Science.gov

Sample records for norman access control

  1. STS-125 Flight Control Team in WFCR - Ascent/Entry with Flight Director Norman Knight

    NASA Image and Video Library

    2009-05-21

    JSC2009-E-121353 (21 May 2009) --- The members of the STS-125 Ascent and Entry flight control team pose for a group portrait in the space shuttle flight control room in the Mission Control Center at NASA's Johnson Space Center. Flight director Norm Knight (left) and astronaut Gregory H. Johnson, spacecraft communicator (CAPCOM), hold the STS-125 mission logo.

  2. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  3. Reflective Database Access Control

    ERIC Educational Resources Information Center

    Olson, Lars E.

    2009-01-01

    "Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…

  4. Editorial on Norman Borlaug

    USDA-ARS?s Scientific Manuscript database

    A three paragraph editorial about Norman Borlaug and his work to produce semi-dwarf wheats for improved food production on a world scale. His work in Mexico, since 1944, resulted in many developing countries, especially in the subAsian continent, becoming self sufficient in wheat production. Borla...

  5. Improving School Access Control

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    Few things are more important for school safety and security than controlling access to buildings and grounds. It is relatively easy to incorporate effective access control measures in new school designs but more difficult in existing schools, where most building and site features cannot be readily altered or reconfigured. The National…

  6. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  7. ACCESS Pointing Control System

    NASA Technical Reports Server (NTRS)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; hide

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  8. 33 CFR 208.34 - Norman Dam and Lake Thunderbird, Little River, Okla.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 3 2012-07-01 2012-07-01 false Norman Dam and Lake Thunderbird... OF THE ARMY, DEPARTMENT OF DEFENSE FLOOD CONTROL REGULATIONS § 208.34 Norman Dam and Lake Thunderbird, Little River, Okla. The Bureau of Reclamation, or its designated agent, shall operate Norman Dam and...

  9. 33 CFR 208.34 - Norman Dam and Lake Thunderbird, Little River, Okla.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 3 2013-07-01 2013-07-01 false Norman Dam and Lake Thunderbird... OF THE ARMY, DEPARTMENT OF DEFENSE FLOOD CONTROL REGULATIONS § 208.34 Norman Dam and Lake Thunderbird, Little River, Okla. The Bureau of Reclamation, or its designated agent, shall operate Norman Dam and...

  10. 33 CFR 208.34 - Norman Dam and Lake Thunderbird, Little River, Okla.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Norman Dam and Lake Thunderbird... OF THE ARMY, DEPARTMENT OF DEFENSE FLOOD CONTROL REGULATIONS § 208.34 Norman Dam and Lake Thunderbird, Little River, Okla. The Bureau of Reclamation, or its designated agent, shall operate Norman Dam and...

  11. 33 CFR 208.34 - Norman Dam and Lake Thunderbird, Little River, Okla.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 3 2014-07-01 2014-07-01 false Norman Dam and Lake Thunderbird... OF THE ARMY, DEPARTMENT OF DEFENSE FLOOD CONTROL REGULATIONS § 208.34 Norman Dam and Lake Thunderbird, Little River, Okla. The Bureau of Reclamation, or its designated agent, shall operate Norman Dam and...

  12. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  13. Norman Drachler: Defender of Decentralization

    ERIC Educational Resources Information Center

    Logan, Edgar

    1972-01-01

    Dr. Norman Drachler, former Detroit Superintendent of Schools, went to Washington in 1971 to establish an Institute for Educational Leadership for the Ford Foundation in association with George Washington University. (Author/MB)

  14. Mobile access control vestibule

    NASA Astrophysics Data System (ADS)

    DePoy, Jennifer M.

    1998-12-01

    The mobile access control vestibule (MACV) is an adaptation of techniques developed for mobile military command centers. The overall configuration of modules acts as an entry control/screening facility or transportable command center. The system would provide the following capabilities: (1) A key element for force protection, rapid deployment units sent to areas having no prepositioned equipment or where there has been a degradation of that equipment as a result of natural disasters or civil unrest. (2) A rapidly deployable security control center to upgrade the security at nonmilitary sites (e.g., diplomatic or humanitarian organizations). (3) Personnel screening, package screening, badge/identification card production for authorized personnel, centralized monitoring of deployed perimeter sensors, and centralized communications for law enforcement personnel. (4) Self-contained screening and threat detection systems, including explosives detection using the system developed by Sandia National Laboratories for the FAA. When coupled with transportable electric generators, the system is self-sufficient. The communication system for the MACV would be a combination of physically wired and wireless communication units that supports by ad hoc networking.

  15. Norman Geschwind Lecture: Geschwind's Lesson.

    ERIC Educational Resources Information Center

    Duane, Drake D.

    2002-01-01

    This article reviews the contributions of Norman Geschwind on behavioral neurology. It discusses his novel associations between brain function/structure and behavior and findings from a recent study of 200 individuals with developmental disorders that indicate altered neuroanatomy in dyslexia may be accompanied by altered clinical neurophysiology.…

  16. Norman Geschwind Lecture: Geschwind's Lesson.

    ERIC Educational Resources Information Center

    Duane, Drake D.

    2002-01-01

    This article reviews the contributions of Norman Geschwind on behavioral neurology. It discusses his novel associations between brain function/structure and behavior and findings from a recent study of 200 individuals with developmental disorders that indicate altered neuroanatomy in dyslexia may be accompanied by altered clinical neurophysiology.…

  17. Bibliographic Access and Control System.

    ERIC Educational Resources Information Center

    Kelly, Betsy; And Others

    1982-01-01

    Presents a brief summary of the functions of the Bibliographic Access & Control System (BACS) implemented at the Washington University School of Medicine Library, and outlines the design, development, and uses of the system. Bibliographic control of books and serials and user access to the system are also discussed. (Author/JL)

  18. Norman Garmezy (1918-2009).

    PubMed

    Masten, Ann S; Nuechterlein, Keith H; Wright, Margaret O'Dougherty

    2011-01-01

    Norman Garmezy, a pioneer in research on risk and resilience, died in Nashville, Tennessee, on November 21, 2009, at the age of 91. He was a legendary mentor as well as an eminent scientist in clinical psychology. Norm was born on June 18, 1918, in New York City and grew up in the Bronx in a Jewish neighborhood where educational attainment was highly valued. The scientific study of resilience as conceived by Norman Garmezy, his peers, and students has transformed the science and practice of multiple disciplines, from the molecular level to the global ecosystem, infusing a strength-based and recovery-oriented approach into psychology, education, social work, and psychiatry. Current research on resilience ranges from studies of plasticity in brain development to effective planning for resilience in the context of disaster. Norm's influential ideas and research earned him international acclaim and many honors for lifetime achievements in science. Throughout his career, Norm held many leadership roles. Throughout his life, Norm spoke with great love about his wife of 63 years, Edie Garmezy (who died just months before him in 2009), and their children. In addition to his work and his family, Norm had three abiding passions-theater, movies, and politics. During the last two decades of his life, Norm and those who loved him endured his long decline from Alzheimer's, which slowly stole his brilliant mind and hilarious sense of humor. Nonetheless, the incredible spirit and humanity of this giant scholar continued to shine through this terrible disease. To the end of his life, Norm's face would light up with a smile as he greeted the people he loved, and he would often exclaim, "Wonderful!" Norman Garmezy was a remarkable person and scholar who left an extraordinary legacy of love and work to inspire future generations in their efforts to understand and promote the human capacity for competence and resilience. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  19. Service-Oriented Access Control

    DTIC Science & Technology

    2014-09-01

    several advanced networking courses. Through his knowledge and teaching style, I gained critical knowledge and skills that will certainly help me in my...information contained in a datagram that is pertinent to access control. The following pseudo- grammar specifies the values used in this thesis: A ::= HTTP_RQ

  20. LANSCE personnel access control system

    SciTech Connect

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described.

  1. ACCESS: Detector Control and Performance

    NASA Astrophysics Data System (ADS)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  2. Evaluation of Kinetic Controls on SO42- Reduction at Experimentally Induced Small-Scale Mixing Interfaces Using Modified Push-Pull Tests in a Landfill-Leachate Contaminated Wetland, Norman Landfill

    NASA Astrophysics Data System (ADS)

    Kneeshaw, T. A.; McGuire, J. T.; Cozzarelli, I. M.; Smith, E. W.

    2006-05-01

    A wide variety of methods have been used to quantify the subsurface activities of microorganisms in response to geochemical perturbations but identifying representative reaction rates has proven challenging. This study was conducted at the Norman Landfill, Norman, OK, to evaluate kinetic controls on SO42- reduction at simulated in situ mixing interfaces between wetland porewater and groundwater impacted by landfill leachate using a series of modified push-pull tests. Small (cm) scale mixing zones exhibiting steep geochemical gradients were targeted because quantifying the role of these poorly understood reaction zones is important for understanding system level biogeochemical cycling and in turn the fate and transport of contaminants. This study was designed to isolate rates of reactions from push-pull tests in an effort to evaluate the kinetic controls on rates within these dynamic mixing zones. To obtain in situ rates we evaluated kinetic controls on SO42- reduction using geochemical data collected from small-scale push-pull tests used to introduce electron- acceptor (SO42-) limited wetland porewater to anaerobic groundwater containing abundant electron acceptor (SO42-), thus simulating the aquifer-wetland interface. A relatively well-sorted, fine-grained sand lens within the reducing wetland sediments was targeted using small-diameter (2.54 cm, O.D.) drive-point wells with a discrete, internally packed 4.5 cm well screen. A series of push-pull tests were performed in these wells by injecting the SO42--rich aquifer water into the targeted zone. The SO42--rich water used for the push phase of the tests was pumped from the anaerobic aquifer at the site and amended with 100 mg/L bromide (as NaBr) which served as a conservative tracer to track dilution from mixing, advection, and dispersion. Geochemical results revealed that 1) SO42- reduction was the dominant terminal electron accepting process initiated by the mixing event 2) in all tests in which sulfate reduction

  3. Efficient Access Control in Multimedia Social Networks

    NASA Astrophysics Data System (ADS)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  4. Logical Access Control Mechanisms in Computer Systems.

    ERIC Educational Resources Information Center

    Hsiao, David K.

    The subject of access control mechanisms in computer systems is concerned with effective means to protect the anonymity of private information on the one hand, and to regulate the access to shareable information on the other hand. Effective means for access control may be considered on three levels: memory, process and logical. This report is a…

  5. American Chronicles: The Art of Norman Rockwell

    ERIC Educational Resources Information Center

    Johnson, Mark M.

    2009-01-01

    Norman Rockwell was the quintessential painter of American life. His images reflect the history of America as told through the eyes of this idealistic and patriotic artist who sought to show America at its best, and to present the lives, hopes and dreams of the average American in the middle-20th century. Few artists have produced so many images…

  6. American Chronicles: The Art of Norman Rockwell

    ERIC Educational Resources Information Center

    Johnson, Mark M.

    2009-01-01

    Norman Rockwell was the quintessential painter of American life. His images reflect the history of America as told through the eyes of this idealistic and patriotic artist who sought to show America at its best, and to present the lives, hopes and dreams of the average American in the middle-20th century. Few artists have produced so many images…

  7. J. Norman Collie, the inventive chemist.

    PubMed

    Davies, Alwyn G

    2014-01-01

    Norman Collie was Professor of Organic Chemistry and Director of Laboratories at University College London between 1902 and 1928. He was a pioneering mountaineer but was also a prolific inventor; this review focuses on that little-known latter aspect of his activities.

  8. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  9. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  10. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  11. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No control...

  12. 47 CFR 95.645 - Control accessibility.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  13. 10 CFR 36.23 - Access control.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Access control. 36.23 Section 36.23 Energy NUCLEAR... activation of the control. (g) Each entrance to the radiation room of a panoramic irradiator and each... unauthorized entry when the personnel access barrier is locked. Activation of the intrusion alarm must alert an...

  14. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  15. Proximity Displays for Access Control

    ERIC Educational Resources Information Center

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  16. Norman Rostoker and strongly correlated plasmas

    NASA Astrophysics Data System (ADS)

    Ichimaru, Setsuo

    2016-03-01

    If Norman were alive and attended this symposium, he might have quipped: "Setsuo! What are you talking about! A plasma is, after all, a strongly correlated object, and there is nothing so special about it!" "Yes, Norman, you are so correct! A statistical system consisting of mutually non-interacting and thus uncorrelated particles may be an "ideal-gas" system from a physics teacher's pedagogical point of view, but real systems do consist of mutually interacting and thus strongly correlated particles; a plasma is definitely one of them.Here, in the memory of Professor Rostoker's outstanding contributions to strongly correlated plasmas for the past 60 years, we wish to survey on "Scattering of Electromagnetic Waves by a Strongly Correlated Plasma" and "Multi-particle Correlation, Equations of State, and Phase Diagrams" in what follows.

  17. Wei-Norman equations for classical groups

    NASA Astrophysics Data System (ADS)

    Charzyński, Szymon; Kuś, Marek

    2015-08-01

    We show that the nonlinear autonomous Wei-Norman equations, expressing the solution of a linear system of non-autonomous equations on a Lie algebra, can be reduced to the hierarchy of matrix Riccati equations in the case of all classical simple Lie algebras. The result generalizes our previous one concerning the complex Lie algebra of the special linear group. We show that it cannot be extended to all simple Lie algebras, in particular to the exceptional G2 algebra.

  18. Norman Thagard Explains the Microgravity Vestibular Investigation

    NASA Technical Reports Server (NTRS)

    1992-01-01

    In this video, astronaut Norman Thagard explains how he and his fellow STS-42 crew mates interacted with the rotator chair for the Microgravity Vestibular Investigations (MVI) onboard the International Microgravity Laboratory in July 1992. In the MVI, researchers from Canada, the United States, and other countries examined the effects of orbital flight on the human orientation system to obtain a better understanding of the mechanisms of adaptation to orbit.

  19. Role-based access control permissions

    DOEpatents

    Staggs, Kevin P.; Markham, Thomas R.; Hull Roskos, Julie J.; Chernoguzov, Alexander

    2017-04-25

    Devices, systems, and methods for role-based access control permissions are disclosed. One method includes a policy decision point that receives up-to-date security context information from one or more outside sources to determine whether to grant access for a data client to a portion of the system and creates an access vector including the determination; receiving, via a policy agent, a request by the data client for access to the portion of the computing system by the data client, wherein the policy agent checks to ensure there is a session established with communications and user/application enforcement points; receiving, via communications policy enforcement point, the request from the policy agent, wherein the communications policy enforcement point determines whether the data client is an authorized node, based upon the access vector received from the policy decision point; and receiving, via the user/application policy enforcement point, the request from the communications policy enforcement point.

  20. The medical life of Henry Norman Bethune

    PubMed Central

    Deslauriers, Jean; Goulet, Denis

    2015-01-01

    BACKGROUND: Henry Norman Bethune is one of the most exciting and incredible surgeons that Canada has ever produced. Indeed, he is often characterized as one of the world’s best-known surgeons. He was an innovator and his scientific contributions have stood the test of time. In Canada, he will forever be remembered as a social activist committed to the welfare of the poor and to the reform of the health care system. In the People’s Republic of China, he is idolized and remains the only foreigner to ever become a national hero. OBJECTIVE: To detail the numerous and significant achievements of Henry Norman Bethune in the field of thoracic surgery and as a social activist and describe his heroic war-time actions on the battlefields of both Spain and China. METHOD: Information was gathered through the reading of the numerous publications written about the life and work of Bethune, interviews with knowledgeable people from Canadian and Chinese universities, analysis of Bethune’s own publications, and extensive experience of one of the authors in China. RESULTS: In the social sense, Henry Norman Bethune had a difficult personality, but he was deeply caring about the plight of his patients, especially the poor. As a thoracic surgeon, he could be ingenious, thoughtful and effective but he could also be abrasive, restless and temperamental. His scientific contributions were sound and, at the time, gained worldwide attention. As an activist, he led a crusade to reform the Canadian health care system, demanding free health care for all. His outstanding work during the Spanish Civil War, where he organized the first ever mobile blood transfusion unit, and during the Sino-Japanese war, where he was totally committed to the welfare of both soldiers and civilian population, were deliberate acts of resistance against Fascist onslaught and enthusiasm for the Communist cause. CONCLUSIONS: Henry Norman Bethune was unconventional and a revolutionary, but he was brilliant. He will

  1. Access Control Management for SCADA Systems

    NASA Astrophysics Data System (ADS)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  2. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  3. The linked medical data access control framework.

    PubMed

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  4. Access control for electronic patient records.

    PubMed

    Glagola, M J

    1998-01-01

    The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.

  5. Norman Stuart heaps 1928”1986

    NASA Astrophysics Data System (ADS)

    Cartwright, David E.

    Dr. Norman Heaps died on June 26, 1986, in a hospital near his native town of Prescot, U.K., a suburb of Liverpool, after a long illness punctuated by bouts of painful medical treatment for lung cancer. He was the pioneer in Britain of the numerical modeling of tides and storm surges in shelf seas.He graduated at the University of Liverpool in 1949 with honors in mathematics with subsidiary physics and oceanography. Many years later the same university awarded him a doctorate on the basis of his published work. Norman's first 10 postgraduate years were spent as mathematician in the aircraft industry, but he never felt at home in the industrial world and sought a more academic career. While lecturing at the Royal College of Advanced Technology at Salford, Manchester (now the University of Salford), he struck a lasting friendship with Clifford Mortimer, FRS, then director of the Freshwater Biological Association laboratory at Lake Windermere, who first interested Heaps in the problem of computing the natural seiche oscillations of that lake. The use of electronic computers was still in its infancy, but Heaps saw that the equations of internal oscillations in such a lake could be solved numerically by methods that he had developed in the theory of wing structures. Heaps worked up a Master's thesis on this problem during his summer vacations, and he later worked with Mortimer at the University of Wisconsin on a more advanced scheme involving the coupled oscillations of Green Bay and Lake Michigan.

  6. Dr. Norman Bethune as a surgeon

    PubMed Central

    Rosen, Irving B.

    1996-01-01

    Dr. Norman Bethune’s recognition as a Canadian of renown resulted from his devoted work in China during the late 1930s. He had received a general surgical training, but his personal illness with tuberculosis led him to specialize in thoracic surgery. A surgical program at McGill University under Dr. Edward Archibald, a pioneer thoracic surgeon, was initially successful, but by the mid-1930s Bethune was rejected by McGill and Dr. Archibald. He became chief of thoracic surgery at the Hôpital du Sacré-Coeur outside Montreal. He developed thoracic surgical instruments and wrote numerous scientific papers. The outbreak of civil war in Spain in 1937 attracted Bethune to oppose what he viewed as fascist aggression. He went to Spain, where he established the value of mobile blood banking. On his return to Canada in 1937 he became aware of the escalating war between China and Japan. He joined the Chinese communist forces in northern China and spent 18 months doing Herculean mobile war surgery, while improving the state of medical services in primitive, depressing conditions. He died in 1939 at the age of 49 years of septicemia as a result of accidental laceration of his finger during surgery. The Chinese have venerated Norman Bethune and stimulated his memorialization in Canada. His surgical record can be viewed as mixed in quality, but overall his performance remains impressive for its achievement. PMID:8599799

  7. 168. ARAIV Index of drawings prepared by Norman Engineering Company ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    168. ARA-IV Index of drawings prepared by Norman Engineering Company in preparation for construction of ARA-IV. Norman Engineering Company 961-area/ML-1index. Date: March 1961. Ineel index code no. 066-9999-90-613-102731. - Idaho National Engineering Laboratory, Army Reactors Experimental Area, Scoville, Butte County, ID

  8. PsychoNeuroImmunology Research Society's Norman Cousins Award.

    PubMed

    2015-01-01

    Dr. Rainer H. Straub, University Hospital, Regensburg, Germany, is the recipient of the 2015 Norman Cousins Award and will present the memorial lecture at the PsychoNeuroImmunology Research Society (PNIRS) meeting, June 3–6, Seattle, WA. The Norman Cousins award is the highest honor bestowed by the PNIRS and recognizes sustained and outstanding research contributions in psychoneuroimmunology.

  9. Access control mechanisms for distributed healthcare environments.

    PubMed

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  10. Access control mechanism of wireless gateway based on open flow

    NASA Astrophysics Data System (ADS)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  11. Wei-Norman equations for a unitary evolution

    NASA Astrophysics Data System (ADS)

    Charzyński, Szymon; Kuś, Marek

    2013-07-01

    The Wei-Norman technique allows one to express the solution of a system of linear non-autonomous differential equations in terms of product of exponentials with time-dependent exponents being solutions of a system of nonlinear differential equations. We show that in the unitary case, i.e. when the solution of the linear system is given by a unitary evolution operator, the nonlinear system, by an appropriate choice of ordering, can be reduced to a hierarchy of matrix Riccati equations. To this end, we consider a general linear non-autonomous dynamical system on the special linear group SL(N, {C}). The unitary case, of particular significance for quantum optimal control problems, is then obtained by restriction to anti-Hermitian generators. We also point to the connections of the obtained results with the theory of the so-called Lie systems.

  12. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  13. Network Access Control List Situation Awareness

    ERIC Educational Resources Information Center

    Reifers, Andrew

    2010-01-01

    Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…

  14. Temporal dynamics of biogeochemical processes at the Norman Landfill site

    USGS Publications Warehouse

    Arora, Bhavna; Mohanty, Binayak P.; McGuire, Jennifer T.; Cozzarelli, Isabelle M.

    2013-01-01

    The temporal variability observed in redox sensitive species in groundwater can be attributed to coupled hydrological, geochemical, and microbial processes. These controlling processes are typically nonstationary, and distributed across various time scales. Therefore, the purpose of this study is to investigate biogeochemical data sets from a municipal landfill site to identify the dominant modes of variation and determine the physical controls that become significant at different time scales. Data on hydraulic head, specific conductance, δ2H, chloride, sulfate, nitrate, and nonvolatile dissolved organic carbon were collected between 1998 and 2000 at three wells at the Norman Landfill site in Norman, OK. Wavelet analysis on this geochemical data set indicates that variations in concentrations of reactive and conservative solutes are strongly coupled to hydrologic variability (water table elevation and precipitation) at 8 month scales, and to individual eco-hydrogeologic framework (such as seasonality of vegetation, surface-groundwater dynamics) at 16 month scales. Apart from hydrologic variations, temporal variability in sulfate concentrations can be associated with different sources (FeS cycling, recharge events) and sinks (uptake by vegetation) depending on the well location and proximity to the leachate plume. Results suggest that nitrate concentrations show multiscale behavior across temporal scales for different well locations, and dominant variability in dissolved organic carbon for a closed municipal landfill can be larger than 2 years due to its decomposition and changing content. A conceptual framework that explains the variability in chemical concentrations at different time scales as a function of hydrologic processes, site-specific interactions, and/or coupled biogeochemical effects is also presented.

  15. Temporal dynamics of biogeochemical processes at the Norman Landfill site

    NASA Astrophysics Data System (ADS)

    Arora, Bhavna; Mohanty, Binayak P.; McGuire, Jennifer T.; Cozzarelli, Isabelle M.

    2013-10-01

    The temporal variability observed in redox sensitive species in groundwater can be attributed to coupled hydrological, geochemical, and microbial processes. These controlling processes are typically nonstationary, and distributed across various time scales. Therefore, the purpose of this study is to investigate biogeochemical data sets from a municipal landfill site to identify the dominant modes of variation and determine the physical controls that become significant at different time scales. Data on hydraulic head, specific conductance, δ2H, chloride, sulfate, nitrate, and nonvolatile dissolved organic carbon were collected between 1998 and 2000 at three wells at the Norman Landfill site in Norman, OK. Wavelet analysis on this geochemical data set indicates that variations in concentrations of reactive and conservative solutes are strongly coupled to hydrologic variability (water table elevation and precipitation) at 8 month scales, and to individual eco-hydrogeologic framework (such as seasonality of vegetation, surface-groundwater dynamics) at 16 month scales. Apart from hydrologic variations, temporal variability in sulfate concentrations can be associated with different sources (FeS cycling, recharge events) and sinks (uptake by vegetation) depending on the well location and proximity to the leachate plume. Results suggest that nitrate concentrations show multiscale behavior across temporal scales for different well locations, and dominant variability in dissolved organic carbon for a closed municipal landfill can be larger than 2 years due to its decomposition and changing content. A conceptual framework that explains the variability in chemical concentrations at different time scales as a function of hydrologic processes, site-specific interactions, and/or coupled biogeochemical effects is also presented.

  16. [The military odyssey of Norman Bethune].

    PubMed

    Alexander, C A

    2000-04-01

    While visiting the People's Republic of China in 1982, I became aware of the work of the Canadian, Norman Bethune, as a military surgeon. Bethune first served as a stretcher - bearer in an ambulance unit and later as a medical officer with the Allies during the First World War. He also participated in the Spanish Civil War as a military physician. He died in China while serving with Mao Tsetung's Eighth Route Army, fighting the Japanese invaders in Yen'an. Bethune pioneered the use of whole blood transfusions in combat areas, first in Spain and then in China. In the annals of Chinese military history, he has been given an honored place as a military surgeon and a martyr. He is also credited in China, with improving the practice of battlefield medicine, as an organizer, teacher and innovator. Bethune's fame in China is now spreading to Canada.

  17. Norman Bethune, Canadian surgeon: his Chinese connection.

    PubMed

    Summers, G V

    1983-07-01

    Norman Bethune, a Canadian thoracic surgeon who dabbled in painting, poetry, criticism, teaching and invention, was a member of the Communist Party of Canada. He became involved in two civil wars on opposite sides of the world and amassed both criticism and respect from colleagues and national leaders. The author describes Bethune's time in China, during which he developed front line field hospitals for Mao Tse-tung and his guerrillas in their struggle against the Japanese during 1938 and 1939. His efforts in China on behalf of the wounded brought him into contact with the primitive military medicine of the country and the poverty of its people; it earned for him a local reputation as saviour and benefactor and gave him an honoured place in Chinese military history.

  18. J. Norman Lockyer: The Early Years

    NASA Astrophysics Data System (ADS)

    Frost, M. A.

    2005-12-01

    Joseph Norman Lockyer was born in 1836 in Rugby, where his father was a surgeon-apothecary and a leading member of the Literary and Scientific Institution. In the 1840s the family moved to Leicester, where his father became a manufacturer of matches. After his mother's death, he lived with an uncle and attended school in Kenilworth. His main interests then were classical and modern languages, which he taught in a Somerset school before going to Switzerland in 1856-57. On his return, the patronage of Lord Leigh of Stoneleigh helped him to become a clerk in the War Office. He developed an interest in astronomy that led to his election as a Fellow of the Royal Society, and to the editorship of the science journal Nature.

  19. Speed control system for an access gate

    DOEpatents

    Bzorgi, Fariborz M [Knoxville, TN

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  20. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  1. Social Network Privacy via Evolving Access Control

    NASA Astrophysics Data System (ADS)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  2. External access to ALICE controls conditions data

    NASA Astrophysics Data System (ADS)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  3. Access control and confidentiality in radiology

    NASA Astrophysics Data System (ADS)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  4. [To the Centennial of Norman Holter (19141983)].

    PubMed

    Makarov, L M

    2015-01-01

    The article is devoted to the centennial of the founder of ambulatory ECG monitoring Norman Jeffrey Holter (1914-1983). It contains brief history of the scientists family, and depiction of his own educational way from magister of chemistry and physics to specialist in nuclear research. His activity during World War II, research related to impact of nuclear tests on environment after the war is also described. The fact is stressed that N. Holter was organizer and first president of Society of Nuclear Medicine. But most prominent contribution of N. Holter was elaboration of the method of long-term ECG monitoring of freely active patients - the method which was later named Holter Monitoring (HM). The article also contains data of first clinical trials of HM systems and stresses contribution of Holter team-mates and colleagues (B. Del Mar, G. Kennedy, S. Stern and others) in their conduct. It shows technical and ideological evolution of HM systems from large apparatuses weighting 40 kg to modern portable devices capable of collecting, storing and processing huge amounts of information, transmitting it over internet to any distance. Nontriviality and serendipity of N. Holters approach to obtaining novel unpredictable knowledge allowed him to realize his numerous talents and abilities.

  5. A service-oriented data access control model

    NASA Astrophysics Data System (ADS)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  6. Modelling privilege management and access control.

    PubMed

    Blobel, Bernd; Nordberg, Ragnar; Davis, John Mike; Pharow, Peter

    2006-08-01

    For establishing trustworthiness in advanced architectures for future-proof health information systems being open, flexible, scaleable, portable, and semantically interoperable, security and privacy services needed must be designed as an inherent part of the architecture. Such architecture has to meet the paradigms of distribution, component orientation, formal modelling, separation of logical and technological aspects, etc. In model-driven architectures components providing security and privacy services have to be specified using the same methodology of formal models with meta-languages as expression means, as deployed in computational, technical, or medical domains. The resulting approach must be based on the ISO Reference Model-Open Distributed Processing. Currently, standards developing organisation are defining emerging tasks and standards for semantic interoperability and trustworthy collaboration for advanced health information systems. Communication security issues have been specified and implemented, while application security challenges such as privilege management and access control are still under development. Therefore, a series of formal models have been developed by the authors covering, e.g. domains, service delegation, claims control, policies, roles, authorisations, and access control. The required models are introduced and interpreted in a generic way. The crucial concept of security policy and its relationship to the other concepts has been considered in detail. Based on formal models, security services can be integrated into advanced systems architectures enabling semantic interoperability in the context of trustworthiness of communication and co-operation.

  7. Cardea: Dynamic Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  8. Application-Defined Decentralized Access Control

    PubMed Central

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  9. Modeling mandatory access control in role-based security systems

    SciTech Connect

    Nyanchama, M.; Osborn, S.

    1996-12-31

    This paper discusses the realization of mandatory access control in role-based protection systems. Starting from the basic definitions of roles, their application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information context. By handling each of the role contexts as independent security levels of information, we simulate mandatory access by imposing the requirements of mandatory access control. Among the key considerations, we propose a means of taming Trojan horses by imposing acyclic information flow among contexts in role-based protection systems. The acyclic information flows and suitable access rules incorporate secrecy which is an essential component of mandatory access control.

  10. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  11. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.

    PubMed

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-03-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  12. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

    PubMed Central

    Mell, Peter; Shook, James; Harang, Richard; Gavrila, Serban

    2017-01-01

    An important way to limit malicious insiders from distributing sensitive information is to as tightly as possible limit their access to information. This has always been the goal of access control mechanisms, but individual approaches have been shown to be inadequate. Ensemble approaches of multiple methods instantiated simultaneously have been shown to more tightly restrict access, but approaches to do so have had limited scalability (resulting in exponential calculations in some cases). In this work, we take the Next Generation Access Control (NGAC) approach standardized by the American National Standards Institute (ANSI) and demonstrate its scalability. The existing publicly available reference implementations all use cubic algorithms and thus NGAC was widely viewed as not scalable. The primary NGAC reference implementation took, for example, several minutes to simply display the set of files accessible to a user on a moderately sized system. In our approach, we take these cubic algorithms and make them linear. We do this by reformulating the set theoretic approach of the NGAC standard into a graph theoretic approach and then apply standard graph algorithms. We thus can answer important access control decision questions (e.g., which files are available to a user and which users can access a file) using linear time graph algorithms. We also provide a default linear time mechanism to visualize and review user access rights for an ensemble of access control mechanisms. Our visualization appears to be a simple file directory hierarchy but in reality is an automatically generated structure abstracted from the underlying access control graph that works with any set of simultaneously instantiated access control policies. It also provide an implicit mechanism for symbolic linking that provides a powerful access capability. Our work thus provides the first efficient implementation of NGAC while enabling user privilege review through a novel visualization approach. This

  13. Astronaut Norman Thagard changes tray in RAHF for rodents

    NASA Technical Reports Server (NTRS)

    1985-01-01

    Astronaut Norman Thagard changes a tray in the research animal holding facility (RAHF) for rodents at the Ames double rack facility aboard the Spacelab 3 science module in the cargo bay of the shuttle Challenger. Lending a hand is payload specialist Lodewijk van den Berg. Both men are wearing protective clothing and surgical masks for this procedure.

  14. Donald Norman's "The Invisible Computer" and Its Implications for Education.

    ERIC Educational Resources Information Center

    Frey, Joanne M.

