12 resultados para Access control
em BORIS: Bern Open Repository and Information System - Berna - Suiça
Resumo:
Over the past several years, a number of design approaches in wireless mesh networks have been introduced to support the deployment of wireless mesh networks (WMNs). We introduce a novel wireless mesh architecture that supports authentication and authorisation functionalities, giving the possibility of a seamless WMN integration into the home's organization authentication and authorisation infrastructure. First, we introduce a novel authentication and authorisation mechanism for wireless mesh nodes. The mechanism is designed upon an existing federated access control approach, i.e. the AAI infrastructure that is using just the credentials at the user's home organization in a federation. Second, we demonstrate how authentication and authorisation for end users is implemented by using an existing web-based captive portal approach. Finally, we observe the difference between the two and explain in detail the process flow of authorized access to network resources in wireless mesh networks. The goal of our wireless mesh architecture is to enable easy broadband network access to researchers at remote locations, giving them additional advantage of a secure access to their measurements, irrespective of their location. It also provides an important basis for the real-life deployment of wireless mesh networks for the support of environmental research.
Resumo:
The paper presents a link layer stack for wireless sensor networks, which consists of the Burst-aware Energy-efficient Adaptive Medium access control (BEAM) and the Hop-to-Hop Reliability (H2HR) protocol. BEAM can operate with short beacons to announce data transmissions or include data within the beacons. Duty cycles can be adapted by a traffic prediction mechanism indicating pending packets destined for a node and by estimating its wake-up times. H2HR takes advantage of information provided by BEAM such as neighbour information and transmission information to perform per-hop congestion control. We justify the design decisions by measurements in a real-world wireless sensor network testbed and compare the performance with other link layer protocols.
Resumo:
In this paper we follow a theory-based approach to study the assimilation of compliance software in highly regulated multinational enterprises. These relatively new software products support the automation of controls which are associated with mandatory compliance requirements. We use institutional and success factor theories to explain the assimilation of compliance software. A framework for analyzing the assimilation of Access Control Systems (ACS), a special type of compliance software, is developed and used to reflect the experiences obtained in four in-depth case studies. One result is that coercive, mimetic, and normative pressures significantly effect ACS assimilation. On the other hand, quality aspects have only a moderate impact at the beginning of the assimilation process, in later phases the impact may increase if performance and improvement objectives become more relevant. In addition, it turns out that position of the enterprises and compatibility heavily influence the assimilation process.
Resumo:
Introduction: Video‐Supported Learning is particularly effective when it comes to skills and behaviors. Video registration of patient‐physician interviews, class room instruction or practical skills allow it to learners themselves, their peers, and their tutors to assess the quality of the learner's performance, to give specific feedback, and to make suggestions for improvement. Methods: In Switzerland, four pedagogical universities and two medical faculties joined to initiate the development of a national infrastructure for Video Supported Learning. The goal was to have a system that is simple to use, has most steps automated, provides the videos over the Internet, and has a sophisticated access control. Together with SWITCH, the national IT‐Support‐Organisation for Swiss Universities, the program iVT (Individual Video Training) was developed by integrating two preexisting technologies. The first technology is SWITCHcast, a podcast system. With SWITCHcast, videos are automatically uploaded to a server as soon as the registration is over. There the videos are processed and converted to different formats. The second technology is the national Single Logon System AAI (Authentification and Authorization Infrastructure) that enables iVT to link each video with the corresponding learner. The learner starts the registration with his Single Logon. Thus, the video can unambiguously be assigned. Via his institution's Learning Management System (LMS), the learner can access his video and give access to his video to peers and tutors. Results: iVT is now used at all involved institutions. The system works flawlessly. In Bern, we use iVT for the communications skills training in the forth and sixth year. Since students meet with patient actors alone, iVT is also used to certify attendance. Students are encouraged to watch the videos of the interview and the feedback of the patient actor. The offer to discuss a video with a tutor was not used by the students. Discussion: We plan to expand the use of iVT by making peer assessment compulsory. To support this, annotation capabilities are currently added to iVT. We also want to use iVT in training of practical skills, again for self as well as for peer assessment. At present, we use iVT for quality control of patient actor's performance.
Resumo:
Location prediction has attracted a significant amount of research effort. Being able to predict users’ movement benefits a wide range of communication systems, including location-based service/applications, mobile access control, mobile QoS provision, and resource management for mobile computation and storage management. In this demo, we present MOBaaS, which is a cloudified Mobility and Bandwidth prediction services that can be instantiated, deployed, and disposed on-demand. Mobility prediction of MOBaaS provides location predictions of a single/group user equipments (UEs) in a future moment. This information can be used for self-adaptation procedures and optimal network function configuration during run-time operations. We demonstrate an example of real-time mobility prediction service deployment running on OpenStack platform, and the potential benefits it bring to other invoking services.
