A New Approach Based on Blockchain for User Access Management Problem of IoT Environments

Author(s):  
Halil ARSLAN ◽  
A. Gurkan YUKSEK ◽  
Hilal ASLAN
1992 ◽  
Vol 6 (4) ◽  
pp. 229-238
Author(s):  
Helwig Schmied

This article is founded on the basic assumption that Europe taken as a whole possesses all the necessary resources to combat successfully any non-European competitor in the fields of technology, provided that it solves the management problem of organizing the coordination of those resources. At present, the author argues, they are dispersed and so underexploited. To contribute to the solution of this core problem, he sets out a new approach to research collaboration, using the example of the German–French Institute for Automation and Robotics to show ways in which HEIs can cooperate internationally to provide industry with what it needs to be truly competitive.


2021 ◽  
Author(s):  
Fathima T ◽  
Vennila S M

IEEE 802 is used in LAN networks that expose or provide sensitive data to complex applications or services. These are protocols for accessing, managing and controlling access to network-based services and applications in general. Port-controlled network access controls network access and prevents the transmission and reception of nameless or unauthorized persons, leading to network interruption, service theft and data loss. This paper introduces a new approach to investigate whether a data packets in wired networks transferred to a management device is authenticated packet. The data packets are sent to the SDN from RAR and share the information associated with each packet with a limited rate for the access management and are received by the RFC. Here it detects whether the data packet arrived is accepted or restricted. The speed at the authentication start packet is restricted to manage the number of terminals that enter later authentication, and it avoids avalanche impact of wireless authentication which may cause faults to lots of terminals which enter later authentication at the same time.


2019 ◽  
Vol 14 (1) ◽  
pp. 15-34 ◽  
Author(s):  
Lorraine Lee ◽  
Rebecca Sawyer

ABSTRACT The verification of Information Technology (IT) controls is a core responsibility of IT auditors. This case places the student in the role of an IT auditor assigned to test the operating effectiveness of a specific IT general control: user access management. In addition to learning about IT controls, the case introduces several Excel functions such as VLOOKUP, MATCH, INDEX, and various text functions. The student documents the results of the IT controls tests by completing a testing matrix and writing a memo. General controls, user access management, and Excel applications are all topics taught in Accounting Information Systems (AIS) and Audit courses. As such, instructors can use this case at the undergraduate or graduate level in an IT Audit, Accounting Information Systems, or Audit class.


Sensors ◽  
2018 ◽  
Vol 18 (3) ◽  
pp. 664 ◽  
Author(s):  
Fuhong Lin ◽  
Zhibo Pang ◽  
Xingmin Ma ◽  
Qing Gu

2015 ◽  
Vol 13 (3) ◽  
pp. 338-345
Author(s):  
I.P. Bolodurina ◽  
◽  
T.V. Volkova ◽  
N.A. Ashcheulova ◽  
◽  
...  

2005 ◽  
Vol 13 (02) ◽  
pp. 117-130 ◽  
Author(s):  
S. BHATTACHARYYA ◽  
D. K. BHATTACHARYA

The paper deals with the effect of pesticide on the pest affecting a paddy field and also on the fishes living in the soil water. An objective function is formed in terms of projected loss of individual fish, the projected profit of killing a pest and the cost of spraying insecticide for a finite time period. Next the corresponding pest management model is formed by considering the growth equations of paddy, pest, and fish of the soil water. The model is analyzed by control theoretic means to determine the threshold limits of pesticide to be used. Lastly, the optimal value of pesticide is obtained. It is shown that the optimal value lies within the threshold limits. Finally corresponding to this optimal threshold value of pesticide, the optimal values of the biomass of paddy and that of the fish of the soil water are also obtained. The results are finally verified numerically by special choice of parameters compatible with the model.


Author(s):  
Peter Haag ◽  
Marco Spruit

This chapter investigates how organizations can be supported in selecting and implementing Identity and Access Management (IAM) services. Due to the ever growing number of applications that are being used in organizations, stricter regulations and changing relationships between organizations, a new approach towards login- and password administration, security, and compliance is needed. IAM services claim to provide this new approach. Unfortunately, IAM selection projects have not been very successful in the recent past. Therefore, this chapter presents the IAM Services Assessment Model which provides a useful and usable tool to support organizations in the selection and implementation of IAM services.


Author(s):  
Farshid Maghami Asl ◽  
A. Galip Ulsoy

Over-capacity has been a major problem in the world economy over the past decade. Reconfigurable capacity, and optimal capacity management policies, can contribute to increased economic stability. This research introduces a new approach to optimal capacity management for a firm faced with uncertainties and imperfect information of the market demand. It presents an optimal policy for the capacity management problem in a firm facing stochastic market demand, based on Markov decision theory. To make the approach more realistic, it is assumed that the firm has imperfect information of its stochastic market demand, and can only observe its previous sales. Optimal policies are presented as boundaries representing the optimal capacity expansion and reduction levels.


2020 ◽  
Vol 16 (5) ◽  
pp. 571-610 ◽  
Author(s):  
Oleksii Konashevych

Purpose The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain technologies and ensure their interoperability. Design/methodology/approach This paper is framed with design science research (DSR). The primary method is exaptation, i.e. adoption of solutions from other fields. The research is looking into existing technologies which are applied here as elements of the protocol: Name-Value Storage (NVS), Berkley DB, RAID protocol, among others. The choice of NVS as a reference technology for creating a database over blockchain is based on the analysis and comparison with two other similar technologies Bigchain and Amazon QLDB. Findings The proposed mechanism allows creating a standard database over a bundle of distributed ledgers. It ensures a blockchain agnostic approach and uses the benefits of various blockchain technologies in one ecosystem. In this scheme, blockchains play the role of journal storages (immutable log), whereas the overlaid database is the indexed storage. The distinctive feature of such a system is that in blockchain, users can perform peer-to-peer transactions directly in the ledger using blockchain native mechanism of user access management with public-key cryptography (blockchain does not require to administrate its database). Originality/value This paper presents a new method of creating a public peer-to-peer database across a bundle of distributed ledgers.


Sign in / Sign up

Export Citation Format

Share Document