    In "The Invisible Computer," Donald Norman illustrates his theory of invisible computers turning into information appliances with examples of past inventions like the radio, automobile, and phonograph. Second generation computers have evolved as far as technology will allow. At the present time, the technology itself is the driving force…

  15. Maintaining Excellence While Managing Transitions: Norman S. Weir Revisited

    ERIC Educational Resources Information Center

    Emmons, Christine L.; Baskerville, Ruth

    2005-01-01

    In a national education climate where change is the only constant, Norman S. Weir Elementary School has maintained and expanded the reform efforts that have resulted in striking academic achievement and improved school climate. Despite changes in administration and staffing, a highly professional and committed staff has continued the…

  16. Maintaining Excellence While Managing Transitions: Norman S. Weir Revisited

    ERIC Educational Resources Information Center

    Emmons, Christine L.; Baskerville, Ruth

    2005-01-01

    In a national education climate where change is the only constant, Norman S. Weir Elementary School has maintained and expanded the reform efforts that have resulted in striking academic achievement and improved school climate. Despite changes in administration and staffing, a highly professional and committed staff has continued the…

  17. A School Transformed: The Case of Norman S. Weir.

    ERIC Educational Resources Information Center

    Emmons, Christine L.; Hagopian, Gloria; Efimba, Maloke O.

    1998-01-01

    Describes the Norman S. Weir Elementary School, Paterson (New Jersey), which epitomizes the transformation that occurs when the Comer School Development Program is implemented well. The school has risen from being one of the lowest achieving schools in its district to one of the highest achievers. The role of the principal is highlighted. (SLD)

  18. Astronaut Norman Thagard changes tray in RAHF for rodents

    NASA Technical Reports Server (NTRS)

    1985-01-01

    Astronaut Norman Thagard changes a tray in the research animal holding facility (RAHF) for rodents at the Ames double rack facility aboard the Spacelab 3 science module in the cargo bay of the shuttle Challenger. Lending a hand is payload specialist Lodewijk van den Berg. Both men are wearing protective clothing and surgical masks for this procedure.

  19. Transfer and Changing Linguistic Norms in Jersey Norman French

    ERIC Educational Resources Information Center

    Jones, Mari C.

    2005-01-01

    The aim of this paper is to investigate a case of transfer within the context of language death. By examining data from Jersey Norman French (known to its speakers as Jerriais) it illustrates the difficulty in determining linguistic norms for this relatively undocumented variety and suggests possible strategies to overcome this problem. The study…

  20. Recharge processes in an alluvial aquifer riparian zone, Norman Landfill, Norman, Oklahoma, 1998-2000

    USGS Publications Warehouse

    Scholl, Martha; Christenson, Scott; Cozzarelli, Isabelle; Ferree, Dale; Jaeshke, Jeanne

    2005-01-01

    Analyses of stable isotope profiles (d2H and d18O) in the saturated zone, combined with water-table fluctuations, gave a comprehensive picture of recharge processes in an alluvial aquifer riparian zone. At the Norman Landfill U.S. Geological Survey Toxic Substances Hydrology research site in Norman, Oklahoma, recharge to the aquifer appears to drive biodegradation, contributing fresh supplies of electron acceptors for the attenuation of leachate compounds from the landfill. Quantifying recharge is a first step in studying this process in detail. Both chemical and physical methods were used to estimate recharge. Chemical methods included measuring the increase in recharge water in the saturated zone, as defined by isotopic signature, specific conductance or chloride measurements; and infiltration rate estimates using storm event isotopic signatures. Physical methods included measurement of water-table rise after individual rain events and on an approximately monthly time scale. Evapotranspiration rates were estimated using diurnal watertable fluctuations; outflux of water from the alluvial aquifer during the growing season had a large effect on net recharge at the site. Evaporation and methanogenesis gave unique isotopic signatures to different sources of water at the site, allowing the distinction of recharge using the offset of the isotopic signature from the local meteoric water line. The downward movement of water from large, isotopically depleted rain events in the saturated zone yielded recharge rate estimates (2.2 - 3.3 mm/day), and rates also were determined by observing changes in thickness of the layer of infiltrated recharge water at the top of the saturated zone (1.5 - 1.6 mm/day). Recharge measured over 2 years (1998-2000) in two locations at the site averaged 37 percent of rainfall, however, part of this water had only a short residence time in the aquifer. Isotopes showed recharge water entering the ground-water system in winter and spring, then being

  1. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  2. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  3. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  4. Open versus Controlled-Access Data | Office of Cancer Genomics

    Cancer.gov

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  5. Biogeochemical Cycling at Natural System Interfaces at the Norman Landfill, Norman, OK: Living on the Edge

    NASA Astrophysics Data System (ADS)

    McGuire, J. T.; Baez-Cazull, S.; Cozzarelli, I. M.; Voytek, M. A.; Smith, E. W.; Kneeshaw, T. A.; Kirshstein, J. D.

    2006-05-01

    Steep biogeochemical gradients were observed at mixing interfaces in a wetland-aquifer system impacted by landfill leachate in Norman, Oklahoma. The system lies within the reworked alluvial plain of the Canadian River and is characterized by layered low hydraulic conductivity wetland sediments and interbedded sandy aquifer material. Using cm-scale passive diffusion samplers (peepers), water samples were collected to span the interfaces between surface water, wetland sediments, and sandy sediments. Geochemical indicators of terminal electron accepting processes, including low molecular weight fatty acids, were analyzed by capillary electrophoresis and field techniques to maximize low sample volumes. Iron reduction and sulfate reduction appear to coexist at the sediment-water interface. Maximum concentrations of other biogeochemical indicators (ex. acetate (1.80mM, 8.8mM) and ammonium (13mM, 36mM)) were observed at the sediment/water, and wetland sediment/sand interfaces. Findings support the hypothesis that increased biogeochemical cycling occurs at interfaces where limiting electron acceptors and donors mix. The linkages between geochemical gradients and microbiological cycling are being evaluated using in-situ experiments designed to collect microbiological and geochemical data at similar spatial and temporal scales within the aquifer-wetland system.

  6. Permission to Speak: A Novel Formal Foundation for Access Control

    DTIC Science & Technology

    2016-06-21

    NAME(S) AND ADDRESS(ES) University of Pennsylvania,Computer and Information Science ,Philadelphia,PA,19104 8. PERFORMING ORGANIZATION REPORT NUMBER... science • Uniform treatment of access control and conformance – Access control is verification of permissions – Conformance is satisfaction of

  7. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  8. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... each Maritime Security (MARSEC) Level, including those points where TWIC access control provisions will... control, particularly if these security measures are applied on a random or occasional basis. (f) MARSEC... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access...

  9. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... each Maritime Security (MARSEC) Level, including those points where TWIC access control provisions will... control, particularly if these security measures are applied on a random or occasional basis. (f) MARSEC... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access...

  10. Analysis of Access Control Policies in Operating Systems

    ERIC Educational Resources Information Center

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  11. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... each MARSEC Level, including those points where TWIC access control provisions will be applied. Each... escorting them; (4) Procedures for identifying authorized and unauthorized persons at any MARSEC level; and... access controls, particularly if they are to be applied on a random or occasional basis. (f) MARSEC...

  12. Norman Thagard Discusses Value of Microgravity Vestibular Investigation

    NASA Technical Reports Server (NTRS)

    1992-01-01

    Onboard the International Microgravity Laboratory (IML) mission in July 1992, payload specialist Norman Thagard describes his role in the Microgravity Vestibular Investigation (MVI) which examined the effects of orbital flight on the human orientation system to obtain a better understanding of the mechanisms of adaptation to orbit. Due to gravity, researchers cannot separate the eyes detection of linear and angular motion. Crew members sat in the rotator chair on different axes and recorded eye movement while rotating.

  13. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed.

  14. Managed Access by Controlled Sensing (MACS)

    SciTech Connect

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  15. Urban Studies: A Study of Bibliographic Access and Control.

    ERIC Educational Resources Information Center

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 9 2012-10-01 2012-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  17. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  18. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 9 2014-10-01 2014-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  19. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  20. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 9 2013-10-01 2013-10-01 false Access control systems. 1542.207 Section 1542.207 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access...

  1. 14 CFR 420.53 - Control of public access.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DEPARTMENT OF TRANSPORTATION LICENSING LICENSE TO OPERATE A LAUNCH SITE Responsibilities of a Licensee § 420.53 Control of public access. (a) A licensee shall prevent unauthorized access to the launch site, and... the launch site of safety rules and emergency and evacuation procedures prior to that person's...

  2. Role Based Access Control system in the ATLAS experiment

    NASA Astrophysics Data System (ADS)

    Valsan, M. L.; Dobson, M.; Lehmann Miotto, G.; Scannicchio, D. A.; Schlenker, S.; Filimonov, V.; Khomoutnikov, V.; Dumitru, I.; Zaytsev, A. S.; Korol, A. A.; Bogdantchikov, A.; Avolio, G.; Caramarcu, C.; Ballestrero, S.; Darlea, G. L.; Twomey, M.; Bujor, F.

    2011-12-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (~3000), roles (~320), groups (~80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  3. Access Control of Web- and Java-Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  4. Access control within military C4ISR systems

    NASA Astrophysics Data System (ADS)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  5. Personnel Access Control System Evaluation for National Ignition Facility Operations

    SciTech Connect

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  6. Regulatory Accessibility and Social Influences on State Self-Control

    PubMed Central

    vanDellen, Michelle R.; Hoyle, Rick H.

    2013-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms. PMID:20008967

  7. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    NASA Astrophysics Data System (ADS)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  8. Testing Efficiency Improved by Addition of Remote Access Control Room

    NASA Technical Reports Server (NTRS)

    1996-01-01

    The NASA Lewis Research Center's Remote Access Control Room (RACR) uses off-the-shelf video conferencing software integrated with existing facility data systems to provide access to the test data by networking from virtually anywhere in the country. The system allows research engineers in remote locations to participate in tests and monitor data in real time just as if they were present in the control room.

  9. RANDOM ACCESS CONTROL OF ELECTROLUMINESCENT ELEMENTS.

    DTIC Science & Technology

    Cadmium selenide (CdSe) switches were devised to control the luminous emittance of electroluminescent cells in a solid-state display. The technique...purpose of this contract was to establish the feasibility of utilizing the hysteretic effect in cadmium selenide to provide switching and storage to an...array of electroluminescent cells by investigating the cadmium selenide material, by studying panel structure, and by investigating the addressing of

  10. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  11. Accessible Gaming through Mainstreaming Kinetic Controller

    NASA Astrophysics Data System (ADS)

    Garrido, Yolanda; Marco, Álvaro; Segura, Joaquín; Blanco, Teresa; Casas, Roberto

    Leisure is a very important aspect in our everyday life; and gaming is one of the main ways to it. Depending on the particular situation of each person, the way of playing could be very different. Motivation, preferences, skills, knowledge are some of the factors that influences this experience. When the person has a disability, additional agents come to scene such as cognitive level and mobility. Besides the design of the game, these factors clearly affect how the person interacts with the game; its user interface. In this paper we present a tool that allows people with disabilities to play games with a normalized user interface. This tool a) manages several wireless kinetic remote controllers, e.g. the Wiimotes; b) can be configured to capture any voluntary movements users could do and c) convert them into the specific inputs required by existing adapted games. As a result, users with disabilities can experience and enjoy games that were previously inaccessible to them.

  12. [Justice in health. Comment on the theory by Norman Daniels].

    PubMed

    Rauprich, O

    2009-05-01

    This comment outlines the current approach of Norman Daniels and illustrates its connection to the important theory of political justice by John Rawls. Despite some conceptual imprecision and a lack of coherency between his substantial and procedural account of justice, Daniels' approach qualifies as a benchmark for other current and future theories of justice and health. The social and political implications of his theory are far reaching: We are still far from protecting our health in the way we owe it to each other.

  13. Control with a random access protocol and packet dropouts

    NASA Astrophysics Data System (ADS)

    Wang, Liyuan; Guo, Ge

    2016-08-01

    This paper investigates networked control systems whose actuators communicate with the controller via a limited number of unreliable channels. The access to the channels is decided by a so-called group random access protocol, which is modelled as a binary Markov sequence. Data packet dropouts in the channels are modelled as independent Bernoulli processes. For such systems, a systematic characterisation for controller synthesis is established and stated in terms of the transition probabilities of the Markov protocol and the packet dropout probabilities. The results are illustrated via a numerical example.

  14. Access Control to Information in Pervasive Computing Environments

    DTIC Science & Technology

    2005-08-01

    The latter techniques intro- 138 duce some modification to the data stored in a database or to the requested statistics during the processing of a...for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of...access to Carol’s cal- endar information. Access control to information has been well investigated in the context of informa- tion stored in distributed

  15. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... restricted area and maintain security control during transfers between the facility and a vessel. (g) MARSEC... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  16. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... restricted area and maintain security control during transfers between the facility and a vessel. (g) MARSEC... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  17. Geologic environment of the Van Norman Reservoirs area

    USGS Publications Warehouse

    Yerkes, R.F.; Bonilla, M.G.; Youd, T.L.; Sims, J.D.

    1974-01-01

    The upper and lower Van Norman dams, in northwesternmost San Fernando Valley about 20 mi (32 km) northwest of downtown Los Angeles, were severely damaged during the 1971 San Fernando earthquake. An investigation of the geologic-seismologic setting of the Van Norman area indicates that an earthquake of at least M 7.7 may be expected in the Van Norman area. The expectable transitory effects in the Van Norman area of such an earthquake are as follows: peak horizontal acceleration of at least 1.15 g, peak velocity of displacement of 4.43 ft/sec (135 cm/sec), peak displacement of 2.3 ft (70 cm), and duration of shaking at accelerations greater than 0.05 g, 40 sec. A great earthquake (M 8+) on the San Andreas fault, 25 mi distant, also is expectable. Transitory effects in the Van Norman area from such an earthquake are estimated as follows: peak horizontal acceleration of 0.5 g, peak velocity of 1.97 ft/sec (60 cm/sec), displacement of 1.31 ft (40 cm), and duration of shaking at accelerations greater than 0.05 g, 80 sec. The permanent effects of the expectable local earthquake could include simultaneous fault movement at the lower damsite, the upper damsite, and the site proposed for a replacement dam halfway between the upper and lower dams. The maximum differential displacements due to such movements are estimated at 16.4 ft (5 m) at the lower damsite and about 9.6 ft (2.93 m) at the upper and proposed damsites. The 1971 San Fernando earthquake (M 6?) was accompanied by the most intense ground motions ever recorded instrumentally for a natural earthquake. At the lower Van Norman dam, horizontal accelerations exceeded 0.6 g, and shaking greater than 0.25 g lasted for about 13 see; at Pacoima dam, 6 mi (10 km) northeast of the lower dam, high-frequency peak horizontal accelerations of 1.25 g were recorded in two directions, and shaking greater than 0.25 g lasted for about 7 sec. Permanent effects of the earthquake include slope failures in the embankments of the upper

  18. Towards an Access-Control Framework for Countering Insider Threats

    NASA Astrophysics Data System (ADS)

    Crampton, Jason; Huth, Michael

    As insider threats pose very significant security risks to IT systems, we ask what policy-based approaches to access control can do for the detection, mitigation or countering of insider threats and insider attacks. Answering this question is difficult: little public data about insider-threat cases is available; there is not much consensus about what the insider problem actually is; and previous research in access control has by-and-large not dealt with this issue. We explore existing notions of insiderness in order to identify the relevant research issues. We then formulate a set of requirements for next-generation access-control systems, whose realization might form part of an overall strategy to address the insider problem.

  19. A case of Norman-Roberts syndrome identified from postnatal diagnosis of microlissencephaly.

    PubMed

    Tosello, Barthélémy; Brévaut-Malaty, Véronique; Chaumoître, Kathia; Gire, Catherine

    2015-06-01

    Lissencephaly is a rare brain malformation. What differentiates microlissencephaly from classical lissencephaly and other variants is the presence of severe microcephaly. Very few postnatal cases of Norman-Roberts syndrome are described in the literature. We report a case of microlissencephaly with a polymalformative syndrome that prompted postnatal diagnosis of Norman-Roberts syndrome.

  20. Emergency access authorization for personally controlled online health care data.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2012-02-01

    Personally controlled health records (PCHR) systems have emerged to allow patients to control their own medical data. In a PCHR system, all the access privileges to a patient's data are granted by the patient. However, in many emergency cases, it is impossible for the patient to participate in access authorization on site when immediate medical treatment is needed. To solve the emergency access authorization problem in the absence of patients, we consider two cases: a) the requester is already in the PCHR system but has not obtained the access privilege of the patient's health records, and b) the requester does not even have an account in the PCHR system to submit its request. For each of the two cases, we present a method for emergency access authorization, utilizing the weighted voting and source authentication cryptographic techniques. Our methods provide an effective, secure and private solution for emergency access authorization, that makes the existing PCHR system frameworks more practical and thus improves the patients' experiences of health care when using PCHR systems. We have implemented a prototype system as a proof of concept.

  1. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  2. Access and control of information and intellectual property

    NASA Astrophysics Data System (ADS)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  3. Secondary retention of rubber dam: effective moisture control access considerations.

    PubMed

    Liebenberg, W H

    1995-04-01

    Primary rubber dam retention affects attachment of the latex sheet to the anchor teeth bordering the isolated working field. Secondary rubber dam retention is the provision of an effective seal at the dam-tooth junction, which is essential to the maintenance of adequate access and moisture control within the working field. Practical hints are offered to optimize access and moisture control through well-planned and properly executed secondary retention of classic rubber dam applications. In addition, innovative solutions to the limitations of general field isolation, which pertain mostly to secondary retention of the unrestrained buccal and lingual curtains of the slit dam, are introduced.

  4. Joint Access Control Based on Access Ratio and Resource Utilization for High-Speed Railway Communications

    NASA Astrophysics Data System (ADS)

    Zhou, Yuzhe; Ai, Bo

    2015-05-01

    The fast development of high-speed rails makes people's life more and more convenient. However, provisioning of quality of service of multimedia applications for users on the high-speed train is a critical task for wireless communications. Therefore, new solutions are desirable to be found to address this kind of problem. Current researches mainly focus on providing seamless broadband wireless access for high-speed mobile terminals. In this paper, an algorithm to calculate the optimal resource reservation fraction of handovers is proposed. A joint access control scheme for high-speed railway communication handover scenario is proposed. Metrics of access ratio and resource utilization ratio are considered jointly in the analysis and the performance evaluation. Simulation results show that the proposed algorithm and the scheme improve quality of service compared with other conventional schemes.

  5. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  6. Access Control of Web and Java Based Applications

    NASA Technical Reports Server (NTRS)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  7. Access Control for Agent-based Computing: A Distributed Approach.

    ERIC Educational Resources Information Center

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  8. Fine-Grained Access Control for Electronic Health Record Systems

    NASA Astrophysics Data System (ADS)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  9. Secure Dynamic access control scheme of PHR in cloud computing.

    PubMed

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  10. SAFE: SPARQL Federation over RDF Data Cubes with Access Control.

    PubMed

    Khan, Yasar; Saleem, Muhammad; Mehdi, Muntazir; Hogan, Aidan; Mehmood, Qaiser; Rebholz-Schuhmann, Dietrich; Sahay, Ratnesh

    2017-02-01

    Several query federation engines have been proposed for accessing public Linked Open Data sources. However, in many domains, resources are sensitive and access to these resources is tightly controlled by stakeholders; consequently, privacy is a major concern when federating queries over such datasets. In the Healthcare and Life Sciences (HCLS) domain real-world datasets contain sensitive statistical information: strict ownership is granted to individuals working in hospitals, research labs, clinical trial organisers, etc. Therefore, the legal and ethical concerns on (i) preserving the anonymity of patients (or clinical subjects); and (ii) respecting data ownership through access control; are key challenges faced by the data analytics community working within the HCLS domain. Likewise statistical data play a key role in the domain, where the RDF Data Cube Vocabulary has been proposed as a standard format to enable the exchange of such data. However, to the best of our knowledge, no existing approach has looked to optimise federated queries over such statistical data. We present SAFE: a query federation engine that enables policy-aware access to sensitive statistical datasets represented as RDF data cubes. SAFE is designed specifically to query statistical RDF data cubes in a distributed setting, where access control is coupled with source selection, user profiles and their access rights. SAFE proposes a join-aware source selection method that avoids wasteful requests to irrelevant and unauthorised data sources. In order to preserve anonymity and enforce stricter access control, SAFE's indexing system does not hold any data instances-it stores only predicates and endpoints. The resulting data summary has a significantly lower index generation time and size compared to existing engines, which allows for faster updates when sources change. We validate the performance of the system with experiments over real-world datasets provided by three clinical organisations as

  11. Access control and interlock system at the Advanced Photon Source

    SciTech Connect

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-08-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS`s design philosophy, configuration, hardware, functionality, validation requirements, and operational experience.

  12. Controlling user access to electronic resources without password

    DOEpatents

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  13. Immediate animation: Thomistic principles applied to Norman Ford's objections.

    PubMed

    Velez, Juan R

    2005-01-01

    Norman Ford and other scholars argue that the human embryo cannot have a human soul until after week two of fertilization. They claim that the individuality proper to ensoulment requires the development of the primitive streak and excludes the possibility of twinning. Their arguments are refuted by principles of philosophical realism inspired by Aristotle and Aquinas. According to these principles, the new substance formed by the union of the paternal and maternal DNA has a rational soul. The zygote, to be human, requires a human soul that determines its human development. The primitive streak is part of this development, not a condition of it. Twinning does not disprove the existence of a previous embryo with a human soul. Instead it indicates the existence of a new embryo derived from some totipotent cells that separate from the first embryo.

  14. Distributed reservation control protocols for random access broadcasting channels

    NASA Astrophysics Data System (ADS)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  15. Distributed reservation control protocols for random access broadcasting channels

    NASA Technical Reports Server (NTRS)

    Greene, E. P.; Ephremides, A.

    1981-01-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  16. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  17. Tag Content Access Control with Identity-based Key Exchange

    NASA Astrophysics Data System (ADS)

    Yan, Liang; Rong, Chunming

    2010-09-01

    Radio Frequency Identification (RFID) technology that used to identify objects and users has been applied to many applications such retail and supply chain recently. How to prevent tag content from unauthorized readout is a core problem of RFID privacy issues. Hash-lock access control protocol can make tag to release its content only to reader who knows the secret key shared between them. However, in order to get this shared secret key required by this protocol, reader needs to communicate with a back end database. In this paper, we propose to use identity-based secret key exchange approach to generate the secret key required for hash-lock access control protocol. With this approach, not only back end database connection is not needed anymore, but also tag cloning problem can be eliminated at the same time.

  18. Rural providers' access to online resources: a randomized controlled trial

    PubMed Central

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  19. Authorisation and access control for electronic health record systems.

    PubMed

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  20. An approach to access control in electronic health record.

    PubMed

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  1. Integration of access control and ancillary information systems

    SciTech Connect

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  2. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... schedule. (c) Access control. Access within the blasting area shall be controlled to prevent presence of..., and access control. 816.66 Section 816.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  3. Hand geometry biometric device for secure access control

    SciTech Connect

    Colbert, C.; Moles, D.R. )

    1991-01-01

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Security Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.

  4. Global Access-controlled Transfer e-frame (GATe)

    SciTech Connect

    2012-05-30

    Global Access-controlled Transfer e-frame (GATe) was designed to take advantage of the patterns that occur during an electronic record transfer process. The e-frame (or electronic framework or platform) is the foundation for developing secure information transfer to meet classified and unclassified business processes and is particularly useful when there is a need to share information with various entities in a controlled and secure environment. It can share, search, upload, download and retrieve sensitive information, as well as provides reporting capabilities.

  5. A study of multiple access schemes in satellite control network

    NASA Astrophysics Data System (ADS)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  6. Access Control Model for Sharing Composite Electronic Health Records

    NASA Astrophysics Data System (ADS)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  7. Recent breakthroughs on C-2U: Norman's legacy

    NASA Astrophysics Data System (ADS)

    Binderbauer, M. W.; Tajima, T.; Tuszewski, M.; Schmitz, L.; Smirnov, A.; Gota, H.; Garate, E.; Barnes, D.; Deng, B. H.; Trask, E.; Yang, X.; Putvinski, S.; Andow, R.; Bolte, N.; Bui, D. Q.; Ceccherini, F.; Clary, R.; Cheung, A. H.; Conroy, K. D.; Dettrick, S. A.; Douglass, J. D.; Feng, P.; Galeotti, L.; Giammanco, F.; Granstedt, E.; Gupta, D.; Gupta, S.; Ivanov, A. A.; Kinley, J. S.; Knapp, K.; Korepanov, S.; Hollins, M.; Magee, R.; Mendoza, R.; Mok, Y.; Necas, A.; Primavera, S.; Onofri, M.; Osin, D.; Rath, N.; Roche, T.; Romero, J.; Schroeder, J. H.; Sevier, L.; Sibley, A.; Song, Y.; Steinhauer, L. C.; Thompson, M. C.; Van Drie, A. D.; Walters, J. K.; Waggoner, W.; Yushmanov, P.; Zhai, K.

    2016-03-01

    Conventional field-reversed configurations (FRC) face notable stability and confinement concerns, which can be ameliorated by introducing and maintaining a significant fast ion population in the system. This is the conjecture first introduced by Norman Rostoker multiple decades ago and adopted as the central design tenet in Tri Alpha Energy's advanced beam driven FRC concept. In fact, studying the physics of such neutral beam (NB) driven FRCs over the past decade, considerable improvements were made in confinement and stability. Next to NB injection, the addition of axially streaming plasma guns, magnetic end plugs, as well as advanced surface conditioning lead to dramatic reductions in turbulence driven losses and greatly improved stability. In turn, fast ion confinement improved significantly and allowed for the build-up of a dominant fast particle population. This recently led to the breakthrough of sustaining an advanced beam driven FRC, thereby demonstrating successful maintenance of trapped magnetic flux, plasma dimensions and total pressure inventory for times much longer than all characteristic system time scales and only limited by hardware and electric supply constraints.

  8. MCNPX Cosmic Ray Shielding Calculations with the NORMAN Phantom Model

    NASA Technical Reports Server (NTRS)

    James, Michael R.; Durkee, Joe W.; McKinney, Gregg; Singleterry Robert

    2008-01-01

    The United States is planning manned lunar and interplanetary missions in the coming years. Shielding from cosmic rays is a critical aspect of manned spaceflight. These ventures will present exposure issues involving the interplanetary Galactic Cosmic Ray (GCR) environment. GCRs are comprised primarily of protons (approx.84.5%) and alpha-particles (approx.14.7%), while the remainder is comprised of massive, highly energetic nuclei. The National Aeronautics and Space Administration (NASA) Langley Research Center (LaRC) has commissioned a joint study with Los Alamos National Laboratory (LANL) to investigate the interaction of the GCR environment with humans using high-fidelity, state-of-the-art computer simulations. The simulations involve shielding and dose calculations in order to assess radiation effects in various organs. The simulations are being conducted using high-resolution voxel-phantom models and the MCNPX[1] Monte Carlo radiation-transport code. Recent advances in MCNPX physics packages now enable simulated transport over 2200 types of ions of widely varying energies in large, intricate geometries. We report here initial results obtained using a GCR spectrum and a NORMAN[3] phantom.

  9. [To the centennial of Norman Holter (1914-1983)].

    PubMed

    Makarov, L M

    2015-01-01

    The article is devoted to the centennial of the founder of ambulatory ECG monitoring Norman Jeffrey Holter (1914-1983). It contains brief history of the scientist's family, and depiction of his own educational way from magister of chemistry and physics to specialist in nuclear research. His activity during World War II, research related to impact of nuclear tests on environment after the war is also described. The fact is stressed that N. Holter was organizer and first president of Society of Nuclear Medicine. But most prominent contribution of N. Holter was elaboration of the method of long-term ECG monitoring of freely active patients--the method which was later named Holter Monitoring (HM). The article also contains data of first clinical trials of HM systems and stresses contribution of Holter team-mates and colleagues (B. Del Mar, G. Kennedy, S. Stern and others) in their conduct. It shows technical and ideological evolution of HM systems from large apparatuses weighting 40 kg to modern portable devices capable of collecting, storing and processing huge amounts of information, transmitting it over internet to any distance. Nontriviality and serendipity of N. Holter's approach to obtaining novel unpredictable knowledge allowed him to realize his numerous talents and abilities.

  10. Efficient identity management and access control in cloud environment

    NASA Astrophysics Data System (ADS)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  11. Privacy and Access Control for IHE-Based Systems

    NASA Astrophysics Data System (ADS)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  12. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... notification required in § 817.64(a). (c) Access control. Access within the blasting areas shall be controlled..., and access control. 817.66 Section 817.66 Mineral Resources OFFICE OF SURFACE MINING RECLAMATION AND... control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator...

  13. Accessibility

    EPA Pesticide Factsheets

    Federal laws, including Section 508 of the Rehabilitation Act, mandate that people with disabilities have access to the same information that someone without a disability would have. 508 standards cover electronic and information technology (EIT) products.

  14. Biogeochemical evolution of a landfill leachate plume, Norman, Oklahoma

    USGS Publications Warehouse

    Cozzarelli, Isabelle M.; Böhlke, John Karl; Masoner, Jason R.; Breit, George N.; Lorah, Michelle M.; Tuttle, Michele L.W.; Jaeschke, Jeanne B.

    2011-01-01

    Leachate from municipal landfills can create groundwater contaminant plumes that may last for decades to centuries. The fate of reactive contaminants in leachate-affected aquifers depends on the sustainability of biogeochemical processes affecting contaminant transport. Temporal variations in the configuration of redox zones downgradient from the Norman Landfill were studied for more than a decade. The leachate plume contained elevated concentrations of nonvolatile dissolved organic carbon (NVDOC) (up to 300 mg/L), methane (16 mg/L), ammonium (650 mg/L as N), iron (23 mg/L), chloride (1030 mg/L), and bicarbonate (4270 mg/L). Chemical and isotopic investigations along a 2D plume transect revealed consumption of solid and aqueous electron acceptors in the aquifer, depleting the natural attenuation capacity. Despite the relative recalcitrance of NVDOC to biodegradation, the center of the plume was depleted in sulfate, which reduces the long-term oxidation capacity of the leachate-affected aquifer. Ammonium and methane were attenuated in the aquifer relative to chloride by different processes: ammonium transport was retarded mainly by physical interaction with aquifer solids, whereas the methane plume was truncated largely by oxidation. Studies near plume boundaries revealed temporal variability in constituent concentrations related in part to hydrologic changes at various time scales. The upper boundary of the plume was a particularly active location where redox reactions responded to recharge events and seasonal water-table fluctuations. Accurately describing the biogeochemical processes that affect the transport of contaminants in this landfill-leachate-affected aquifer required understanding the aquifer's geologic and hydrodynamic framework.

  15. Norman Rockwell's "Man's First Step On The Moon"

    NASA Astrophysics Data System (ADS)

    Barker, Timothy

    2011-05-01

    Rockwell's painting, which appeared in the January 10, 1967 issue of Look magazine, is perhaps the most famous ever done of an astronaut's first step on the Moon. But it has a number of astronomical misconceptions, many of which are apparent to sharp-eyed introductory astronomy students: the size of the Earth in the lunar sky is too large compared to the Big Dipper, the orbiting Command Service Module is illuminated from a different direction than the Earth is, and the lighting on the lunar surface is also inconsistent, among other errors. This raises the question: How could Rockwell, a notoriously meticulous illustrator, have apparently been so careless? It turns out that Rockwell was anything but careless, but rather was typically obsessive about every detail in the painting. He was in constant communication with experts, even traveling to Huston to meet with NASA officials. He went so far as to enlist the help of space artist Pierre Mion, who ended up doing part of the painting, one of only two known collaborations between Rockwell and another artist. When the Look article was published, readers responded with praise but also criticism about the technical errors that still slipped through, to Rockwell's great frustration. The most important part of the painting, however, is accurate and compelling: the astronaut is shown stepping off the LM exactly as Neil Armstrong would do over two years later. The astronaut's boot covers part of the shadow that it casts. Does the shadow run all the way to the heel, or is the boot poised just above the lunar surface? Has the artist captured the instant after, or, perhaps, the instant before, humanity's first contact with another world? I am grateful to the curators at the Norman Rockwell Museum Archives for their assistance.

