Spelling suggestions: "subject:"accesscontrol"" "subject:"accesskontroll""
261 |
Energy Efficient Multicast Scheduling with Adaptive Modulation and Coding for IEEE 802.16e Wireless Metropolitan Area NetworksHsu, Chao-Yuan 14 July 2011 (has links)
One of the major applications driving wireless network services is video streaming, which is based on the ability to simultaneously multicast the same video contents to a group of users, thus reducing the bandwidth consumption. On the other hand, due to slow progress in battery technology, the investigation of power saving technologies becomes important. IEEE 802.16e (also known as Mobile WiMAX) is currently the international MAC (medium access control) standard for wireless metropolitan area networks. However, in 802.16e, the power saving class for multicast traffic is designed only for best-effort-based management operations. On the other hand, SMBC-AMC adopts the concepts of ¡§multicast superframe¡¨ and ¡§logical broadcast channel¡¨ to support push-based multicast applications. However, SMBC-AMC requires that (1) the number of frames in each logical broadcast channel must be equal, (2) all mobile stations must have the same duty cycle, and (3) the base station must use the same modulation to send data in a frame. These imply that SMBC-AMC is too inflexible to reach high multicast energy throughput. In this thesis, we propose cross-layer energy efficient multicast scheduling algorithms, called EEMS-AMC, for scalable video streaming. The goal of EEMS-AMC is to find a multicast data scheduling such that the multicast energy throughput of a WiMAX network is maximum. Specifically, EEMS-AMC has the following attractive features: (1) By means of admission control and the restriction of the multicast superframe length, EEMS-AMC ensures that the base layer data of all admitted video streams can be delivered to mobile stations in timeliness requirements. (2) EEMS-AMC adopts the greedy approach to schedule the base layer data such that the average duty cycle of all admitted stations can approach to the theoretical minimum. (3) EEMS-AMC uses the metric ¡§potential multicast throughput¡¨ to find the proper modulation for each enhancement layer data and uses the metric ¡§multicast energy throughput gain¡¨ to find the near-optimal enhancement layer data scheduling. Simulation results show that EEMS-AMC significantly outperforms SMBC-AMC in terms of average duty cycle, multicast energy throughput, multicast packet loss rate, and normalized total utility.
|
262 |
Design and Implementation of a SCORM Compliant and Resource Access Control Learning management SystemYang, Tzung-Ying 27 August 2003 (has links)
The rapidly increasing expansion of the Internet has brought dramatic impact to our life and education alike. The major feature differentiates e-learning from the traditional learning is its ability to train anyone, anytime, and anywhere attributed to the Internet. Many experts tell us that e-learning will plays the key-enabling role in knowledge management for individual, schools, and enterprise. Nevertheless, the lack of standard in courseware and learning management system (LMSs) makes courseware in different LMS platforms can not be exchanged directly, and there is no way to monitor and evaluate learner¡¦s behavior from one platform to another. And there are LMS platforms do not provide the effective protection mechanism for courseware in the LMS platforms; this will let an unauthorized user can retrieve courseware as well as he knows the correct URL in the LMS. In this thesis, in order to overcome those hurdles, we refer to the e-learning standard, called Sharable Content Object Reference Model (SCORM), to enhance this feature on our existing LMS platform. And we propose an effective courseware access control mechanism which implement at the kernel of the web server.
|
263 |
Design of a Wireless LAN Medium Access Controller on the ARM-based PlatformYang, Cheng-Hsien 03 September 2003 (has links)
It is a future trend to include the function of wireless networking in portable electronic devices, such as notebooks, tablet PC, PDA, mobile phone, and other information applicants. IEEE 802.11 is the most popular wireless LAN protocol that defines the functions in the medium access control (MAC) layer and physical layer.
In this thesis, we design and implement a flexible and reusable soft IP (Intellectual Property) for wireless MAC that is compatible with AMBA system and can be used in SOC applications. The wireless MAC supports buffer descriptors, interrupt and DMA. The IP provides an AMBA-compatible interface for the host system bus, and provides a communication interface for the baseband processor in the physical layer.
|
264 |
Medium Access Control in Wireless Networks with Multipacket Reception and QueueingChen, Guan-Mei 26 July 2005 (has links)
In this thesis, we propose the predictive multicast polling scheme for medium access control in wireless networks with multipacket reception capability. We concentrate on the case in which the packet arrival process is general and the maximum queue size is finite but larger than one. We derive both analytical results and simulation results. We use the theory of discrete-time Markov chain to analyze the evolution of the system state. In addition, we propose to use Markov reward processes to calculate the throughput. Furthermore, we obtain the average system size, the packet blocking probability,
and the average packet delay. The proposed analysis approach is applicable no matter whether perfect state information is available to the controller or not. We also use simulation results to justify the usage of the proposed approach. Our study shows that the system performance can be significantly improved with a few additional buffers in the queues. The proposed medium access control scheme can be used in the single-hop wireless local area networks and the multi-hop wireless mesh networks.
