887 resultados para Generic APIs


Relevância:

30.00% 30.00%

Publicador:

Resumo:

La iniciativa FIWARE ofrece un conjunto de APIs potentes que proporcionan la base para una innovación rápida y eficiente en el Internet del Futuro. Estas APIs son clave en el desarrollo de aplicaciones que usan tecnologías muy recientes e innovadoras, como el Internet de las cosas o la Gestión de Identidad en módulos de seguridad. Este documento presenta el desarrollo de una aplicación web de FIWARE usando componentes virtualizados en máquinas virtuales. La aplicación web está basada en “la fábrica de chocolate de Willy Wonka” como una implementación metafórica de una aplicación de seguridad e IoT en un entorno industrial. El componente principal es un servidor web en node.js que conecta con varios componentes de FIWARE, conocidos como “Generic Enablers”. La implementación está compuesta por dos módulos principales: el módulo de IoT y el módulo de seguridad. El módulo de IoT gestiona los sensores instalados por Willy Wonka en las salas de fábrica para monitorizar varios parámetros como, por ejemplo, la temperatura, la presión o la ocupación. El módulo de IoT crea y recibe información de contexto de los sensores virtuales. Esta información de contexto es gestionada y almacenada en un componente de FIWARE conocido como Context Broker. El Context Broker está basado en mecanismos de subscripciones que postean los datos de los sensores en la aplicación, en tiempo real y cuando estos cambian. La conexión con el cliente se produce mediante Web Sockets (socket.io). El módulo de seguridad gestiona las cuentas y la información de los usuarios, les autentica en la aplicación usando una cuenta de FIWARE y comprueba la autorización para acceder a distintos recursos. Distintos roles son creados con distintos permisos asignados. Por ejemplo, Willy Wonka puede tener acceso a todos los recursos, mientras que un Oompa Loopa encargado de la sala del chocolate solo deberías de tener acceso a los recursos de su sala. Este módulo está compuesto por tres componentes: el Gestor de Identidades, el PEP Proxy y el PDP AuthZForce. El gestor de identidades almacena las cuentas de FIWARE de los usuarios y permite la autenticación Single Sing On usando el protocolo OAuth2. Tras logearse, los usuarios autenticados reciben un token de autenticación que es usado después por el AuthZForce para comprobar el rol y permiso asociado del usuario. El PEP Proxy actúa como un servidor proxy que redirige las peticiones permitidas y bloquea las no autorizadas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent developments in networked three dimensional (3D) virtual worlds, and the proliferation of high bandwidth communications technology, have the potential to dramatically improve collaboration in the construction industry. This research project focuses on the early stages of a construction project in which the models for the project are developed and revised. The project investigates three aspects of collaboration in virtual environments: 1. The processes that enable effective collaboration using high bandwidth information communication technology (ICT); 2. The models that allow for multiple disciplines to share their views in a synchronous virtual environment; 3. The generic skills used by individuals and teams when engaging with high bandwidth information communication technology. The third aspect of the project, listed above, led by the University of Newcastle, explores the domain of People and the extent to which they contribute to the effectiveness of virtual teams. This report relates, primarily, to this aspect.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent developments in networked three dimensional (3D) virtual worlds and the proliferation of high bandwidth communications technology have the potential to dramatically improve collaboration in the construction industry. This research project focuses on the early stages of a design/construction project in which models for a project are developed and revised. We have investigated three aspects of collaboration in virtual environments: 1. The processes that enable effective collaboration using high bandwidth information communication technology (ICT); 2. The models that allow for multiple disciplines to share their views in a synchronous virtual environment; 3. The generic skills used by individuals and teams when engaging with high bandwidth information communication technology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The construction industry is a key national economic component. It tends to be at the forefront of cyclic changes in the Australian economy. It has a significant impact, both directly and indirectly, on the efficiency and productivity of other industries. Moreover it affects everyone to a greater or lesser extent; through its products whether they are manifested in the physical infrastructure that supports the operation of the economy or through the built environment that directly impacts on the quality of life experienced by individuals. In financial terms the industry makes one of the largest contributions to the Australian economy, accounting for 4.7 per cent of GDP 1 which was worth over $30B in 20012. The construction industry is comprised of a myriad of small firms, across several important sectors including, o Residential building, o Commercial building, o Building services, o Engineering, o Infrastructure o Facilities Management o Property Development Each sector is typified by firms that have distinctive characteristics such as the number of employees, size and value of contracts, number of jobs, and so forth. It tends to be the case that firms operating in commercial building are larger than those involved in residential construction. The largest contractors are found in engineering and infrastructure, as well as in the commercial building sub-sectors. However all sectors are characterised by their reliance upon sub-contractors to carry out on-site operations. Professionals from the various design consultant groups operate across all of these sectors. This description masks one of the most significant underlying causes of inefficiency in the construction industry, namely its fragmentation. The Construction Industry chapter of the 2004 Australian Year Book3, published by the Australian Bureau of Statistics unmasks the industry’s fragmented structure, typified by the large number of operating businesses within it, the vast majority of which are small companies employing less than 5 people. It identifies over 190,000 firms, of which over 90 percent employ less than 5 people. At the other end of the spectrum, firms employing 20 or more people account for fractionally more than one percent of businesses in the industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper a generic decoupled imaged-based control scheme for calibrated cameras obeying the unified projection model is proposed. The proposed decoupled scheme is based on the surface of object projections onto the unit sphere. Such features are invariant to rotational motions. This allows the control of translational motion independently from the rotational motion. Finally, the proposed results are validated with experiments using a classical perspective camera as well as a fisheye camera mounted on a 6 dofs robot platform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.