  16. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  17. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  18. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... Federal Aviation Administration Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224, Airport Security Access Control. DATES: The...

  19. BIOPACK: the ground controlled late access biological research facility.

    PubMed

    van Loon, Jack J W A

    2004-03-01

    Future Space Shuttle flights shall be characterized by activities necessary to further build the International Space Station, ISS. During these missions limited resources are available to conduct biological experiments in space. The Shuttles' Middeck is a very suitable place to conduct science during the ISS assembly missions or dedicated science missions. The BIOPACK, which flew its first mission during the STS-107, provides a versatile Middeck Locker based research tool for gravitational biology studies. The core facility occupies the space of only two Middeck Lockers. Experiment temperatures are controlled for bacteria, plant, invertebrate and mammalian cultures. Gravity levels and profiles can be set ranging from 0 to 2.0 x g on three independent centrifuges. This provides the experimenter with a 1.0 x g on-board reference and intermediate hypogravity and hypergravity data points to investigate e.g. threshold levels in biological responses. Temperature sensitive items can be stored in the facilities' -10 degrees C and +4 degrees C stowage areas. During STS-107 the facility also included a small glovebox (GBX) and passive temperature controlled units (PTCU). The GBX provides the experimenter with two extra levels of containment for safe sample handling. This biological research facility is a late access (L-10 hrs) laboratory, which, when reaching orbit, could automatically be starting up reducing important experiment lag-time and valuable crew time. The system is completely telecommanded when needed. During flight system parameters like temperatures, centrifuge speeds, experiment commanding or sensor readouts can be monitored and changed when needed. Although ISS provides a wide range of research facilities there is still need for an STS-based late access facility such as the BIOPACK providing experimenters with a very versatile research cabinet for biological experiments under microgravity and in-flight control conditions.

  20. First Experiences Using XACML for Access Control in Distributed Systems

    NASA Technical Reports Server (NTRS)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  1. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    PubMed

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  2. Dynamic access control model for privacy preserving personalized healthcare in cloud environment.

    PubMed

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2015-01-01

    When sharing and storing healthcare data in a cloud environment, access control is a central issue for preserving data privacy as a patient's personal health data may be accessed without permission from many stakeholders. Specifically, dynamic authorization for the access of data is required because personal health data is stored in cloud storage via wearable devices. Therefore, we propose a dynamic access control model for preserving the privacy of personal healthcare data in a cloud environment. The proposed model considers context information for dynamic access. According to the proposed model, access control can be dynamically determined by changing the context information; this means that even for a subject with the same role in the cloud, access permission is defined differently depending on the context information and access condition. Furthermore, we experiment the ability of the proposed model to provide correct responses by representing a dynamic access decision with real-life personalized healthcare system scenarios.

  3. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... CFR Part 240 Risk Management Controls for Brokers or Dealers With Market Access; Final Rule #0;#0... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... alternative trading system (``ATS''), including those providing sponsored or direct market access to customers...

  4. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Federal Aviation Administration Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13, 2012...

  5. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Federal Aviation Administration Twelfth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10 a...

  6. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Aviation Administration Twenty First Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10, 2013...

  7. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Federal Aviation Administration Eleventh Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10 a.m.-4...

  8. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Federal Aviation Administration Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20, 2013...

  9. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Federal Aviation Administration Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28, 2012...

  10. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Federal Aviation Administration Twentieth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from 9...

  11. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Federal Aviation Administration Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access...). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15, 2012...

  12. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  13. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... controls access to national security-classified information? (a) The declassification of and public access... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property...

  14. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... controls access to national security-classified information? (a) The declassification of and public access... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true What controls access to national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property...

  15. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access...

  16. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... TRANSPORTATION Federal Aviation Administration Ninth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control Systems...

  17. Suction catheter for enhanced control and accuracy of transseptal access.

    PubMed

    Sulkin, Matthew S; Berwick, Zachary C; Hermiller, James B; Navia, Jose A; Kassab, Ghassan S

    2016-12-20

    Percutaneous structural heart therapies, such as mitral value repair, require site-specific transseptal access (TSA). This can be challenging for interventional cardiologists. We describe a TSA catheter (TSAC) that utilises suction for enhanced control and puncture accuracy. Here, we aim to evaluate the safety and efficacy of the device. Ex vivo interatrial septum preparations were dissected from swine (n=8) and diseased human hearts (n=6) to quantify TSAC suction and needle puncture force. TSAC suction was 6.5-fold greater than the opposing needle puncture force, and thus provides sufficient stabilisation for punctures. The safety and efficacy of TSAC was evaluated in a chronic mitral regurgitation swine model (n=10) and compared to a conventional TSA device. MR was induced by disrupting one to three mitral chordae tendineae, and the progression of heart disease was followed for three weeks. During device testing, procedure time and fluoroscopy exposure were not statistically different between devices. TSAC reduced septal displacement from 8.7±0.30 mm to 3.60±0.19 mm (p<0.05) and improved puncture accuracy 1.75-fold. TSAC provides controlled TSA and improves puncture accuracy, while maintaining procedure time and workflow. These findings provide a strong rationale for a first-in-man study to demonstrate the clinical utility of the device.

  18. Obituary: Norman Hodgson Baker, Jr., 1931-2005

    NASA Astrophysics Data System (ADS)

    Helfand, David J.

    2005-12-01

    Norman H. Baker, a key contributor to the foundation of modern stellar pulsation theory and former editor of the "Astronomical Journal", died on 11 October 2005 in Watertown, New York near his beloved summer home in Natural Bridge. He succumbed to complications of Waldenstrom's macroglobulinemia, a bone marrow lymphoma that he had successfully surmounted for twenty-two years. Norm, as he was known to all, was born 23 October 1931 in Fergus Falls, Minnesota to Norman Hodgson and Jeannette (née Lieber) Baker. He attended the University of Minnesota where he met the first of many lifelong astronomical friends, Bill Erickson. He received his BA in 1952. He went on to do his PhD, "Radiation from Particle Interactions which Create Current," at Cornell University under Phil Morrison. He then moved to a postdoctoral position at the Max Planck Institut für Physik und Astrophysik in München with the intent of pursuing his work in plasma physics with Ludwig Biermann and Arnulf Schlüter. However, Rudolf (Rudi) Kippenhan snatched him away to pursue what became his lifelong interest, stellar physics. This was the dawn of the era in which electronic computers were becoming practical for scientific calculations, and Norm immediately adopted this new tool. Indeed, he remained at the forefront of computing technology throughout his life: He was certainly the first member of the Astronomy Department at Columbia to buy a Mac, and was undoubtedly one of the few emeritus professors in the world known by all the administrative staff as the first person to turn to when stumped by a computer problem. Following his first paper with Kippenhan on stellar rotation, Norm turned his attention to stellar pulsations, a topic he would pursue throughout his career. His 1962 paper in "Zeitschrift für Astrophysik" on pulsational models of Cepheids (Baker and Kippenhan 1962, 54, 155) is a classic in the field. The first figure displays the three dimensional model of the atmospheric absorption

  19. Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation

    NASA Astrophysics Data System (ADS)

    Yamada, Akira; Kubota, Ayumu; Miyake, Yutaka; Hashimoto, Kazuo

    Using Web-based content management systems such as Blog, an end user can easily publish User Generated Content (UGC). Although publishing of UGCs is easy, controlling access to them is a difficult problem for end users. Currently, most of Blog sites offer no access control mechanism, and even when it is available to users, it is not sufficient to control users who do not have an account at the site, not to mention that it cannot control accesses to content hosted by other UGC sites. In this paper, we propose new access control architecture for UGC, in which third party entities can offer access control mechanism to users independently of UGC hosting sites. With this architecture, a user can control accesses to his content that might be spread over many different UGC sites, regardless of whether those sites have access control mechanism or not. The key idea to separate access control mechanism from UGC sites is to apply cryptographic access control and we implemented the idea in such a way that it requires no modification to UGC sites and Web browsers. Our prototype implementation shows that the proposed access control architecture can be easily deployed in the current Web-based communication environment and it works quite well with popular Blog sites.

  20. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    ERIC Educational Resources Information Center

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  1. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    PubMed

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  2. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    PubMed Central

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  3. Bureau of Prisons access control system: functional and operational requirements

    NASA Astrophysics Data System (ADS)

    Janus, Michael; Carlson, Peter M.; Kane, Thomas

    1997-01-01

    The Federal Bureau of Prisons (BOP) operates 86 correctional institutions nationwide. The BOP has grown dramatically, the size of its inmate population growing from just over 41,000 inmates in 1987 to over 100,000 today. The number of BOP staff managing these facilities has grown correspondingly, more than doubling in number in the same ten year period. Technology has paid a major role in keeping up with this growth while maintaining high standards of security in BOP institutions. In an attempt to further enhance security in its institutions, the BOP has recently begun pilot testing an access control and entry system (ACES). ACES is intended to provide an automated record of very entry and exit to a correctional institution. ACES takes advantage of several methods of identifying an individual (inmate, staff or visitor) to assure that the individual exiting the institution is the same as the individual entering. The pilot test has raised a number of questions regarding the implementation of a technologically sophisticated system in a correctional institution. Questions of training, support, 'ownership,' cost effectiveness, and future potential all influence the deployment of this system. Preliminary results indicate that an adequate training and support system is essential to the performance of any sophisticated system and that other organizational issues need to be addressed before the decision to implement is made.

  4. Everywhere Access: Remote Control Software for the Internet.

    ERIC Educational Resources Information Center

    Beckett, George

    1994-01-01

    Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)

  5. Broadband passive optical network media access control protocols

    NASA Astrophysics Data System (ADS)

    Quayle, Alan

    1996-11-01

    Most telecommunication operators are currently deciding on how to respond to customers' needs stimulated by the synergy between compression coding of multimedia and the emergence of broadband digital networks. This paper describes a range of broadband access architectures under consideration in the full services access network initiative. All architectures have a common requirement for a broadband ATM PON. A common broadband PON applicable to many operators increases the world-wide market for the product. With greater production volumes manufacturers' costs reduce because of the experience curve effect making broadband access systems economic.

  6. Norman C. Gysbers: Reflections on Three Decades as Editor of the "Journal of Career Development"

    ERIC Educational Resources Information Center

    Heppner, Mary J.; Wagner, Julie

    2011-01-01

    As many regular readers of the journal have noticed, the editorship of the "Journal of Career Development" has been passed from Norman C. Gysbers to Lisa Y. Flores. Unlike other journals whose editorships are more typically 3 to 6 years, Dr. Gysbers has guided the journal for almost three decades. Although Dr. Gysbers' life and enormous…

  7. Norman C. Gysbers: Reflections on Three Decades as Editor of the "Journal of Career Development"

    ERIC Educational Resources Information Center

    Heppner, Mary J.; Wagner, Julie

    2011-01-01

    As many regular readers of the journal have noticed, the editorship of the "Journal of Career Development" has been passed from Norman C. Gysbers to Lisa Y. Flores. Unlike other journals whose editorships are more typically 3 to 6 years, Dr. Gysbers has guided the journal for almost three decades. Although Dr. Gysbers' life and enormous…

  8. The Brown University Traumatic Brain Injury Research Consortium and the Norman Prince Neurosciences Institute.

    PubMed

    Rogg, Jeffrey; Spader, Heather; Wilcox, Bethany J; Ellermeier, Anna; Correira, Steven; Chodobski, Adam; Szmydynger-Chodobska, Joanna; Raukar, Neha; Machan, Jason T; Crisco, Joseph J; LaFrance, W Curt

    2014-05-01

    This article provides an overview of the Brown University Traumatic Brain Injury Research Consortium (TBIRC) and summarizes the multidisciplinary basic and clinical neuroscience work being conducted by investigators at Brown University and the affiliate hospitals in association with the Norman Prince Neurosciences Institute (NPNI).

  9. A Dream Deferred: The Failed Fantasy of Norman Lear's "a.k.a. Pablo."

    ERIC Educational Resources Information Center

    Mayerle, Judine

    1987-01-01

    Uses fantasy theme analysis to examine Norman Lear's series "a.k.a. Pablo." Develops an argument demonstrating how a rhetorical vision and its concomitant group consciousness emerged and was sustained throughout preproduction research and collaboration, and how it disintegrated when dramatized first in scripts and then in performance.…

  10. A New NPGS Special Collection: Norman L. Taylor University of Kentucky Clover Collection

    USDA-ARS?s Scientific Manuscript database

    Dr. Norman L. Taylor was a world renowned Professor and clover breeder in the Department of Plant and Soil Sciences at the University of Kentucky for 48 years. Following retirement in 2001, he continued working on clovers up until his death in 2010. Dr. Taylor’s entire career was devoted to enhancin...

  11. Things That Help Us Perform: Commentary on Ideas from Donald A. Norman.

    ERIC Educational Resources Information Center

    Dickelman, Gary J.

    1995-01-01

    Reviews and summarizes "Things That Make Us Smart," a book by Donald Norman that defends human attributes in the age of electronic systems. Topics include human performance; kinds of cognition; kinds of learning; design principles for electronic performance support systems; and examples. (LRW)

  12. Norman Rockwell's "The Problem We All Live With:" Teaching "Bush v. Orleans Parish School Board"

    ERIC Educational Resources Information Center

    Middleton, Tiffany

    2011-01-01

    "The Problem We All Live With" is one of Norman Rockwell's most famous, and provocative, images. First printed in the January 14, 1964, issue of "Look" magazine, the image features an approximately six-year-old African American girl walking. She is wearing a white dress, white socks and white shoes. Her hair is parted in neat…

  13. Astronaut Norman Thagard rests on middeck while other team is on duty

    NASA Image and Video Library

    1985-05-03

    Astronaut Norman E. Thagard, mission specialist for the "silver" team, rests on the middeck while the "gold" team is on duty in the science module. Don L. Lind, left, "gold" team member, meanwhile participates in autogenic feedback training (AFT), designed to help flight crewmembers overcome the effects of zero-gravity adaptation.

  14. The Contradictions of Contemporary Culture: A Tribute to Norman Jay Levitt (1943-2009)

    ERIC Educational Resources Information Center

    Gross, Paul R.

    2012-01-01

    Norman Jay Levitt was the author's good friend, collaborator, and co-author. He was--above, before, and after politics--an honest inquirer. His socio-cultural views evolved continuously. Levitt, truth-seeker and liberal, was impatient with, and a devastating critic of, the political correctness and--even worse--the philosophic triviality that…

  15. Astronaut Norman Thagard rests on middeck while other team is on duty

    NASA Technical Reports Server (NTRS)

    1985-01-01

    Astronaut Norman E. Thagard, mission specialist for the 'silver' team, rests on the middeck while the 'gold' team is on duty in the science module. Don L. Lind, left, 'gold' team member, meanwhile participates in autogenic feedback training (AFT), designed to help flight crewmembers overcome the effects of zero-gravity adaptation.

  16. FDR's 'Four Freedoms' Campaign: The Rhetorical Contribution of Norman Rockwell's Posters.

    ERIC Educational Resources Information Center

    Olson, Lester C.

    Rhetorical criticism focusing on Norman Rockwell's paintings of the "Four Freedoms" provides reasons for the paintings' effectiveness within the context of Franklin Roosevelt's campaign to educate Americans about participation in World War II. The epideictic icons in Rockwell's paintings promoted identifications that constitute the…

  17. Norman Rockwell's "The Problem We All Live With:" Teaching "Bush v. Orleans Parish School Board"

    ERIC Educational Resources Information Center

    Middleton, Tiffany

    2011-01-01

    "The Problem We All Live With" is one of Norman Rockwell's most famous, and provocative, images. First printed in the January 14, 1964, issue of "Look" magazine, the image features an approximately six-year-old African American girl walking. She is wearing a white dress, white socks and white shoes. Her hair is parted in neat…

  18. The Contradictions of Contemporary Culture: A Tribute to Norman Jay Levitt (1943-2009)

    ERIC Educational Resources Information Center

    Gross, Paul R.

    2012-01-01

    Norman Jay Levitt was the author's good friend, collaborator, and co-author. He was--above, before, and after politics--an honest inquirer. His socio-cultural views evolved continuously. Levitt, truth-seeker and liberal, was impatient with, and a devastating critic of, the political correctness and--even worse--the philosophic triviality that…

  19. Biographical chronology and selected bibliography of Norman William Kingsley, pioneer in orthodontics.

    PubMed

    Peck, Sheldon

    2010-01-01

    Norman W. Kingsley (1829- 1913) of New York City was one of the great contributors to the early development of orthodontics and cleft palate therapy. His biographical chronology is presented, based largely on a little-known autobiography published in 1907 when he was 77 years old. Also presented is a Kingsley bibliography with key publications by and about this remarkable pioneer in orthodontics.

  20. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... sponsored or direct market access to customers or other persons, and broker-dealer operators of an ATS that...-dealer that could arise as a result of market access, and ensure compliance with all regulatory...

  1. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  2. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  3. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 1 2012-01-01 2012-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  4. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  5. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  6. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  7. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  8. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 1 2011-01-01 2011-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  9. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 1 2014-01-01 2014-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  10. 10 CFR 20.1602 - Control of access to very high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to very high radiation areas. 20.1602 Section 20.1602 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1602 Control of access to very high radiation areas...

  11. 10 CFR 20.1601 - Control of access to high radiation areas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 1 2013-01-01 2013-01-01 false Control of access to high radiation areas. 20.1601 Section 20.1601 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Control of Exposure From External Sources in Restricted Areas § 20.1601 Control of access to high radiation areas. (a...

  12. Naturally Occurring Arsenic in Ground Water, Norman, Oklahoma, 2004, and Remediation Options for Produced Water

    USGS Publications Warehouse

    Smith, S. Jerrod; Christenson, Scott

    2005-01-01

    In 2000, the U.S. Environmental Protection Agency (EPA) reviewed the arsenic drinking water standard for public water supplies. Considering the available research and statistics on the health effects of arsenic ingestion, the EPA reduced the Maximum Contaminant Level (MCL) for public drinking water from 50 micrograms per liter (?g/L) to 10 ?g/L (U.S. Environmental Protection Agency, 2001a). As a result of the more stringent standard, the EPA estimates that about 3,000 public water providers across the United States must take action to meet the new standard before it becomes effective on January 23, 2006 (U.S. Environmental Protection Agency, 2001b). The City of Norman (City) is one of several Oklahoma municipalities affected by the new arsenic standard. About 20 percent of Norman?s water is supplied by wells completed in the Central Oklahoma (Garber-Wellington) aquifer; the rest is supplied by Lake Thunderbird (fig. 1) or purchased from Oklahoma City. The Norman well field is composed of 24 active wells, and water produced from about half of the wells will not be in compliance with the new MCL (figs. 2 and 3). Chemical treatment of water with elevated arsenic is possible, but it is generally cost prohibitive. Another costly solution is simply to abandon the high-arsenic wells and replace them with new wells in low-arsenic areas. In the next phase of well construction beginning in 2005, the City plans to construct as many as 30 new wells in northeast Norman (Bryan Mitchell, City of Norman, oral commun., 2005). The new wells will replace production lost to the new arsenic standard and add new production to keep pace with rapidly growing consumer demand. Well modification to exclude arsenic-bearing water from existing wells is a more cost-effective solution, but it requires a great deal of knowledge about local aquifer properties and individual well dynamics to decide which wells are good candidates for modification. With the goal of determining if well modification

  13. An Integrated Approach to Quantify Groundwater - Surface Water Interactions: the Norman Research Site, Oklahoma

    NASA Astrophysics Data System (ADS)

    Mendoza-Sanchez, I.; Phanikumar, M. S.; Masoner, J.; Cozzarelli, I.; McGuire, J. T.

    2009-12-01

    An intensive investigation of hydrogeologic and biogeochemical processes controlling contaminant migration and attenuation is in progress at the Norman Landfill Research Site in Oklahoma. The site involves a wetland that overlies a landfill leachate plume. The wetland-aquifer system actively exchanges contaminants and nutrients. These chemicals move from the wetland to the aquifer and vice versa depending on the groundwater-surface water (GW-SW) exchange rate and flow direction. The GW-SW flux has to be quantified to better understand the fate and transport of contaminants and nutrients. Different types of data have been collected at the site over a period of ten years including meteorological data, isotopic composition of water samples, water levels, pan evaporation rates, and seepage fluxes. This paper reports the development and application of a process-based water balance model based on long-term climate, soil, vegetation and hydrological dynamics of the system to determine the GW-SW flow rates. Our integrated approach involved model evaluation by means of the following independent measurements: (a) groundwater inflow calculation using stable isotopes of oxygen and hydrogen ( ) (b) seepage flux measurements in the wetland hyporheic sediment and c) pan evaporation measurements on land and in the wetland. The approach was found to be useful for identifying the dominant hydrological processes at the site, including recharge and subsurface flows. Recharge results from the model compared well with estimates obtained using isotope methods from previous studies and allowed us to identify specific annual signatures of this important process during the period of study. Results indicate that subsurface flow components in the system are seasonal and readily respond to rainfall events. The wetland water balance is dominated by local groundwater inputs and regional groundwater flow contributes little to the overall water balance.

  14. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    NASA Astrophysics Data System (ADS)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  15. An effective access control approach to support mobility in IPv6 networks

    NASA Astrophysics Data System (ADS)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  16. Open access, readership, citations: a randomized controlled trial of scientific journal publishing.

    PubMed

    Davis, Philip M

    2011-07-01

    Does free access to journal articles result in greater diffusion of scientific knowledge? Using a randomized controlled trial of open access publishing, involving 36 participating journals in the sciences, social sciences, and humanities, we report on the effects of free access on article downloads and citations. Articles placed in the open access condition (n=712) received significantly more downloads and reached a broader audience within the first year, yet were cited no more frequently, nor earlier, than subscription-access control articles (n=2533) within 3 yr. These results may be explained by social stratification, a process that concentrates scientific authors at a small number of elite research universities with excellent access to the scientific literature. The real beneficiaries of open access publishing may not be the research community but communities of practice that consume, but rarely contribute to, the corpus of literature.

  17. Access control and privilege management in electronic health record: a systematic literature review.

    PubMed

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  18. 33 CFR 150.604 - Who controls access to medical monitoring and exposure records?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Who controls access to medical... Health Safety and Health (general) § 150.604 Who controls access to medical monitoring and exposure records? If medical monitoring is performed or exposure records are maintained by an employer, the...

  19. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on... TRANSPORTATION Federal Aviation Administration Twenty-Fourth Meeting: RTCA Special Committee 224, Airport...

  20. 33 CFR 150.604 - Who controls access to medical monitoring and exposure records?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Who controls access to medical monitoring and exposure records? 150.604 Section 150.604 Navigation and Navigable Waters COAST GUARD... Health Safety and Health (general) § 150.604 Who controls access to medical monitoring and...

  1. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... TRANSPORTATION Federal Aviation Administration Thirteenth Meeting: RTCA Special Committee 224, Airport Security... (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from 10...

  2. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... TRANSPORTATION Federal Aviation Administration Eighth Meeting: RTCA Special Committee 224: Airport Security... Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control Systems...

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... cooperation with the facility. (h) MARSEC Level 3. In addition to the security measures required for MARSEC... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265...

  4. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... cooperation with the facility. (h) MARSEC Level 3. In addition to the security measures required for MARSEC... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265...

  5. Scalable Machine Learning Framework for Behavior-Based Access Control

    DTIC Science & Technology

    2013-08-01

    rules. Dynamic events, such as subversion of credentials (e.g., theft of a Smart Card [3] such as the Common Access Card [4]) or changes in actor... Smart card handbook. Wiley, 2010. [4] DoD ID Card Reference Center, 2013, http://www.cac.mil/ [5] Hearst, Marti A., et al. "Support vector machines

  6. Computer Control of a Random Access Slide Projector.

    ERIC Educational Resources Information Center

    Barker, Philip G.

    1982-01-01

    A description of a simple interface to enable the interconnection of a random access slide projector and a microcomputer is provided, as well as summaries of the role of slide images as a means of implementing graphic communication and the new activity in graphics as an area of information processing. The microcomputer interface is then detailed,…

  7. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... unattended spaces that adjoin areas to which passengers and visitors have access; (9) Provide a designated... government personnel present identification credentials for entry; (2) X-ray screening of all unaccompanied... baggage more extensively, for example, x-raying from two or more angles; (ii) Prepare to restrict or...

  8. Regulation of the nucleosome unwrapping rate controls DNA accessibility

    PubMed Central

    North, Justin A.; Shimko, John C.; Javaid, Sarah; Mooney, Alex M.; Shoffner, Matthew A.; Rose, Sean D.; Bundschuh, Ralf; Fishel, Richard; Ottesen, Jennifer J.; Poirier, Michael G.

    2012-01-01

    Eukaryotic genomes are repetitively wrapped into nucleosomes that then regulate access of transcription and DNA repair complexes to DNA. The mechanisms that regulate extrinsic protein interactions within nucleosomes are unresolved. We demonstrate that modulation of the nucleosome unwrapping rate regulates protein binding within nucleosomes. Histone H3 acetyl-lysine 56 [H3(K56ac)] and DNA sequence within the nucleosome entry-exit region additively influence nucleosomal DNA accessibility by increasing the unwrapping rate without impacting rewrapping. These combined epigenetic and genetic factors influence transcription factor (TF) occupancy within the nucleosome by at least one order of magnitude and enhance nucleosome disassembly by the DNA mismatch repair complex, hMSH2–hMSH6. Our results combined with the observation that ∼30% of Saccharomyces cerevisiae TF-binding sites reside in the nucleosome entry–exit region suggest that modulation of nucleosome unwrapping is a mechanism for regulating transcription and DNA repair. PMID:22965129

  9. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  10. Controls Over the Contractor Common Access Card Life Cycle

    DTIC Science & Technology

    2008-10-10

    Identification System SES Senior Executive Service SPOC Service Point of Contact TASM Trusted Agent Security Manager USD (AT&L) Under...the final report by October 31, 2008. 53 Finding D. Oversight of Common Access Card Sponsors DoD CVS Service Points of Contact ( SPOCs ...authorization to approve contractor CACs. Organization of CAC Application Sites Each Service agency has an SPOC who is responsible for coordinating with

  11. Stable-isotope ratios of hydrogen and oxygen in precipitation at Norman, Oklahoma, 1996-2008

    USGS Publications Warehouse

    Jaeschke, Jeanne B.; Scholl, Martha A.; Cozzarelli, Isabelle M.; Masoner, Jason R.; Christenson, Scott; Qi, Haiping

    2011-01-01

    Precipitation samples for measurement of stable-isotope ratios of hydrogen (delta2H) and oxygen (delta18O) were collected at the Norman Landfill Research Site in Norman, Oklahoma, from May 1996 to October 2008. Rainfall amounts also were measured at the site (U.S. Geological Survey gaging station 07229053) during the collection period. The delta2H of precipitation samples ranged from -121.9 to +8.3 per mil, and the delta18O of precipitation ranged from -16.96 to +0.50 per mil. The volume-weighted average values for delta2H and delta18O of precipitation over the 12-year measurement period were -31.13 per mil for delta2H and -5.57 per mil for delta18O. Average summer-season delta2H and delta18O values of precipitation usually were more positive (enriched in the heavier isotopes) than winter values.

  12. Proximity-based access control for context-sensitive information provision in SOA-based systems

    NASA Astrophysics Data System (ADS)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  13. Dr. Norman Thagard, crewmember for STS-7, during training on the KC-135

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Dr. Norman E. Thagard, a physician assigned to mission specialist duties on STS-7, familiarizes himself with the donning and doffing of the extravehicular mobility unit (EMU) onboard NASA's zero gravity aircraft, the KC-135. In this view, Dr. Thagard is assisted by various technicians to don the EMU. He is wearing the hard upper and lower torso, but not the backpack, gloves or helmet.

  14. Dr. Norman Thagard, crewmember for STS-7, during training on the KC-135

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Dr. Norman E. Thagard, a physician assigned to mission specialist duties on STS-7, familiarizes himself with the donning and doffing of the extravehicular mobility unit (EMU) onboard NASA's zero gravity aircraft, the KC-135. Dr. Thagard has anchored his EMU to a 'lifeline' in the KC-135 as he awaits the next weightless session. A number of technicians and engineers assist Dr. Thagard in the training procedures.

  15. Fertility effects of abortion and birth control pill access for minors.

    PubMed

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  16. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Federal Aviation Administration Seventh Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security...

  17. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Federal Aviation Administration Fourth Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security...

  18. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  19. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  20. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public...

  1. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Federal Aviation Administration Second Meeting: RTCA Special Committee 224: Airport Security Access... Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security...

  2. The Smart Card concept applied to access control

    SciTech Connect

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described.

  3. Enhancing Subject Access to OPACs: Controlled Vocabulary vs. Natural Language.

    ERIC Educational Resources Information Center

    Cousins, Shirley Anne

    1992-01-01

    Investigation of retrieval performance of controlled vocabulary derived from natural language terms in tables of contents and book indexes assumed that controlled vocabulary representative of users' queries should adequately represent documents' contents. Queries were indexed using Library of Congress Subject Headings (LSCH), Dewey Decimal…

  4. Hydrological Perturbations Drive Biogeochemical Processes in Experimental Soil Columns from the Norman Landfill Site

    NASA Astrophysics Data System (ADS)

    Arora, B.; Mohanty, B. P.; McGuire, J. T.

    2010-12-01

    Fate and transport of contaminants in saturated and unsaturated zones is governed by biogeochemical processes that are complex and non-linearly coupled to each other. A fundamental understanding of the interactions between transport and reaction processes is essential to better characterize contaminant movement in the subsurface. The objectives of this study are to: i) develop quantitative relationships between hydrological (initial and boundary conditions, hydraulic conductivity ratio, and soil layering), geochemical (mineralogy, surface area, redox potential, and organic matter) and microbiological factors (MPN) that alter the biogeochemical processes, and ii) characterize the effect of hydrologic perturbations on coupled processes occurring at the column scale. The perturbations correspond to rainfall intensity, duration of wet and dry conditions, and water chemistry (pH). Soils collected from two locations with significantly different geochemistry at the Norman landfill site are used in this study. Controlled flow experiments were conducted on: i) two homogeneous soil columns, ii) a layered soil column, iii) a soil column with embedded clay lenses, and iv) a soil column with embedded clay lenses and one central macropore. Experimental observations showed enhanced biogeochemical activity at the interface of the layered and lensed columns over the texturally homogeneous soil columns. Multivariate statistical analysis showed that the most important processes were microbial reduction of Fe(III) and SO42-, and oxidation of reduced products in the columns. Modeling results from HP1 indicate least redox activity in the homogeneous sand column while the structurally heterogeneous columns utilize oxygen and nitrate from recharge as well as iron sulfide minerals already present in the columns as electron acceptors. Furthermore, the interface of the layered and lensed soil columns acts as a hotspot of biogeochemical activity due to increased transport timescale as a

  5. Microbial Community Structure and Function at an Aquifer Contaminated with Landfill Leachate (Norman,OK)

    NASA Astrophysics Data System (ADS)

    Weiss, J. V.; Voytek, M. A.; Lowit, M. B.; Cozzarelli, I. M.; Kirshtein, J. D.

    2006-05-01

    Geochemical research at an aquifer contaminated with landfill leachate (Norman, OK) has shown that contaminated areas have significant increases in the concentration of dissolved organic carbon (DOC) and persistent anaerobic conditions as compared to uncontaminated areas. As a result, sulfate is depleted in the center of the contaminant plume with concomitant increases in Fe(II) and methane. These observations have been used to infer the dominant biogeochemical processes in this ecosystem which include Fe reduction, sulfate reduction, and methanogenesis. Because each of these processes is microbially-mediated, the goal of this study was to use a combination of culture-based and molecular methods to determine the composition and diversity of the microbial community in the contaminant plume. Groundwater and sediment samples were collected along the flow path of contamination in June 2005. We used most probable number (MPN) analyses to determine the abundances of key functional groups of bacteria including methanogens, sulfate-reducers (SRB), and iron-reducers (FeRB). Quantitative PCR (qPCR) was performed to determine abundances of functional genes of the dissimilatory sulfite reductase (dsr) and methyl coenzyme M-reductase (mcr) genes and the 16 rRNA genes targeting Geobacter spp. Results from the MPN analyses confirmed the presence of a relatively abundant and diverse anaerobic community in the groundwater at the landfill (e.g. 102 SRB, FeRB ml-1. In general, with increasing distance from the source of contamination, abundances of FeRB, SRB, and methanogens decreased to < 101 cells ml-1 groundwater and < 102 cells g soil. In fact, most of these groups were undetectable throughout much of the sampling transect, particularly in the groundwater. For example, methanogens were largely absent despite the presence of high concentrations of methane. In contrast to these estimates obtained with MPN analyses, the results of qPCR indicated that there were measurable, and many

  6. Increasing software testability with standard access and control interfaces

    NASA Technical Reports Server (NTRS)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  7. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224... Overview RTCA Functional Overview Previous Committee History Current Committee Scope, Terms of Reference...