|
265 |
Creating Application Security Layer Based On Resource Access Decision ServiceMetin, Mehmet Ozer 01 September 2003 (has links) (PDF)
Different solutions have been used for each security aspects (access control, application security) to
secure enterprise web applications. However combining " / enterprise-level" / and " / application-level" / security aspects in one layer could give great benefits such as reusability, manageability, and
scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a
common evaluation and enforcement environment for both enterprise-level and application level
policies to bring together access controlling with application-level security. Removing discrimination
between enterprise-level and application-level security policies improves manageability, reusability
and scalability of whole system. Resource Access Decision (RAD) specification has been
implemented and used as authentication mechanism for this layer. RAD service not only provides
encapsulating domain specific factors to give access decisions but also can form a solid base to apply
positive and negative security model to secure enterprise web applications. Proposed solution has
been used in a real life system and test results have been presented.
|
266 |
An Access Control Method for Multipoint Cyclic Data Gathering over a PLC NetworkKATAYAMA, Masaaki, YAMAZATO, Takaya, OHTOMO, Yuzo January 2010 (has links)
No description available.
|
267 |
Predictive Multicast Polling and Tree Splitting Algorithm in Wireless Access Networks with Multipacket ReceptionChen, Kuan-Mei 23 August 2009 (has links)
In this dissertation, we propose using and analytically evaluate the predictive multicast polling scheme and the tree splitting algorithm for medium access control in interference dominating wireless access networks with random traffic and finite nodes. In an interference dominating wireless network, a receiver could simultaneously receive multiple packets from a variety of transmitters, as long as the signal-to-interference-plus-noise ratio exceeds a predetermined threshold. We concentrate on the case of in which the maximum queue size in a node is finite. We use discrete-time Markov chains, reward processes and regenerative processes to derive the throughput, the packet blocking probability, the average packet delay, and the average system size. We show that the system performance of the predictive multicast polling scheme can be significantly improved with a few additional buffers in the queues. Our study also shows that exact performance of the splitting algorithm depends on the total number of nodes in the networks. We verify our numerical results by rigorous mathematical proof and computer simulations.
|
268 |
Re-authentication of Critical Operations / Återautentisering av Kritiska OperationerYachouh, Marwan January 2002 (has links)
<p>This is a study on the development of a re-authentication prototype. Re- authentication serves as a receipt for e.g. system administrators that authorise them to carry out a critical operation in a system that already is protected by a security architecture. A critical operation is a kind of operation that can cause serious damage to a network node or a set of network nodes, if it is done without one giving it a second thought. The purpose is to prevent mistakes and secure the users’ audit trail. </p><p>The main task is to propose and implement a re-authentication prototype, that is to enable the incorporation of the re-authentication prototype to an already complete security architecture and yet preserve the security and performance level of the architecture. </p><p>This thesis deals with this problem by using digitally signed certificates to provide the necessary security issues. The certificates used are called re- authentication certificates and follows the X.509 attribute certificate standard. The re-authentication certificate is optimised so that it only holds authorisation information regarding one critical operation. An access control decision function is used to decide if the re-authentication certificate and its owner are authentic. On basis of that decision the user can get the authority to execute critical operations. </p><p>The finished prototype confirms that a re-authentication can be incorporated with the security architecture. The report also shows that the security status of the architecture is preserved. The performance of the prototype is rather difficult to prove since the prototype implementation only initialises the objects that are required to prove the security issues. A performance test can therefore never prove how the prototype will perform in an authentic environment. The performance is assumed to be adequate since it uses the same authentication function that is used by the security architecture.</p>
|
269 |
Zugangsmanagement für Wireless LAN / Access control for Wireless LANParthey, Mirko 03 September 2002 (has links) (PDF)
This paper describes a solution which enables mobile devices to transparently access the campus network and the Internet. Different user classes are provided, and security issues are taken into account. The requirements for user machines are low, and the software is nearly maintenance-free for the network administrator after installation and configuration. / Diese Arbeit realisiert einen transparenten Zugang zum Campusnetz der TU Chemnitz und zum Internet für mobile Geräte. Dabei werden mehrere Nutzerklassen unterschieden und Sicherheitsaspekte berücksichtigt. Die Anforderungen an die Nutzerrechner sind gering, und der Aufwand für den Administrator beschränkt sich im wesentlichen auf die Installation und Konfiguration der Software.
|
270 |
Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentiellesSeitz, Ludwig Brunie, Lionel. Pierson, Jean-Marc. January 2006 (has links)
Thèse doctorat : Informatique : Villeurbanne, INSA : 2005. / Thèse bilingue français-anglais. Glossaire. Titre provenant de l'écran-titre. Bibliogr. p. 173-183.
|
Page generated in 0.0635 seconds