24 resultados para State security

em Repositório Científico do Instituto Politécnico de Lisboa - Portugal


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new circuit topology is proposed to replace the actual pulse transformer and thyratron based resonant modulator that supplies the 60 kV target potential for the ion acceleration of the On-Line Isotope Mass Separator accelerator, the stability of which is critical for the mass resolution downstream separator, at the European Organization for Nuclear Research. The improved modulator uses two solid-state switches working together, each one based on the Marx generator concept, operating as series and parallel switches, reducing the stress on the series stacked semiconductors, and also as auxiliary pulse generator in order to fulfill the target requirements. Preliminary results of a 10 kV prototype, using 1200 V insulated gate bipolar transistors and capacitors in the solid-state Marx circuits, ten stages each, with an electrical equivalent circuit of the target, are presented, demonstrating both the improved voltage stability and pulse flexibility potential wanted for this new modulator.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A newly developed solid-state repetitive high-voltage (HV) pulse modulator topology created from the mature concept of the d.c. voltage multiplier (VM) is described. The proposed circuit is based in a voltage multiplier type circuit, where a number of d.c. capacitors share a common connection with different voltage rating in each one. Hence, besides the standard VM rectifier and coupling diodes, two solid-state on/off switches are used, in each stage, to switch from the typical charging VM mode to a pulse mode with the d.c. capacitors connected in series with the load. Due to the on/off semiconductor configuration, in half-bridge structures, the maximum voltage blocked by each one is the d.c. capacitor voltage in each stage. A 2 kV prototype is described and the results are compared with PSPICE simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Resolução do Conselho de Ministros n.º 120/2008, de 30 de Julho, definiu como prioridade estratégica para o País, no sector das comunicações electrónicas, a promoção do investimento em redes de nova geração. Com o objectivo de dar execução às orientações estratégicas estabelecidas, o Decreto -Lei n.º 123/2009, de 21 de Maio, veio estabelecer um conjunto de obrigações aplicáveis ao Estado, às Regiões Autónomas, às autarquias locais, empresas públicas, concessionárias e, genericamente, às entidades que detenham infra-estruturas que se integrem em domínio público, de forma a garantir a todas empresas de comunicações electrónicas, o acesso às infra-estruturas aptas ao alojamento de redes de comunicações electrónicas. Em Portugal, o caminho a ser traçado até as redes de nova geração passa pela, abertura eficaz e não discriminatória de todas as condutas e outras infra-estruturas aptas ao alojamento de redes de comunicações electrónicas, elaboração de regras técnicas aplicáveis às infra-estruturas de telecomunicações em loteamentos, urbanizações e conjuntos de edifícios, adopção de soluções que eliminem ou atenuem as barreiras verticais à instalação de fibra óptica e que evitem a monopolização do acesso aos edifícios pelo primeiro operador. Neste âmbito, excluem-se, pela sua especial natureza e fins a que estão afectas, as redes privativas dos órgãos políticos de soberania, do Ministério da Defesa Nacional, das forças e serviços de segurança, de emergência e de protecção civil. Assim, este trabalho visa apresentar procedimentos aplicáveis às infra-estruturas de telecomunicações para elaboração de um cadastro de todas as infra-estruturas, públicas e privadas, aptas ao alojamento de redes de comunicações electrónicas, e propor instruções técnicas para as condições e direitos de acesso, construção e intervenção sobre estas infra-estruturas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The pressurization of hydraulic systems containing entrapped air is considered a critical condition for the infrastructure's security due to transient pressure variations often occurred. The objective of the present study is the computational evaluation of trends observed in variation of maximum surge pressure resulting from rapid pressurizations. The comparison of the results with those obtained in previous studies is also undertaken. A brief state of art in this domain is presented. This research work is applied to an experimental system having entrapped air in the top of a vertical pipe section. The evaluation is developed through the elastic model based on the method of characteristics, considering a moving liquid boundary, with the results being compared with those achieved with the rigid liquid column model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The pressurization of hydraulic systems containing entrapped air is considered a critical condition for the infrastructure's security due to transient pressure variations often occurred. The objective of the present study is the computational evaluation of trends observed in variation of maximum surge pressure resulting from rapid pressurizations. The comparison of the results with those obtained in previous studies is also undertaken. A brief state of art in this domain is presented. This research work is applied to an