865 resultados para Privacy Based Access Control


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation proposed a self-organizing medium access control protocol (MAC) for wireless sensor networks (WSNs). The proposed MAC protocol, space division multiple access (SDMA), relies on sensor node position information and provides sensor nodes access to the wireless channel based on their spatial locations. SDMA divides a geographical area into space divisions, where there is one-to-one map between the space divisions and the time slots. Therefore, the MAC protocol requirement is the sensor node information of its position and a prior knowledge of the one-to-one mapping function. The scheme is scalable, self-maintaining, and self-starting. It provides collision-free access to the wireless channel for the sensor nodes thereby, guarantees delay-bounded communication in real time for delay sensitive applications. This work was divided into two parts: the first part involved the design of the mapping function to map the space divisions to the time slots. The mapping function is based on a uniform Latin square. A Uniform Latin square of order k = m 2 is an k x k square matrix that consists of k symbols from 0 to k-1 such that no symbol appears more than once in any row, in any column, or in any m x in area of main subsquares. The uniqueness of each symbol in the main subsquares presents very attractive characteristic in applying a uniform Latin square to time slot allocation problem in WSNs. The second part of this research involved designing a GPS free positioning system for position information. The system is called time and power based localization scheme (TPLS). TPLS is based on time difference of arrival (TDoA) and received signal strength (RSS) using radio frequency and ultrasonic signals to measure and detect the range differences from a sensor node to three anchor nodes. TPLS requires low computation overhead and no time synchronization, as the location estimation algorithm involved only a simple algebraic operation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Virtual machines (VMs) are powerful platforms for building agile datacenters and emerging cloud systems. However, resource management for a VM-based system is still a challenging task. First, the complexity of application workloads as well as the interference among competing workloads makes it difficult to understand their VMs’ resource demands for meeting their Quality of Service (QoS) targets; Second, the dynamics in the applications and system makes it also difficult to maintain the desired QoS target while the environment changes; Third, the transparency of virtualization presents a hurdle for guest-layer application and host-layer VM scheduler to cooperate and improve application QoS and system efficiency. This dissertation proposes to address the above challenges through fuzzy modeling and control theory based VM resource management. First, a fuzzy-logic-based nonlinear modeling approach is proposed to accurately capture a VM’s complex demands of multiple types of resources automatically online based on the observed workload and resource usages. Second, to enable fast adaption for resource management, the fuzzy modeling approach is integrated with a predictive-control-based controller to form a new Fuzzy Modeling Predictive Control (FMPC) approach which can quickly track the applications’ QoS targets and optimize the resource allocations under dynamic changes in the system. Finally, to address the limitations of black-box-based resource management solutions, a cross-layer optimization approach is proposed to enable cooperation between a VM’s host and guest layers and further improve the application QoS and resource usage efficiency. The above proposed approaches are prototyped and evaluated on a Xen-based virtualized system and evaluated with representative benchmarks including TPC-H, RUBiS, and TerraFly. The results demonstrate that the fuzzy-modeling-based approach improves the accuracy in resource prediction by up to 31.4% compared to conventional regression approaches. The FMPC approach substantially outperforms the traditional linear-model-based predictive control approach in meeting application QoS targets for an oversubscribed system. It is able to manage dynamic VM resource allocations and migrations for over 100 concurrent VMs across multiple hosts with good efficiency. Finally, the cross-layer optimization approach further improves the performance of a virtualized application by up to 40% when the resources are contended by dynamic workloads.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-08

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public agencies are increasingly required to collaborate with each other in order to provide high-quality e-government services. This collaboration is usually based on the service-oriented approach and supported by interoperability platforms. Such platforms are specialized middleware-based infrastructures enabling the provision, discovery and invocation of interoperable software services. In turn, given that personal data handled by governments are often very sensitive, most governments have developed some sort of legislation focusing on data protection. This paper proposes solutions for monitoring and enforcing data protection laws within an E-government Interoperability Platform. In particular, the proposal addresses requirements posed by the Uruguayan Data Protection Law and the Uruguayan E-government Platform, although it can also be applied in similar scenarios. The solutions are based on well-known integration mechanisms (e.g. Enterprise Service Bus) as well as recognized security standards (e.g. eXtensible Access Control Markup Language) and were completely prototyped leveraging the SwitchYard ESB product.