  8. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ...The Librarian of Congress announces that the prohibition against circumvention of technological measures that effectively control access to copyrighted works shall not apply to persons who engage in noninfringing uses of six classes of copyrighted works.

  9. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... From the Federal Register Online via the Government Publishing Office LIBRARY OF CONGRESS Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  10. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders AGENCY...

  11. A controlled trial of an advanced access appointment system in a residency family medicine center.

    PubMed

    Belardi, Francis G; Weir, Sam; Craig, Francis W

    2004-05-01

    The implementation of advanced access appointment systems has improved continuity of care, patient and physician satisfaction, physician productivity, and average physician panel size in private practice and group-model HMO settings. This study's purpose was to document the patient care benefits, practice management benefits, and educational outcomes from the controlled implementation of an advanced access appointment system in a residency family medicine center. Two faculty-resident teams were created. One team adopted the advanced access system while the other team continued using a traditional access system. Outcome measures included length of time needed to obtain an appointment (days to third available appointment), continuity (percentage of visits with the patient's designated provider), no-show rates, productivity, visits lost to outside providers, panel sizes, and patient satisfaction. Outcomes were measured at baseline and quarterly for 1 year after initial implementation. After implementation, the "days to third available appointment" for the advanced access group was 5 days, compared to 21 days for the traditional access group. A significant improvement in continuity (ie, a match between the primary care physician and patient) for the advanced access team was found. Comparison of no-show rates between the advanced access and traditional access teams revealed significant between-subjects effect, but controlling for within-subject variation using repeated measures ANOVA eliminated this effect. Advanced access residents increased their continuity above 50% while increasing provider satisfaction with office practice and scope of practice. Faculty and residents can successfully use advanced access. Advanced access can enhance residency education by reducing appointment delays and significantly increasing the patient-primary care physician match.

  12. A contextual role-based access control authorization model for electronic patient record.

    PubMed

    Motta, Gustavo H M B; Furuie, Sergio S

    2003-09-01

    The design of proper models for authorization and access control for electronic patient record (EPR) is essential to a wide scale use of EPR in large health organizations. In this paper, we propose a contextual role-based access control authorization model aiming to increase the patient privacy and the confidentiality of patient data, whereas being flexible enough to consider specific cases. This model regulates user's access to EPR based on organizational roles. It supports a role-tree hierarchy with authorization inheritance; positive and negative authorizations; static and dynamic separation of duties based on weak and strong role conflicts. Contextual authorizations use environmental information available at access time, like user/patient relationship, in order to decide whether a user is allowed to access an EPR resource. This enables the specification of a more flexible and precise authorization policy, where permission is granted or denied according to the right and the need of the user to carry out a particular job function.

  13. Distributed Medium Access Control with SDMA Support for WLANs

    NASA Astrophysics Data System (ADS)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  14. Simulation and Modeling of a New Medium Access Control Scheme for Multi-Beam Directional Networking

    DTIC Science & Technology

    2017-03-03

    Simulation and Modeling of a New Medium Access Control Scheme for Multi-Beam Directional Networking Brian Proulx, Greg Kuperman, Nathaniel M. Jones...paper, we analyze a new medium access control (MAC) protocol for multi-beam directional network via high- fidelity simulation using a real-time emulator...implement our protocol in both simula- tion and a new Extendable Mobile Ad-hoc Network Emula- tor (EMANE) model that allows for real-time, high fidelity

  15. Springfield Processing Plant* (A Hypothetical Facility) SPP, Entry Control Point and Vehicle Gate Access Control Post Order

    SciTech Connect

    Baum, Gregory A.

    2014-06-01

    This hypothetical order provides the requirements and instructions for the Springfield Processing Plant (SPP) Vehicle Gate and Entry Control Point (ECP) in the perimeter access building. The purpose of this post is to prevent the theft, sabotage or diversion of nuclear material (NM), control access and exit at the protected area, and to respond to emergencies according the SPP Guard Force (GF) Contingency Plan and as directed by a Guard Force Supervisor.

  16. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  17. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    ERIC Educational Resources Information Center

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  18. 33 CFR 165.9 - Geographic application of limited and controlled access areas and regulated navigation areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and controlled access areas and regulated navigation areas. 165.9 Section 165.9 Navigation and... controlled access areas and regulated navigation areas. (a) General. The geographic application of the limited and controlled access areas and regulated navigation areas in this part are determined based...

  19. Generalized access control strategies for integrated services token passing systems

    NASA Astrophysics Data System (ADS)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  20. Trust-based access control model from sociological approach in dynamic online social network environment.

    PubMed

    Baek, Seungsoo; Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  1. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    PubMed Central

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  2. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    PubMed Central

    Su, Mang; Li, Fenghua; Tang, Zhi; Yu, Yinyan; Zhou, Bo

    2014-01-01

    This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical. PMID:25136651

  3. Advanced Guidance and Control for Hypersonics and Space Access

    NASA Technical Reports Server (NTRS)

    Hanson, John M.; Hall, Charles E.; Mulqueen, John A.; Jones, Robert E.

    2003-01-01

    Advanced guidance and control (AG&C) technologies are critical for meeting safety, reliability, and cost requirements for the next generation of reusable launch vehicle (RLV), whether it is fully rocket-powered or has air- breathing components. This becomes clear upon examining the number of expendable launch vehicle failures in the recent past where AG&C technologies could have saved a RLV with the same failure mode, the additional vehicle problems where t h i s technology applies, and the costs and time associated with mission design with or without all these failure issues. The state-of-the-art in guidance and control technology, as well as in computing technology, is the point where we can look to the possibility of being able to safely return a RLV in any situation where it can physically be recovered. This paper outlines reasons for AWC, current technology efforts, and the additional work needed for making this goal a reality. There are a number of approaches to AG&C that have the potential for achieving the desired goals. For some of these methods, we compare the results of tests designed to demonstrate the achievement of the goals. Tests up to now have been focused on rocket-powered vehicles; application to hypersonic air-breathers is planned. We list the test cases used to demonstrate that the desired results are achieved, briefly describe an automated test scoring method, and display results of the tests. Some of the technology components have reached the maturity level where they are ready for application to a new vehicle concept, while others are not far along in development.

  4. [Public control and equity of access to hospitals under non-State public administration].

    PubMed

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  5. Astronaut Norman E. Thagard is briefed on array of tools for EVA

    NASA Technical Reports Server (NTRS)

    1983-01-01

    Astronaut Norman E. Thagard is briefed on the array of tools for extravehicular activity by James McBride, a crew trainer. An array of special tools is lined up on the table in front of them. Some of the tools include, bottom row from right to left, allen wrench with extension, diagonal cutters, a hammer, drive ratchet with hex socket extension, contingency strut wrench, forceps, bolt puller, and compound cable cutters. Above the hammer is a pair of french hooks, and a remote manipulator rope reel. Above the diagonal cutters is a power drive unit disconnect.

  6. Halloysite Nanotubes: Controlled Access and Release by Smart Gates

    PubMed Central

    Cavallaro, Giuseppe; Danilushkina, Anna A.; Evtugyn, Vladimir G.; Milioto, Stefana; Parisi, Filippo; Rozhina, Elvira V.; Fakhrullin, Rawil F.

    2017-01-01

    Hollow halloysite nanotubes have been used as nanocontainers for loading and for the triggered release of calcium hydroxide for paper preservation. A strategy for placing end-stoppers into the tubular nanocontainer is proposed and the sustained release from the cavity is reported. The incorporation of Ca(OH)2 into the nanotube lumen, as demonstrated using transmission electron microscopy (TEM) imaging and Energy Dispersive X-ray (EDX) mapping, retards the carbonatation, delaying the reaction with CO2 gas. This effect can be further controlled by placing the end-stoppers. The obtained material is tested for paper deacidification. We prove that adding halloysite filled with Ca(OH)2 to paper can reduce the impact of acid exposure on both the mechanical performance and pH alteration. The end-stoppers have a double effect: they preserve the calcium hydroxide from carbonation, and they prevent from the formation of highly basic pH and trigger the response to acid exposure minimizing the pH drop-down. These features are promising for a composite nanoadditive in the smart protection of cellulose-based materials. PMID:28788058

  7. Steganography-based access control to medical data hidden in electrocardiogram.

    PubMed

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  8. Modelling of Medium Access Control (MAC) Protocols for Mobile Ad-Hoc Networks

    DTIC Science & Technology

    2005-06-01

    Slot IP Internet Protocol LAN Local Area Network MAC Medium Access Control MACAW Medium Access Protocol for Wireless LANs MANET Mobile Ad-hoc...Unforced state – It waits after entering the state until it is invoked by another process or an interrupt. It is in dark grey on this report, and red ... green in OPNET. A MAC process model is built for general initialisations of the MAC module, and to invoke the selected MAC protocol process model

  9. Towards a Secure Programming Language. An Access Control System for CommonLisp

    DTIC Science & Technology

    2009-03-25

    at the 2009 International Lisp Conference, Cambridge MA March 22-25, 2009. 14. ABSTRACT Computer security is becoming an increasingly important...flow and access that would limit the damage due to a penetration. In this paper, we present an access control system for Lisp -like languages that...language as dynamic as Common- lisp is a serious challenge; we present techniques based on use of the Meta- Object Protocol (MOP) that achieve this

  10. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of the...

  11. 50 CFR 622.17 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false South Atlantic golden crab controlled... ATLANTIC Effort Limitations § 622.17 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery Management Plan for the Golden Crab Fishery of the...

  12. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery...

  13. 50 CFR 622.241 - South Atlantic golden crab controlled access.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false South Atlantic golden crab controlled..., AND SOUTH ATLANTIC Golden Crab Fishery of the South Atlantic Region § 622.241 South Atlantic golden crab controlled access. (a) General. In accordance with the procedures specified in the Fishery...

  14. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  15. Analysis of Decision Factors for the Application of Information Access Controls within the Organization

    ERIC Educational Resources Information Center

    Foerster, Carl A.

    2013-01-01

    The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…

  16. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    NASA Astrophysics Data System (ADS)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  17. Norman Dott, Gerard Guiot, and Jules Hardy: key players in the resurrection and preservation of transsphenoidal surgery.

    PubMed

    Patel, Smruti K; Husain, Qasim; Eloy, Jean Anderson; Couldwell, William T; Liu, James K

    2012-08-01

    Developed over a century ago, the transsphenoidal approach to access lesions of the pituitary gland and sella turcica has transformed the field of neurosurgery, largely due to the work of Oskar Hirsch and Harvey Cushing. Furthermore, its use and modification in the early 1900s was perhaps one of Cushing's greatest legacies to skull base surgery. However, Cushing, who had worked relentlessly to improve the transsphenoidal route to the pituitary region, abandoned the approach by 1929 in his pursuit to master transcranial approaches to the suprasellar region. Hirsch and a few other surgeons continued to perform transsphenoidal operations, but they were unable to maintain the popularity of the approach among their peers. During a time when transsphenoidal surgery was on the brink of extinction, a critical lineage of 3 key surgeons--Norman Dott, Gerard Guiot, and Jules Hardy--would resurrect the art, each working to further improve the procedure. Dott, Cushing's apprentice from 1923 to 1924, brought his experiences with transsphenoidal surgery to Edinburgh, Scotland, and along the way, developed the lighted nasal speculum to provide better illumination in the narrow working area. Guiot, inspired by Dott, adopted his technique and used intraoperative radiofluoroscopic technique for image guidance. Hardy, a fellow of Guiot, from Montreal, Canada, revolutionized transsphenoidal microsurgery with the introduction of the binocular microscope and selective adenomectomy. The teachings of these pioneers have endured over time and are now widely used by neurosurgeons worldwide. In this paper, we review the lineage and contributions of Dott, Guiot, and Hardy who served as crucial players in the preservation of transsphenoidal surgery.

  18. Effect of route of EPO administration on hemodialysis arteriovenous vascular access failure: a randomized controlled trial.

    PubMed

    Lee, Young-Ki; Koo, Ja-Ryong; Kim, Jin-Kyung; Park, In-Il; Joo, Min-Ha; Yoon, Jong-Woo; Noh, Jung-Woo; Vaziri, Nosratola D

    2009-05-01

    Vascular access failure is a major cause of morbidity and hospitalization in hemodialysis populations worldwide. Erythropoietin (EPO) potentially can contribute to vascular access stenosis and occlusion by promoting intimal hyperplasia and thrombosis. Intravenous administration of EPO results in a severe, but transient, increase in drug concentration within the vascular access, whereas subcutaneous administration leads to a mild, but sustained, increase in the systemic circulation. The effect of route of administration of EPO on vascular access outcomes is uncertain. Randomized controlled trial. 78 Korean hemodialysis patients were randomly assigned to receive either intravenous (n = 40) or subcutaneous (n = 38) EPO. EPO was administered during dialysis, and the dose was titrated to maintain hemoglobin levels between 9 to 12 g/dL. All patients received EPO 2 or 3 times/wk. Study duration was 4 to 77 months. The primary end point was time to vascular access failure. Analysis was performed using Cox regression analysis. The incidence of access failure was 4.7%/patient-year in the intravenous-therapy group and 12.0%/patient-year in the subcutaneous-therapy group, with an unadjusted hazard ratio of 3.24 (95% confidence interval, 1.31 to 8.00; P = 0.01). After adjustment for dialysis access type, vascular access age, previous intervention, serum phosphorus level, and diabetes mellitus, subcutaneous EPO administration was independently associated with increased vascular access failure (hazard ratio, 3.56; 95% confidence interval, 1.20 to 10.58; P = 0.02). There were no significant differences in either hemoglobin concentration or EPO dosage between the 2 groups during the study period. Relatively small sample size and lack of complete symmetry between the 2 groups with respect to some baseline characteristics. This study suggests that the risk of vascular access failure may be greater with subcutaneous compared with intravenous administration of EPO in hemodialysis

  19. Norman Barrett (1903-79): unorthodox pioneer of thoracic and oesophageal surgery.

    PubMed

    Edison, E; Agha, R A; Camm, C F

    2013-05-01

    It is an interesting quirk of medical history that the legacy of Norman Barrett most ostensibly lies in the name of a disease the he was quite emphatically wrong about, at least when he first described it. Indeed, there are those who argue to remove the eponym in favour of the title 'Columnar Lined Epithelium', in part because of what little Barrett actually had to do with the correct initial characterization of this disease. Yet the sum of Norman Barrett's contributions to modern medicine is much more than a mistaken characterization of a pathological process. Barrett was truly a pioneer of chest surgery in the UK - a specialty in its embryonic stages when he first qualified. He was also renowned as a teacher and academic of the highest calibre. In tracing the story of his life we can see how his natural attributes, life experiences and keen appreciation of the arts (especially history) facilitated personal success and such sharp insight into the vagaries of modern academic medicine.

  20. Norman Barrett (1903-1979): Unorthodox pioneer of thoracic and oesophageal surgery.

    PubMed

    Edison, E; Agha, R; Camm, C

    2016-05-01

    It is an interesting quirk of medical history that the legacy of Norman Barrett most ostensibly lies in the name of a disease the he was quite emphatically wrong about, at least when he first described it. Indeed, there are those who argue to remove the eponym in favour of the title 'Columnar Lined Epithelium', in part because of what little Barrett actually had to do with the correct initial characterisation of this disease. Yet the sum of Norman Barrett's contributions to modern medicine is much more than a mistaken characterisation of a pathological process. Barrett was truly a pioneer of chest surgery in the UK - a speciality in its embryonic stages when he first qualified. He was also renowned as a teacher and academic of the highest calibre. In tracing the story of his life we can see how his natural attributes, life experiences and keen appreciation of the arts (especially history) facilitated personal success and such sharp insight into the vagaries of modern academic medicine.

  1. An improved MCNP version of the NORMAN voxel phantom for dosimetry studies

    NASA Astrophysics Data System (ADS)

    Ferrari, P.; Gualdrini, G.

    2005-09-01

    In recent years voxel phantoms have been developed on the basis of tomographic data of real individuals allowing new sets of conversion coefficients to be calculated for effective dose. Progress in radiation studies brought ICRP to revise its recommendations and a new report, already circulated in draft form, is expected to change the actual effective dose evaluation method. In the present paper the voxel phantom NORMAN developed at HPA, formerly NRPB, was employed with MCNP Monte Carlo code. A modified version of the phantom, NORMAN-05, was developed to take into account the new set of tissues and weighting factors proposed in the cited ICRP draft. Air kerma to organ equivalent dose and effective dose conversion coefficients for antero-posterior and postero-anterior parallel photon beam irradiations, from 20 keV to 10 MeV, have been calculated and compared with data obtained in other laboratories using different numerical phantoms. Obtained results are in good agreement with published data with some differences for the effective dose calculated employing the proposed new tissue weighting factors set in comparison with previous evaluations based on the ICRP 60 report.

  2. Expectable Earthquakes and their ground motions in the Van Norman Reservoirs Area

    USGS Publications Warehouse

    Wesson, R.L.; Page, R.A.; Boore, D.M.; Yerkes, R.F.

    1974-01-01

    The upper and lower Van Norman dams, in northwesternmost San Fernando Valley about 20 mi (32 km) northwest of downtown Los Angeles, were severely damaged during the 1971 San Fernando earthquake. An investigation of the geologic-seismologic setting of the Van Norman area indicates that an earthquake of at least M 7.7 may be expected in the Van Norman area. The expectable transitory effects in the Van Norman area of such an earthquake are as follows: peak horizontal acceleration of at least 1.15 g, peak velocity of displacement of 4.43 ft/sec (135 cm/sec), peak displacement of 2.3 ft (70 cm), and duration of shaking at accelerations greater than 0.05 g, 40 sec. A great earthquake (M 8+) on the San Andreas fault, 25 mi distant, also is expectable. Transitory effects in the Van Norman area from such an earthquake are estimated as follows: peak horizontal acceleration of 0.5 g, peak velocity of 1.97 ft/sec (60 cm/sec), displacement of 1.31 ft (40 cm), and duration of shaking at accelerations greater than 0.05 g, 80 sec. The permanent effects of the expectable local earthquake could include simultaneous fault movement at the lower damsite, the upper damsite, and the site proposed for a replacement dam halfway between the upper and lower dams. The maximum differential displacements due to such movements are estimated at 16.4 ft (5 m) at the lower damsite and about 9.6 ft (2.93 m) at the upper and proposed damsites. The 1971 San Fernando earthquake (M 6?) was accompanied by the most intense ground motions ever recorded instrumentally for a natural earthquake. At the lower Van Norman dam, horizontal accelerations exceeded 0.6 g, and shaking greater than 0.25 g lasted for about 13 see; at Pacoima dam, 6 mi (10 km) northeast of the lower dam, high-frequency peak horizontal accelerations of 1.25 g were recorded in two directions, and shaking greater than 0.25 g lasted for about 7 sec. Permanent effects of the earthquake include slope failures in the embankments of the upper

  3. Virus spreading in wireless sensor networks with a medium access control mechanism

    NASA Astrophysics Data System (ADS)

    Wang, Ya-Qi; Yang, Xiao-Yuan

    2013-04-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations.

  4. Joint Random Access and Power Control Game in Ad Hoc Networks with Noncooperative Users

    NASA Astrophysics Data System (ADS)

    Long, Chengnian; Guan, Xinping

    We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as non-cooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally.

  5. RiBAC: Role Interaction Based Access Control Model for Community Computing

    NASA Astrophysics Data System (ADS)

    Jung, Youna; Masoumzadeh, Amirreza; Joshi, James B. D.; Kim, Minkoo

    Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as medical or military services, an access control mechanism is necessary to prevent unauthorized access to critical data or action. In this paper, we propose a family of Role interaction Based Access Control (RiBAC) models for Community Computing, by extending the existing RBAC model to consider role interactions. As a basic model, we propose the core RiBAC model. For the convenience of management and to provide more fine-grained access control, we propose Hierarchical RiBAC (H-RiBAC), Constrained RiBAC (C-RiBAC), and Constrained Hierarchical RiBAC (CH-RiBAC) models. Finally, we extend the existing community computing framework to accommodate the specification and enforcement of RiBAC policies.

  6. Performance Evaluation of Virtualization Techniques for Control and Access of Storage Systems in Data Center Applications

    NASA Astrophysics Data System (ADS)

    Ahmadi, Mohammad Reza

    2013-09-01

    Virtualization is a new technology that creates virtual environments based on the existing physical resources. This article evaluates effect of virtualization techniques on control servers and access method in storage systems [1, 2]. In control server virtualization, we have presented a tile based evaluation based on heterogeneous workloads to compare several key parameters and demonstrate effectiveness of virtualization techniques. Moreover, we have evaluated the virtualized model using VMotion techniques and maximum consolidation. In access method, we have prepared three different scenarios using direct, semi-virtual, and virtual attachment models. We have evaluated the proposed models with several workloads including OLTP database, data streaming, file server, web server, etc. Results of evaluation for different criteria confirm that server virtualization technique has high throughput and CPU usage as well as good performance with noticeable agility. Also virtual technique is a successful alternative for accessing to the storage systems especially in large capacity systems. This technique can therefore be an effective solution for expansion of storage area and reduction of access time. Results of different evaluation and measurements demonstrate that the virtualization in control server and full virtual access provide better performance and more agility as well as more utilization in the systems and improve business continuity plan.

  7. Control packet signaling mechanism using electronic code division multiple access for packet-based networks

    NASA Astrophysics Data System (ADS)

    Nadarajah, Nishaanthan

    2008-10-01

    We propose and experimentally demonstrate the feasibility of a control packet signaling technique using electronic code division multiple access for a wavelength division multiplexing packet-based network, whereby each wavelength channel is assigned a unique electronic code based label on a radio frequency subcarrier. Such a technique allows each wavelength channel to be electronically identified without requiring the use of a WDM demultiplexer. We experimentally demonstrate this technique with two wavelength channels each with 1.25 Gb/s baseband payload data and 10 Mb/s header coded onto an electronic code at 160 Mb/s. A performance study of the electronic code division multiple access based control signaling scheme in a wavelength division multiplexed packet-based access network is also performed in terms of the required power budget to monitor the electronic code division multiple access control signals in the presence of several sources of noise for error-free transmission of both payload data and electronic code division multiple access based control signals. It is shown that the modulation depth of each signal impacts the amount of required optical tap power. As the modulation depth of the electronic code division multiple access based control signal is increased, the required optical tap power is reduced. However, this increases the bit-error-rate for the payload data. Therefore, there lies a maximum and a minimum of the required tap optical power for the successful recovery of both signals. The lower bound of this range is usually determined by the successful recovery of electronic code division multiple access based control signal while the upper bound is determined by the successful recovery of payload data. The required optical tap power is analyzed for different transmission bit rates of the payload data for various receiver architecture scenarios without an optical amplifier at the receiver. The scalability analyses were repeated with an optical

  8. Automated biometric access control system for two-man-rule enforcement

    SciTech Connect

    Holmes, J.P.; Maxwell, R.L. ); Henderson, R.W. )

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.

  9. Toward Federated Security and Data Access Control within a Services Oriented Architecture for Publishing Hydrologic Data

    NASA Astrophysics Data System (ADS)

    Horsburgh, J. S.; Tarboton, D. G.; Schreuders, K.; Patil, K. S.

    2010-12-01

    Academic researchers who manage experimental watersheds, observatories, and research sites need the ability to effectively collect, manage, and publish hydrologic data. This often requires the ability to control and document access to the data. One current mechanism for publishing data from experimental sites uses the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS). The CUAHSI HIS Project has developed a software stack called HydroServer for publishing hydrologic data. HydroServer relies on a standard relational database schema for storing hydrologic observations, called the Observations Data Model (ODM), a standard set of web services for publishing observations stored in an ODM database, called WaterOneFlow, and a standard XML schema for exchanging hydrologic observations data, called Water Markup Language (WaterML). These standards make is possible for disparate investigators to publish their data as web services within a federated network of HydroServers. Once a HydroServer is operational, all Internet users can access all of the data on the server, with no requirement for users to identify themselves, or restriction on what can be accessed. There are a number of situations where data producers want to take advantage of the organization and functionality that ODM and the HydroServer software stack provides, but without providing unrestricted and unlogged access to all of the data that they are putting on their server. These include the desire of academic data collectors to: 1) control who can access/download data; 2) publish research results based on data before the data are released to the general public; 3) keep track of who is downloading and using their data to evaluate and document its impact on the community; 4) have and use a data use/access agreement and ensure that they get credit and appropriate citation for the data that they publish; 5) expose the best or highest quality data

  10. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia.

    PubMed

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003-2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Over a decade the health service coverage (the health facility-to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=-0.25, p<0.001) and altitude (b-estimate=-0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=-0.27, p<0.001) and altitude (b-estimate=-0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Accessibility to TB control services improved despite

  11. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    PubMed Central

    Dangisso, Mesay Hailu; Datiko, Daniel Gemechu; Lindtjørn, Bernt

    2015-01-01

    Background Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB) control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs) and treatment outcome in the Sidama Zone, southern Ethiopia. Design We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB) cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results Over a decade the health service coverage (the health facility–to-population ratio) increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km) between kebeles (the smallest administrative units) and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km). In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001) and altitude (b-estimate=−0.31, p<0.001) increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001) and altitude (b-estimate=−0.30, p<0.001) were inversely associated with treatment success (proportion of treatment completed or cured cases). Conclusions

  12. Pace: Privacy-Protection for Access Control Enforcement in P2P Networks

    NASA Astrophysics Data System (ADS)

    Sánchez-Artigas, Marc; García-López, Pedro

    In open environments such as peer-to-peer (P2P) systems, the decision to collaborate with multiple users — e.g., by granting access to a resource — is hard to achieve in practice due to extreme decentralization and the lack of trusted third parties. The literature contains a plethora of applications in which a scalable solution for distributed access control is crucial. This fact motivates us to propose a protocol to enforce access control, applicable to networks consisting entirely of untrusted nodes. The main feature of our protocol is that it protects both sensitive permissions and sensitive policies, and does not rely on any centralized authority. We analyze the efficiency (computational effort and communication overhead) as well as the security of our protocol.

  13. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    NASA Astrophysics Data System (ADS)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  14. Empowering citizens with access control mechanisms to their personal health resources.

    PubMed

    Calvillo, J; Román, I; Roa, L M

    2013-01-01

    Advancements in information and communication technologies have allowed the development of new approaches to the management and use of healthcare resources. Nowadays it is possible to address complex issues such as meaningful access to distributed data or communication and understanding among heterogeneous systems. As a consequence, the discussion focuses on the administration of the whole set of resources providing knowledge about a single subject of care (SoC). New trends make the SoC administrator and responsible for all these elements (related to his/her demographic data, health, well-being, social conditions, etc.) and s/he is granted the ability of controlling access to them by third parties. The subject of care exchanges his/her passive role without any decision capacity for an active one allowing to control who accesses what. We study the necessary access control infrastructure to support this approach and develop mechanisms based on semantic tools to assist the subject of care with the specification of access control policies. This infrastructure is a building block of a wider scenario, the Person-Oriented Virtual Organization (POVO), aiming at integrating all the resources related to each citizen's health-related data. The POVO covers the wide range and heterogeneity of available healthcare resources (e.g., information sources, monitoring devices, or software simulation tools) and grants each SoC the access control to them. Several methodological issues are crucial for the design of the targeted infrastructure. The distributed system concept and focus are reviewed from the service oriented architecture (SOA) perspective. The main frameworks for the formalization of distributed system architectures (Reference Model-Open Distributed Processing, RM-ODP; and Model Driven Architecture, MDA) are introduced, as well as how the use of the Unified Modelling Language (UML) is standardized. The specification of access control policies and decision making mechanisms

  15. Trace ResourceBook: Assistive Technologies for Communication, Control and Computer Access, 1993-94 Edition.

    ERIC Educational Resources Information Center

    Borden, Peter A.; And Others

    This volume lists and describes products pertaining to assistive and rehabilitative technologies in the areas of communication, control, and computer access, as well as special software. Part 1, covering communication for individuals with disabilities, includes products designed as aids to both electronic and nonelectronic communication. It…

  16. A Stateful Multicast Access Control Mechanism for Future Metro-Area-Networks.

    ERIC Educational Resources Information Center

    Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin

    2003-01-01

    Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)

  17. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  18. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  19. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  20. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least one of the individuals designated under paragraph (a) of this section must verify that the DEA... authentication credential to satisfy the logical access controls. The second individual must be a DEA registrant... practitioner's DEA registration expires, unless the registration has been renewed. (3) The...

  1. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    ERIC Educational Resources Information Center

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  2. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    SciTech Connect

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  3. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    PubMed Central

    Liu, Changyu; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840

  4. The Role of Automatic Indexing in Access Control: A Modular View

    ERIC Educational Resources Information Center

    Hartson, H. Rex

    1974-01-01

    A model which relates the access control and indexing functions. The model is based on concept protection which allows a practically unbounded number of levels (subsets) of protection without requiring a fixed hierarchy among the levels. This protection is offered independently for each of the user operations allowed. (Author)

  5. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  6. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  7. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  8. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  9. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  10. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    ERIC Educational Resources Information Center

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  11. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    ERIC Educational Resources Information Center

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  12. Mining Roles and Access Control for Relational Data under Privacy and Accuracy Constraints

    ERIC Educational Resources Information Center

    Pervaiz, Zahid

    2013-01-01

    Access control mechanisms protect sensitive information from unauthorized users. However, when sensitive information is shared and a Privacy Protection Mechanism (PPM) is not in place, an authorized insider can still compromise the privacy of a person leading to identity disclosure. A PPM can use suppression and generalization to anonymize and…

  13. The need for the use of XACML access control policy in a distributed EHR and some performance considerations.

    PubMed

    Sucurovic, Snezana; Milutinovic, Veljko

    2008-01-01

    The Internet based distributed large scale information systems implements attribute based access control (ABAC) rather than Role Based Access Control (RBAC). The reason is that the Internet is identity less and that ABAC scales better. EXtensible Access Control Markup Language is standardized language for writing access control policies, access control requests and access control responses in ABAC. XACML can provide decentralized administration and credentials distribution. In year 2002 version of CEN ENV 13 606 attributes have been attached to EHCR components and in such a system ABAC and XACML have been easy to implement. This paper presents writing XACML policies in the case when attributes are in hierarchical structure. It is presented two possible solutions to write XACML policy in that case and that the solution when set functions are used is more compact and provides 10% better performances.

  14. The unexpected confluence of plasma physics and climate science: On the lives and legacies of Norman Rostoker and Sherry Rowland

    NASA Astrophysics Data System (ADS)

    Mackey, Katherine R. M.

    2016-03-01

    The Norman Rostoker Memorial Symposium brought together approximately 150 attendees to share their recent work and to reflect on the contributions of Norman Rostoker to the field of plasma physics and the advancement of fusion as a source of renewable clean energy. The field has changed considerably in a few short decades, with theoretical advances and technological innovations evolving in lock step. Over those same decades, our understanding of human induced climate change has also evolved; measurable changes in Earth's physical, chemical, and biological processes have already been observed, and these will likely intensify in the coming decades. Never before has the need for clean energy been more pronounced, or the need for transformative solutions more pressing. As scientists work with legislators, journalists, and the public to take actions to address the threat of climate change, there is much to be learned from the legacies of innovators like Norman Rostoker, who have tackled complex problems with scientific insight and determination even when the odds were stacked against them. I write this from the perspective on an Earth system scientist who studies photosynthesis and the biogeochemistry of the oceans, and my statements about plasma physics and Norman Rostoker are based on information I gathered from the colloquium and from many enjoyable conversations with his friends and colleagues.

