832 resultados para role-based access control
Resumo:
In this paper we follow a theory-based approach to study the assimilation of compliance software in highly regulated multinational enterprises. These relatively new software products support the automation of controls which are associated with mandatory compliance requirements. We use institutional and success factor theories to explain the assimilation of compliance software. A framework for analyzing the assimilation of Access Control Systems (ACS), a special type of compliance software, is developed and used to reflect the experiences obtained in four in-depth case studies. One result is that coercive, mimetic, and normative pressures significantly effect ACS assimilation. On the other hand, quality aspects have only a moderate impact at the beginning of the assimilation process, in later phases the impact may increase if performance and improvement objectives become more relevant. In addition, it turns out that position of the enterprises and compatibility heavily influence the assimilation process.
Resumo:
BACKGROUND A number of epidemiological studies indicate an inverse association between atopy and brain tumors in adults, particularly gliomas. We investigated the association between atopic disorders and intracranial brain tumors in children and adolescents, using international collaborative CEFALO data. PATIENTS AND METHODS CEFALO is a population-based case-control study conducted in Denmark, Norway, Sweden, and Switzerland, including all children and adolescents in the age range 7-19 years diagnosed with a primary brain tumor between 2004 and 2008. Two controls per case were randomly selected from population registers matched on age, sex, and geographic region. Information about atopic conditions and potential confounders was collected through personal interviews. RESULTS In total, 352 cases (83%) and 646 controls (71%) participated in the study. For all brain tumors combined, there was no association between ever having had an atopic disorder and brain tumor risk [odds ratio 1.03; 95% confidence interval (CI) 0.70-1.34]. The OR was 0.76 (95% CI 0.53-1.11) for a current atopic condition (in the year before diagnosis) and 1.22 (95% CI 0.86-1.74) for an atopic condition in the past. Similar results were observed for glioma. CONCLUSIONS There was no association between atopic conditions and risk of all brain tumors combined or of glioma in particular. Stratification on current or past atopic conditions suggested the possibility of reverse causality, but may also the result of random variation because of small numbers in subgroups. In addition, an ongoing tumor treatment may affect the manifestation of atopic conditions, which could possibly affect recall when reporting about a history of atopic diseases. Only a few studies on atopic conditions and pediatric brain tumors are currently available, and the evidence is conflicting.
Resumo:
Objective. The aim of this study was to assess the independent risk of hepatitis C virus (HCV) infection in the development of hepatocellular carcinoma (HCC). The independent risk of hepatitis B virus (HBV), its interaction with hepatitis C virus and the association with other risk factors were examined.^ Methods. A hospital-based case-control study was conducted between January 1994 and December 1995. We enrolled 115 pathologically confirmed HCC patients and 230 nonliver cancer controls, who were matched by age ($\pm$5 years), gender, and year of diagnosis. Both cases and controls were recruited from The University of Texas M. D. Anderson Cancer Center at Houston. The risk factors were collected through personal interviews and blood samples were tested for HCV and HBV markers. Univariate and multivariate analyses were performed through conditional logistic regression.^ The prevalence of anti-HCV positive is 25.2% in HCC cases compared to 3.0% in controls. The univariate analysis showed that anti-HCV, HBsAg, alcohol drinking and cigarette smoking were significantly associated with HCC, however, family history of cancer, occupational chemical exposure, and use of oral contraceptive were not. Multivariate analysis revealed a matched odds ratio (OR) of 10.1 (95% CI 3.7-27.4) for anti-HCV, and an OR of 11.9 (95% CI 2.5-57.5) for HBsAg. However, dual infection of HCV and HBV had only a thirteen times increase in the risk of HCC, OR = 13.9 (95% CI 1.3-150.6). The estimated population attributable risk percent was 23.4% for HCV, 12.6% for HBV, and 5.3% for both viruses. Ever alcohol drinkers was positively associated with HCC, especially among daily drinkers, matched OR was 5.7 (95% CI 2.1-15.6). However, there