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis reports on an investigation of the feasibility and usefulness of incorporating dynamic management facilities for managing sensed context data in a distributed contextaware mobile application. The investigation focuses on reducing the work required to integrate new sensed context streams in an existing context aware architecture. Current architectures require integration work for new streams and new contexts that are encountered. This means of operation is acceptable for current fixed architectures. However, as systems become more mobile the number of discoverable streams increases. Without the ability to discover and use these new streams the functionality of any given device will be limited to the streams that it knows how to decode. The integration of new streams requires that the sensed context data be understood by the current application. If the new source provides data of a type that an application currently requires then the new source should be connected to the application without any prior knowledge of the new source. If the type is similar and can be converted then this stream too should be appropriated by the application. Such applications are based on portable devices (phones, PDAs) for semi-autonomous services that use data from sensors connected to the devices, plus data exchanged with other such devices and remote servers. Such applications must handle input from a variety of sensors, refining the data locally and managing its communication from the device in volatile and unpredictable network conditions. The choice to focus on locally connected sensory input allows for the introduction of privacy and access controls. This local control can determine how the information is communicated to others. This investigation focuses on the evaluation of three approaches to sensor data management. The first system is characterised by its static management based on the pre-pended metadata. This was the reference system. Developed for a mobile system, the data was processed based on the attached metadata. The code that performed the processing was static. The second system was developed to move away from the static processing and introduce a greater freedom of handling for the data stream, this resulted in a heavy weight approach. The approach focused on pushing the processing of the data into a number of networked nodes rather than the monolithic design of the previous system. By creating a separate communication channel for the metadata it is possible to be more flexible with the amount and type of data transmitted. The final system pulled the benefits of the other systems together. By providing a small management class that would load a separate handler based on the incoming data, Dynamism was maximised whilst maintaining ease of code understanding. The three systems were then compared to highlight their ability to dynamically manage new sensed context. The evaluation took two approaches, the first is a quantitative analysis of the code to understand the complexity of the relative three systems. This was done by evaluating what changes to the system were involved for the new context. The second approach takes a qualitative view of the work required by the software engineer to reconfigure the systems to provide support for a new data stream. The evaluation highlights the various scenarios in which the three systems are most suited. There is always a trade-o↵ in the development of a system. The three approaches highlight this fact. The creation of a statically bound system can be quick to develop but may need to be completely re-written if the requirements move too far. Alternatively a highly dynamic system may be able to cope with new requirements but the developer time to create such a system may be greater than the creation of several simpler systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Database schemas, in many organizations, are considered one of the critical assets to be protected. From database schemas, it is not only possible to infer the information being collected but also the way organizations manage their businesses and/or activities. One of the ways to disclose database schemas is through the Create, Read, Update and Delete (CRUD) expressions. In fact, their use can follow strict security rules or be unregulated by malicious users. In the first case, users are required to master database schemas. This can be critical when applications that access the database directly, which we call database interface applications (DIA), are developed by third party organizations via outsourcing. In the second case, users can disclose partially or totally database schemas following malicious algorithms based on CRUD expressions. To overcome this vulnerability, we propose a new technique where CRUD expressions cannot be directly manipulated by DIAs any more. Whenever a DIA starts-up, the associated database server generates a random codified token for each CRUD expression and sends it to the DIA that the database servers can use to execute the correspondent CRUD expression. In order to validate our proposal, we present a conceptual architectural model and a proof of concept.