  15. Historical overiew of John M. Norman's involvement in the development of several key instruments for biophysical measurement

    USDA-ARS?s Scientific Manuscript database

    Professor John M. Norman has played a key role in the development of many measurement devices currently used in the field of Environmental Biophysics, including the LAI-2000 for measuring leaf area index and plant canopy architecture and the LI-6000 Portable Photosynthesis System for measuring plant...

  16. The unexpected confluence of plasma physics and climate science: On the lives and legacies of Norman Rostoker and Sherry Rowland

    SciTech Connect

    Mackey, Katherine R. M.

    2016-03-25

    The Norman Rostoker Memorial Symposium brought together approximately 150 attendees to share their recent work and to reflect on the contributions of Norman Rostoker to the field of plasma physics and the advancement of fusion as a source of renewable clean energy. The field has changed considerably in a few short decades, with theoretical advances and technological innovations evolving in lock step. Over those same decades, our understanding of human induced climate change has also evolved; measurable changes in Earth’s physical, chemical, and biological processes have already been observed, and these will likely intensify in the coming decades. Never before has the need for clean energy been more pronounced, or the need for transformative solutions more pressing. As scientists work with legislators, journalists, and the public to take actions to address the threat of climate change, there is much to be learned from the legacies of innovators like Norman Rostoker, who have tackled complex problems with scientific insight and determination even when the odds were stacked against them. I write this from the perspective on an Earth system scientist who studies photosynthesis and the biogeochemistry of the oceans, and my statements about plasma physics and Norman Rostoker are based on information I gathered from the colloquium and from many enjoyable conversations with his friends and colleagues.

  17. Distributed data access in the LAMPF (Los Alamos Meson Physics Facility) control system

    SciTech Connect

    Schaller, S.C.; Bjorklund, E.A.

    1987-01-01

    We have extended the Los Alamos Meson Physics Facility (LAMPF) control system software to allow uniform access to data and controls throughout the control system network. Two aspects of this work are discussed here. Of primary interest is the use of standard interfaces and standard messages to allow uniform and easily expandable inter-node communication. A locally designed remote procedure call protocol will be described. Of further interest is the use of distributed databases to allow maximal hardware independence in the controls software. Application programs use local partial copies of the global device description database to resolve symbolic device names.

  18. Access Scheme for Controlling Mobile Agents and its Application to Share Medical Information.

    PubMed

    Liao, Yu-Ting; Chen, Tzer-Shyong; Chen, Tzer-Long; Chung, Yu-Fang; Chen, Yu- Xin; Hwang, Jen-Hung; Wang, Huihui; Wei, Wei

    2016-05-01

    This study is showing the advantage of mobile agents to conquer heterogeneous system environments and contribute to a virtual integrated sharing system. Mobile agents will collect medical information from each medical institution as a method to achieve the medical purpose of data sharing. Besides, this research also provides an access control and key management mechanism by adopting Public key cryptography and Lagrange interpolation. The safety analysis of the system is based on a network attacker's perspective. The achievement of this study tries to improve the medical quality, prevent wasting medical resources and make medical resources access to appropriate configuration.

  19. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    PubMed Central

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign. PMID:2289296

  20. Joint power and multiple access control for wireless mesh network with Rose projection method.

    PubMed

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  1. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    PubMed Central

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  2. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    PubMed

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  3. Norman Vincent Peale, Smiley Blanton and the hidden energies of the mind.

    PubMed

    Capps, Donald

    2009-12-01

    This article on Norman Vincent Peale and Smiley Blanton, who cofounded the American Foundation of Religion and Psychiatry in 1937, focuses on books that they wrote in the 1950s: Peale's The Power of Positive Thinking (1952) and Blanton's Love or Perish (1956). Similarities between Peale's problem-solving techniques and Milton E. Erickson's psychotherapeutic methods are demonstrated, and Blanton's indebtedness to psychoanalytic theories and methods is also shown. The Peale-Blanton collaboration suggests that pastoral counselors may legitimately employ these very different therapeutic approaches depending on the needs of the individual counselee. On the other hand, the fact that they subscribed to very different therapeutic approaches raises the question as to whether the two men shared anything in common as far as their professional work with individuals was concerned. The answer is that both believed that we humans possess an enormous reservoir of untapped energies that, when released and appropriately directed, are capable of effecting fundamental changes in an individual's life.

  4. Climate change and Norman Daniels' theory of just health: an essay on basic needs.

    PubMed

    Lacey, Joseph

    2012-02-01

    Norman Daniels, in applying Rawls' theory of justice to the issue of human health, ideally presupposes that society exists in a state of moderate scarcity. However, faced with problems like climate change, many societies find that their state of moderate scarcity is increasingly under threat. The first part of this essay aims to determine the consequences for Daniels' theory of just health when we incorporate into Rawls' understanding of justice the idea that the condition of moderate scarcity can fail. Most significantly, I argue for a generation-neutral principle of basic needs that is lexically prior to Rawls' familiar principles of justice. The second part of this paper aims to demonstrate how my reformulated version of Daniels' conception of just health can help to justify action on climate change and guide climate policy within liberal-egalitarian societies.

  5. Subsurface imaging of an abandoned solid waste landfill site in Norman, Oklahoma

    USGS Publications Warehouse

    Zume, J.T.; Tarhule, A.; Christenson, S.

    2006-01-01

    Leachate plume emanating from an old unlined municipal landfill site near the city of Norman, Oklahoma, is discharging into the underlying alluvial aquifer. Subsurface imaging techniques, electrical resistivity tomography and electrical conductivity (EC) logging, were used on the site to detect and map the position of the leachate plume. Anomalous EC zones, delineated with the two methods, correlated with the occurrence of the plume detected by water chemistry analyses from multilevel monitoring wells. Specific conductance, a potential indicator of leachate contamination, ranged from 1861 to 7710 ??S/cm in contaminated zones and from 465 to 2180 ??S/cm in uncontaminated ground water. Results are in agreement with those from earlier studies that the leachate plume emerges from the landfill along preferential pathways. Additionally, there are indications that the leading edge of the plume has migrated, at least, 200 m away from the landfill in the direction of ground water flow. ?? 2006 National Ground Water Association.

  6. A new species of Gastrosaccus Norman, 1868 (Mysida, Mysidae, Gastrosaccinae) from a sandy shore of Indonesia.

    PubMed

    Hanamura, Yukio; Mantiri, Rose O S E; Ohtsuka, Susumu

    2014-01-01

    A new species of the mysid crustacean genus Gastrosaccus Norman, 1868 (Mysida, Mysidae, Gastrosaccinae) is reported from a sandy shore of Lombok Island, Indonesia. These specimens resemble G. sorrentoensis Wooldridge & McLachlan, 1986 and G. yuyu Bamber and Morton, 2012 by the possession of an articulated process on the fifth abdominal somite together with a fringe of spine-like filaments on the posterodorsal margin of the carapace. The Lombok population differs from the known congeners by having comparatively fewer numbers of carpopropod segments on the endopod of the third to eighth thoracic limbs and the conformation in the telson and in the male third pleopod. Hence, G. lombokiensis sp. n. is proposed herein as a third species of "G. sorrentoensis" species group.

  7. A new species of Gastrosaccus Norman, 1868 (Mysida, Mysidae, Gastrosaccinae) from a sandy shore of Indonesia

    PubMed Central

    Hanamura, Yukio; Mantiri, Rose O.S.E.; Ohtsuka, Susumu

    2014-01-01

    Abstract A new species of the mysid crustacean genus Gastrosaccus Norman, 1868 (Mysida, Mysidae, Gastrosaccinae) is reported from a sandy shore of Lombok Island, Indonesia. These specimens resemble G. sorrentoensis Wooldridge & McLachlan, 1986 and G. yuyu Bamber and Morton, 2012 by the possession of an articulated process on the fifth abdominal somite together with a fringe of spine-like filaments on the posterodorsal margin of the carapace. The Lombok population differs from the known congeners by having comparatively fewer numbers of carpopropod segments on the endopod of the third to eighth thoracic limbs and the conformation in the telson and in the male third pleopod. Hence, G. lombokiensis sp. n. is proposed herein as a third species of “G. sorrentoensis” species group. PMID:25197216

  8. Water chemistry near the closed Norman Landfill, Cleveland County, Oklahoma 1995

    USGS Publications Warehouse

    Schlottmann, Jamie L.

    2001-01-01

    The Norman Landfill was selected for study as part of the U.S. Geological Survey Toxic Substances Hydrology Program in 1994. The landfill is located south of the City of Norman on alluvial deposits of the Canadian River. Type of waste deposited in the landfill from 1922 to 1973 was largely unrestricted and may include substances now recognized as hazardous. Dissolved and suspended substances leached from wastes in the closed and capped landfill are now in ground water extending toward the Canadian River as a plume of leachate. Water samples were collected from two stock wells, one domestic well, temporary drive-point wells, the Canadian River, and a small intermittent stream hydraulically downgradient of the capped landfill known as the slough. Most constituent concentrations were greater in ground water downgradient from the capped landfill than in background ground water and were greater in the slough than in the Canadian River. Concentrations of most constituents in the Canadian River, other than sulfate, manganese, and iron, were similar to concentrations in background ground water. Some constituents measured in ground-water for this investigation are potential indicators of leachate contamination. Potential indicators that could be used to differentiate leachate contaminated water from uncontaminated ground water of the alluvial aquifer include specific conductance, chloride, alkalinity, dissolved organic carbon, boron, and dD. Specific conductance and chloride were greater in water from wells downgradient of the landfill than water from background wells. Dissolved organic carbon and boron also were greater in the leachate contaminated ground water than in background ground water.

  9. Ground water in the alluvial deposits of the Canadian River valley near Norman, Oklahoma

    USGS Publications Warehouse

    Stacy, Bill L.

    1961-01-01

    Unconsolidated water-bearing alluvial deposits border the Canadian River in the vicinity of Norman, Oklahoma. These Quaternary materials are divided on the basis of topgraphic position into 'high terrace deposits' and 'alluvium.' The high terrace lies at an elevation of 50 to 60 feet above the alluvium, which in turn lies 7 to 15 feet above the channel of the Canadian River. Southwest of Norman a relatively thick section of these deposits occur as a hydrologic unit and overlie impermeable Permian shale. The high terrace deposits contain thick beds of clay, silt, and fine sand, whereas the alluvium contains a higher percentage of coarse sand and gravel. Ground-water recharge is estimated to be 23 percent of the normal annual precipitation of 33.22 inches; the specific yield is about 15 percent, and the coefficient of permeability is about 1,000 gpd/ft2. Using these figures 17,000 acre-feet of water is computed to be in storage within the area acting as a hydrologic unit. About 3.6 million gallons of water is discharged daily from the high terrace deposits through a 16,000-foot section of alluvium having a saturated thickness of 40 feet along the river. The quality of water in the high terrace deposits meets the standards of the U.S. Public Health Service for domestic water used by Interstate carriers but nitrate content of one well is higher than recommended by the Oklahoma Department of Public Health. Water in the alluvium is of poorer quality because the water is concentrated by evapotranspiration. (available as photostat copy only)

  10. Norman M. Dott, master of hypothalamic craniopharyngioma surgery: the decisive mentoring of Harvey Cushing and Percival Bailey at Peter Bent Brigham Hospital.

    PubMed

    Prieto, Ruth; Pascual, José M

    2017-01-06

    Norman McOmish Dott (1897-1973) developed surgical neurology in Edinburgh, Scotland, and was a scholar of worldwide renown. One of Dott's most notable contributions to neurosurgery was his understanding of hypothalamic physiology, mostly acquired through the comprehensive study of patients with lesions involving this region of the diencephalon, particularly craniopharyngiomas (CPs). Recognition of symptoms caused by hypothalamic disturbances allowed him to predict the accurate anatomical relationships between CPs and the hypothalamus, despite the rudimentary radiological methods available during the 1930s. His sophisticated knowledge permitted Dott to perform radical removals of CPs originating within the third ventricle floor with acceptable success. Between 1934 and 1937, he operated on 4 CP cases originating in the hypothalamus, achieving a satisfactory postoperative outcome in 3 of the 4 patients. Aware of the strong attachment of hypothalamic CPs to the infundibulo-tuberal area, Dott used a double transbasal and transventricular approach to these lesions, a strategy providing an optimal view and control of the tumor boundaries. The decisive mentorship of several legendary figures of physiology and neurosurgery greatly influenced Dott's surgical evolution. The experimental pituitary gland work he performed with Sir Edward Sharpey-Schäfer at the beginning of his career stirred Dott's curiosity about the issue of hypothalamus-pituitary relationships. As a result, he decided to move to Peter Bent Brigham Hospital (Boston, Massachusetts) in 1923, to train in neurosurgery and neuropathology under the guidance of the leaders in these fields, Harvey Williams Cushing (1869-1939) and Percival Sylvester Bailey (1892-1973). They inspired the young Dott and shared with him their clinical and pathological expertise, in addition to their surgical strategies for best approaching and removing these challenging tumors. In time, Dott would come to surpass his mentors. This

  11. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    NASA Astrophysics Data System (ADS)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  12. Distributed joint power and access control algorithm for secondary spectrum sharing

    NASA Astrophysics Data System (ADS)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  13. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  15. A Privacy Access Control Framework for Web Services Collaboration with Role Mechanisms

    NASA Astrophysics Data System (ADS)

    Liu, Linyuan; Huang, Zhiqiu; Zhu, Haibin

    With the popularity of Internet technology, web services are becoming the most promising paradigm for distributed computing. This increased use of web services has meant that more and more personal information of consumers is being shared with web service providers, leading to the need to guarantee the privacy of consumers. This paper proposes a role-based privacy access control framework for Web services collaboration, it utilizes roles to specify the privacy privileges of services, and considers the impact on the reputation degree of the historic experience of services in playing roles. Comparing to the traditional privacy access control approaches, this framework can make the fine-grained authorization decision, thus efficiently protecting consumers' privacy.

  16. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  17. An internet of things example: classrooms access control over near field communication.

    PubMed

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  18. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    PubMed Central

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  19. Design of access control methods for protecting the confidentiality of patient information in networked systems.

    PubMed Central

    Bowen, J. W.; Klimczak, J. C.; Ruiz, M.; Barnes, M.

    1997-01-01

    Public awareness of the potential for violation of personal privacy in clinical information systems is increasing. Much of this increase can be attributed to the popularity and publicity of the World Wide Web. Nightly news reports of intruder break-ins and flaws in Internet software security have stimulated public interest in the security of clinical information systems available over the web. As part of the development of systems designed to provide clinical narratives to physicians over the Internet, we are exploring designs that provide additional protection and security to these systems. Specifically, we are developing and testing automated access control measures based on provider-patient relationships for controlling access to personally identifiable patient information. PMID:9357586

  20. Information Leaks and Limitations of Role-Based Access Control Mechanisms: A Qualitative Exploratory Single Case Study

    ERIC Educational Resources Information Center

    Antony, Laljith

    2016-01-01

    Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…

  1. Controlled Access Headings in EAD Finding Aids: Current Practices in Number of and Types of Headings Assigned

    ERIC Educational Resources Information Center

    Mascaro, Michelle

    2011-01-01

    This article presents the findings from a study of controlled access headings assigned to encoded archival description finding aids in the Ohio Library and Information Network Finding Aid Repository, focusing on the number of headings per finding aid and the category of terms assigned. Assigning multiple controlled access headings was widely…

  2. Traffic Control Algorithm Offering Multi-Class Fairness in PON Based Access Networks

    NASA Astrophysics Data System (ADS)

    Okumura, Yasuyuki

    This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and UDP (User Datagram Protocol) traffic flows show that the algorithm increases the throughput of TCP, improves the fairness between the two protocols, and solves the congestion problem at the SNI.

  3. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    DTIC Science & Technology

    2002-08-01

    validdes. En d’autres mots, ce projet est une 6tape suppldmentaire dans le dessein de migrer ces technologies radio vers la Flotte Op ~ rationnelle ...Defence Research and Recherche et ddveloppement Development Canada pour la defense Canada DEFENCE • I7 DEFENSE Sub-Network Access Control...dans l’optique qu’ils op ~rent sur des liens avec une large bande passantes dont la topologie 6volue Tentement. Les produites con-nerciaux de gestion de

  4. The influence of patriarchal behavior on birth control access and use among recent Hispanic immigrants.

    PubMed

    Gonzalez, Eleazar U; Sable, Marjorie R; Campbell, James D; Dannerbeck, Anne

    2010-08-01

    It is commonly assumed that Hispanic immigrants in the United States subscribe to a patriarchal ideology that keeps women subordinated to men, often through violence and exploitative reproductive behaviors. If this assumption is true, we might expect to find that in the Hispanic culture patriarchal males control decision-making about access to and use of birth control. Structured interviews of 100 Hispanic men and 100 Hispanic women who were recent immigrants to a Midwest community were conducted to examine this assumption. Results did not support this assumption among this study population. We found no patriarchal ideology supporting women's subordination to men, violence as a mechanism of control, reproduction as a way of exploitation, or cultural influences discouraging access to and use of birth control in the Hispanic community. Rather, these immigrants revealed adequate knowledge of birth control use and positive perceptions of gender equality. Gaining a better understanding of the limited influence of patriarchal ideology on the use of birth control and family planning services among this Hispanic community may inform the development of family planning services tailored for new Hispanic immigrants.

  5. Socio-economic status influences blood pressure control despite equal access to care.

    PubMed

    Paulsen, M S; Andersen, M; Munck, A P; Larsen, P V; Hansen, D G; Jacobsen, I A; Larsen, M L; Christensen, B; Sondergaard, J

    2012-10-01

    Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general practice. We enrolled 184 general practices and 5260 hypertensive patients. The general practitioners reported information about BP and diagnosis of diabetes. Information about education, income, antihypertensive drug treatment and other co-morbidity was retrieved from relevant registers from Statistics Denmark. The outcome measure was BP control defined as BP <140/90 mmHg in general and <130/80 mmHg in diabetics. Patients <65 years and with an educational level of 10-12 years had increased odds ratio (OR) of BP control compared to patients with an educational level <10 years. Patients ≥65 years had increased OR of BP control if they were married/cohabiting as compared to being single, whereas education and income had no impact in this age group. Diabetics had significantly reduced odds of BP control irrespective of age, educational or income level. Despite equal access to care for all patients, SES had significant impact on BP control in this survey. Diabetes and cardiovascular disease also had a substantial influence irrespective of age, educational and income level.

  6. A human rights view on access to controlled substances for medical purposes under the international drug control framework.

    PubMed

    Gispen, Marie Elske C

    2013-11-05

    The world is confronted with a major public health deficit caused by poor access to controlled essential medicines under the international drug control framework. This is affecting millions of patients on a daily basis and resulting in numerous human rights violations. The present review contextualises this deficit from a human rights perspective. Drug control efforts are informed by a twofold objective stemming from the double nature of scheduled substances: free access for medical purposes should be ensured, though non-medical use of substances such as opium should be restricted. The international drug control framework is, in theory, based on this twofold notion, however at the level of interpretation, monitoring, and implementation, a one-sided emphasis is demonstrated. By tracing a parallel between the obligations of states under the international drug control framework and those that derive from human rights law, the review shows that the two systems seem incoherent and conflicting in nature and flags the importance of cross-disciplinary research into drug control and human rights. © 2013 Elsevier B.V. All rights reserved.

  7. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    PubMed Central

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  8. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    PubMed

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  9. Final Report-Object Approaches to Data Access, Controls and Remote and Distributed Computing.

    SciTech Connect

    Dr. John R Cary

    2003-01-23

    We submitted a progress report covering the first year of work on this grant on October 10, 2000. Though originally envisioned as a three-year grant, this work was not, in fact, funded after the first year. Thus, we hereby submit a report that is basically the same as the report submitted on October 10, 2000. In the first year of this project we prepared the groundwork for moving to automatic discovery, secure access to data servers, applications and controls, and migration to object approaches to data storage. We built and installed the secure Apache web server. It can be accessed at https://fusion.txcorp.com. We are able to configure this web server so that access is limited to a set of persons based on their Public Key Infrastructure certificates. Secondly, we developed signed applets for the National Transport Code Collaboration Demonstration Code, as are needed for secure access to the data and physics servers being developed by that project. Signed applets assure the user that the applet is the official version, and so it will not corrupt their machine. The also assure the server that the commands that come over are from a valid applet. In addition we began working with the CORBA naming daemon for configuring it to provide automatic discovery of data and physics servers. Finally, we spent significant time working on the NTCC project to ensure that its components were robust and useful, so that the remainder of this project would have a valuable tool to implement.

  10. A low-complexity medium access control framework for body sensor networks.

    PubMed

    Wang, Bo; Wang, Lei; Huang, Bang-Yu; Wu, Dan; Lin, Shao-Jie; Gu, Jia; Zhang, Yuan-Ting; Chen, Wei

    2009-01-01

    This paper proposed a low-complexity medium access control (MAC) protocol tailored for body sensor networks (BSN) applications. The MAC protocol was designated to handle collision avoidance by reducing the numbers of the overhead packets for handshake control within the BSN. We also suggested a novel message recovery mechanism for getting back the lost physiological information. The adaptive synchronization scheme we have implemented exploited the features of multiple data-rate and adjustable precision design to support differentiated healthcare applications. The MAC protocol was fully implemented using our BSN development platform. The experimental results suggested the improved MAC design was compact and energy-efficient.

  11. Layered Multicast Encryption of Motion JPEG2000 Code Streams for Flexible Access Control

    NASA Astrophysics Data System (ADS)

    Nakachi, Takayuki; Toyoshima, Kan; Tonomura, Yoshihide; Fujii, Tatsuya

    In this paper, we propose a layered multicast encryption scheme that provides flexible access control to motion JPEG2000 code streams. JPEG2000 generates layered code streams and offers flexible scalability in characteristics such as resolution and SNR. The layered multicast encryption proposal allows a sender to multicast the encrypted JPEG2000 code streams such that only designated groups of users can decrypt the layered code streams. While keeping the layering functionality, the proposed method offers useful properties such as 1) video quality control using only one private key, 2) guaranteed security, and 3) low computational complexity comparable to conventional non-layered encryption. Simulation results show the usefulness of the proposed method.

  12. BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks.

    PubMed

    Maw, Htoo; Xiao, Hannan; Christianson, Bruce; Malcolm, James

    2015-12-22

    Wireless Sensor Networks (WSNs) have recently attracted much interest in the research community because of their wide range of applications. An emerging application for WSNs involves their use in healthcare where they are generally termed Wireless Medical Sensor Networks (WMSNs). In a hospital, outfitting every patient with tiny, wearable, wireless vital sign sensors would allow doctors, nurses and other caregivers to continuously monitor the state of their patients. In such a scenario, patients are expected to be treated in reasonable time, so, an access control model is needed which will provide both real-time access to comprehensive medical records and detect unauthorised access to sensitive data. In emergency situations, a doctor or nurse needs to access data immediately. The loss in data availability can result in further decline in the patient's condition or can even lead to death. Therefore, the availability of data is more important than any security concern in emergency situations. To address that research issue for medical data in WSNs, we propose the Break-The-Glass Access Control (BTG-AC) model that is a modified and redesigned version of the Break-The-Glass Role-Based Access Control (BTG-RBAC) model to address data availability issue and to detect the security policy violations from both authorised and unauthorised users. Several changes within the access control engine are made in BTG-RBAC in order to make the new BTG-AC to apply and fit in WSNs. This paper presents the detailed design and development of the BTG-AC model based on a healthcare scenario. The evaluation results show that the concepts of BTG, prevention and detection mechanism, and obligation provide more flexible access than other current access control models in WSNs. Additionally, we compare the BTG-AC model with an adaptive access control model (A2C) which has similar properties, for further evaluation. Alongside with the comparison, the advantages and disadvantages of BTGAC over

  13. Hypertension Detection, Management, Control and Associated Factors Among Residents Accessing Community Health Services In Beijing

    PubMed Central

    JIANG, Bin; LIU, Hongmei; RU, Xiaojuan; ZHANG, Hui; WU, Shengping; WANG, Wenzhi

    2014-01-01

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs. PMID:24784167

  14. Hypertension detection, management, control and associated factors among residents accessing community health services in Beijing.

    PubMed

    Jiang, Bin; Liu, Hongmei; Ru, Xiaojuan; Zhang, Hui; Wu, Shengping; Wang, Wenzhi

    2014-05-02

    The aim of this study was to analyse high blood pressure detection, management, control and associated factors among residents accessing community health services (CHSs) in Beijing. We screened for HBP in 9524 individuals aged 50 years or older who accessed care in four Beijing CHSs. Among the 9397 residents with questionnaire responses that qualified them for inclusion in the study, 5029 patients with HBP were identified, 1510 (i.e., 30% of the HBP patient group) of whom were newly identified cases. The rate of hypertension detection was 53.5%. Among the 5029 HBP patients, the rates of awareness, treatment and control of hypertension were 70.0%, 62.1% and 29.6%, respectively. In general, the rate of hypertension control was higher when the rates of hypertension awareness and treatment were higher in subgroups stratified by different sociodemographic and risk factors, except for the overweight and obesity subgroups. In conclusion, suboptimal HBP awareness, treatment, and control are still major problems confronting CHSs in Beijing. Control of hypertension in the population may be improved by increasing awareness and improving the treatment of hypertension in CHSs.

  15. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    PubMed

    Vayena, Effy; Blasimme, Alessandro

    2017-10-05

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  16. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    PubMed Central

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  17. Preemptive Correction of Arteriovenous Access Stenosis: A Systematic Review and Meta-analysis of Randomized Controlled Trials.

    PubMed

    Ravani, Pietro; Quinn, Robert R; Oliver, Matthew J; Karsanji, Divya J; James, Matthew T; MacRae, Jennifer M; Palmer, Suetonia C; Strippoli, Giovanni F M

    2016-03-01

    Preemptive correction of a stenosis in an arteriovenous (AV) access (fistula or graft) that is adequately providing hemodialysis (functional AV access) may prolong access survival as compared to waiting for signs of access dysfunction to intervene (deferred salvage). However, the evidence in support of preemptive intervention is controversial. We evaluated benefits and harms of preemptive versus deferred correction of AV access stenosis. Systematic review and meta-analysis of randomized controlled trials. Adults receiving hemodialysis by a functional AV access. We searched the Cochrane Kidney and Transplant Specialised Register and EMBASE to October 15, 2015. Active access surveillance (flow measurement and Doppler or venous pressure) and preemptive correction of a newly identified stenosis versus routine clinical monitoring and deferred salvage, or preemptive correction of a known stenosis versus deferred salvage. Access loss (primary outcome) and thrombosis (overall and by access type), infection, mortality, hospitalization, and access-related procedures. We included 14 trials (1,390 participants; follow-up, 6-38 months). Relative to deferred salvage, preemptive correction of AV access stenosis had a nonsignificant effect on risk for access loss (risk ratio [RR], 0.81; 95% CI, 0.65-1.02; I(2)=0%) and a significant effect on risk for thrombosis (RR, 0.79; 95% CI, 0.65-0.97; I(2)=30%). Treatment effects were larger in fistulas than in grafts for both risk for access loss (subgroup difference, P=0.05) and risk for thrombosis (subgroup difference, P=0.002). Results were heterogeneous or imprecise for mortality, rates of access-related infections or procedures, and hospitalization. Small number and size of primary studies limited analysis power. Preemptive stenosis correction in a functional AV access does not improve access longevity. Although preemptive stenosis correction may be promising in fistulas, existing evidence is insufficient to guide clinical practice and

  18. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    PubMed

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  19. A network access control framework for 6LoWPAN networks.

    PubMed

    Oliveira, Luís M L; Rodrigues, Joel J P C; de Sousa, Amaro F; Lloret, Jaime

    2013-01-18

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes.

  20. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  1. Frequency-selective design of wireless power transfer systems for controlled access applications

    NASA Astrophysics Data System (ADS)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  2. An interaction-based access control model (IBAC) for collaborative services

    SciTech Connect

    Altunay, Mine; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  3. GeoChip-based Analysis of Groundwater Microbial Diversity in Norman Landfill

    SciTech Connect

    Lu, Zhenmei; He, Zhili; Parisi, Victoria; Kang, Sanghoon; Deng, Ye; Nostrand, Joy Van; Masoner, Jason; Cozzarelli, Isabelle; Suflita, Joseph; Zhou, Jizhong

    2010-05-17

    The Norman Landfill is a closed municipal solid waste landfill located on an alluvium associated with the Canadian River in Norman, Oklahoma. It has operated as a research site since 1994 because it is typical of many closed landfill sites across the U.S. Leachate from the unlined landfill forms a groundwater plume that extends downgradient approximately 250 m from the landfill toward the Canadian River. To investigate the impact of the landfill leachate on the diversity and functional structure of microbial communities, groundwater samples were taken from eight monitoring wells at a depth of 5m, and analyzed using a comprehensive functional gene array covering about 50,000 genes involved in key microbial processes, such as biogeochemical cycling of C, N, P, and S, and bioremediation of organic contaminants and metals. Wells are located within a transect along a presumed flow path with different distances to the center of the leachate plume. Our analyses showed that microbial communities were obviously impacted by the leachate-component from the landfill. The number of genes detected and microbial diversity indices in the center (LF2B) and its closest (MLS35) wells were significantly less than those detected in other more downgradient wells, while no significant changes were observed in the relative abundance (i.e., percentage of each gene category) for most gene categories. However, the microbial community composition or structure of the landfill groundwater did not clearly show a significant correlation with the distance from well LF2B. Burkholderia sp. and Pseudomonas sp. were found to be the dominant microbial populations detected in all wells, while Bradyrhizobium sp. and Ralstonia sp. were dominant populations for seven wells except LF2B. In addition, Mantel test and canonical correspondence analysis (CCA) indicate that pH, sulfate, ammonia nitrogen and dissolved organic carbon (DOC) have significant effects on the microbial community structure. The results

  4. On the designing of a tamper resistant prescription RFID access control system.

    PubMed

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  5. Randomized controlled trials in central vascular access devices: A scoping review

    PubMed Central

    Keogh, Samantha; Rickard, Claire M.

    2017-01-01

    Background Randomized controlled trials evaluate the effectiveness of interventions for central venous access devices, however, high complication rates remain. Scoping reviews map the available evidence and demonstrate evidence deficiencies to focus ongoing research priorities. Method A scoping review (January 2006–December 2015) of randomized controlled trials evaluating the effectiveness of interventions to improve central venous access device outcomes; including peripherally inserted central catheters, non-tunneled, tunneled and totally implanted venous access catheters. MeSH terms were used to undertake a systematic search with data extracted by two independent researchers, using a standardized data extraction form. Results In total, 178 trials were included (78 non-tunneled [44%]; 40 peripherally inserted central catheters [22%]; 20 totally implanted [11%]; 12 tunneled [6%]; 6 non-specified [3%]; and 22 combined device trials [12%]). There were 119 trials (68%) involving adult participants only, with 18 (9%) pediatric and 20 (11%) neonatal trials. Insertion-related themes existed in 38% of trials (67 RCTs), 35 RCTs (20%) related to post-insertion patency, with fewer trials on infection prevention (15 RCTs, 8%), education (14RCTs, 8%), and dressing and securement (12 RCTs, 7%). There were 46 different study outcomes reported, with the most common being infection outcomes (161 outcomes; 37%), with divergent definitions used for catheter-related bloodstream and other infections. Conclusion More high quality randomized trials across central venous access device management are necessary, especially in dressing and securement and patency. These can be encouraged by having more studies with multidisciplinary team involvement and consumer engagement. Additionally, there were extensive gaps within population sub-groups, particularly in tunneled devices, and in pediatrics and neonates. Finally, outcome definitions need to be unified for results to be meaningful and

  6. Arab-Norman Heritage: State of Knowledge and New Actions and Innovative Proposal

    NASA Astrophysics Data System (ADS)

    Prescia, R.; Scianna, A.

    2017-05-01

    This paper wants to offers a perlustrative recognition on the 'state of the studies', concerning to the Arab-Norman architecture of Palermo, admissed by Unesco in 2015 and explain a research in progress which, starting from re-cognition of the peculiarities of the restoration work carried out on it, consisting of the identification of authentic material-constructive values and / or reconstruction, it orients itself to develop a concrete proposal of filing for a more conscious knowledge. She, moreover, wants contribute to real enhancement through the use of targeted communication strategies that use innovative means capable, on one hand, to attracting the greatest possible number of users, on the other hand, to plan further interventions of conservation coherent with the previous data. The product that you want to achieve is that of a Bank-data that allows the "networking" of monumental emergencies, that become the virtual itineraries waypoint, which can be implemented periodically and whose boards meet the cataloging needs and documentation but with reference at geo-referred systems, compatible with the conservation and management of heritage and with need of usability, real and virtual.

