Browsing by Subject "Access control"
Now showing items 1-20 of 22
-
A cloud-assisted random linear network coding medium access control protocol for healthcare applications
(2014-03)
Article
Open AccessRelay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC) protocols, based on ... -
Architectures and technologies for adapting secured content in governed multimedia applications
(IEEE Computer Society Publications, 2011-11-15)
Article
Restricted access - publisher's policyThis article analyzes existing initiatives and proposes new technologies for the governed adaptations of secured content in heterogeneous environments. These technologies are integrated into an architecture for the secure ... -
Cooperative ARQ: a medium access control (MAC) layer perspective
(INTECH, 2010)
Part of book or chapter of book
Open Access -
Designing a secure exam management system (SEMS) for m-learning environments
(2016-02-03)
Article
Open AccessM-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi ... -
Digital and physical layer network coding performance in the context of enforced fairness
(2014)
Conference report
Restricted access - publisher's policyIn this paper, we investigate the performance of the so-called Cross Network operating under diverse Network Coding (NC) techniques. We study the impact of Medium Access Control (MAC) layer fairness on the throughput ... -
Disseny d'un quadre de comandament integral per un sistema de control d'accés
(Universitat Politècnica de Catalunya, 2016-12-12)
Bachelor thesis
Restricted access - confidentiality agreement -
Disseny de sistemes de control d'accés biomètrics
(Universitat Politècnica de Catalunya, 2009-07)
Master thesis (pre-Bologna period)
Open AccessEntre els 7 sistemes d’identificació més utilitzats es troben els sistemes biomètrics. L’autentificació per biometria es basa en la verificació d’un element del cos de l’usuari (identificació del rostre, termograma del ... -
DRM and access control architectures interoperability
(2008-09-10)
Conference report
Open AccessDigital objects are managed in a controlled way through the complete value chain by DRM systems. Access Control Frameworks manage access by users to resources. This paper presents a solution that enables users of both ... -
Dynamic sensitivity control of access points for IEEE 802.11ax
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Restricted access - publisher's policyThe popularity and wider acceptance of IEEE 802.11 based WLANs has resulted in their dense deployments in diverse environments. While this massive deployment can potentially increase capacity and coverage, the current physical ... -
Energy harvesting-aware contention tree-based access for wireless machine-to-machine networks
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Restricted access - publisher's policyThe Energy Harvesting-aware Contention Treebased Access (EH-CTA) protocol is presented in this paper as a novel Medium Access Control (MAC) protocol for wireless Machine-to-Machine (M2M) networks where enddevices are ... -
FAIR aspects of a genomic information protection and management system
(IOS Press, 2021)
Conference report
Open AccessTo handle genomic information while supporting FAIR principles, we present GIPAMS, a modular architecture. GIPAMS provides security and privacy to manage genomic information by means of several independent services and ... -
Guaranteed bit rate traffic prioritisation and isolation in multi-tenant radio access networks
(Institute of Electrical and Electronics Engineers (IEEE), 2018)
Conference report
Open AccessNetwork slicing is a key feature of forthcoming 5G systems to facilitate the partitioning of the network into multiple logical networks customised according to different operation and application needs. Network slicing ... -
Implantación sistema de control de acceso (SAP GRC AC)
(Universitat Politècnica de Catalunya, 2015-07-10)
Master thesis
Restricted access - author's decisionGovernance, Risk and Compliance System implantation based on the wedoIT customer requirements of a compatible Solution with the ERP system. Based on customer needs to have a tool to control risks and segregation of ... -
Implementation of a simplified Access Control language using JSON
(Universitat Politècnica de Catalunya, 2023-07-06)
Master thesis
Open AccessThe aim of this project is to develop an access control validator specifically tailored for image resources using a simplified version of XACML (eXtensible Access Control Markup Language) called JACSON, which is based on ... -
Improving privacy in JPEG images
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Restricted access - publisher's policyThe massive distribution and sharing of images increases the risk of privacy losses. There are several image formats, but one of the most used is JPEG. To take care of this, the JPEG standardization committee is promoting ... -
Modeling and developing access control policies using semantic technologies
(Universitat Politècnica de Catalunya, 2009-09-11)
Master thesis
Open AccessPolicy languages have become the most common way to protect the online resources from unauthorized access. Nowadays, the Sun's XACML has become the most widely used standard for access control, allowing the definition of ... -
Networking challenges and prospective impact of broadcast-oriented wireless networkson- chip
(Association for Computing Machinery (ACM), 2015)
Conference report
Restricted access - publisher's policyThe cost of broadcast has been constraining the design of manycore processors and of the algorithms that run upon them. However, as on-chip RF technologies allow the design of small-footprint and high-bandwidth antennas ... -
Ownership based access control through non fungible tokens
(Universitat Politècnica de Catalunya, 2023-07-04)
Bachelor thesis
Restricted access - confidentiality agreement
Covenantee: Entrust DatacardDuring the past years a concept that has emerged in the Blockchain space is tokenization, which is the process of transforming ownerships and rights of assets owned by an individual into a digital form. Thanks to tokenization, ... -
Seguridad en redes de computación ubicua: contribución a la validación de credenciales
(Universitat Politècnica de Catalunya, 2010-06-30)
Doctoral thesis
Open AccessTechnology progress in both user devices and networks allows communications anytime and anywhere. New communication environments offer a wide range of possibilities to users, but also generate new threats. For this reason, ... -
Sistema de control d'accés per proximitat
(Universitat Politècnica de Catalunya, 2008-06-04)
Master thesis (pre-Bologna period)
Open Access