4 resultados para role based access control
em DRUM (Digital Repository at the University of Maryland)
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
Resumo:
In this work a system of autonomous agents engaged in cyclic pursuit (under constant bearing (CB) strategy) is considered, for which one informed agent (the leader) also senses and responds to a stationary beacon. Building on the framework proposed in a previous work on beacon-referenced cyclic pursuit, necessary and suffi- cient conditions for the existence of circling equilibria in a system with one informed agent are derived, with discussion of stability and performance. In a physical testbed, the leader (robot) is equipped with a sound sensing apparatus composed of a real time embedded system, estimating direction of arrival of sound by an Interaural Level and Phase Difference Algorithm, using empirically determined phase and level signatures, and breaking front-back ambiguity with appropriate sensor placement. Furthermore a simple framework for implementing and evaluating the performance of control laws with the Robot Operating System (ROS) is proposed, demonstrated, and discussed.
Resumo:
ABSTRACT Title of Document: AN ANALYSIS OF THE IMPLEMENTATION AND PERCEIVED EFFECTIVENESS OF THE SCHOOLMAX FAMILY PORTAL Warren Wesley Watts, Doctor of Education, 2015 Directed By: Margaret J. McLaughlin, Ph.D. Department of Counseling, Higher Education and Special Education School districts have spent millions of dollars implementing student information systems that offer family portals with web-based access to parents and students. One of the main purposes of these systems is to improve school-to-home communication. Research has shown that when school-to-home communication is implemented effectively, parent involvement improves and student achievement increases (Epstein, 2001). The purpose of the study was to (a) understand why parents used or refrained from using the family portal and (b) determine what barriers to use might exist. To this end, this descriptive study identified the information parent users accessed in the SchoolMAX family portal, determined how frequently parents accessed the portal, and ascertained whether parents perceived an increase in communication with their children about academic matters after they began accessing the portal. Finally, the study sought to identify whether barriers existed that prevented parents from using the family portal. The inquiry employed three data sources to answer the aforementioned queries. These sources included (a) a survey sent electronically to 19,108 parents who registered online for the SchoolMAX family portal; (b) SchoolMAX portal usage data from the student information system for system usage between January 1, 2015 and June 30, 2015; and (c) a paper survey sent to 691 parents of students that had never used the SchoolMAX family portal in one elementary school, one middle school and one high school that were representative of other schools in the district. Survey results indicated that parents at all grade levels used the family portal. Usage data also confirmed that approximately 19% of the students had parents who monitored their progress through the family portal. Usage data also showed that parents were monitoring approximately 25% of students in secondary schools (6th – 12th grade) and 16% of students in elementary schools. Of the wide menu of resources available through the SchoolMAX family portal, parents used three areas most frequently: attendance, daily grades, and report cards. Approximately 70% of parents responded that their communication had improved with their children about academic matters since they started using the SchoolMAX family portal, and 90% of parents responded that the SchoolMAX family portal was an effective or somewhat effective tool. Parents also expressed interest in the addition of additional information to the SchoolMAX family portal. Specifically, the top three additions parents wanted to see included homework assignments, high stakes test scores, and graduation requirements. Parents also reported that 92% of them spoke to their children at least 2 to 3 times per week about academics. Due to the low response rate of the parent non-user survey, potential barriers to using the SchoolMAX family portal could not be addressed in this study. However, this issue may be a useful research topic in a future study. Keywords: school to home communication, student information systems, family portal, parent portal
Resumo:
Manipulation of single cells and particles is important to biology and nanotechnology. Our electrokinetic (EK) tweezers manipulate objects in simple microfluidic devices using gentle fluid and electric forces under vision-based feedback control. In this dissertation, I detail a user-friendly implementation of EK tweezers that allows users to select, position, and assemble cells and nanoparticles. This EK system was used to measure attachment forces between living breast cancer cells, trap single quantum dots with 45 nm accuracy, build nanophotonic circuits, and scan optical properties of nanowires. With a novel multi-layer microfluidic device, EK was also used to guide single microspheres along complex 3D trajectories. The schemes, software, and methods developed here can be used in many settings to precisely manipulate most visible objects, assemble objects into useful structures, and improve the function of lab-on-a-chip microfluidic systems.