  7. [Norman Edward Shumway - pioneer of cardiac surgery (February 9, 1923 to February 10, 2006)].

    PubMed

    Schmitto, Jan D; Grossmann, Marius; Kubbe, Eric; Liakopoulos, Oliver J; Popov, Aron F; Mirzaie, Masoud; Seipelt, Ralf; Schöndube, Friedrich A

    2008-07-01

    After a fulfilled life, Norman E. Shumway, the great pioneer of cardiac transplantation, died of lung cancer 1 day after his 83rd birthday in Palo Alto, California, USA. Already at the beginning of the 1960s, he and his colleague Richard R. Lower did revolutionary experimental work on developing and establishing the technique of orthotopic cardiac transplantation in dogs. Several studies on cardiac transplantation were carried out in his department and a few years later, Shumway and his team were on their way to perform the worldwide first human-to-human cardiac transplantation. On December 3, 1967, Christiaan Neethling Barnard, a cardiac surgeon from South Africa, forestalled Shumway and performed this operation in Cape Town, South Africa. This event initiated a global boom of cardiac transplantations in the following years." Many heart centers started their own cardiac transplant programs but high mortality rates led again to stagnancy of transplant activities. Shumway remained stable in believing in good results of cardiac transplantation and continued his program steadily. At the beginning of the 1970s, he and his group were responsible for most cardiac transplantations worldwide.

  8. Experimental Investigation on Transmission Control Protocol Throughput Behavior in Optical Fiber Access Networks

    NASA Astrophysics Data System (ADS)

    Tego, Edion; Matera, Francesco; del Buono, Donato

    2016-03-01

    This article describes an experimental investigation on the behavior of transmission control protocol in throughput measurements to be used in the verification of the service-level agreement between the Internet service provider and user in terms of line capacity for ultra-broadband access networks typical of fiber-to-the-x architectures. It is experimentally shown different conditions in high bandwidth-delay product links where the estimation of the line capacity based on a single transmission control protocol session results are unreliable. Simple equations reported in this work, and experimentally verified, point out the conditions in terms of packet loss, time delay, and line capacity, that allow consideration of the reliability of the measurement carried out with a single transmission control protocol session test by adopting a suitable measurement time duration.

  9. A stochastic control approach to Slotted-ALOHA random access protocol

    NASA Astrophysics Data System (ADS)

    Pietrabissa, Antonio

    2013-12-01

    ALOHA random access protocols are distributed protocols based on transmission probabilities, that is, each node decides upon packet transmissions according to a transmission probability value. In the literature, ALOHA protocols are analysed by giving necessary and sufficient conditions for the stability of the queues of the node buffers under a control vector (whose elements are the transmission probabilities assigned to the nodes), given an arrival rate vector (whose elements represent the rates of the packets arriving in the node buffers). The innovation of this work is that, given an arrival rate vector, it computes the optimal control vector by defining and solving a stochastic control problem aimed at maximising the overall transmission efficiency, while keeping a grade of fairness among the nodes. Furthermore, a more general case in which the arrival rate vector changes in time is considered. The increased efficiency of the proposed solution with respect to the standard ALOHA approach is evaluated by means of numerical simulations.

  10. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey.

    PubMed

    Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees

    2017-09-16

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  11. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    PubMed Central

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  12. Minor access control of Hong Kong under the Framework Convention on Tobacco Control.

    PubMed

    Kan, Ming-yue; Lau, Maggie

    2010-05-01

    Asia's tobacco control movement was strengthened owing to the need to fulfill the Framework Convention on Tobacco Control (FCTC). The present study aims to assess the compliance rates of tobacco retailers to the law forbidding the sales of tobacco to minors in Hong Kong before and after the growth of the tobacco control movement brought by the enactment of the newly amended tobacco control law with effect from 2007. The legislation was enacted to fulfill the FCTC. Two waves of territory-wide compliance checks conducted in 2006 and 2008 were compared. The compliance check was conducted using Standard Protocol. The overall compliance rate was still low though it increased from 18.9% in 2006 to 27.0% in 2008. The compliance rate of convenience stores and newspaper stands improved whereas the rate for restaurants, grocery stores and petrol stations worsened. Less tobacco retailing outlets displayed a specified warning sign required in 2008 (33.7%) comparing to 2006 (41.4%). The indoor smoking ban of the FCTC unintentionally changed the cigarette retailing landscape and finally improved the compliance rate. The case study also demonstrated that the Asia region still has much room for improvement in fulfilling the FCTC in term of effective implementation and enforcement. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  13. Evaluation of Standards for Access Control Enabling PHR-S Federation.

    PubMed

    Mense, Alexander; Urbauer, Philipp; Sauermann, Stefan

    2017-01-01

    The adoption of the Internet of Things (IoT) and mobile applications in the healthcare may transform the healthcare industry by offering better disease tracking and management as well as patient empowerment. Unfortunately, almost all of these new systems set up their own ecosystem and to be really valuable for the care process they need to be integrated or federated with user managed access control services based on international standards and profiles to enable interoperability. Thus, this work presents the results of an evaluation of available specifications for federated authorization, based on a set of basic requirements.

  14. Development and process control of magnetic tunnel junctions for magnetic random access memory devices

    NASA Astrophysics Data System (ADS)

    Kula, Witold; Wolfman, Jerome; Ounadjela, Kamel; Chen, Eugene; Koutny, William

    2003-05-01

    We report on the development and process control of magnetic tunnel junctions (MTJs) for magnetic random access memory (MRAM) devices. It is demonstrated that MTJs with high magnetoresistance ˜40% at 300 mV, resistance-area product (RA) ˜1-3 kΩ μm2, low intrinsic interlayer coupling (Hin) ˜2-3 Oe, and excellent bit switching characteristics can be developed and fully integrated with complementary metal-oxide-semiconductor circuitry into MRAM devices. MTJ uniformity and repeatability level suitable for mass production has been demonstrated with the advanced processing and monitoring techniques.

  15. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  16. Archaeological and Historic Cultural Resources Inventory for a Flood Control Project at Halstad, Norman County, Minnesota.

    DTIC Science & Technology

    1982-05-21

    deltoides), box elder (Acer negundo), oaks (Quercus sp.), basswood ( Tilia americana), soft maple (Acer saccharinum), willows (Salix sp.), aspen (Populus...utility Fraxinus sp. Various ashes Medicine (tonic), utility Quercus sp. Various oaks Medicine (heart wounds), utility Tilia americana Basswood

  17. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    PubMed Central

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  18. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    PubMed

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  19. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    NASA Astrophysics Data System (ADS)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  20. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  1. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  2. Overview of the Altair Lunar Lander Thermal Control System Design and the Impacts of Global Access

    NASA Technical Reports Server (NTRS)

    Stephan, Ryan A.

    2011-01-01

    NASA's Constellation Program (CxP) was developed to successfully return humans to the Lunar surface prior to 2020. The CxP included several different project offices including Altair, which was planned to be the next generation Lunar Lander. The Altair missions were architected to be quite different than the Lunar missions accomplished during the Apollo era. These differences resulted in a significantly dissimilar Thermal Control System (TCS) design. The current paper will summarize the Altair mission architecture and the various operational phases associated with the planned mission. In addition, the derived thermal requirements and the TCS designed to meet these unique and challenging thermal requirements will be presented. During the past year, the design team has focused on developing a vehicle architecture capable of accessing the entire Lunar surface. Due to the widely varying Lunar thermal environment, this global access requirement resulted in major changes to the thermal control system architecture. These changes, and the rationale behind the changes, will be detailed throughout the current paper.

  3. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  4. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    NASA Astrophysics Data System (ADS)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  5. Patient preferences in controlling access to their electronic health records: a prospective cohort study in primary care.

    PubMed

    Schwartz, Peter H; Caine, Kelly; Alpert, Sheri A; Meslin, Eric M; Carroll, Aaron E; Tierney, William M

    2015-01-01

    Previous studies have measured individuals' willingness to share personal information stored in electronic health records (EHRs) with health care providers, but none has measured preferences among patients when they are allowed to determine the parameters of provider access. Patients were given the ability to control access by doctors, nurses, and other staff in a primary care clinic to personal information stored in an EHR. Patients could restrict access to all personal data or to specific types of sensitive information, and could restrict access for a specific time period. Patients also completed a survey regarding their understanding of and opinions regarding the process. Of 139 eligible patients who were approached, 105 (75.5 %) were enrolled, and preferences were collected from all 105 (100 %). Sixty patients (57 %) did not restrict access for any providers. Of the 45 patients (43 %) who chose to limit the access of at least one provider, 36 restricted access only to all personal information in the EHR, while nine restricted access of some providers to a subset of the their personal information. Thirty-four (32.3 %) patients blocked access to all personal information by all doctors, nurses, and/or other staff, 26 (24.8 %) blocked access by all doctors and/or nurses, and five (4.8 %) denied access to all doctors, nurses, and staff. A significant minority of patients chose to restrict access by their primary care providers to personal information contained in an EHR, and few chose to restrict access to specific types of information. More research is needed to identify patient goals and understanding of the implications when facing decisions of this sort, and to identify the impact of patient education regarding information contained in EHRs and their use in the clinical care setting.

  6. Controllable quantized conductance for multilevel data storage applications using conductive bridge random access memory.

    PubMed

    Aga, Fekadu Gochole; Woo, Jiyong; Song, Jeonghwan; Park, Jaehyuk; Lim, Seokjae; Sung, Changhyuck; Hwang, Hyunsang

    2017-03-17

    In this paper, we investigate the quantized conduction behavior of conductive bridge random access memory (CBRAM) with varied materials and ramping rates. We report stable and reproducible quantized conductance states with integer multiples of fundamental conductance obtained by optimizing the voltage ramping rate and the Ti-diffusion barrier (DB) at the Cu/HfO2 interface. Owing to controlled diffusion of Cu ions by the Ti-DB and the optimized ramping rate, through which it was possible to control the time delay of Cu ion reduction, more than seven levels of discrete conductance states were clearly observed. Analytical modeling was performed to determine the rate-limiting step in filament growth based on an electrochemical redox reaction. Our understanding of the fundamental mechanisms of quantized conductance behaviors provide a promising future for the multi-bit CBRAM device.

  7. Controllable quantized conductance for multilevel data storage applications using conductive bridge random access memory

    NASA Astrophysics Data System (ADS)

    Gochole Aga, Fekadu; Woo, Jiyong; Song, Jeonghwan; Park, Jaehyuk; Lim, Seokjae; Sung, Changhyuck; Hwang, Hyunsang

    2017-03-01

    In this paper, we investigate the quantized conduction behavior of conductive bridge random access memory (CBRAM) with varied materials and ramping rates. We report stable and reproducible quantized conductance states with integer multiples of fundamental conductance obtained by optimizing the voltage ramping rate and the Ti-diffusion barrier (DB) at the Cu/HfO2 interface. Owing to controlled diffusion of Cu ions by the Ti-DB and the optimized ramping rate, through which it was possible to control the time delay of Cu ion reduction, more than seven levels of discrete conductance states were clearly observed. Analytical modeling was performed to determine the rate-limiting step in filament growth based on an electrochemical redox reaction. Our understanding of the fundamental mechanisms of quantized conductance behaviors provide a promising future for the multi-bit CBRAM device.

  8. Analysis of the TDRS multiple access system for possible use as an attitude control system sensor

    NASA Technical Reports Server (NTRS)

    Blevins, Bruce Allyn; Sank, Victor J.

    1993-01-01

    A member of the constellation of TDR satellites (TDRS) has experienced a failure of its prime earth sensor. Failure of the remaining earth sensor could result in the inability of the satellite to control its attitude and provide user services. Loss of the satellite would be a serious event. The multiple access (MA) antenna array on the TDRS has been proposed for use as a backup sensor for the attitude control system. This paper describes our analysis of the performance of the MA array as an interferometer used for accurate attitude determination. A least squares fit of a plane to the MA phase information appears to represent the TDRS body roll and pitch within about 0.1 deg. This is sufficient for SGL pointing and MA and SSA user services. Analytic improvements that include ionospheric correction may yield sufficient accuracy for KSA user services.

  9. Preliminary assessment of Tongue Drive System in medium term usage for computer access and wheelchair control.

    PubMed

    Yousefi, Behnaz; Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless, wearable assistive technology that enables individuals with severe motor impairments access computers, drive wheelchairs, and control their environments using tongue motion. In this paper, we have evaluated the TDS performance as a computer input device using ISO9241-9 standard tasks for pointing and selecting, based on the well known Fitts' Law, and as a powered wheelchair controller through an obstacle course navigation task. Nine able-bodied subjects who already had tongue piercing participated in this trial over 5 sessions during 5 weeks, allowing us to study the TDS learning process and its current limiting factors. Subjects worn tongue rings made of titanium in the form of a barbell with a small rare earth magnetic tracer hermetically sealed inside the upper ball. Comparing the results between 1(st) and 5(th) sessions showed that subjects' performance improved in all the measures through 5 sessions, demonstrating the effects of learning.

  10. Infection control in hemodialysis units: a quick access to essential elements.

    PubMed

    Karkar, Ayman; Bouhaha, Betty Mandin; Dammang, Mienalyn Lim

    2014-05-01

    Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD) patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs) due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC), the Association of Professionals in Infection Control (APIC), the Kidney Disease Outcomes Quality Initiative (K/DOQI), the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP) and the Kidney Disease: Improving Global Outcomes (KDIGO). However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  11. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  12. A method for protecting and controlling access to JPEG2000 images

    NASA Astrophysics Data System (ADS)

    Serrão, Carlos; Serra, Antonio; Fonseca, Pedro; Salles Dias, Jose M.

    2003-11-01

    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. This paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management), which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.

  13. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    NASA Astrophysics Data System (ADS)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  15. Utilization of Ceramic Inlays for Sealing Implant Prostheses Screw Access Holes: A Case-Control Study.

    PubMed

    Mihali, Sorin; Canjau, Silvana; Bratu, Emanuel; Wang, Hom-Lay

    2016-01-01

    The aim of this study was to evaluate, in a case control study, the esthetic and functional clinical performance of ceramic inlays used for covering the screw access hole in single monolithic lithium disilicate full-contour crowns bonded on computer-aided design/computer-aided manufacturing (CAD/CAM) prefabricated titanium abutments in order to eliminate the drawbacks of alternative restorative methods. Twenty-eight patients with missing teeth in the lateral areas (premolars and molars) received screw-retained implant restorations. In half of the restorations (n = 14), composite fillings were used to seal the access hole (control group), while the other half was sealed with ceramic inlays (test group). To determine the restoration occlusal wear, impressions were obtained after the restorations were finalized, at 1 year, and at 2 years follow-up. The casts were scanned with a 3D Scanner Design System recording the anatomical surfaces of the white model replicates. Wear amounts (μm) were calculated as the maximum loss in height of the occlusal surface. The clinical evaluation was carried out using a kit specifically designed for assessing the FDI criteria. Statistics were performed using analysis of variance (ANOVA). A total of 58 restorations were delivered, and after 2 years of follow-up, the wear values were 228.20 ± 54.68 μm for the control group and 65.20 ± 7.24 μm for the ceramic inlay group. One-way ANOVA showed significant differences among the vertical loss between these two groups (P < .001). Clinical outcomes according to the FDI score for assessing dental restorations revealed substantial deterioration within 2 years of follow-up. The use of ceramic inlays appears to be a predictable, esthetic, and successful method of sealing the screw holes of the screw-retained implant restorations.

  16. Survey of infection control practices in hemodialysis units: preventing vascular access-associated bloodstream infections.

    PubMed

    Trépanier, Pascale; Quach, Caroline; Gonzales, Milagros; Fortin, Elise; Kaouache, Mohammed; Desmeules, Simon; Rocher, Isabelle; Ngenda-Muadi, Muleka; Frenette, Charles; Tremblay, Claude

    2014-07-01

    Despite surveillance, the Quebec Healthcare-Associated Infections Surveillance Program saw no improvement in vascular access-associated bloodstream infections in hemodialysis (HD). We aimed to determine the infection control measures recommended and implemented in Quebec's HD units, compliance of local protocols to infection control practice guidelines, and reasons behind the low prevalence of arteriovenous fistulas. An online survey was elaborated on the basis of the Centers for Disease Control and Prevention (CDC) and National Kidney Foundation Kidney Disease Outcomes Quality Initiative guidelines. The questionnaire was validated (construct, content, face validity, and reliability) and sent to all HD units in Quebec (n = 40). Results were analyzed using descriptive statistics, linear regression, and Poisson regression. Thirty-seven (93%) of 40 HD units participated. Thirty (94%) of the 32 centers where central catheters are inserted have written insertion protocols. Compliance with practice guidelines is good, except for full-body draping during catheter insertion (79%) and ointment use at insertion site (3%). Prevention measures for catheter maintenance are in accordance with guidelines, except for skin disinfection with at least 0.5% chlorhexidine and 70% alcohol (67% compliance) and regular antiseptic ointment use at the insertion site (3%). Before fistula cannulation, skin preparation is suboptimal; forearm hygiene is performed in only 61% of cases. Several factors explain the low rate of fistulas, including patient preference (69%) and lack of surgical resources (39%; P = .01). Improvement in standardization of care according to practice guidelines is necessary. Fistula rate could be increased by improving access to surgical resources and patient education. Strategies are now being elaborated to address these findings.

  17. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  18. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  19. Privacy aware access controls for medical data disclosure on European healthgrids.

    PubMed

    Rahmouni, Hanene Boussi; Solomonides, Tony; Mont, Marco Casassa; Shiu, Simon

    2010-01-01

    To be processed within a healthgrid environment, medical data goes through a complete lifecycle and several stages until it is finally used for the primary reason it has been collected for. This stage is not always the final occurrence of when the data would have been manipulated. The data could rather continue to be needed for secondary purposes of legitimate or non legitimate nature. Although other privacy issues are related to the processing of patient data while it is residing on a healthgrid environment, the control of data disclosure is our primary interest. When sharing medical data between different Healthcare and biomedical research organizations in Europe, it is important that the different parties involved in the sharing handle the data in the same way indicated by the legislation of the member state where the data was originally collected as the requirements might differ from one state to another. Privacy requirements, such as patient consent, may be subject to conflicting conditions between different national frameworks as well as between different legal and ethical frameworks within a single member state. These circumstances have made the compliance management process in European healthgrid very challenging. In this paper we are presenting an approach to tackle these issues by relying on several technologies contained in the semantic web stack. Our work suggests a direct mapping from high level legislation on privacy and data protection to operational level privacy aware controls. Additionally we suggest an architecture for the enforcement of these controls on access control models adopted by healthgrids security infrastructures.

  20. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    PubMed

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  1. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    PubMed Central

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  2. Quantitative trait loci controlling light and hormone response in two accessions of Arabidopsis thaliana.

    PubMed Central

    Borevitz, Justin O; Maloof, Julin N; Lutes, Jason; Dabi, Tsegaye; Redfern, Joanna L; Trainer, Gabriel T; Werner, Jonathan D; Asami, Tadao; Berry, Charles C; Weigel, Detlef; Chory, Joanne

    2002-01-01

    We have mapped quantitative trait loci (QTL) responsible for natural variation in light and hormone response between the Cape Verde Islands (Cvi) and Landsberg erecta (Ler) accessions of Arabidopsis thaliana using recombinant inbred lines (RILs). Hypocotyl length was measured in four light environments: white, blue, red, and far-red light and in the dark. In addition, white light plus gibberellin (GA) and dark plus the brassinosteroid biosynthesis inhibitor brassinazole (BRZ) were used to detect hormone effects. Twelve QTL were identified that map to loci not previously known to affect light response, as well as loci where candidate genes have been identified from known mutations. Some QTL act in all environments while others show genotype-by-environment interaction. A global threshold was established to identify a significant epistatic interaction between two loci that have few main effects of their own. LIGHT1, a major QTL, has been confirmed in a near isogenic line (NIL) and maps to a new locus with effects in all light environments. The erecta mutation can explain the effect of the HYP2 QTL in the blue, BRZ, and dark environments, but not in far-red. LIGHT2, also confirmed in an NIL, has effects in white and red light and shows interaction with GA. The phenotype and map position of LIGHT2 suggest the photoreceptor PHYB as a candidate gene. Natural variation in light and hormone response thus defines both new genes and known genes that control light response in wild accessions. PMID:11861571

  3. A method to implement fine-grained access control for personal health records through standard relational database queries.

    PubMed

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  4. A Time Tree Medium Access Control for Energy Efficiency and Collision Avoidance in Wireless Sensor Networks

    PubMed Central

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme. PMID:22319270

  5. A time tree medium access control for energy efficiency and collision avoidance in wireless sensor networks.

    PubMed

    Lee, Kilhung

    2010-01-01

    This paper presents a medium access control and scheduling scheme for wireless sensor networks. It uses time trees for sending data from the sensor node to the base station. For an energy efficient operation of the sensor networks in a distributed manner, time trees are built in order to reduce the collision probability and to minimize the total energy required to send data to the base station. A time tree is a data gathering tree where the base station is the root and each sensor node is either a relaying or a leaf node of the tree. Each tree operates in a different time schedule with possibly different activation rates. Through the simulation, the proposed scheme that uses time trees shows better characteristics toward burst traffic than the previous energy and data arrival rate scheme.

  6. [Assessment of exposure to cancerogenic aromatic hydrocarbon during controlled-access highways management activities].

    PubMed

    Martinotti, I; Cirla, A M; Cottica, D; Cirla, P E

    2011-01-01

    The purpose of this study was an integrated assessment of exposure to benzene and Polycyclic Aromatic Hydrocarbons (PAH) in 29 workers employed to manage a controlled-access highways. A campaign was performed in summertime by environmental monitoring (active and passive airborne personal sampler), as well as by biological monitoring (urine samples of the beginning and of the end of daily shift, baseline after two days of vacation). The measured environmental levels did not differ from background environmental concentrations found in a metropolitan area (i.e. benzo[a]pyrene < 1 ng/m3; benzene < 5 mcg/m3), and the results of biological monitoring were in agreement and were compatible with extra-professional habits of the investigated subjects (1-hydroxipyrene 50-990 ng/g creatinine; unmetabolized benzene 15-2010 ng/I; t-t muconic acid < 4-222 mcg/g creatinine).

  7. A comparison of Percutaneous femoral access in Endovascular Repair versus Open femoral access (PiERO): study protocol for a randomized controlled trial.

    PubMed

    Vierhout, Bastiaan P; Saleem, Ben R; Ott, Alewijn; van Dijl, Jan Maarten; de Kempenaer, Ties D van Andringa; Pierie, Maurice E N; Bottema, Jan T; Zeebregts, Clark J

    2015-09-14

    Access for endovascular repair of abdominal aortic aneurysms (EVAR) is obtained through surgical cutdown or percutaneously. The only devices suitable for percutaneous closure of the 20 French arteriotomies of the common femoral artery (CFA) are the Prostar(™) and Proglide(™) devices (Abbott Vascular). Positive effects of these devices seem to consist of a lower infection rate, and shorter operation time and hospital stay. This conclusion was published in previous reports comparing techniques in patients in two different groups (cohort or randomized). Access techniques were never compared in one and the same patient; this research simplifies comparison because patient characteristics will be similar in both groups. Percutaneous access of the CFA is compared to surgical cutdown in a single patient; in EVAR surgery, access is necessary in both groins in each patient. Randomization is performed on the introduction site of the larger main device of the endoprosthesis. The contralateral device of the endoprosthesis is smaller. When we use this type of randomization, both groups will contain a similar number of main and contralateral devices. Preoperative nose cultures and perineal cultures are obtained, to compare colonization with postoperative wound cultures (in case of a surgical site infection). Furthermore, patient comfort will be considered, using VAS-scores (Visual analog scale). Punch biopsies of the groin will be harvested to retrospectively compare skin of patients who suffered a surgical site infection (SSI) to patients who did not have an SSI. The PiERO trial is a multicenter randomized controlled clinical trial designed to show the consequences of using percutaneous access in EVAR surgery and focuses on the occurrence of surgical site infections. NTR4257 10 November 2013, NL44578.042.13.

  8. Geomorphic and hydrologic assessment of erosion hazards at the Norman municipal landfill, Canadian River floodplain, Central Oklahoma

    USGS Publications Warehouse

    Curtis, J.A.; Whitney, J.W.

    2003-01-01

    The Norman, Oklahoma, municipal landfill closed in 1985 after 63 years of operation, because it was identified as a point source of hazardous leachate composed of organic and inorganic compounds. The landfill is located on the floodplain of the Canadian River, a sand-bed river characterized by erodible channel boundaries and by large variation in mean monthly discharges. In 1986, floodwaters eroded riprap protection at the southern end of the landfill and penetrated the landfill's clay cap, thereby exposing the landfill contents. The impact of this moderate-magnitude flood event (Q12) was the catalyst to investigate erosion hazards at the Norman landfill. This geomorphic investigation analyzed floodplain geomorphology and historical channel changes, flood-frequency distributions, an erosion threshold, the geomorphic effectiveness of discharge events, and other factors that influence erosion hazards at the landfill site. The erosion hazard at the Norman landfill is a function of the location of the landfill with respect to the channel thalweg, erosional resistance of the channel margins, magnitude and duration of discrete discharge events, channel form and hydraulic geometry, and cumulative effects related to a series of discharge events. Based on current climatic conditions and historical channel changes, a minimum erosion threshold is set at bankfull discharge (Q = 572 m3/s). The annual probability of exceeding this threshold is 0.53. In addition, this analysis indicates that peak stream power is less informative than total energy expenditures when estimating the erosion potential or geomorphic effectiveness of discrete discharge events. On the Canadian River, long-duration, moderate-magnitude floods can have larger total energy expenditures than shorter-duration, high-magnitude floods and therefore represent the most serious erosion hazard to floodplain structures.

  9. Thermal Control System Development to Support the Crew Exploration Vehicle and Lunar Surface Access Module

    NASA Technical Reports Server (NTRS)

    Anderson, Molly; Westheimer, David

    2006-01-01

    All space vehicles or habitats require thermal management to maintain a safe and operational environment for both crew and hardware. Active Thermal Control Systems (ATCS) perform the functions of acquiring heat from both crew and hardware within a vehicle, transporting that heat throughout the vehicle, and finally rejecting that energy into space. Almost all of the energy used in a space vehicle eventually turns into heat, which must be rejected in order to maintain an energy balance and temperature control of the vehicle. For crewed vehicles, Active Thermal Control Systems are pumped fluid loops that are made up of components designed to perform these functions. NASA has recently evaluated all of the agency s technology development work and identified key areas that must be addressed to aid in the successful development of a Crew Exploration Vehicle (CEV) and a Lunar Surface Access Module (LSAM). The technologies that have been selected and are currently under development include: fluids that enable single loop ATCS architectures, a gravity insensitive vapor compression cycle heat pump, a sublimator with reduced sensitivity to feedwater contamination, an evaporative heat sink that can operate in multiple ambient pressure environments, a compact spray evaporator, and lightweight radiators that take advantage of carbon composites and advanced optical coatings.

  10. "The blood fights on in other veins": Norman Bethune and the transfusion of cadaver blood in the Spanish Civil War.

    PubMed

    Lethbridge, David

    2012-01-01

    During the Spanish Civil War, Dr. Norman Bethune instituted a research laboratory to determine whether the blood from cadavers could be transfused into wounded soldiers and civilians at the front. Dr. Herman J. Muller joined him in this effort carrying out extensive experimentation into the technique and practice of such transfusions. At the same time, Bethune was in frequent contact with Dr. Reginald Saxton who later publicly advocated that the Spanish government should organize a large-scale supply of cadaver blood to the front-line hospitals. Recent evidence suggests that Saxton carried out cadaveric transfusions to an extent not previously recognized.

  11. [The usefulness of the Chrispin-Norman score in the evaluation of pulmonary status in patients with cystic fibrosis].

    PubMed

    Harms, H K; Bertele, R M; Weidl, B; Fendel, H

    1983-01-01

    Its objectivity and reproducibility having been checked by for independent researchers, the Chrispin-Norman score has proved to be a useful yardstick for evaluating pulmonary changes in cystic fibrosis. The correlation to arterial pO2 was r = 0.68, and to the Schwachman-Kulczycki score, r = 0.75. Scores still consistent with a good general clinical condition were 10.5 in patients under 8 years of age; 13.4 in patients aged between 8 and 13; and 15.5 in the 13-20 age group. An average increase of more than 2 points a year indicates a particularly high danger level.

  12. Study protocol for a cluster-randomised controlled trial of an NCD access to medicines initiative: evaluation of Novartis Access in Kenya

    PubMed Central

    Rockers, Peter C; Wirtz, Veronika J; Vian, Taryn; Onyango, Monica A; Ashigbie, Paul G; Laing, Richard

    2016-01-01

    Introduction Novartis recently launched Novartis Access, an initiative to provide a basket of reduced price medicines for non-communicable diseases (NCDs) to be sold through the public and private non-profit sectors in programme countries. This study will evaluate the impact of Novartis Access on the availability and price of NCD medicines at health facilities and households in Kenya, the first country to receive the programme. Methods and analysis This study will be a cluster-randomised controlled trial. 8 counties in Kenya will be randomly assigned to the intervention or control group using a covariate constrained randomisation method to maximise balance on demographic and health characteristics. In intervention counties, public and private non-profit health facilities will be able to order Novartis Access NCD medicines from the Mission for Essential Drugs and Supplies (MEDS). Data will be collected from a random sample of 384 health facilities and 800 households at baseline, midline after 1-year of intervention, and end-line after 2 years. Quarterly surveillance data will also be collected from health facilities and a subsample of households through phone-based interviews. Households will be eligible if at least one resident has been previously diagnosed and prescribed a medicine for an NCD addressed by Novartis Access, including hypertension and diabetes. The primary outcomes will be availability and price of NCD medicines at health facilities, and availability, price, and expenditures on NCD medicines at households. Impacts will be estimated using intention-to-treat analysis. Ethics and dissemination This protocol was approved by the Institutional Review Boards at Strathmore University and at Boston University. Informed consent will be obtained from all participants at the start of the trial. The findings of the trial will be disseminated through peer-reviewed journals, international conferences, and meetings and events organised with local stakeholders

  13. Diagenesis and evolution of microporosity of Middle-Upper Devonian Kee Scarp reefs, Norman Wells, Northwest Territories, Canada: Petrographic and chemical evidence

    SciTech Connect

    Al-Aasm, I.S.; Azmy, K.K.

    1996-01-01

    The Middle-Upper Devonian Kee Scarp reef complexes of Norman Wells, Northwest Territories, Canada, are oil-producing, stromatoporoid-dominated carbonates. Episodic increases in the rate of sea level rise produced multiple cycles of reef growth that exhibit backstepping characteristics. These carbonates, composed of invariably altered limestones, have original interskeletal, intraskeletal, and intergranular porosity, mostly occluded by nonferroan, dull luminescent cements. Secondary porosity, represented by micropores of various types, developed during diagenesis by aggrading neomorphism and dissolution. The micropores represent the main reservoir porosity in the Kee Scarp limestone. Petrographic, chemical, and isotopic studies of Kee Scarp reef components reveal a complex diagenetic history involving marine fluids modified by increasing water/rock interaction and burial. Neomorphic stabilization of skeletal components caused further depletion in {gamma}{sup 18}O but very little change in {gamma}{sup 13}C, an argument for modification of the original marine fluids with increasing burial. Variations in magnitude of water/rock interaction with depth, facies changes, and porosity modifications probably exerted some control on fractionation and distribution of stable isotopes and trace elements in reef components.

  14. Hydrogeology and leachate plume delineation at a closed municipal landfill, Norman, Oklahoma

    USGS Publications Warehouse

    Becker, Carol J.