was no significant increase in the risk of HCC among smokers as compared to nonsmokers. The mean age of HCC patients was significantly younger among the HBV(+) group and among the HCV(+)/HBV(+) group, when compared to the group of HCC patients with no viral markers. The association between past histories of blood transfusion, acupuncture, tattoo and IVDU was highly significant among the HCV(+) group and the HBV(+)/HCV(+) group, as compared to HCC patients with no viral markers. Forty percent of the HCC patients were pathologically or clinically diagnosed with liver cirrhosis. Anti-HCV(+) (OR = 3.6 95% CI 1.5-8.9) and alcohol drinking (OR = 2.7 95% CI 1.1-6.7), but not HBsAg, are the major risk factors for liver cirrhosis in HCC patients.^ Conclusion. Both hepatitis B virus and hepatitis C virus were independent risk factors for HCC. There was not enough evidence to determine the interaction between both viruses. Only daily alcoholic drinkers showed increasing risk for HCC development, as compared to nondrinkers. ^
Resumo:
Listeria monocytogenes is a Gram-positive facultative intracellular bacteria which infects a wide range of hosts. In ruminants, infection with L. monocytogenes frequently causes encephalitis, which is usually fatal in sheep and goat, while cattle often recover with antibiotic therapy. Since the role of NO in the control of Listeria is controversial, we have studied the expression of iNOS in the brains of cattle, sheep and goats which had succumbed to listeria encephalitis. iNOS was demonstrated in decreasing intensity in the M phi of microabscesses from cattle, sheep and goat. iNOS expression was accompanied by NT in the microabscesses of cattle, but was only present to a low degree in sheep and was absent in goats. This is indirect evidence for differences in the ability to produce NO in the three species. Presence of iNOS and NT were inversely correlated with the numbers of bacteria. While microabscesses of goats contained high amounts of L. monocytogenes they occurred only rarely in cattle. To corroborate our hypothesis that NO is involved in the control of listeria encephalitis a new animal model was developed. Eleven day old infant rats were infected intracisternally with a low dose of L. monocytogenes. This resulted in a transient meningoencephalitis with moderate clinical signs and low mortality. Listeria proliferated strongly in the inflammatory lesions during the first days of infection, reached a peak at day 4 and were eliminated until day 7. The presence of bacteria was closely accompanied by high numbers of iNOS-expressing M phi and the formation of NT. Administration of the iNOS inhibitor L-NIL or the radical scavenger PBN resulted in rapid death of the treated animals. However, the increase in bacterial numbers was one order of magnitude higher for animals treated with PBN compared with L-NIL administration. This shows that NO plays an important role in the control of a brain infection with Listeria, but suggests that reactive oxidants other than NO are also involved. In conclusion, our findings point to a possible involvement of the differences in the ability to express iNOS and subsequent NO production in the different clinical outcome of listeria encephalitis in cattle and small ruminants.
Resumo:
Disruption of function of left, but not right, lateral prefrontal cortex (LPFC) with low-frequency repetitive transcranial magnetic stimulation (rTMS) increased choices of immediate rewards over larger delayed rewards. rTMS did not change choices involving only delayed rewards or valuation judgments of immediate and delayed rewards, providing causal evidence for a neural lateral-prefrontal cortex-based self-control mechanism in intertemporal choice.
Resumo:
Location prediction has attracted a significant amount of research effort. Being able to predict users’ movement benefits a wide range of communication systems, including location-based service/applications, mobile access control, mobile QoS provision, and resource management for mobile computation and storage management. In this demo, we present MOBaaS, which is a cloudified Mobility and Bandwidth prediction services that can be instantiated, deployed, and disposed on-demand. Mobility prediction of MOBaaS provides location predictions of a single/group user equipments (UEs) in a future moment. This information can be used for self-adaptation procedures and optimal network function configuration during run-time operations. We demonstrate an example of real-time mobility prediction service deployment running on OpenStack platform, and the potential benefits it bring to other invoking services.