Resumo:
Plasmalemmal injury is a frequent event in the life of a cell. Physical disruption of the plasma membrane is common in cells that operate under conditions of mechanical stress. The permeability barrier can also be breached by chemical means: pathogens gain access to host cells by secreting pore-forming toxins and phospholipases, and the host's own immune system employs pore-forming proteins to eliminate both pathogens and the pathogen-invaded cells. In all cases, the influx of extracellular Ca(2+) is being sensed and interpreted as an "immediate danger" signal. Various Ca(2+)-dependent mechanisms are employed to enable plasma membrane repair. Extensively damaged regions of the plasma membrane can be patched with internal membranes delivered to the cell surface by exocytosis. Nucleated cells are capable of resealing their injured plasmalemma by endocytosis of the permeabilized site. Likewise, the shedding of membrane microparticles is thought to be involved in the physical elimination of pores. Membrane blebbing is a further damage-control mechanism, which is triggered after initial attempts at plasmalemmal resealing have failed. The members of the annexin protein family are ubiquitously expressed and function as intracellular Ca(2+) sensors. Most cells contain multiple annexins, which interact with distinct plasma membrane regions promoting membrane segregation, membrane fusion and--in combination with their individual Ca(2+)-sensitivity--allow spatially confined, graded responses to membrane injury.
Resumo:
PURPOSE: This study aimed to evaluate the safety and patency rate of bovine mesenterial vein grafts (BMVG) for vascular access (VA) in hemodialysis patients (HDP), compared to expanded polytetrafluorethylene (ePTFE grafts) over a mid- to long-term period. METHODS: Patency and complication rate of 23 consecutive HDP with BMVG for VA were compared to a control group consisting of 23 similar HDP with ePTFE grafts. In both groups, the graft was placed preferably in a forearm loop configuration. The same surgeon performed all procedures. All patients were followed over a period of 4 yrs. RESULTS: Graft placement was successful in all patients. Patency rates did not differ significantly in both groups. However, there were less severe complications in the BMVG group. CONCLUSION: The BMVG is a viable alternative for HD access in patients where autologous construction is not possible, and should be given priority in patients with a failed ePTFE graft or high risk for infection.
Resumo:
Before entering the central nervous system (CNS) immune cells have to penetrate any one of its barriers, namely either the endothelial blood-brain barrier, the epithelial blood-cerebrospinal fluid barrier or the tanycytic barrier around the circumventricular organs, all of which maintain homeostasis within the CNS. The presence of these barriers in combination with the lack of lymphatic vessels and the absence of classical MHC-positive antigen presenting cells characterizes the CNS as an immunologically privileged site. In multiple sclerosis a large number of inflammatory cells gains access to the CNS parenchyma. Studies performed in experimental autoimmune encephalomyelitis (EAE), a rodent model for multiple sclerosis, have enabled us to understand some of the molecular mechanisms involved in immune cell entry into the CNS. In particular, the realization that /alpha4-integrins play a predominant role in leukocyte trafficking to the CNS has led to the development of a novel drug for the treatment of relapsing-remitting multiple sclerosis, which targets /alpha4-integrin mediated immune cell migration to the CNS. At the same time, the involvement of other adhesion and signalling molecules in this process remains to be investigated and novel molecules contributing to immune cell entry into the CNS are still being identified. The entire process of immune cell trafficking into the CNS is strictly controlled by the brain barriers not only under physiological conditions but also during neuroinflammation, when some barrier properties are lost. Thus, immune cell entry into the CNS critically depends on the unique characteristics of the brain barriers maintaining CNS homeostasis.
Resumo:
The paper seeks a re-conceptualization of the global digital divide debate. It critically explores the predominant notion, its evolution and measurement, as well as the policies that have been advanced to bridge the digital divide. Acknowledging the complexity of this inequality, the paper aims at analyzing the disparities beyond the connectivity and the skills barriers. Without understating the first two digital divides, it is argued that as the Internet becomes more sophisticated and more integrated into economic, social and cultural processes, a ‘third’ generation of divides becomes critical. These divides are drawn not at the entry to the net but within the net itself, and limit access to content. The increasing barriers to content, although of diverse nature, all relate to some governance characteristics inherent in cyberspace, such as global spillover of local decisions, regulation through code or proliferation of self- and co-regulatory models. It is maintained that as the practice of intervention intensifies in cyberspace, multiple and far-reaching points of control outside formal legal institutions are created, which threaten the availability of public goods and make the pursuit of public objectives difficult. This is an aspect that is rarely addressed in the global digital divide discussions, even in comprehensive analysis and political initiatives such as the World Summit on the Information Society. Yet, the conceptualization of the digital divide as impeded access to content may be key in terms of ensuring real participation and catering for the long-term implications of digital technologies.
Resumo:
This paper addresses the novel notion of offering a radio access network as a service. Its components may be instantiated on general purpose platforms with pooled resources (both radio and hardware ones) dimensioned on-demand, elastically and following the pay-per-use principle. A novel architecture is proposed that supports this concept. The architecture's success is in its modularity, well-defined functional elements and clean separation between operational and control functions. By moving much processing traditionally located in hardware for computation in the cloud, it allows the optimisation of hardware utilization and reduction of deployment and operation costs. It enables operators to upgrade their network as well as quickly deploy and adapt resources to demand. Also, new players may easily enter the market, permitting a virtual network operator to provide connectivity to its users.
Resumo:
Abstract. During the last decade mobile communications increasingly became part of people's daily routine. Such usage raises new challenges regarding devices' battery lifetime management when using most popular wireless access technologies, such as IEEE 802.11. This paper investigates the energy/delay trade-off of using an end-user driven power saving approach, when compared with the standard IEEE 802.11 power saving algorithms. The assessment was conducted in a real testbed using an Android mobile phone and high-precision energy measurement hardware. The results show clear energy benefits of employing user-driven power saving techniques, when compared with other standard approaches.