96 research outputs found

    Self-adaptation for energy efficiency in software systems

    Get PDF

    Um protocolo de autorização para internet das coisas baseado em atributos e informações de contexto

    Get PDF
    Orientador: Carlos Alberto MazieroDissertação (mestrado) - Universidade Federal do Paraná, Setor de Ciências Exatas, Programa de Pós-Graduação em Informática. Defesa : Curitiba, 18/02/2019Inclui referências: p.59-63Área de concentração: Ciência da ComputaçãoResumo: Com a Internet das Coisas, a ubiquidade de dispositivos cresce a cada dia. Controlar e garantir comunicação segura e amigável ao usuário final continua um desafio. Este trabalho propõe um protocolo de autorização para dispositivos baseado em atributos e informações de contexto. As informações de contexto são observações disponíveis em sensores dos dispositivos, tais como: luz, temperatura, microfone - para citar algumas. Este contexto provê elementos que auxiliam nas decisões de segurança, como fatores complementares de autorização. Agrega-se ao contexto um fator social dos dispositivos, auxiliando na avaliação de acessos e respectivos riscos. Este fator social consiste tanto no histórico das observações realizadas pelo dispositivo, quanto no cumprimento de suas funções (comportamento esperado). De posse destas informações de contexto e de atributos do pedido (requisitante e risco da informação), o protocolo classifica o risco e decide se efetiva ou não o pedido. As informações de contexto são base para o modelo de confiança entre os dispositivos, sendo utilizadas como validações entre os mesmos. Somado ao protocolo apresentado, discute-se o modelo de ameaças e respectivas mitigações as quais o protocolo resiste satisfatoriamente. Na sequencia, apresenta-se o uso e análise específica de um atributo: a luminância. Discute-se o uso da luminância para representação de um mesmo ambiente e respectivos resultados desta pesquisa. Por fim, algumas considerações e possibilidades de pesquisa em aberto. Palavras-chave: IoT, Segurança, Autorização, ABAC, Contexto, Protocolo, Luminância.Abstract: Internet of Things grows the devices' ubiquity constinuously. It remains a challenge to control and ensure a user-friendly secure communication. This work presents an context-aware attributebased authorization protocol. The context provides elements that helps decision making. The devices' social factor are included in the context, assisting in access evaluation and its risks. Context information is gathered throught devices' sensors, such as: light, temperature, sound - to list some examples. This context provides aid in security decisions, as complementary factors of authorization. A devices' social factor is added to the context, aiding the accesses evaluation and its risks. This social factor consists both the observations historical made by devices, and in by execution of its functions (expected behavior). With this context information and request attributes (asker and information risk), the protocol classifies the risk and decides whether or not will honor the request. Context information is the basis for the trust model between devices, and is used as validation between devices. In addition to the presented protocol, the threat model and its mitigations are discussed, which the protocol resists satisfactorily. In sequence, the analysis of an attribute use is presented: luminance. We discuss the luminance's use to represent same environment. Finally, we conclude with some considerations and open research possibilities. Keywords: IoT, Security, Authorization, ABAC, Context-Aware, Protocol, Luminance

    Digital 3D Technologies for Humanities Research and Education: An Overview

    Get PDF
    Digital 3D modelling and visualization technologies have been widely applied to support research in the humanities since the 1980s. Since technological backgrounds, project opportunities, and methodological considerations for application are widely discussed in the literature, one of the next tasks is to validate these techniques within a wider scientific community and establish them in the culture of academic disciplines. This article resulted from a postdoctoral thesis and is intended to provide a comprehensive overview on the use of digital 3D technologies in the humanities with regards to (1) scenarios, user communities, and epistemic challenges; (2) technologies, UX design, and workflows; and (3) framework conditions as legislation, infrastructures, and teaching programs. Although the results are of relevance for 3D modelling in all humanities disciplines, the focus of our studies is on modelling of past architectural and cultural landscape objects via interpretative 3D reconstruction methods

    Medical Image Segmentation Using Phase-Field Method based on GPU Parallel Programming

    Get PDF
    The use of a Phase Field method for medical image segmentation is proposed in this paper. The Allen-Cahn equation, a mathematical model equation, is used in this method. The Finite Difference method is used for numerical discretization of model equations and semi-algebraic equations integrated over time using the second -order Runge-Kutta method. Numerical algorithms are implemented into computer programming using the serial and parallel C programming language based on GPU CUDA. Based on image segmentation calculations, the Phase Field method has high accuracy. It is indicated by the Jaccard Index and Dice Similarity values that are close to one. The range of Jaccard Index values is 0.859 - 0.952, while the Dice Similarity value range is 0.926 - 0.976. In addition, it is shown that parallel programming with GPU CUDA can accelerate 45.72 times compared to serial programming
    corecore