Resumo:
Background. The population-based Houston Tuberculosis Initiative (HTI) study has enrolled and gathered demographic, social, behavioral, and disease related data on more than 80% of all reported Mycobacterium Tuberculosis (MTB) cases and 90% of all culture positive patients in Houston/Harris County over a 9 year period (from October 1995-September 2004). During this time period 33% (n=1210) of HTI MTB cases have reported a history of drug use. Of those MTB cases reporting a history of drug use, a majority of them (73.6%), are non-injection drug users (NIDUs). ^ Other than HIV, drug use is the single most important risk factor for progression from latent to infectious tuberculosis (TB). In addition, drug use is associated with increased transmission of active TB, as seen by the increased number of clonally related strains or clusters (see definition on page 30) found in this population. The deregulatory effects of drug use on immune function are well documented. Associations between drug use and increased morbidity have been reported since the late 1970's. However, limited research focused on the immunological consequence of non-injection drug use and its relation to tuberculosis infection among TB patients is available. ^ Methods. TB transmission patterns, symptoms, and prevalence of co-morbidities were a focus of this project. Smoking is known to suppress Nitric Oxide (NO) production and interfere with immune function. In order to limit any possible confounding due to smoking two separate analyses were done. Non-injection drug user smokers (NIDU-S) were compared to non-drug user smokers (NDU-S) and non-injection drug user non-smokers (NIDU-NS) were compared to non-drug user non-smokers (NDU-NS) individually. Specifically proportions, chi-square p-values, and (where appropriate) odds ratios with 95% confidence intervals were calculated to assess characteristics and potential associations of co-morbidities and symptoms of TB among NIDUs HTI TB cases. ^ Results. Significant differences in demographic characteristics and risk factors were found. In addition drug users were found to have a decreased risk for cancer, diabetes mellitus, and chronic pulmonary disease. They were at increased risk of having HIV/AIDS diagnosis, liver disease, and trauma related morbidities. Drug users were more likely to have pulmonary TB disease, and a significantly increased amount of clonally related strains of TB or "clusters" were seen in both smokers and non-smoker drug users when compared to their non-drug user counterparts. Drug users are more likely to belong to print groups (clonally related TB strains with matching spoligotypes) including print one and print three and the Beijing family group, s1. Drug users were found to be no more likely to experience drug resistance to TB therapy and were likely to be cured of disease upon completion of therapy. ^ Conclusion. Drug users demographic and behavioral risk factors put them at an increased risk contracting and spreading TB disease throughout the community. Their increased levels of clustering are evidence of recent transmission and the significance of certain print groups among this population indicate the transmission is from within the social family. For these reasons a focus on this "at risk population" is critical to the success of future public health interventions. Successful completion of directly observed therapy (DOT), the tracking of TB outbreaks and incidence through molecular characterization, and increased diagnostic strategies have led to the stabilization of TB incidence in Houston, Harris County over the past 9 years and proven that the Houston Tuberculosis Initiative has played a critical role in the control and prevention of TB transmission. ^
Resumo:
Background. In the United States, the incidence of pancreatic cancer has increased; more than 37,000 new cases of pancreatic cancer were diagnosed in the year 2007. Overall, the five-year survival rate is about 5% and pancreatic cancer ranks the fourth leading cause of cancer-related mortality among men and women. Despite the observed progress in cancer diagnosis and treatment, pancreatic cancer remains an unresolved significant public health problem in the United States. Familial pancreatic cancer has been confirmed to be responsible for approximately 10% of pancreatic cancer cases. However, 90% are still without known inherited predisposition. Until now, the role of oral contraceptive pills (OCPs) and hormonal replacement therapy (HRT) among women with pancreatic cancer remain unclear. We examined the association of exogenous hormonal uses in US women with risk of pancreatic cancer. ^ Methods. This was an active hospital-based case-control study which is conducted at the department of gastrointestinal medical oncology in The University of Texas M.D. Anderson Cancer Center. Between January 2005 and December 2007, a total of 287 women with pathologically confirmed pancreatic cancer (cases) and 287 healthy women (controls) were included in this investigation. Both cases and controls were frequency matched by age and race. Information about the use of hormonal contraceptives and hormonal replacement therapy (HRT) preparations as well as information about several risk factors of pancreatic cancer were collected by personal interview. Univariate and multivariate analyses were performed in this study to analyze the data. ^ Results. We found a statistical significant protective effect for use of exogenous hormone preparations on pancreatic cancer development (adjusted odds ratio [AOR], 0.4; 95% confidence interval [CI], 0.2–0.8). In addition, a 40% reduction in pancreatic cancer risk was observed among women who ever used any of the contraceptive methods including oral contraceptive pills (AOR, 6; 95% CI, 0.4–0.9). ^ Conclusions. Consistent with previous studies, the use of exogenous hormone preparations including oral contraceptive pills may confers a protective effect for pancreatic cancer development. More studies are warranted to explore for the underlying mechanism of such protection.^