experimental system having entrapped air in the top of a vertical pipe section. The evaluation is developed through the elastic model based on the method of characteristics, considering a moving liquid boundary, with the results being compared with those achieved with the rigid liquid column model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to formulate an approximation of the US actuarial balance model and apply it to the Spanish public retirement pension system under various scenarios in order to determine a consistent indicator of the system's financial state comparable to those used by the most advanced social security systems. This will enable us to answer the question as to whether there is any justification for reforming the pension system in Spain. This type of actuarial balance uses projections to show future challenges to the financial side of the pension system deriving basically from ageing, the projected increase in longevity and fluctuations in economic activity. If one is compiled periodically it can provide various indicators to help depoliticize the management of the pay-as-you-go system by bringing the planning horizons of politicians and the system itself closer together.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the voltage droop compensation associated with long pulses generated by solid-stated based high-voltage Marx topologies. In particular a novel design scheme for voltage droop compensation in solid-state based bipolar Marx generators, using low-cost circuitry design and control, is described. The compensation consists of adding one auxiliary PWM stage to the existing Marx stages, without changing the modularity and topology of the circuit, which controls the output voltage and a LC filter that smoothes the voltage droop in both the positive and negative output pulses. Simulation results are presented for 5 stages Marx circuit using 1 kV per stage, with 1 kHz repetition rate and 10% duty cycle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to present and discuss a general HV topology of the solid-state Marx modulator, for unipolar or bipolar generation connected with a step-up transformer to increase the output voltage applied to a resistive load. Due to the use of an output transformer, discussion about the reset of the transformer is made to guarantee zero average voltage applied to the primary. It is also discussed the transformer magnetizing energy recovering back to the energy storage capacitors. Simulation results for a circuit that generates 100 kV pulses using 1000 V semiconductors are presented and discussed regarding the voltage and current stress on the semiconductors and result obtained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an algorithm to efficiently generate the state-space of systems specified using the IOPT Petri-net modeling formalism. IOPT nets are a non-autonomous Petri-net class, based on Place-Transition nets with an extended set of features designed to allow the rapid prototyping and synthesis of system controllers through an existing hardware-software co-design framework. To obtain coherent and deterministic operation, IOPT nets use a maximal-step execution semantics where, in a single execution step, all enabled transitions will fire simultaneously. This fact increases the resulting state-space complexity and can cause an arc "explosion" effect. Real-world applications, with several million states, will reach a higher order of magnitude number of arcs, leading to the need for high performance state-space generator algorithms. The proposed algorithm applies a compilation approach to read a PNML file containing one IOPT model and automatically generate an optimized C program to calculate the corresponding state-space.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The stability of the color flavor locked phase in the presence of a strong magnetic field is investigated within the phenomenological MIT bag model, taking into account the variation of the strange quark mass, the baryon density, the magnetic field, as well as the bag and gap parameters. It is found that the minimum value of the energy per baryon in a color flavor locked state at vanishing pressure is lower than the corresponding one for unpaired magnetized strange quark matter and, as the magnetic field increases, the energy per baryon decreases. This implies that magnetized colorflavor locked matter is more stable and could become the ground state inside neutron stars. The mass-radius relation for such stars is also studied.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sub-nanosecond bipolar high voltage pulses are a very important tool for food processing, medical treatment, waste water and exhaust gas processing. A Hybrid Modulator for sub-microsecond bipolar pulse generation, comprising an unipolar solid-state Marx generator connected to a load through a stack Blumlein system that produces bipolar pulses and further multiplies the pulse voltage amplitude, is presented. Experimental results from an assembled prototype show the generation of 1000 V amplitude bipolar pulses with 100 ns of pulse width and 1 kHz repetition rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dissertação de Mestrado em Engenharia de Redes de Comunicação e Multimédia

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia de Electrónica e Telecomunicações