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Call Level Interfaces (CLI) are low level API that play a key role in database applications whenever a fine tune control between application tiers and the host databases is a key requirement. Unfortunately, in spite of this significant advantage, CLI were not designed to address organizational requirements and contextual runtime requirements. Among the examples we emphasize the need to decouple or not to decouple the development process of business tiers from the development process of application tiers and also the need to automatically adapt to new business and/or security needs at runtime. To tackle these CLI drawbacks, and simultaneously keep their advantages, this paper proposes an architecture relying on CLI from which multi-purpose business tiers components are built, herein referred to as Adaptable Business Tier Components (ABTC). This paper presents the reference architecture for those components and a proof of concept based on Java and Java Database Connectivity (an example of CLI).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In next generation Internet-of-Things, the overhead introduced by grant-based multiple access protocols may engulf the access network as a consequence of the proliferation of connected devices. Grant-free access protocols are therefore gaining an increasing interest to support massive multiple access. In addition to scalability requirements, new demands have emerged for massive multiple access, including latency and reliability. The challenges envisaged for future wireless communication networks, particularly in the context of massive access, include: i) a very large population size of low power devices transmitting short packets; ii) an ever-increasing scalability requirement; iii) a mild fixed maximum latency requirement; iv) a non-trivial requirement on reliability. To this aim, we suggest the joint utilization of grant-free access protocols, massive MIMO at the base station side, framed schemes to let the contention start and end within a frame, and succesive interference cancellation techniques at the base station side. In essence, this approach is encapsulated in the concept of coded random access with massive MIMO processing. These schemes can be explored from various angles, spanning the protocol stack from the physical (PHY) to the medium access control (MAC) layer. In this thesis, we delve into both of these layers, examining topics ranging from symbol-level signal processing to succesive interference cancellation-based scheduling strategies. In parallel with proposing new schemes, our work includes a theoretical analysis aimed at providing valuable system design guidelines. As a main theoretical outcome, we propose a novel joint PHY and MAC layer design based on density evolution on sparse graphs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: Restriction fragment length polymorphism (RFLP) is a common molecular assay used for genotyping, and it requires validated quality control procedures to prevent mistyping caused by impaired endonuclease activity. We have evaluated the usefulness of a plasmid-based internal control in RFLP assays. Results: Blood samples were collected from 102 individuals with acute myocardial infarction (AMI) and 108 non-AMI individuals (controls) for DNA extraction and laboratory analyses. The 1196C> T polymorphism in the toll-like receptor 4 (TLR4) gene was amplified by mismatched-polymerase chain reaction (PCR). Amplicons and pBluescript II SK-plasmid were simultaneously digested with endonuclease HincII. Fragments were separated on 2% agarose gels. Plasmid was completely digested using up to 55.2 nmL/L DNA solutions and 1 mu L PCR product. Nevertheless, plasmid DNA with 41.4 nM or higher concentrations was incompletely digested in the presence of 7 mL PCR product. In standardized conditions, TLR4 1196C> T variant was accurately genotyped. TLR4 1196T allele frequency was similar between AMI (3.1%) and controls (2.0%, p = 0.948). TLR4 SNP was not associated with AMI in this sample population. In conclusion, the plasmid-based control is a useful approach to prevent mistyping in RFLP assays, and it is validate for genetic association studies such as TLR4 1196C> T.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objectives-To estimate the relative risk of coronary heart disease (CHD) associated with exposure to environmental tobacco smoke (ETS). Design-Population-based case-control study. Subjects-Cases were 953 people identified in a population register of coronary events, and controls were 3189 participants in independent community-based risk factor prevalence surveys from the same study populations. Setting-Newcastle, Australia and Auckland, New Zealand. Main outcome measures-Acute myocardial infarction or coronary death. Results-After adjusting for the effects of age, education, history of heart disease, and body mass index, women had a statistically significant increased risk of a coronary event associated with exposure to ETS (relative risk (RR) = 1.99; 95% confidence interval (CI)= 1.40-2.81). There was little statistical evidence of increased risk found in men (RR = 1.02, 95% CI = 0.81-1.28). Conclusion-Our study found evidence for the adverse effects of exposure to ETS on risk of coronary heart disease among women, especially at home. For men the issue is unclear according to the data from our study. Additional studies with detailed information on possible confounders and adequate statistical power are needed. Most importantly, they should use methods for measuring exposure to ETS that are sufficiently accurate to permit the investigation of dose-response relationships.