Resumo:
Background. Primary liver cancer, the majority of which is hepatocellular carcinoma, is the third most common cause of mortality from cancer. It has one of the worst prognosis outcomes and an overall 5-year survival of only 5-6%. Hepatocellular carcinoma has been shown to have wide variations in geographic distribution and there is a marked difference in the incidence between different races and gender. Previously low-rate countries, including the US, have shown to have doubled the incidence of HCC during the past two decades. Even though the incidence of HCC is higher in males as compared to females, female hormones, especially estrogens have been postulated to have a role in the development of hepatocellular carcinoma on a molecular level. Despite the frequent usage of oral contraceptive pills (OCP) and previously, hormone replacement therapy (HRT), their role on HCC development has not been studied thoroughly. We aim to examine the association between exogenous hormone intake (oral contraceptives and post-menopausal hormone replacement therapy) and the development of HCC. Methods. This study is part of an ongoing hospital-based case-control study which is conducted at the Department of Gastrointestinal Oncology at The University of Texas M. D. Anderson Cancer Center. From January 2005 up to January 2008, a total of 77 women with pathologically confirmed hepatocellular carcinoma (cases) and 277 healthy women (controls) were included in the investigation. Information about the use of hormonal contraceptives, hormone replacement therapy and risk factors of hepatocellular cancer was collected by personal interview. Univariate and multivariate logistic regression analyses were done to estimate the crude odds ratios (OR) and adjusted odds ratios (AOR). Results. We found statistically significant protective effect for the use of HRT on the development of HCC, AOR=0.42 (95% CI, 0.21, 0.81). The significance was observed for estrogen replacement, AOR=0.43 (95% CI, 0.22, 0.83) and not for progesterone replacement, AOR=0.49 (95% CI, 0.10, 2.35). On the other hand, any hormonal contraceptive use, which encompasses oral contraceptive pills, implants and injections, did not show a statistical significance either in the crude OR=0.58 (95% CI, 0.33, 1.01) or AOR=0.56 (95% CI 0.26, 1.18). Conclusions. As corroborated by previous studies, HRT confers 58% HCC risk reduction among American women. The more important question of the association between hormonal contraceptives and HCC remains controversial. Further studies are warranted to explore the mechanism of the protective effect of HRT and the relationship between hormonal contraception and HCC.^
Resumo:
A population-based case-control study of risk factors for ectopic pregnancy has been conducted. The investigation includes 274 cases diagnosed in Rochester, Minnesota residents from 1935 through 1982, and 548 matched controls selected from live birth deliveries. Risk factor information documented prior to the last index menstrual period was obtained via medical record abstract for 22 potential risk factor variables.^ Univariate matched analyses revealed nine variables with significantly elevated odds ratios (ORs). Following conditional logistic regression for matched sets, four variables remained as significant risk factors for ectopic pregnancy. These risk factors with ORs and 95% confidence intervals (Cls) were: current intrauterine device use (OR = 13.7, Cl = 1.6 - 120.6), infertility (OR = 2.6, Cl = 1.6 - 4.2), pelvic inflammatory disease (OR = 3.3, Cl = 1.6 - 6.6), and tubal surgery (OR = 4.5, Cl = 1.5 - 13.9). After adjusting for these four major risk factors, the following variables did not have statistically significant ORs: abdominal/pelvic surgery (OR = 2.0), acute appendicitis (OR = 2.0), anovulation (OR = 1.2), clomiphene citrate use during the index conception (OR = 3.5), induced abortion (OR = 2.1), in utero exposure to diethylstilbestrol (OR = 1.6), myomas (OR = 0.7), ovarian cysts (OR = 1.0), and past intrauterine device use (OR = 1.2). ^
Resumo:
Changes of sea surface temperature (SST) in the subarctic NE Pacific over the last 16,000 calendar years before present (16 kyr BP) have been inferred from the study of C37 alkenone unsaturation in a sediment core from the western Canadian continental slope. Between 16.0 and 11.0 kyr, three distinct cold phases (6-7°C) interrupt two warmer periods (9-10°C). Within the 2sigma range of the radiocarbon based time control, the observed SST oscillations correspond to the Oldest Dryas, the Bolling, the Older Dryas, the Allered, and the Younger Dryas periods in the GISP2 d180 record. These results represent the first high resolution marine paleotemperature estimates off the northern West coast of North America and imply that the climate of this region may be very strongly coupled to that of the North Atlantic. Given the fast rates of SST change (1°C/40-80 yr), such coupling must be controlled by atmospheric transmission of the climate signal.