    2002-01-01

    The City of Norman operated a solid-waste municipal landfill at two sites on the Canadian River alluvium in Cleveland County, Oklahoma from 1970 to 1985. The sites, referred to as the west and east cells of the landfill, were originally excavations in the unconsolidated alluvial deposits and were not lined. Analysis of ground-water samples indicate that leachate from the west cell is discharging into an adjacent abandoned river channel, referred to as the slough, and is migrating downgradient in ground water toward the Canadian River. The report describes the hydrogeologic features at the landfill, including the topography of the bedrock, water-level changes in the alluvial aquifer, and delineates the leachate plume using specific conductance data. The leading edge of the leachate plume along the 35-80 transect extended over 250 meters downgradient of the west cell. The leading edge of the leachate plume along the 40-SOUTH transect had moved about 60 meters from the west cell in a south-southwesterly direction and had not moved past the slough as of 1997. Specific conductance measurements exceeding 7,000 microsiemens per centimeter at site 40 indicate the most concentrated part of the plume remained in the upper half of the alluvial aquifer adjacent to the west cell. The direction of ground-water flow in the alluvial aquifer surrounding the landfill was generally north-northeast to south-southwest toward the river. However, between the west cell and the slough along the 40-SOUTH transect, head measurements indicate a directional change to the east and southeast toward a channel referred to as the sewage outfall. Near the 35-80 transect, at 0.5 meter below the water table and at the base of the aquifer, the direction of ground-water flow was south-southeast with a gradient of about 30 centimeters per 100 meters. Generally, ground-water levels in the alluvial aquifer were higher during the winter months and lower during summer months, due to a normal decrease in

  15. Using routinely recorded data in the UK to assess outcomes in a randomised controlled trial: The Trials of Access.

    PubMed

    Powell, G A; Bonnett, L J; Tudur-Smith, C; Hughes, D A; Williamson, P R; Marson, A G

    2017-08-23

    In the UK, routinely recorded data may benefit prospective studies including randomised controlled trials (RCTs). In an on-going study, we aim to assess the feasibility of access and agreement of routinely recorded clinical and non-clinical data compared to data collected during a RCT using standard prospective methods. This paper will summarise available UK routinely recorded data sources and discuss our experience with the feasibility of accessing routinely recorded data for participants of a RCT before finally proposing recommendations for improving the access and implementation of routinely recorded data in RCTs. Setting: the case study RCT is the Standard and New Antiepileptic Drugs II (SANAD II) trial, a pragmatic, UK, multicentre, phase IV RCT assessing the clinical and cost-effectiveness of antiepileptic drug treatments for newly diagnosed epilepsy. 98 participants have provided written consent to permit the request of routinely recorded data. Study procedures: routinely recorded clinical and non-clinical data were identified and data requested through formal applications from available data holders for the duration that participants have been recruited into SANAD II. The feasibility of accessing routinely recorded data during a RCT is assessed and recommendations for improving access proposed. Secondary-care clinical and socioeconomic data is recorded on a national basis and can be accessed, although there are limitations in the application process. Primary-care data are recorded by a number of organisations on a de-identified basis but access for specific individuals has not been feasible. Access to data recorded by non-clinical sources, including The Department for Work and Pensions and The Driving and Vehicle Licensing Agency, was not successful. Recommendations discussed include further research to assess the attributes of routinely recorded data, an assessment of public perceptions and the development of strategies to collaboratively improve access to

  16. Controlling multidrug-resistant tuberculosis and access to expensive drugs: a rational framework.

    PubMed Central

    Pablos-Mendez, Ariel; Gowda, Deepthiman K.; Frieden, Thomas R.

    2002-01-01

    The emergence and spread of multidrug-resistant tuberculosis (MDR-TB), i.e. involving resistance to at least isoniazid and rifampicin, could threaten the control of TB globally. Controversy has emerged about the best way of confronting MDR-TB in settings with very limited resources. In 1999, the World Health Organization (WHO) created a working group on DOTS-Plus, an initiative exploring the programmatic feasibility and cost-effectiveness of treating MDR-TB in low-income and middle-income countries, in order to consider the management of MDR-TB under programme conditions. The challenges of implementation have proved more daunting than those of access to second-line drugs, the prices of which are dropping. Using data from the WHO/International Union Against Tuberculosis and Lung Disease surveillance project, we have grouped countries according to the proportion of TB patients completing treatment successfully and the level of MDR-TB among previously untreated patients. The resulting matrix provides a reasonable framework for deciding whether to use second-line drugs in a national programme. Countries in which the treatment success rate, i.e. the proportion of new patients who complete the scheduled treatment, irrespective of whether bacteriological cure is documented, is below 70% should give the highest priority to introducing or improving DOTS, the five-point TB control strategy recommended by WHO and the International Union Against Tuberculosis and Lung Disease. A poorly functioning programme can create MDR-TB much faster than it can be treated, even if unlimited resources are available. There is no single prescription for controlling MDR-TB but the various tools available should be applied wisely. Firstly, good DOTS and infection control; then appropriate use of second-line drug treatment. The interval between the two depends on the local context and resources. As funds are allocated to treat MDR-TB, human and financial resources should be increased to expand

  17. Performance analysis and overload control of an open service access (OSA) architecture

    NASA Astrophysics Data System (ADS)

    Andersson, Jens K.; Nyberg, Christian; Kihl, Maria

    2003-08-01

    The trend of the service architectures developed in telecommunications today is that they should be open in the sense that they can communicate over the borders of different networks. Instead of each network having their own service architecture with their own applications, all networks should be able to use the same applications. 3GPP, the organization developing specifications for the 3G networks has specified the standard Open Service Access (OSA), as a part of the 3G specification. OSA offers different Application Protocol Interfaces that enable an application that resides outside a network to use the capabilities of the network. This paper analyses the performance of an OSA gateway. It is examined how the overload control can be dealt with in a way to best satisfy the operators and the 3'rd parties. There are some guiding principles in the specifications, but a lot of decisions have to be made by the implementors of application servers and OSA gateways. Proposals of different requirements for an OSA architecture exist such as, minimum amount of accepted calls per second and time constraint for the maximal total delay for an application. Maximal and fair throughput have to be prioritized from the 3'rd parties view, but profit is the main interest from the operators point of view. Therefore this paper examines a priority based proposal of an overload control mechanism taking these aspects and requirements into account.

  18. A low power medium access control protocol for wireless medical sensor networks.

    PubMed

    Lamprinos, I; Prentza, A; Sakka, E; Koutsouris, D

    2004-01-01

    The concept of a wireless integrated network of sensors, already applied in several sectors of our everyday life, such as security, transportation and environment monitoring, can as well provide an advanced monitor and control resource for healthcare services. By networking medical sensors wirelessly, attaching them in patient's body, we create the appropriate infrastructure for continuous and real-time monitoring of patient without discomforting him. This infrastructure can improve healthcare by providing the means for flexible acquisition of vital signs, while at the same time it provides more convenience to the patient. Given the type of wireless network, traditional medium access control (MAC) protocols cannot take advantage of the application specific requirements and information characteristics occurring in medical sensor networks, such as the demand for low power consumption and the rather limited and asymmetric data traffic. In this paper, we present the architecture of a low power MAC protocol, designated to support wireless networks of medical sensors. This protocol aims to improve energy efficiency by exploiting the inherent application features and requirements. It is oriented towards the avoidance of main energy wastage sources, such as idle listening, collision and power outspending.

  19. Analyzing the effect of routing protocols on media access control protocols in radio networks

    SciTech Connect

    Barrett, C. L.; Drozda, M.; Marathe, A.; Marathe, M. V.

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  20. The IEO Data Center Management System: Tools for quality control, analysis and access marine data

    NASA Astrophysics Data System (ADS)

    Casas, Antonia; Garcia, Maria Jesus; Nikouline, Andrei

    2010-05-01

    Since 1994 the Data Centre of the Spanish Oceanographic Institute develops system for archiving and quality control of oceanographic data. The work started in the frame of the European Marine Science & Technology Programme (MAST) when a consortium of several Mediterranean Data Centres began to work on the MEDATLAS project. Along the years, old software modules for MS DOS were rewritten, improved and migrated to Windows environment. Oceanographic data quality control includes now not only vertical profiles (mainly CTD and bottles observations) but also time series of currents and sea level observations. New powerful routines for analysis and for graphic visualization were added. Data presented originally in ASCII format were organized recently in an open source MySQL database. Nowadays, the IEO, as part of SeaDataNet Infrastructure, has designed and developed a new information system, consistent with the ISO 19115 and SeaDataNet standards, in order to manage the large and diverse marine data and information originated in Spain by different sources, and to interoperate with SeaDataNet. The system works with data stored in ASCII files (MEDATLAS, ODV) as well as data stored within the relational database. The components of the system are: 1.MEDATLAS Format and Quality Control - QCDAMAR: Quality Control of Marine Data. Main set of tools for working with data presented as text files. Includes extended quality control (searching for duplicated cruises and profiles, checking date, position, ship velocity, constant profiles, spikes, density inversion, sounding, acceptable data, impossible regional values,...) and input/output filters. - QCMareas: A set of procedures for the quality control of tide gauge data according to standard international Sea Level Observing System. These procedures include checking for unexpected anomalies in the time series, interpolation, filtering, computation of basic statistics and residuals. 2. DAMAR: A relational data base (MySql) designed to

  1. Access roads for RAG-ged terrains: control of T cell receptor gene rearrangement at multiple levels.

    PubMed

    Livák, Ferenc; Petrie, Howard T

    2002-10-01

    Antigen-specific immune response requires the generation of a diverse antigen (Ag)-receptor repertoire. The primary repertoire is generated through somatic gene rearrangement and molded by subsequent cellular selection. Constraints during gene recombination influence the ultimate shape of the repertoire. One major control mechanism of gene rearrangement, investigated for many years, is exerted through regulated chromosomal accessibility of the recombinase to the antigen receptor loci. More recent studies began to explore the role of interactions between the recombinase and its cognate recognition DNA sequences. The emerging results suggest that formation of the primary repertoire is controlled by two, partially independent factors: chromosomal accessibility and direct recombinase-DNA interactions.

  2. Access to controlled medicines for anesthesia and surgical care in low-income countries: a narrative review of international drug control systems and policies.

    PubMed

    Nickerson, Jason W; Pettus, Katherine; Wheeler, Kathleen E; Hallam, Christopher; Bewley-Taylor, David R; Attaran, Amir; Gelb, Adrian W

    2017-03-01

    This article describes the functioning of the international drug control system, its integration into national legislation and policy, and the collective impact on access to medicines. We conducted a review of the three international drug control conventions, peer-reviewed articles, and grey literature known to the authors that describes national and international drug control systems and their impact on access to controlled medicines. This review was supplemented with literature derived from a structured search of MEDLINE(®) for articles relating to medical uses of ketamine in low- and middle-income countries conducted to strengthen an advocacy campaign. We illustrate the impact of the drug control system on access to medicines through an analysis of current levels of availability of opioids in many countries as well as through a description of the ongoing advocacy work to ensure the availability of ketamine for medical care in low-income countries. The complexity of the international drug control system, along with health providers' lack of knowledge regarding key provisions, presents a barrier to improving access to safe anesthesia care in low- and middle-income countries. Fifteen of the 46 essential medicines of potential relevance to perioperative care are listed under one or more of the schedules of the three international drug control conventions and, subsequently, are required to be under national controls, potentially decreasing their availability for medical use. Improving the capacity and quality of anesthesia care in low- and middle-income countries requires attention to improving access to controlled medicines. Anesthesiologists and others involved in global health work should collaborate with policymakers and others to improve national and international drug control legislation to ensure that attempts to thwart illicit drug trafficking and use do not compromise availability of controlled medicines.

  3. Controlling the taste receptor accessible structure of rebaudioside A via binding to bovine serum albumin.

    PubMed

    Mudgal, Samriddh; Keresztes, Ivan; Feigenson, Gerald W; Rizvi, S S H

    2016-04-15

    We illustrate a method that uses bovine serum albumin (BSA) to control the receptor-accessible part of rebaudioside A (Reb A). The critical micelle concentration (CMC) of Reb A was found to be 4.5 mM and 5 mM at pH 3 and 6.7 respectively. NMR studies show that below its CMC, Reb A binds weakly to BSA to generate a Reb A-protein complex ("RPC"), which is only modestly stable under varying conditions of pH (3.0-6.7) and temperature (4-40°C) with its binding affinities determined to be in the range of 5-280 mM. Furthermore, saturation transfer difference (STD) NMR experiments confirm that the RPC has fast exchange of the bitterness-instigating diterpene of Reb A into the binding sites of BSA. Our method can be used to alter the strength of Reb A-receptor interaction, as a result of binding of Reb A to BSA, which may ultimately lead to moderation of its taste.

  4. Ongoing Spontaneous Activity Controls Access to Consciousness: A Neuronal Model for Inattentional Blindness

    PubMed Central

    Changeux, Jean-Pierre

    2005-01-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden “ignition” of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of “inattentional blindness,” in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness. PMID:15819609

  5. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    PubMed

    Dehaene, Stanislas; Changeux, Jean-Pierre

    2005-05-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  6. Peptide-controlled access to the interior surface of empty virus nanoparticles.

    PubMed

    Sainsbury, Frank; Saunders, Keith; Aljabali, Alaa A A; Evans, David J; Lomonossoff, George P

    2011-11-04

    The structure of Cowpea mosaic virus (CPMV) is known to high resolution, thereby enabling the rational use of the particles in diverse applications, from vaccine design to nanotechnology. A recently devised method for the production of empty virus-like particles (eVLPs) has opened up new possibilities for CPMV capsid-based technologies, such as internal mineralisation of the particle. We have investigated the role of the carboxyl (C) terminus of the small coat (S) protein in controlling access to the interior of CPMV eVLPs by determining the efficiency of internal mineralisation. The presence of the C-terminal 24-amino acid peptide of the S protein was found to inhibit internal mineralisation, an effect that could be eliminated by enzymatic removal of this region. We have also demonstrated the amenability of the C terminus to genetic modification. Substitution with six histidine residues generated stable particles and facilitated external mineralisation by cobalt. These findings demonstrate consistent internal and external mineralisation of CPMV, and will aid the further exploration and development of the use of eVLPs for bionanotechnological and medical applications. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  7. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    PubMed

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel.

  8. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon

    PubMed Central

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S.

    2015-01-01

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome–Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S–RQC and 80S–Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome–translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. PMID:25877867

  9. Analysis of driver injury severity in wrong-way driving crashes on controlled-access highways.

    PubMed

    Pour-Rouholamin, Mahdi; Zhou, Huaguo

    2016-09-01

    For more than five decades, wrong-way driving (WWD) has been notorious as a traffic safety issue for controlled-access highways. Numerous studies and efforts have tried to identify factors that contribute to WWD occurrences at these sites in order to delineate between WWD and non-WWD crashes. However, none of the studies investigate the effect of various confounding variables on the injury severity being sustained by the at-fault drivers in a WWD crash. This study tries to fill this gap in the existing literature by considering possible variables and taking into account the ordinal nature of injury severity using three different ordered-response models: ordered logit or proportional odds (PO), generalized ordered logit (GOL), and partial proportional odds (PPO) model. The findings of this study reveal that a set of variables, including driver's age, condition (i.e., intoxication), seatbelt use, time of day, airbag deployment, type of setting, surface condition, lighting condition, and type of crash, has a significant effect on the severity of a WWD crash. Additionally, a comparison was made between the three proposed methods. The results corroborate that the PPO model outperforms the other two models in terms of modeling injury severity using our database. Based on the findings, several countermeasures at the engineering, education, and enforcement levels are recommended. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  11. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    ERIC Educational Resources Information Center

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  12. Unified Information Access in Product Creation with an Integrated Control Desk

    NASA Astrophysics Data System (ADS)

    Wrasse, Kevin; Diener, Holger; Hayka, Haygazun; Stark, Rainer

    2017-06-01

    Customers demand for individualized products leads to a large variety of different products in small series and single-unit production. A high flexibility pressure in product creation is one result of this trend. In order to counteract the pressure, the information steadily increasing by Industry 4.0 must be made available at the workplace. Additionally, a better exchange of information between product development, production planning and production is necessary. The improvement of individual systems, like CAD, PDM, ERP and MES, can only achieve this to a limited extent. Since they mostly use systems from different manufacturers, the necessary deeper integration of information is only feasible for SMEs to a limited extend. The presented control desk helps to ensure a more flexible product creation as well as information exchange. It captures information from different IT systems in the production process and presents them integrated, task-oriented and oriented to the user’s mental model, e.g. information of the production combined with the 3D model of product parts, or information about product development on the 3D model of the production. The solution is a digital 3D model of the manufacturing environment, which is enriched by billboards for a quick information overview and web service windows to access detailed MES and PDM information. By this, the level of abstraction can be reduced and reacts to changed requirements in the short term, making informed decisions. The interaction with the control stands utilizes the touch skills of mobile and fixed systems such as smartphones, tablets and multitouch tables.

  13. Guaranteeing synchronous message deadlines with the timed token medium access control protocol

    NASA Technical Reports Server (NTRS)

    Agrawal, Gopal; Chen, Baio; Zhao, Wei; Davari, Sadegh

    1992-01-01

    We study the problem of guaranteeing synchronous message deadlines in token ring networks where the timed token medium access control protocol is employed. Synchronous capacity, defined as the maximum time for which a node can transmit its synchronous messages every time it receives the token, is a key parameter in the control of synchronous message transmission. To ensure the transmission of synchronous messages before their deadlines, synchronous capacities must be properly allocated to individual nodes. We address the issue of appropriate allocation of the synchronous capacities. Several synchronous capacity allocation schemes are analyzed in terms of their ability to satisfy deadline constraints of synchronous messages. We show that an inappropriate allocation of the synchronous capacities could cause message deadlines to be missed even if the synchronous traffic is extremely low. We propose a scheme called the normalized proportional allocation scheme which can guarantee the synchronous message deadlines for synchronous traffic of up to 33 percent of available utilization. To date, no other synchronous capacity allocation scheme has been reported to achieve such substantial performance. Another major contribution of this paper is an extension to the previous work on the bounded token rotation time. We prove that the time elapsed between any consecutive visits to a particular node is bounded by upsilon TTRT, where TTRT is the target token rotation time set up at system initialization time. The previous result by Johnson and Sevcik is a special case where upsilon = 2. We use this result in the analysis of various synchronous allocation schemes. It can also be applied in other similar studies.

  14. Improving cancer patients' knowledge about totally implantable access port: a randomized controlled trial.

    PubMed

    Piredda, Michela; Biagioli, Valentina; Giannarelli, Diana; Incletoli, Daniele; Grieco, Francesca; Carassiti, Massimiliano; De Marinis, Maria Grazia

    2016-02-01

    Providing patients with written information about totally implantable access ports (TIAPs) is recommended during the pre-implantation period to reduce anxiety and to help recalling information. No study tested the effectiveness of information about TIAP neither with oral communication nor with booklets. This study aimed at evaluating the effectiveness of an information booklet, alone or together with answers to clarification questions, both in improving patients' short- and long-time knowledge about TIAP and in decreasing patients' physiological indicators of anxiety immediately after TIAP implantation. This is a randomized controlled trial with three parallel groups: group A (n = 34) receiving only the booklet, group B (n = 34) receiving the booklet with answers to clarification questions, and group C (n = 37) receiving routine care. After 3 months, pair comparisons revealed a significant improvement in knowledge of TIAP in each group (p < 0.001), together with a significant difference in group C compared with groups A (p < 0.001) and B (p < 0.001), similar to each other. Physiological indicators of anxiety decreased in the intervention groups compared to control group immediately after TIAP implantation. The interventions provided resulted effective in decreasing patients' physiological indicators of anxiety immediately after TIAP implantation and improving patients' knowledge about TIAP immediately and at 3 months. Adding answers to clarification questions to the booklet was not more effective than the booklet alone. A well-designed booklet with attention both to scientific content and to communication techniques is useful in improving patients' knowledge about TIAP and reducing anxiety.

  15. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation.

    PubMed

    Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E

    2015-07-01

    Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, accessaccess to WTC and assess employees' (mis)match between components of WTC. For practice, we recommend to introduce WTC on an organizational level and assess employees' need for WTC on an individual basis.

  16. Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests

    DTIC Science & Technology

    2013-11-01

    Behavior-Based Access Control (BBAC). The work described in this paper focuses on the statistical machine learning techniques used in BBAC to make...and describe current plans for transitioning BBAC capabilities into the Department of Defense together with lessons learned for the machine learning community.

  17. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND...

  18. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND...

  19. 17 CFR 240.15c3-5 - Risk management controls for brokers or dealers with market access.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... designed to manage the financial, regulatory, and other risks of this business activity. Such broker or... by paragraph (b) of this section shall include the following elements: (1) Financial risk management... access. (d) The financial and regulatory risk management controls and supervisory procedures described in...

  20. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  1. Suppressing NOM access to controlled porous TiO2 particles enhances the decomposition of target water contaminants

    EPA Science Inventory

    Suppressing access of natural organic matter (NOM) to TiO2 is a key to the successful photocatalytic decomposition of a target contaminant in water. This study first demonstrates simply controlling the porous structure of TiO2 can significantly improve the selective oxidation.

  2. The views of stakeholders on controlled access schemes for high-cost antirheumatic biological medicines in Australia

    PubMed Central

    Lu, Christine Y; Ritchie, Jan; Williams, Ken; Day, Ric

    2007-01-01

    Background In Australia, government-subsidised access to high-cost medicines is "targeted" to particular sub-sets of patients under the Pharmaceutical Benefits Scheme to achieve cost-effective use. In order to determine how this access system could be improved, the opinions of key stakeholders on access to biological agents for rheumatoid arthritis were explored. Methods Thirty-six semi-structured interviews were conducted with persons from relevant stakeholder groups. These were transcribed verbatim, and analysed thematically. Results Controlled access to expensive medicines was considered to be equitable and practical; however, there was disagreement as to the method of defining the target patient populations. Other concerns included timeliness of access, excessive bureaucracy, and the need for additional resources to facilitate the scheme. Collaboration between stakeholders was deemed important because it allows more equitable distribution of limited resources. The majority considered that stakeholder consultation should have been broader. Most wanted increased transparency of the decision-making process, ongoing and timely review of access criteria, and an increased provision of information for patients. More structured communication between stakeholders was proposed. Conclusion The Pharmaceutical Benefit Scheme is adapting to meet the changing needs of patients. Provision of subsidised access to high-cost medicines in a manner that is affordable for individuals and society, and that is equitable and efficiently managed is challenging. The views of stakeholders on targeted access to anti-rheumatic biological medicines in Australia acknowledged this challenge and provided a number of suggestions for modifications. These could serve as a basis to inform the debate on how to change the processes and policies so as to improve the scheme. PMID:18096055

  3. Provider responses to patients controlling access to their electronic health records: a prospective cohort study in primary care.

    PubMed

    Tierney, William M; Alpert, Sheri A; Byrket, Amy; Caine, Kelly; Leventhal, Jeremy C; Meslin, Eric M; Schwartz, Peter H

    2015-01-01

    Applying Fair Information Practice principles to electronic health records (EHRs) requires allowing patient control over who views their data. We designed a program that captures patients' preferences for provider access to an urban health system's EHR. Patients could allow or restrict providers' access to all data (diagnoses, medications, test results, reports, etc.) or only highly sensitive data (sexually transmitted infections, HIV/AIDS, drugs/alcohol, mental or reproductive health). Except for information in free-text reports, we redacted EHR data shown to providers according to patients' preferences. Providers could "break the glass" to display redacted information. We prospectively studied this system in one primary care clinic, noting redactions and when users "broke the glass," and surveyed providers about their experiences and opinions. Eight of nine eligible clinic physicians and all 23 clinic staff participated. All 105 patients who enrolled completed the preference program. Providers did not know which of their patients were enrolled, nor their preferences for accessing their EHRs. During the 6-month prospective study, 92 study patients (88 %) returned 261 times, during which providers viewed their EHRs 126 times (48 %). Providers "broke the glass" 102 times, 92 times for patients not in the study and ten times for six returning study patients, all of whom had restricted EHR access. Providers "broke the glass" for six (14 %) of 43 returning study patients with redacted data vs. zero among 49 study patients without redactions (p = 0.01). Although 54 % of providers agreed that patients should have control over who sees their EHR information, 58 % believed restricting EHR access could harm provider-patient relationships and 71 % felt quality of care would suffer. Patients frequently preferred restricting provider access to their EHRs. Providers infrequently overrode patients' preferences to view hidden data. Providers believed that restricting EHR access

  4. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    NASA Technical Reports Server (NTRS)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  5. [Genetic control of efficient leaf rust resistance in collection accessions of barley Hordeum vulgare L].

    PubMed

    Tyryshkin, L G

    2009-03-01

    Leaf rust resistance was studied in barley accessions from the worldwide collection of the All-Russia Institute of Plant Industry. Most accessions described as highly resistant in the literature proved susceptible. High resistance at the juvenile stage was observed only for the cultivars Henry, Cebada Capa, Forrajera Klein, and Scarlet. Hybrid analysis and phytopathological tests showed that the cultivar Scarlet had one dominant resistance gene, Rph7. Adult resistance was demonstrated for accession NB-3002 from Nepal, which proved to have one dominant gene on evidence of hybrid analysis.

  6. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    EPA Pesticide Factsheets

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  7. Flow Contribution and Water Quality with Depth in a Test Hole and Public-Supply Wells: Implications for Arsenic Remediation Through Well Modification, Norman, OK 2003-2006.

    EPA Science Inventory

    The City of Norman, Oklahoma, is one municipality affected by a change in the Environmental Protection Agency’s National Primary Drinking Water Regulation for arsenic. In 2006, the maximum contaminant level for arsenic in drinking-water was lowered from 50 to 10 micrograms per li...

  8. Flow Contribution and Water Quality with Depth in a Test Hole and Public-Supply Wells: Implications for Arsenic Remediation Through Well Modification, Norman, OK 2003-2006.

    EPA Science Inventory

    The City of Norman, Oklahoma, is one municipality affected by a change in the Environmental Protection Agency’s National Primary Drinking Water Regulation for arsenic. In 2006, the maximum contaminant level for arsenic in drinking-water was lowered from 50 to 10 micrograms per li...

  9. TraPy-MAC: Traffic Priority Aware Medium Access Control Protocol for Wireless Body Area Network.

    PubMed

    Ullah, Fasee; Abdullah, Abdul Hanan; Kaiwartya, Omprakash; Cao, Yue

    2017-06-01

    Recently, Wireless Body Area Network (WBAN) has witnessed significant attentions in research and product development due to the growing number of sensor-based applications in healthcare domain. Design of efficient and effective Medium Access Control (MAC) protocol is one of the fundamental research themes in WBAN. Static on-demand slot allocation to patient data is the main approach adopted in the design of MAC protocol in literature, without considering the type of patient data specifically the level of severity on patient data. This leads to the degradation of the performance of MAC protocols considering effectiveness and traffic adjustability in realistic medical environments. In this context, this paper proposes a Traffic Priority-Aware MAC (TraPy-MAC) protocol for WBAN. It classifies patient data into emergency and non-emergency categories based on the severity of patient data. The threshold value aided classification considers a number of parameters including type of sensor, body placement location, and data transmission time for allocating dedicated slots patient data. Emergency data are not required to carry out contention and slots are allocated by giving the due importance to threshold value of vital sign data. The contention for slots is made efficient in case of non-emergency data considering threshold value in slot allocation. Moreover, the slot allocation to emergency and non-emergency data are performed parallel resulting in performance gain in channel assignment. Two algorithms namely, Detection of Severity on Vital Sign data (DSVS), and ETS Slots allocation based on the Severity on Vital Sign (ETS-SVS) are developed for calculating threshold value and resolving the conflicts of channel assignment, respectively. Simulations are performed in ns2 and results are compared with the state-of-the-art MAC techniques. Analysis of results attests the benefit of TraPy-MAC in comparison with the state-of-the-art MAC in channel assignment in realistic medical

  10. DOE`s nation-wide system for access control can solve problems for the federal government

    SciTech Connect

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.

  11. Controls upon microbial accessibility to soil organic matter following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, C. A.; Boutton, T. W.; Filley, T. R.

    2009-12-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic matter (SOM) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and soil hydrology. To elucidate the controls upon microbial accessibility to SOM, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas A&M Agricultural Experimental Station La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, plant biopolymer chemistry in SOM, and microbial community structure were tracked. Respiration rates declined steadily over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total carbon was mineralized to CO2 throughout the incubation. After day 84 a significantly (p < 0.05) greater portion of carbon was mineralized from soils of older woody clusters (34-86 years) than from soils of younger clusters (14-23 years) and the native grassland. Approximately 80% of patterns seen in cumulative CO2 loss could be explained by the proportions of macro- and micro-aggregates within each soil, suggesting soil structure is a major controlling factor of respiration rates. Despite documented carbon accrual within La Copita soils due to WPE, we observed no evidence of enhanced carbon stabilization in these respiration experiments. In fact, a greater proportion of total carbon was lost from the soil of mature woody stands than from young stands, suggesting carbon accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. A cluster approximately 34 years in age represents a transition point in WPE where respiration dynamics become distinct between grassland and wooded elements. By day 84 of the incubation CO2 respired from all soils was depleted with respect to bulk SOM (1.5 to 5‰) and this

  12. Professor Arthur Norman Exton-Smith CBE MA MD FRCP (1920-90): distinguished geriatrician and gerontologist.

    PubMed

    Denham, M J

    2009-02-01

    Professor Norman Exton-Smith was a highly respected, distinguished postwar consultant geriatrician with a worldwide reputation. He devoted his life to improving the medical care of elderly people and researching age-related decline in physical function, particularly thermoregulation and postural balance. He established thriving clinical and research departments at St Pancras Hospital, London. Many of his junior medical staff became well-known geriatricians. He published and lectured extensively, organized many meetings and conferences, and was advisor to the Department of Health and Social Security for many years. He was a valued authority on geriatric medicine within the Royal College of Physicians of London and a major influence in the British Geriatrics Society (BGS) of which he was Secretary and later the President.

  13. Versemaking and lovemaking--W. B. Yeats' "strange second puberty": Norman Haire and the Steinach rejuvenation operation.

    PubMed

    Wyndham, Diana

    2003-01-01

    This article examines the Steinach rejuvenation operation (a vasectomy) which Norman Haire performed on W. B. Yeats in 1934: while this method is now discredited, many others are still used in similar attempts to "cure" old age and restore youthful vitality. The article deals substantially with ideas which were popular among well-read people and intellectuals in the 1920s and 1930s and discusses whether the poet's late-in-life burst of creativity was caused by a medical breakthrough, Haire's more general medical advice, the placebo effect, or by a combination of factors: questions which still have relevance to theories about age, sexuality, and mind-body relationships. Copyright 2003 Wiley Periodicals, Inc.

  14. The development of blood transfusion: the contributions of Norman Bethune in the Spanish Civil War (1936-1939).

    PubMed

    Franco, A; Cortes, J; Alvarez, J; Diz, J C

    1996-10-01

    Although the Spanish Civil War (1936-1939) has been the focus of many papers in many countries, there are few references concerning medicine during this war, and many of the related events and medical progress are not well known. Some of these events came to influence civilian and military medicine. Among these were advances in blood transfusion, in which the Canadian surgeon, Norman Bethune, played an important role, particularly in advocating transfusion of blood to soldiers at the front rather than at medical centres behind the lines. While much of Bethune's work, especially in Canada and China, is well known, 1-3 certain aspects of Bethune's work and his stay in Spain are worth reviewing.

  15. STS-42 MS/PLC Norman E. Thagard adjusts Rack 10 FES equipment in IML-1 module

    NASA Technical Reports Server (NTRS)

    1992-01-01

    STS-42 Mission Specialist (MS) and Payload Commander (PLC) Norman E. Thagard, wearing bifocals and a lightweight headset (HDST), adjusts Rack 10 Fluids Experiment System (FES) equipment in the International Microgravity Laboratory 1 (IML-1) spacelab (SL) module. FES is a NASA-developed facility that produces optical images of fluid flows during the processing of materials in space. The system's sophisticated optics consist of a laser to make holograms of samples and a video camera to record images of flows in and around samples. Thagard and other crewmembers spent most of their on-duty time in the IML-1 science module, positioned in the payload bay (PLB) and attached via an SL tunnel to Discovery's, Orbiter Vehicle (OV) 103's, airlock.