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background: UV radiation is the major environmental factor related to development of cutaneous melanoma. Besides sun exposure and the influence of latitude, some host characteristics such as skin phototype and hair and eye color are also risk factors for melanoma. Polymorphisms in DNA repair genes could be good candidates for susceptibility genes, mainly in geographical regions exposed to high solar radiation. Objective: Evaluate the role of host characteristic.; and DNA repair polymorphism in melanoma risk in Brazil. Methods: We carried out a hospital-based case-control study in Brazil to evaluate the contribution of host factors and polymorphisms in DNA repair to melanoma risk. A total of 412 patients (202 with melanoma and 210 controls) were analyzed regarding host characteristics for melanoma risk as well as for 11 polymorphisms in DNA repair genes. Results: We found an association of host characteristics with melanoma development, such as eye and hair color, fair skin, history of pigmented lesions removed, sunburns in childhood and adolescence, and also European ancestry. Regarding DNA repair gene polymorphisms, we found protection for the XPG 1104 His/His genotype (OR 0.32; 95% CI 0.13-0.75), and increased risk for three polymorphisms in the XPC gene (PAT+; IV-6A and 939Gln), which represent a haplotype for XPC. Melanoma risk was higher in individuals carrying the complete XPC haplotype than each individual polymorphism (OR 3.64; 95% CI 1.77-7.48). Conclusions: Our data indicate that the host factors European ancestry and XPC polymorphisms contributed to melanoma risk in a region exposed to high sun radiation. (C) 2011 Japanese Society for Investigative Dermatology. Published by Elsevier Ireland Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Although increased body mass is an established risk factor for a variety of cancers, its relation with cancer of the ovary is unclear. We therefore investigated the association between measures of body mass index (BMI) and ovarian cancer risk. Methods: Data from an Australian case-control study of 775 ovarian cancer cases and 846 controls were used to examine the association with BMI. We have also summarized the results from a number of other studies that have examined this association. Results: There was a significant increased risk of ovarian cancer with increasing BMI, with women in the top 15% of the BMI range having an odds ratio (OR) of 1.9 (95% confidence interval (CI), 1.3-2.6) compared with those in the middle 30%. Stratifying by physical activity showed a stronger effect among inactive women (OR = 3.0, 95% CI 1.3-6.9). The overall effect was consistent with the findings of most prior population-based case-control studies, while cohort studies reported positive effects closer to the null. Hospital-based studies gave variable results. Conclusions: Taken together, the evidence is in favor of a small to moderate positive relation between high BMI and occurrence of ovarian cancer.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The incidence of melanoma increases markedly in the second decade of life but almost nothing is known of the causes of melanoma in this age group. We report on the first population-based case-control study of risk factors for melanoma in adolescents (15-19 years). Data were collected through personal interviews with cases, controls and parents. A single examiner conducted full-body nevus counts and blood samples were collected from cases for analysis of the CDKN2A melanoma predisposition gene. A total of 201 (80%) of the 250 adolescents with melanoma diagnosed between 1987 and 1994 and registered with the Queensland Cancer Registry and 205 (79%) of 258 age-, gender- and location-matched controls who were contacted agreed to participate. The strongest risk factor associated with melanoma in adolescents in a multivariate model was the presence of more than 100 nevi 2 mm or more in diameter (odds ratio [OR] = 46.5, 95% confidence interval [Cl] = 11.4-190.8). Other risk factors were red hair (OR = 5.4, 95%Cl = 1.0-28.4); blue eyes (OR = 4.5, 95%Cl = 1.5- 13.6); inability to tan after prolonged sun exposure (OR = 4.7, 95%Cl = 0.9-24.6); heavy facial freckling (OR = 3.2, 95% Cl = 0.9-12.3); and family history of melanoma (OR = 4.0, 95%Cl = 0.8-18.9). Only 2 of 147 cases tested had germline variants or mutations in CDKN2A. There was no association with sunscreen use overall, however, never/rare use of sunscreen at home under the age of 5 years was associated with increased risk (OR = 2.2, 95%Cl = 0.7-7.1). There was no difference between cases and controls in cumulative sun exposure in this high-exposure environment. Factors indicating genetic susceptibility to melanoma, in particular, the propensity to develop nevi and freckles, red hair, blue eyes, inability to tan and a family history of the disease are the primary determinants of melanoma among adolescents in this high solar radiation environment. Lack of association with reported sun exposure is consistent with the high genetic susceptibility in this group. (C) 2002 Wiley-Liss, Inc.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mestrado em Engenharia Electrotécnica e de Computadores