Resumo:
La estrategia i2010 de la UE tiene como objetivo garantizar el liderazgo europeo en materia de TIC y poner los beneficios de la Sociedad de la Información al servicio de la economía, la sociedad y la calidad de vida personal, teniendo presente que los éxitos de Europa hasta la fecha se han basado en favorecer la competencia leal en los mercados de las telecomunicaciones y crear un mercado sin fronteras para contenidos y medios de comunicación digitales. En esta línea, la Comisión Europea ha establecido que los distintos estados miembros deben contribuir activamente al desarrollo y uso seguro de los servicios telemáticos entre sus ciudadanos. Más concretamente, atribuye a las Administraciones Públicas, tanto a nivel nacional, regional como local, un papel dinamizador de la Sociedad de la Información que les obliga a ofrecer paulatinamente todos los actos administrativos a los ciudadanos a través de Internet. Como primer paso para el uso seguro de los servicios telemáticos que ofrecen las instituciones públicas se hace preciso dotar a los ciudadanos de una identidad digital que les permita identificarse ante un Proveedor de Servicio o ante otros ciudadanos de manera inequívoca. Por esta razón, la mayoría de países europeos – y otros en el resto del mundo – están promoviendo, sistemas fiables de gestión de identidad electrónica (eIDM), de tal manera que los ciudadanos, las empresas y departamentos gubernamentales (incluso en Estados miembros diferentes) pueden identificar y certificar sus operaciones con precisión, rapidez y sencillez. Sin embargo, la gestión de esta identidad por las Administraciones Públicas supone un importante desafío, acentuado cuando se hace necesaria la interoperabilidad entre Administraciones de diferentes países, puesto que personas y entidades tienen credenciales de identificación diferentes en función de su propio marco jurídico nacional. Consciente del problema, en la Unión Europea se han puesto en marcha una serie de proyectos con el objetivo de conseguir la interoperabilidad de los eIDMs entre las instituciones públicas de diferentes Estados miembros. A pesar de ello, las soluciones adoptadas hasta la fecha son insuficientes porque no prevén todos los posibles casos de interacción del usuario con las instituciones. En concreto, no tienen en cuenta un aspecto muy importante que se ofrece en los distintos sistemas jurídicos nacionales, a saber, la delegación de la identidad, mediante la cual un ciudadano puede autorizar a otro para que actúe en su nombre para acceder a determinados servicios prestados por las instituciones públicas. En esta tesis se realizan un conjunto de aportaciones que dan solución a distintos aspectos de los problemas planteados y que, de forma conjunta, permiten la interoperabilidad y la delegación de identidad en determinados Sistemas de Gestión de Identidad aplicados al entorno de las Administraciones Públicas. En el caso de la delegación, se ha definido un sistema de delegación dinámica de identidad entre dos entidades genéricas que permite solucionar el problema del acceso delegado a los servicios telemáticos ofrecidos por las Administraciones Públicas. La solución propuesta se basa en la generación de un token de delegación, constituido a partir de un Certificado Proxy, que permite a la entidad que delega establecer la delegación de identidad en otra entidad en base a un subconjunto de sus atributos como delegador, estableciendo además, en el propio token de delegación, restricciones en el conjunto de servicios accesibles a la entidad delegada y el tiempo de validez de la delegación. Adicionalmente, se presentan los mecanismos necesarios tanto para poder revocar un token de delegación como para comprobar sin un token de delegación ha sido o no revocado. Para ello se propone una solución para la identificación unívoca de tokens de delegación y la creación de una nueva entidad denominada Autoridad de Revocación de Tokens de Delegación. Entre las características del sistema de delegación propuesto destaca el que es lo suficientemente seguro como para ser utilizado en el entorno de la Administración Pública, que no requiere el uso de mecanismos off‐line para la generación de la delegación y que se puede realizar la delegación de forma instantánea y sin la necesidad de trámites complejos o la participación de un elevado número de entidades. Adicionalmente, el token de delegación propuesto es perfectamente integrable en las infraestructura de clave pública actual lo que hace que, dado que gran parte de las Administraciones Públicas europeas basan sus sistemas de identidad digital en el uso de la PKI y certificados de identidad X.509, la solución pueda ser puesta en marcha en un entorno real sin necesidad de grandes cambios o modificaciones de comportamiento. En lo referente a la interoperabilidad, se realiza un análisis exhaustivo y la correspondiente evaluación de las principales propuestas de Sistemas de Gestión de Identidad orientados a conseguir la interoperabilidad realizadas hasta la fecha en el marco de la Unión Europea y se propone, a alto nivel, una arquitectura de interoperabilidad para la gestión de identidad en las Administraciones Públicas. Dicha arquitectura es lo suficientemente genérica como para poder ser aplicada tanto en el entorno pan‐Europeo como en los entornos nacionales, autonómicos y locales, de tal forma que la interoperabilidad en la gestión de la identidad esté garantizada en todos los niveles de la Administración Pública. Por último, mediante la integración de la solución de delegación dinámica de