  16. STS-42 MS/PLC Norman E. Thagard adjusts Rack 10 FES equipment in IML-1 module

    NASA Image and Video Library

    1992-01-30

    STS042-05-006 (22-30 Jan 1992) --- Astronaut Norman E. Thagard, payload commander, performs the Fluids Experiment System (FES) in the International Microgravity Laboratory (IML-1) science module. The FES is a NASA-developed facility that produces optical images of fluid flows during the processing of materials in space. The system's sophisticated optics consist of a laser to make holograms of samples and a video camera to record images of flows in and around samples. Thagard was joined by six fellow crewmembers for eight days of scientific research aboard Discovery in Earth-orbit. Most of their on-duty time was spent in this IML-1 science module, positioned in the cargo bay and attached via a tunnel to Discovery's airlock.

  17. STS-42 MS/PLC Norman E. Thagard adjusts Rack 10 FES equipment in IML-1 module

    NASA Technical Reports Server (NTRS)

    1992-01-01

    STS-42 Mission Specialist (MS) and Payload Commander (PLC) Norman E. Thagard, wearing bifocals and a lightweight headset (HDST), adjusts Rack 10 Fluids Experiment System (FES) equipment in the International Microgravity Laboratory 1 (IML-1) spacelab (SL) module. FES is a NASA-developed facility that produces optical images of fluid flows during the processing of materials in space. The system's sophisticated optics consist of a laser to make holograms of samples and a video camera to record images of flows in and around samples. Thagard and other crewmembers spent most of their on-duty time in the IML-1 science module, positioned in the payload bay (PLB) and attached via an SL tunnel to Discovery's, Orbiter Vehicle (OV) 103's, airlock.

  18. Application of the Ecosystem Assessment Model to Lake Norman: A cooling lake in North Carolina: Final report

    SciTech Connect

    Porcella, D.B.; Bowie, G.L.; Campbell, C.L.

    1986-11-01

    The Ecosystem Assessment Model (EAM) of the Cooling Lake Assessment Methodology was applied to the extensive ecological field data collected at Lake Norman, North Carolina by Duke Power Company to evaluate its capability to simulate lake ecosystems and the ecological effects of steam electric power plants. The EAM provided simulations over a five-year verification period that behaved as expected based on a one-year calibration. Major state variables of interest to utilities and regulatory agencies are: temperature, dissolved oxygen, and fish community variables. In qualitative terms, temperature simulation was very accurate, dissolved oxygen simulation was accurate, and fish prediction was reasonably accurate. The need for more accurate fisheries data collected at monthly intervals and non-destructive sampling techniques was identified.

  19. Analysis and Simulation of Traffic Control for Resource Management in DVB-Based Broadband Satellite Access Networks

    NASA Astrophysics Data System (ADS)

    Impemba, Ernesto; Inzerilli, Tiziano

    2003-07-01

    Integration of satellite access networks with the Internet is seen as a strategic goal to achieve in order to provide ubiquitous broadband access to Internet services in Next Generation Networks (NGNs). One of the main interworking aspects which has been most studied is an efficient management of satellite resources, i.e. bandwidth and buffer space, in order to satisfy most demanding application requirements as to delay control and bandwidth assurance. In this context, resource management in DVB-S/DVB-RCS satellite technologies, emerging technologies for broadband satellite access and transport of IP applications, is a research issue largely investigated as a means to provide efficient bi-directional communications across satellites. This is in particular one of the principal goals of the SATIP6 project, sponsored within the 5th EU Research Programme Framework, i.e. IST. In this paper we present a possible approach to efficiently exploit bandwidth, the most critical resource in a broadband satellite access network, while pursuing satisfaction of delay and bandwidth requirements for applications with guaranteed QoS through a traffic control architecture to be implemented in ground terminals. Performance of this approach is assessed in terms of efficient exploitation of the uplink bandwidth and differentiation and minimization of queuing delays for most demanding applications over a time-varying capacity. Opnet simulations is used as analysis tool.

  20. State preemption of local tobacco control policies restricting smoking, advertising, and youth access--United States, 2000-2010.

    PubMed

    2011-08-26

    Preemptive state tobacco control legislation prohibits localities from enacting tobacco control laws that are more stringent than state law. State preemption provisions can preclude any type of local tobacco control policy. The three broad types of state preemption tracked by CDC include preemption of local policies that restrict 1) smoking in workplaces and public places, 2) tobacco advertising, and 3) youth access to tobacco products. A Healthy People 2020 objective (TU-16) calls for eliminating state laws that preempt any type of local tobacco control law. A previous study reported that the number of states that preempt local smoking restrictions in one or more of three settings (government worksites, private-sector worksites, and restaurants) has decreased substantially in recent years. To measure progress toward achieving Healthy People 2020 objectives, this study expands on the previous analysis to track changes in state laws that preempt local advertising and youth access restrictions and to examine policy changes from December 31, 2000, to December 31, 2010. This new analysis found that, in contrast with the substantial progress achieved during the past decade in reducing the number of states that preempt local smoking restrictions, no progress has been made in reducing the number of states that preempt local advertising restrictions and youth access restrictions. Increased progress in removing state preemption provisions will be needed to achieve the relevant Healthy People 2020 objective.

  1. An efficient key-management scheme for hierarchical access control in e-medicine system.

    PubMed

    Wu, Shuhua; Chen, Kefei

    2012-08-01

    In e-medicine system, the sharing of patients' medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.'s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.

  2. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...(a)(2), a vessel issued a limited access NE multispecies permit may not fish for, possess, or land.... (ii) A vessel may not fish for, possess, or land regulated species from March 1 through March 20 of... DAS may be used in the NE multispecies fishery to harvest and land stocks of regulated species...

  3. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...(a)(2), a vessel issued a limited access NE multispecies permit may not fish for, possess, or land.... (ii) A vessel may not fish for, possess, or land regulated species from March 1 through March 20 of... DAS may be used in the NE multispecies fishery to harvest and land stocks of regulated species...

  4. 50 CFR 648.82 - Effort-control program for NE multispecies limited access vessels.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 2005 fishing years, Category A DAS are defined as 60 percent of the vessel's used DAS baseline... program described in this section, unless otherwise provided elsewhere in this part. (1) End-of-year carry...(a)(1)(i)(J), for the entire fishing year preceding the carry-over year, limited access vessels that...

  5. Multi-component access to a commercially available weight loss program: A randomized controlled trial

    USDA-ARS?s Scientific Manuscript database

    This study examined weight loss between a community-based, intensive behavioral counseling program (Weight Watchers PointsPlus that included three treatment access modes and a self-help condition. A total of 292 participants were randomized to a Weight Watchers (WW; n=147) or a self-help condition (...

  6. The Use of a Computer-Controlled Random Access Slide Projector for Rapid Information Display.

    ERIC Educational Resources Information Center

    Muller, Mark T.

    A 35mm random access slide projector operated in conjunction with a computer terminal was adapted to meet the need for a more rapid and complex graphic display mechanism than is currently available with teletypewriter terminals. The model projector can be operated manually to provide for a maintenance checkout of the electromechanical system.…

  7. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... audible blast warning and all-clear signals that are in use, and which explain the marking of blasting... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access...

  8. Preservative-free 0.9% sodium chloride for flushing and locking peripheral intravenous access device: a prospective controlled trial.

    PubMed

    Wang, Rui; Luo, Ou; He, Liu; Li, Jia-Xin; Zhang, Ming-Guang

    2012-11-01

    In Mainland China, heparin saline solution is commonly used for flushing and locking peripheral intravenous access devices in clinical practice for a long time. We conducted a prospective controlled trial to compare the effectiveness and safety of preservative-free 0.9% sodium chloride solution versus heparin saline solution as flushing and locking solution for peripheral intravenous access devices. Patients with gastroenterological or hepatic diseases were enrolled for this study from August 2011 to October 2011. After non-randomized allocation, preservative-free 0.9% sodium chloride was used as flushing and locking solution in the sodium chloride solution group, while hepatic solution (10 U/mL) was given in the heparin saline solution group. The device related complications and its maintenance duration were compared between two groups. One-way ANOVA, Chi(2), or Mantel-Haenszel test were performed using SPSS 13.0 and RevMan 5.0. Totally, 181 and 178 peripheral intravenous access devices in the sodium chloride solution and heparin saline solution groups were included and analyzed. Results indicated than sodium chloride solution did not increase the risks of occlusion (7.7% vs. 7.9%) and other adverse events of peripheral intravenous access devices (P = 0.163). Sodium chloride solution neither shortened the duration of peripheral intravenous access devices maintenance (3.6 ± 1.1 days vs. 3.7 ± 1.2 days, P = 0.651), nor increased the proportion of abnormal withdrawal (29.3% vs. 31.5%, P = 0.654). Sodium chloride solution is as effective and safe as conventional heparin saline solution for flushing and locking peripheral intravenous access devices, which results from our evidence-based study and should be transferred to other nurses in China. © 2012 Wiley Publishing Asia Pty Ltd and Chinese Cochrane Center, West China Hospital of Sichuan University.

  9. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    PubMed

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  10. Fluorination Enables a Ligand-Controlled Regiodivergent Palladium-Catalyzed Decarboxylative Allylation Reaction to Access α,α-Difluoroketones

    PubMed Central

    Yang, Ming–Hsiu; Orsi, Douglas L.

    2015-01-01

    α,α-Difluoroketones possess unique physicochemical properties that are useful for developing therapeutics and probes for chemical biology. In order to access the α-allyl-α,α-difluoroketone substructure, complementary Pd-catalyzed decarboxylative allylation reactions were developed to provide linear and branched α-allyl-α,α-difluoroketones. For these orthogonal processes, the regioselectivity was uniquely controlled by fluorination of the substrate and the structure of ligand. PMID:25581845

  11. Impact of patient access to Internet health records on glaucoma medication: randomized controlled trial.

    PubMed

    Kashiwagi, Kenji; Tsukahara, Shigeo

    2014-01-15

    Glaucoma is one of the leading causes of blindness. Reduction of intraocular pressure is the only proven way to prevent progression of glaucomatous optic neuropathy. The majority of glaucoma patients need to use antiglaucoma ophthalmic solutions over the course of their life. Thus, good adherence and persistency of glaucoma treatment are important factors for better glaucoma care. The purpose of this study was to investigate the impact of an Internet-based glaucoma care support system on glaucoma medication use. Patients were randomly divided into two groups. The non-Internet access (NIA) group consisted of patients who had access to the Internet-based glaucoma care support system during the 4-year period only when they were examined by ophthalmologists. The Internet access (IA) group consisted of patients who had the same Internet-based glaucoma care support system access as the NIA group for the first 2 years following enrollment but who were also given free access to the glaucoma care support system for the remaining 2 years. Changes in glaucoma medication use were investigated. In total, 81 patients in the IA group and 90 patients in the NIA group satisfied the study protocol. The number of antiglaucoma ophthalmic solutions used during the study period significantly increased in the NIA group (P<.03) but not in the IA group. The percentages of patients with unchanged, increased, and decreased antiglaucoma ophthalmic solution use during the study period were 61.1% (55/90), 17.8% (16/90), and 3.3% (3/90), respectively, in the NIA group, and 56.8% (46/81), 8.6% (7/81), and 13.6% (11/81), respectively, in the IA group (P<.001). Internet access significantly shifted from an increasing intraocular pressure trend to a decreasing trend in the IA group (P=.002) among the patients who did not have any medication changes. Allowing patients to browse their medical data may reduce the use and improve the effectiveness of glaucoma medication. UMIN-CTR Clinical Trial Number

  12. Massive Access Control Aided by Knowledge-Extraction for Co-Existing Periodic and Random Services over Wireless Clinical Networks.

    PubMed

    Du, Qinghe; Zhao, Weidong; Li, Weimin; Zhang, Xuelin; Sun, Bo; Song, Houbing; Ren, Pinyi; Sun, Li; Wang, Yichen

    2016-07-01

    The prosperity of e-health is boosted by fast development of medical devices with wireless communications capability such as wearable devices, tiny sensors, monitoring equipments, etc., which are randomly distributed in clinic environments. The drastically-increasing population of such devices imposes new challenges on the limited wireless resources. To relieve this problem, key knowledge needs to be extracted from massive connection attempts dispersed in the air towards efficient access control. In this paper, a hybrid periodic-random massive access (HPRMA) scheme for wireless clinical networks employing ultra-narrow band (UNB) techniques is proposed. In particular, the proposed scheme towards accommodating a large population of devices include the following new features. On one hand, it can dynamically adjust the resource allocated for coexisting periodic and random services based on the traffic load learned from signal collision status. On the other hand, the resource allocation within periodic services is thoroughly designed to simultaneously align with the timing requests of differentiated services. Abundant simulation results are also presented to demonstrate the superiority of the proposed HPRMA scheme over baseline schemes including time-division multiple access (TDMA) and random access approach, in terms of channel utilization efficiency, packet drop ratio, etc., for the support of massive devices' services.

  13. Controls on microbial accessibility to soil organic carbon following woody plant encroachment into grasslands

    NASA Astrophysics Data System (ADS)

    Creamer, Courtney; Boutton, Thomas; Olk, Dan; Filley, Timothy

    2010-05-01

    Woody plant encroachment (WPE) into savannas and grasslands is a global phenomenon that alters soil organic carbon (SOC) dynamics through changes in litter quality and quantity, soil structure, microbial ecology, and hydrology. To elucidate the controls on microbial accessibility to SOC, bulk soils from a chronosequence of progressive WPE into native grasslands at the Texas Agrilife La Copita Research Area were incubated for one year. The quantity and stable carbon isotope composition of respired CO2, and plant biopolymer chemistry in SOC were tracked. Respiration rates declined exponentially over the course of the experiment with 15-25% of the total CO2 respired released in the first month of incubation. Between 8 and 18% of the total SOC was mineralized to CO2 throughout the incubation. After day 84 a significantly (p<0.05) greater portion of SOC was mineralized from soils of older woody clusters (34-86 years) than from soils of younger woody clusters (14-23 years) and the native grassland. Invading woody stands of ≃≥35 years of age represent a transition point in WPE where respiration dynamics become distinct in wooded elements compared to grasslands; this distinction has been previously observed through changes in belowground SOC accrual, C input chemistry, and mycorrhizal productivity. Despite documented SOC accrual following WPE at La Copita, we observed no evidence of enhanced SOC stabilization in these respiration experiments. In fact, a greater proportion of total SOC was lost from the soil of mature woody stands than from young stands, suggesting SOC accumulation observed with WPE may be due to greater input rates or microbial dynamics not captured in the laboratory incubation. Compound-specific analyses indicated there was a significant (p<0.05) loss of C from carbohydrates, amino acids, and amino sugars during the incubation. Amino nitrogen tended to become more concentrated during the incubation, although the trend was not significant. Relatively

  14. Apparatus, method and system to control accessibility of platform resources based on an integrity level

    SciTech Connect

    Jenkins, Chris; Pierson, Lyndon G.

    2016-10-25

    Techniques and mechanism to selectively provide resource access to a functional domain of a platform. In an embodiment, the platform includes both a report domain to monitor the functional domain and a policy domain to identify, based on such monitoring, a transition of the functional domain from a first integrity level to a second integrity level. In response to a change in integrity level, the policy domain may configure the enforcement domain to enforce against the functional domain one or more resource accessibility rules corresponding to the second integrity level. In another embodiment, the policy domain automatically initiates operations in aid of transitioning the platform from the second integrity level to a higher integrity level.

  15. Scalable Authorization in Role-Based Access Control Using Negative Permissions and Remote Authorization

    DTIC Science & Technology

    2003-01-01

    and Hongjie Xin for making this a rewarding team experience. Thanks to Mr. Michael Warres from Sun Microsystems for being prompt and meticulous in our...Windows NT), and security policies based on the Chinese wall model for separation of duties [8]. RBAC simplifies the administration of access...connection check is sort of a first wall of defense against illegitimate users, while the JavaSpace action is more specific to a particular object, known as

  16. Oversight Review: Quality Control Review of Naval Audit Service’s Special Access Program Audits

    DTIC Science & Technology

    2005-09-02

    undergo an external peer review at least once every 3 years by reviewers independent of the audit organization being reviewed. As the organization that...has audit policy and oversight responsibilities for audits in the Department of Defense, we conducted this external peer review of the NAVAUDSVC audits...requiring special access in conjunction with the Army Audit Agency’s external peer review of NAVAUDSVC non-SAP audits.

  17. Composable Distributed Access Control and Integrity Policies for Query-Based Wireless Sensor Networks

    DTIC Science & Technology

    2008-03-01

    multiple WSN policies. The construction, hybridization, and composition of well–known models is demonstrated to preserve security, sustaining...confidentiality in Bell–LaPadula’s model , integrity in Biba’s strict integrity model , and conflict of interest avoidance in the Chinese Wall. Using WASL, a multi...as defined by the security model . It is also be more flexible in that a policy file update is all that is required to modify the accesses permitted

  18. Analysis of the Reconfigurable Control Capabilities of a Space Access Vehicle (Preprint)

    DTIC Science & Technology

    2006-12-01

    based on dynamic inversion with a non-linear control allocator, is used to linearize the vehicle dynamics over its flight envelope and assign control ...backstepping method. Assessment of the vehicle’s ability to recover from control failures is conducted in this work for a nominal re-entry flight . 15...on dynamic inversion with a non-linear control allocator, is used to linearize the vehicle dynamics over its flight envelope and assign control tasks

  19. A Rapid Assessment Tool for Space Access Vehicle Configurations in Guidance and Control Performance (Preprint)

    DTIC Science & Technology

    2006-08-01

    Engineering Corporation, 1989. 4“Application of Multivariable Control Theory to Aircraft Control Laws,” Tech. Rep. WL-TR-96-3099, Wright Laboratory, 16 of...Nonlinear Aircraft Dynamics,” Proceedings of the 2002 Guidance, Navigation and Control Conference, AIAA 2002-4667, August 2002. 7Etkin, B., Dynamics of...Atmospheric Flight , John Wiley & Sons, Inc., 1972. 8Buffington, J. M., “ Modular Control Law Design for the Innovative Control Effectors (ICE) Tailless

  20. Control of depth of anesthesia using MUSMAR--exploring electromyography and the analgesic dose as accessible disturbances.

    PubMed

    Nunes, Catarina S; Mendonça, Teresa; Lemos, João M; Amorim, Pedro

    2007-01-01

    The problem of controlling the level of depth of anesthesia measured by the Bispectral Index (BIS) of the electroencephalogram of patients under general anesthesia, is considered. It is assumed that the manipulated variable is the infusion rate of the hypnotic drug propofol, while the drug remifentanil is also administered for analgesia. Since these two drugs interact, the administration rate of remifentanil is considered as an accessible disturbance in combination with the level of electromyography (EMG) that also interferes with the BIS signal. In order to tackle the high uncertainty present on the system, the predictive adaptive controller MUSMAR is used. The performance of the controller is illustrated by means of simulation with 45 patient individual adjusted models, which incorporate the effect of the drugs interaction on BIS. This controller structure proved to be robust to the EMG and remifentanil disturbances, patient variability, changing reference values and noise.

  1. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    NASA Astrophysics Data System (ADS)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  2. Clinical utility of far-infrared therapy for improvement of vascular access blood flow and pain control in hemodialysis patients

    PubMed Central

    Choi, Soo Jeong; Cho, Eun Hee; Jo, Hye Min; Min, Changwook; Ji, Young Sok; Park, Moo Yong; Kim, Jin Kuk; Hwang, Seung Duk

    2015-01-01

    Background Maintenance of a well-functioning vascular access and minimal needling pain are important goals for achieving adequate dialysis and improving the quality of life in hemodialysis (HD) patients. Far-infrared (FIR) therapy may improve endothelial function and increase access blood flow (Qa) and patency in HD patients. The aim of this study was to evaluate effects of FIR therapy on Qa and patency, and needling pain in HD patients. Methods This prospective clinical trial enrolled 25 outpatients who maintained HD with arteriovenous fistula. The other 25 patients were matched as control with age, sex, and diabetes. FIR therapy was administered for 40 minutes during HD 3 times/wk and continued for 12 months. The Qa was measured by the ultrasound dilution method, whereas pain was measured by a numeric rating scale at baseline, then once per month. Results One patient was transferred to another facility, and 7 patients stopped FIR therapy because of an increased body temperature and discomfort. FIR therapy improved the needling pain score from 4 to 2 after 1 year. FIR therapy increased the Qa by 3 months and maintained this change until 1 year, whereas control patients showed the decrease in Qa. The 1-year unassisted patency with FIR therapy was not significantly different from control. Conclusion FIR therapy improved needling pain. Although FIR therapy improved Qa, the unassisted patency was not different compared with the control. A larger and multicenter study is needed to evaluate the effect of FIR therapy. PMID:27069856

  3. Quality Control Review of Air Force Audit Agency’s Special Access Program Audits

    DTIC Science & Technology

    2014-12-09

    external quality control review of the AFAA SAP audits in conjunction with the Army Audit Agency’s review of the AFAA non- SAP audits. We conducted this...provide reasonable assurance of meeting the objectives of quality control. We tested the AFAA SAP system of quality control for audits to the extent...control for the audit function of AFAA SAP in effect for the period ended September 30, 2013, was designed in accordance with quality standards

  4. One electron-controlled multiple-valued dynamic random-access-memory

    NASA Astrophysics Data System (ADS)

    Kye, H. W.; Song, B. N.; Lee, S. E.; Kim, J. S.; Shin, S. J.; Choi, J. B.; Yu, Y.-S.; Takahashi, Y.

    2016-02-01

    We propose a new architecture for a dynamic random-access-memory (DRAM) capable of storing multiple values by using a single-electron transistor (SET). The gate of a SET is designed to be connected to a plurality of DRAM unit cells that are arrayed at intersections of word lines and bitlines. In this SET-DRAM hybrid scheme, the multiple switching characteristics of SET enables multiple value data stored in a DRAM unit cell, and this increases the storage functionality of the device. Moreover, since refreshing data requires only a small amount of SET driving current, this enables device operating with low standby power consumption.

  5. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  6. Accessibility Is the Mother of Invention: When It Comes to an Innovative Hand Control System

    ERIC Educational Resources Information Center

    Exceptional Parent, 2007

    2007-01-01

    This article features Sure Grip hand control, an innovative hand control system created by Keith Howell, the President and founder of Howell Ventures LTD. Howell was in his early teens when he experienced an accident that resulted in his quadriplegia. From that point on, Howell set about to manufacture a set of controls that would emulate the…

  7. Wireless digital-ultrasonic sensors for proximity ID, access control, firearm control, and C3I in homeland security and law enforcement applications

    NASA Astrophysics Data System (ADS)

    Forcier, Bob

    2003-09-01

    This paper describes a new patent-pending digital-ultrasonic sensor network technology, which provides a "security protection sphere" around the authorized user(s) and the infrastructure system or system(s) to achieve C3I in Homeland Security and Law Enforcement Applications. If the system device, such as a firearm, a secure computer, PDA, or vehicle is misplaced, stolen or removed from the security protective sphere, an alarm is activated. A digital-ultrasonic sensor/tag utilizes the system"s physical structure to form a 2 to 20 Meter programmable protection sphere around the device and the authorized user. In addition, the system allows only authorized users to utilize the system, thereby creating personalized weapons, secure vehicle access or secure computer hardware. If an unauthorized individual accesses the system device, the system becomes inoperative and an alarm is activated. As the command and control, the authorized individual is provided a secure wristwatch/PDA. Access control is provided by "touch" and is controlled through the wristwatch/PDA/smartcard with a unique digital-ultrasonic coding and matching protocol that provides a very high level of security for each wireless sensor.

  8. Advance reservation access control using software-defined networking and tokens

    DOE PAGES

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; ...

    2017-03-09

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present in this paper a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization.more » We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. Finally, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  9. Advance reservation access control using software-defined networking and tokens

    DOE PAGES

    Chung, Joaquin; Jung, Eun -Sung; Kettimuthu, Rajkumar; ...

    2017-03-09

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We usemore » SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. In conclusion, we conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network.« less

  10. Norman Bethune, eccentric, man of principle, man of action, surgeon, and his contribution to blood transfusion in war.

    PubMed

    Pinkerton, Peter H

    2007-07-01

    Norman Bethune was a Canadian surgeon born of a family with wide interests and varied and influential careers. He himself had wide interests in medicine, politics, and the arts. One phase of his career, lasting about 6 months, involved the rapid development and exploitation of a (then) unique mobile blood transfusion service delivering citrated stored blood to hospitals and casualty clearing stations in support of the Republican ("anti-fascist") forces in the Spanish Civil War in 1936 to 1937. He was among the first to recognize the importance of prompt transfusion in the severely injured. His contributions to transfusion medicine were not immediately acknowledged by his contemporaries interested in transfusion, perhaps a consequence of his failure to publish his experience in the relevant medical literature, although other factors probably also played a part. In the past 30 years or so, as part of a wider appreciation of his career (particularly his work in China in 1938-1939), details of his endeavors in transfusion in Spain have come to light.

  11. Evolution and Characteristics of PyroCb Smoke From the Norman Wells August 1998 and Chisholm May 2001 Forest Fires

    NASA Astrophysics Data System (ADS)

    Servranckx, R.; Fromm, M.

    2005-12-01

    Observations of the Aerosol Index based on backscattered near-ultraviolet radiation from the Total Ozone Mapping Spectrometer (TOMS) on board the Nimbus-7 (1979-92) and the Earth Probe (mid-1996 to present) satellites show that the two biggest events resulted from the injection of smoke in the lower stratosphere from forest fires and explosive pyroCb convection near Norman Wells, NWT (August 1998) and Chisholm, Alberta (May 2001). In this paper, we look at the time evolution of the smoke palls using data from the AHVRR instrument onboard the NOAA polar orbiting satellites in the visible (ch1; 0.6 micron), near-infrared (ch3; 3.9 microns) and infrared (ch4; 10.7 microns) channels. The characteristics of the smoke clouds are examined by comparing ch4 and ch3 - ch4 values over a sunset, night and day cycle as a first step to a smoke satellite detection scheme. The satellite data are also compared to the simulated atmospheric transport and dispersion of the smoke using the Canadian Emergency Response Model (CANERM).

  12. Progress in Guidance and Control Research for Space Access and Hypersonic Vehicles (Preprint)

    DTIC Science & Technology

    2006-09-01

    6. Hypersonic Vehicle Geometry 12 [7] J. S. Brinker and K. A. Wise, “Flight Testing of Reconfig- urable Control Law on the X-36 Tailless Aircraft ...controlled aircraft . Both direct and indirect adaptive inner-loop flight control approaches have been pursued and flight-tested in recent years. Indirect...wpafb.afmil ‡M. Bolender, Aerospace Engineer, Air Force Re- search Laboratory, Laboratory, WPAFB, OH 45433, USA michael.bolender@wpafb.afmil aged aircraft

  13. Communication, Control, and Computer Access for Disabled and Elderly Individuals. ResourceBook 1: Communication Aids. Rehab/Education Technology ResourceBook Series.

    ERIC Educational Resources Information Center

    Brandenburg, Sara A., Ed.; Vanderheiden, Gregg C., Ed.

    One of a series of three resource guides concerned with communication, control, and computer access for disabled and elderly individuals, the directory focuses on communication aids. The book's six chapters each cover products with the same primary function. Cross reference indexes allow access to listings of products by function, input/output…

  14. Effectiveness and safety of computer-controlled periodontal ligament injection system in endodontic access to the mandibular posterior teeth.

    PubMed

    Jing, Quan; Wan, Kuo; Wang, Xiao-jun; Ma, Lin

    2014-03-01

    To evaluate the effectiveness and safety of a computer-controlled periodontal ligament (PDL) injection system to the local soft tissues as the primary technique in endodontic access to mandibular posterior teeth in patients with irreversible pulpitis. A total of 162 Chinese patients who had been diagnosed with irreversible pulpitis in their mandibular posterior teeth without acute infection or inflammation in the periodontal tissues were enrolled in this clinical study. The patients were divided into 3 groups according to the position of the involved tooth: the premolar group (PM, n=38), first molar group (FM, n=66), and second molar group (SM, n=58). All the patients received computer-controlled PDL injection with 4% articaine and 1:100 000 epinephrine. Immediately after the injection, endodontic access was performed, and the degree of pain during the treatment was evaluated by the patients using Visual Analogue Scale for pain. The success rates were compared among the 3 groups. The responses of local soft tissues were evaluated 3-8 days and 3 weeks after the procedure. The overall success rate was 76.5%. There was a significant difference in success rates among the PM, FM, and SM groups (92.1%, 53.0%, 93.1%, respectively; χ² = 34.3, P<0.01). Both the PM and SM groups showed higher success rates than that of the FM group (v=1, χ² = 16.73, P<0.01; v=1, χ² = 24.5, P<0.01). No irreversible adverse effects on the periodontal soft tissues at the injection sites were observed in the follow-up visits in any of the groups. The computer-controlled PDL injection system demonstrates both satisfactory anesthetic effects and safety in local soft tissues as primary anesthetic technique in endodontic access to the mandibular posterior teeth in patients with irreversible pulpitis.

  15. Practical considerations to guide development of access controls and decision support for genetic information in electronic medical records

    PubMed Central

    2011-01-01

    Background Genetic testing is increasingly used as a tool throughout the health care system. In 2011 the number of clinically available genetic tests is approaching 2,000, and wide variation exists between these tests in their sensitivity, specificity, and clinical implications, as well as the potential for discrimination based on the results. Discussion As health care systems increasingly implement electronic medical record systems (EMRs) they must carefully consider how to use information from this wide spectrum of genetic tests, with whom to share information, and how to provide decision support for clinicians to properly interpret the information. Although some characteristics of genetic tests overlap with other medical test results, there are reasons to make genetic test results widely available to health care providers and counterbalancing reasons to restrict access to these test results to honor patient preferences, and avoid distracting or confusing clinicians with irrelevant but complex information. Electronic medical records can facilitate and provide reasonable restrictions on access to genetic test results and deliver education and decision support tools to guide appropriate interpretation and use. Summary This paper will serve to review some of the key characteristics of genetic tests as they relate to design of access control and decision support of genetic test information in the EMR, emphasizing the clear need for health information technology (HIT) to be part of optimal implementation of genetic medicine, and the importance of understanding key characteristics of genetic tests when designing HIT applications. PMID:22047175

  16. Cancer control in developing countries: using health data and health services research to measure and improve access, quality and efficiency

    PubMed Central

    2010-01-01

    Background Cancer is a rapidly increasing problem in developing countries. Access, quality and efficiency of cancer services in developing countries must be understood to advance effective cancer control programs. Health services research can provide insights into these areas. Discussion This article provides an overview of oncology health services in developing countries. We use selected examples from peer-reviewed literature in health services research and relevant publicly available documents. In spite of significant limitations in the available data, it is clear there are substantial barriers to access to cancer control in developing countries. This includes prevention, early detection, diagnosis/treatment and palliation. There are also substantial limitations in the quality of cancer control and a great need to improve economic efficiency. We describe how the application of health data may assist in optimizing (1) Structure: strengthening planning, collaboration, transparency, research development, education and capacity building. (2) Process: enabling follow-up, knowledge translation, patient safety and quality assurance. (3) Outcome: facilitating evaluation, monitoring and improvement of national cancer control efforts. There is currently limited data and capacity to use this data in developing countries for these purposes. Summary There is an urgent need to improve health services for cancer control in developing countries. Current resources and much-needed investments must be optimally managed. To achieve this, we would recommend investment in four key priorities: (1) Capacity building in oncology health services research, policy and planning relevant to developing countries. (2) Development of high-quality health data sources. (3) More oncology-related economic evaluations in developing countries. (4) Exploration of high-quality models of cancer control in developing countries. Meeting these needs will require national, regional and international

  17. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    NASA Technical Reports Server (NTRS)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  18. Effective Simulation and Control Approaches for Alleviating the Access to High-Cost Manipulators

    ERIC Educational Resources Information Center

    Mihali, Raul; Sobh, Tarek

    2005-01-01

    A problem that becomes increasingly obvious over time derives from purchasing and working with large scale, industrial type of manipulators. Primarily affected are higher level educational institutions, where manipulators are likely to be exposed to student projects that demand diversity in control strategies and various controlling software and…

  19. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    ERIC Educational Resources Information Center

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  20. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    ERIC Educational Resources Information Center

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…