Search results for "ACCESS CONTROL"

showing 10 items of 79 documents

Security in Mobile Wireless Sensor Networks – A Survey

2011

Published version of an article in the journal: Journal of Communications. Also available from the publisher at: http://dx.doi.org/10.4304/jcm.6.2.128-142. OA Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides securi…

Wi-Fi arrayComputer sciencebusiness.industryWireless networkWireless WANComputer securitycomputer.software_genreKey distribution in wireless sensor networksWireless site surveymobile Wireless Sensor Network security Wireless Sensor NetworkNetwork Access ControlVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile wireless sensor networkElectrical and Electronic EngineeringbusinesscomputerWireless sensor networkComputer networkJournal of Communications
researchProduct

Towards a Dual-mode Adaptive MAC Protocol (DMA-MAC) for Feedback-based Networked Control Systems

2014

Abstract Automated control systems play an important part in many industrial domains and the medium used for communication between devices in these systems is in transition from wired to wireless for cost reasons. Control systems have strict requirements on delay, throughput, and reliability, that vary with time during operation. Addressing these requirements requires predictable and robust protocols to be employed, and they must be adaptive to the varying states of the controlled process. In this article, we propose a dual-mode adaptive medium access control protocol that caters for two main operation modes in control systems: the steady mode operation, and the transient mode operation. We…

Wireless Sensor Actuator NetworksAutomatic controlbusiness.industryComputer scienceReliability (computer networking)Real-time computingThroughputAccess controlEnergy consumptionIndustrial control systemAutomationIndustrial Application.Process ControlAutomationEmbedded systemControl systemGeneral Earth and Planetary SciencesProcess controlbusinessGeneral Environmental ScienceProcedia Computer Science
researchProduct

Supporting scalable video transmission in MANETs through distributed admission control mechanisms

2009

Emerging multimedia applications over mobile devices are becoming very popular, especially over infrastructure wireless networks such as cellular and WLANs. However, providing this kind of services over infrastructureless networks like ad hoc networks presents many additional problems. One of these problems is how to share resources fairly among the users involved. In this article we propose a QoS framework supporting scalable video streaming in mobile ad hoc networks based on distributed admission control and video traffic awareness. Our framework promotes fairness between video flows in terms of resource consumption. It also guarantees a significant reduction of the idle times experienced…

Wireless ad hoc networkComputer scienceWireless networkbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computingMobile ad hoc networkAdmission control:Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Serveis telemàtics i de comunicació multimèdia [Àrees temàtiques de la UPC]Video qualityNetwork congestionVídeo -- TransmissióAd hoc networks (Computer networks) -- Access controlbusinessComputer network
researchProduct

Testbed implementation of the meta-MAC protocol

2016

The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…

Wireless mesh networkInter-Access Point ProtocolComputer sciencebusiness.industrySettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science (all)020206 networking & telecommunications020302 automobile design & engineeringOrder One Network Protocol02 engineering and technologyWireless LAN controllerWireless Transport Layer Security0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringMedia access controlElectrical and Electronic EngineeringbusinessIEEE 802.11sWireless distribution systemComputer network
researchProduct

Personal data in a large digital library

2000

The RePEc Economics library offers the largest distributed source of freely downloadable scientific research reports in the world. RePEc also contains details about Economics institutions, publication outlets and people working in the field. All this data forms a large relational dataset. In this paper we describe HoPEc, a system that allows to implement access control records personal data within RePEc. The bulk of these records describe the authors of documents. These records are maintained by the authors themselves. We discuss the technical and social aspects of this system.

World Wide Webbusiness.industryComputer scienceI. Information treatment for information servicesControl (management)Information sourceAccess controlbusinessDigital libraryElectronic libraryField (computer science)
researchProduct

Enforcing role based access control model with multimedia signatures.

2009

International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer access controlComputer science[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer scienceXACMLAccess control02 engineering and technologycomputer.software_genreWorld Wide Web[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineeringRole-based access control[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Intelligent environmentcomputer.programming_language[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Ambient intelligenceMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Computer security model[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]Web servicebusinesscomputerSoftware
researchProduct

Detecting Inference Channels in Private Multimedia Data via Social Networks

2009

International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/WebInference[SCCO.COMP]Cognitive science/Computer scienceAccess control02 engineering and technologycomputer.software_genre01 natural sciences010104 statistics & probability[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]0101 mathematicsSet (psychology)Function (engineering)media_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Structure (mathematical logic)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Social networkMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Information sensitivity[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer scienceKey (cryptography)[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputer
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

Joint routing and per-flow fairness in wireless multihop networks

2008

In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessData_CODINGANDINFORMATIONTHEORYLoad balancing (computing)Network topologyScheduling (computing)WLANroutingMedia access controlWirelessMaximum throughput schedulingbusinessWireless sensor networkComputer network
researchProduct