identidad y la arquitectura de interoperabilidad propuestas se presenta una solución al problema de la delegación en un escenario pan‐Europeo de gestión de identidad, dando lugar a una arquitectura global de interoperabilidad pan‐Europea con soporte a la delegación de identidad. SUMMARY The i2010 European Union Plan aims to ensure European leadership in ICT and to promote the positive contribution that information and communication technologies can make to the economic, social and personal quality of life, bearing in mind that, to date, success in Europe has been based on promoting fair competition in telecommunications markets and on creating a borderless market for contents and digital media. In this line, the European Commission has established that the different member states should contribute actively to the development and secure use of telematic services among their citizens. More specifically, it is attributed to national, regional and local Public Administrations to have a supportive role of the Information Society, requiring them to gradually provide the citizens with Internet‐based access to all administrative procedures acts. As a first step for the secure use of telematic services offered by public institutions, it is necessary to provide the citizens with a digital identity to enable them to identify themselves unequivocally to a Service Provider or to other citizens. For this reason, most European countries ‐ and others in the rest of the world ‐ are promoting reliable systems for managing electronic identity (eIDM), so that citizens, businesses and government departments (even in different Member States) can identify and certify their operations with precision, speed and simplicity. However, the identity management by Public Administrations is a major challenge that becomes more difficult when interoperability between administrations of different countries is needed, due to the fact that individuals and entities have different identification credentials according to their own national legal framework. Aware of the problem, the European Union has launched a series of projects with the aim of achieving interoperability of eIDMs between public institutions of different Member States. However, the solutions adopted to date are insufficient because they do not foresee all possible cases of user interaction with the institutions. In particular, solutions do not take into account a very important aspect that is offered in different national legal systems, namely, the delegation of identity, by which a citizen can authorize another to act on his/her behalf to access certain services provided by public institutions. In this thesis a collection of contributions that provide solution to different aspects of the aforementioned problems are carried out. The solutions, in global, enable interoperability and identity delegation in some of the Identity Management Systems applied to Public Administration environment. In the case of delegation, a dynamic identity delegation system between generic entities is defined. This system makes it possible to solve the problem of delegated access to telematic services offered by Public Administrations. The proposed solution is based on the generation of a piece of information called delegation token. This delegation token, derived from a Proxy Certificate, allows the establishment of identity delegation by an entity that delegates (delegator) in other entity (delegatee) making use of a subset of delegator attributes. It also establishes restrictions on services that can be used by the delegated entity and the expiry date of delegation. In addition to this, the mechanisms necessary to revoke and check the revocation status of a delegation token are presented. To do this, a solution to univocally identify delegation tokens and the creation of a completely new entity, called Token Delegation Revocation Authority, are proposed. The most remarkable characteristics of the proposed delegation system are its security, enough for it to be used in the Public Administration environment, the fact that it does not require off‐line processes in order to generate the delegation, and the possibility of performing the delegation instantaneously and without neither complex processes nor the intervention of a large number of entities. The proposed delegation token can be completely incorporated into current Public Key Infrastructure (PKI). Thus, since most of the European Public Administrations base their digital identity systems on PKI and X.509 identity certificates, the solution can be adopted in a real environment without great changes or performance modifications. Regarding interoperability, an exhaustive analysis and evaluation of most significant proposals on Identity Management Systems that aim to achieve interoperability carried out in the European Union framework until now are performed. A high level identity management interoperability architecture for Public Administrations is also proposed. This architecture is sufficiently generic to be applied to both pan‐European environment and national, regional or local environments, thus interoperability in identity management at all Public Administration levels is guaranteed. Finally, through the integration of the proposed dynamic identity delegation solution and the high level interoperability architecture, a solution to the problem of identity delegation in a pan‐European identity management environment is suggested, leading to a pan‐European global interoperability architecture with identity delegation support.
Resumo:
The application of impedance control strategies to modern legged locomotion is analyzed, paying special attention to the concepts behind its implementation which is not straightforward. In order to implement a functional impedance controller for a walking mechanism, the concepts of contact, impact, friction, and impedance have to be merged together. A literature review and a comprehensive analysis are presented compiling all these concepts along with a discussion on position-based versus force-based impedance control approaches, and a theoretical model of a robotic leg in contact with its environment is introduced. A theoretical control scheme for the legs of a general legged robot is also introduced, and some simulations results are presented.
Resumo:
Las prestaciones y características de los dispositivos móviles actuales los sitúa a un nivel similar a los ordenadores de escritorio tradicionales en cuanto a funcionalidad y posibilidades de uso, añadiendo además la movilidad y la sensación de pertenencia al usuario que se deriva de ésta. Estas cualidades convierten a las plataformas móviles de computación en verdaderos ordenadores personales, y cada día es más popular su utilización en ámbitos distintos del ocio y las comunicaciones propiamente dichas, pasando a convertirse en herramientas de apoyo a la productividad también en el entorno profesional y corporativo. La utilización del dispositivo móvil como parte de una infraestructura de telecomunicaciones da lugar a nuevas expresiones de problemas clásicos de gestión y seguridad. Para tratar de abordarlos con la flexibilidad y la escalabilidad necesarias se plantean alternativas novedosas que parten de enfoques originales a estos problemas, como las ideas y conceptos que se engloban en la filosofía del Control de Acceso a la Red (Network Access Control, o NAC). La mayoría de los planteamientos de NAC se basan, en el ámbito de la seguridad, en comprobar ciertas características del dispositivo móvil para tratar de determinar hasta qué punto puede éste suponer una amenaza para los recursos de la red u otros usuarios de la misma. Obtener esta información de forma fiable resulta extremadamente difícil si se caracteriza el dispositivo mediante un modelo de caja blanca, muy adecuado dada la apertura propia de los sistemas operativos móviles actuales, muy diferentes de los de antaño, y la ausencia de un marco de seguridad efectivo en ellos. Este trabajo explora el Estado de la Técnica en este ámbito de investigación y plantea diferentes propuestas orientadas a cubrir las deficiencias de las soluciones propuestas hasta el momento y a satisfacer los estrictos requisitos de seguridad que se derivan de la aplicación del modelo de caja blanca, materializándose en última instancia en la definición de un mecanismo de evaluación de características arbitrarias de un cierto dispositivo móvil basado en Entornos Seguros de Ejecución (Trusted Execution Environments, o TEEs) con elevadas garantías de seguridad compatible con los planteamientos actuales de NAC. ABSTRACT The performance and features of today’s mobile devices make them able to compete with traditional desktop computers in terms of functionality and possible usages. In addition to this, they sport mobility and the stronger sense of ownership that derives from it. These attributes change mobile computation platforms into truly personal computers, allowing them to be used not only for leisure or as mere communications devices, but also as supports of productivity in professional and corporative environments. The utilization of mobile devices as part of a telecommunications infrastructure brings new expressions of classic management and security problems with it. In order to tackle them with appropriate flexibility and scalability, new alternatives are proposed based on original approaches to these problems, such as the concepts and ideas behind the philosophy of Network Access Control (NAC). The vast majority of NAC proposals are based, security-wise, on checking certain mobile device’s properties in order to evaluate how probable it is for it to become a threat for network resources or even other users of the infrastructure. Obtaining this information in a reliable and trustworthy way is extremely difficult if the device is characterized using a white-box model, which is the most appropriate if the openness of today’s mobile operating systems, very different from former ones, and the absence of an effective security framework are taken into account. This work explores the State of the Art related with the aforementioned field of research and presents different proposals targeted to overcome the deficiencies of current solutions and satisfy the strict security requirements derived from the application of the white box model. These proposals are ultimately materialized in the definition of a high-security evaluation procedure of arbitrary properties of a given mobile device based on Trusted Execution Environments (TEEs) which is compatible with modern NAC approaches.
Resumo:
El presente PFC tiene como objetivo el desarrollo de un gestor domótico basado en el dictado de voz de la red social WhatsApp. Dicho gestor no solo sustituirá el concepto dañino de que la integración de la domótica hoy en día es cara e inservible sino que acercará a aquellas personas con una discapacidad a tener una mejora en la calidad de vida. Estas personas, con un simple comando de voz a su aplicación WhatsApp de su terminal móvil, podrán activar o desactivar todos los elementos domóticos que su vivienda tenga instalados, “activar lámpara”, “encender Horno”, “abrir Puerta”… Todo a un muy bajo precio y utilizando tecnologías OpenSource El objetivo principal de este PFC es ayudar a la gente con una discapacidad a tener mejor calidad de vida, haciéndose independiente en las labores del hogar, ya que será el hogar quien haga las labores. La accesibilidad de este servicio, es por tanto, la mayor de las metas. Para conseguir accesibilidad para todas las personas, se necesita un servicio barato y de fácil aprendizaje. Se elige la red social WhatsApp como interprete, ya que no necesita de formación al ser una aplicación usada mayoritariamente en España y por la capacidad del dictado de voz, y se eligen las tecnologías OpenSource por ser la gran mayoría de ellas gratuitas o de pago solo el hardware. La utilización de la Red social WhatsApp se justifica por sí sola, en septiembre de 2015 se registraron 900 millones de usuarios. Este dato es fruto, también, de la reciente adquisición por parte de Facebook y hace que cumpla el primer requisito de accesibilidad para el servicio domotico que se presenta. Desde hace casi 5 años existe una API liberada de WhatsApp, que la comunidad OpenSource ha utilizado, para crear sus propios clientes o aplicaciones de envío de mensajes, usando la infraestructura de la red social. La empresa no lo aprueba abiertamente, pero la liberación de la API fue legal y su uso también lo es. Por otra parte la empresa se reserva el derecho de bloquear cuentas por el uso fraudulento de su infraestructura. Las tecnologías OpenSource utilizadas han sido, distribuciones Linux (Raspbian) y lenguajes de programación PHP, Python y BASHSCRIPT, todo cubierto por la comunidad, ofreciendo soporte y escalabilidad. Es por ello que se utiliza, como matriz y gestor domotico central, una RaspberryPI. Los servicios que el gestor ofrece en su primera versión incluyen el control domotico de la iluminación eléctrica general o personal, el control de todo tipo de electrodomésticos, el control de accesos para la puerta principal de entrada y el control de medios audiovisuales. ABSTRACT. This final thesis aims to develop a domotic manager based on the speech recognition capacity implemented in the social network, WhatsApp. This Manager not only banish the wrong idea about how expensive and useless is a domotic installation, this manager will give an opportunity to handicapped people to improve their quality of life. These people, with a simple voice command to their own WhatsApp, could enable or disable all the domotics devices installed in their living places. “On Lamp”, “ON Oven”, “Open Door”… This service reduce considerably the budgets because the use of OpenSource Technologies. The main achievement of this thesis is help handicapped people improving their quality of life, making independent from the housework. The house will do the work. The accessibility is, by the way, the goal to achieve. To get accessibility to a width range, we need a cheap, easy to learn and easy to use service. The social Network WhatsApp is one part of the answer, this app does not need explanation because is used all over the world, moreover, integrates the speech recognition capacity. The OpenSource technologies is the other part of the answer due to the low costs or, even, the free costs of their implementations. The use of the social network WhatsApp is explained by itself. In September 2015 were registered around 900 million users, of course, the recent acquisition by Facebook has helped in this astronomic number and match the first law of this service about the accessibility. Since five years exists, in the internet, a free WhatsApp API. The OpenSource community has used this API to develop their own messaging apps or desktop-clients, using the WhatsApp infrastructure. The company does not approve officially, however le API freedom is legal and the use of the API is legal too. On the other hand, the company can block accounts who makes a fraudulent use of his infrastructure. OpenSource technologies used in this thesis are: Linux distributions (Raspbian) and programming languages PHP, Python and BASHCSRIPT, all of these technologies are covered by the community offering support and scalability. Due to that, it is used a RaspberryPI as the Central Domotic Manager. The domotic services that currently this manager achieve are: Domotic lighting control, electronic devices control, access control to the main door and Media Control.