Top PDF A new access control unit for GANIL and SPIRAL 2

A new access control unit for GANIL and SPIRAL 2

A new access control unit for GANIL and SPIRAL 2

For the GANIL safety revaluation and the new project of accelerator SPIRAL 2, it was decided to replace the existing access control system for radiological controlled areas. These areas are all cyclotron rooms and experimental areas. The existing system is centralized around VME cards. Updating is becoming very problematic. The new UGA (access control unit) will be composed of a pair of PLC to ensure the safety of each room. It will be supplemented by a system UGB (radiological control unit) that will assure the radiological monitoring of the area concerned.
Show more

4 Read more

The Spiral 2 Project

The Spiral 2 Project

CONCLUSIONS On May 23, 2005, the French government approved the construction of SPIRAL 2 a new 130 M€ RNB facility at GANIL. Its construction cost is shared by the French funding agencies CNRS/IN2P3 and CEA/DSM, the regional authorities of Basse- Normandie and international partners. The first beams are expected at SPIRAL 2 by 2011-2012. The project management group responsible for the construction phase was formed recently. Several agreements with international partners were signed recently. The construction of the SPIRAL 2 driver (LINAG) just started. The detailed definition of the RNB production building, of the experimental areas and of the dedicated detectors is entering in the decisive phase.
Show more

9 Read more

A Card-less TEE-Based Solution for Trusted Access Control

A Card-less TEE-Based Solution for Trusted Access Control

2 University of Limoges, XLIM, 123, avenue Albert Thomas, 87060, Limoges, France Keywords: Secure Access Control, Trusted Execution Environments (TEE), Identity Based Encryption, IBAKE. Abstract: In this paper, we present a new card-less access control system aiming to replace existing systems based on vulnerable contact-less cards. These existing systems have many vulnerabilities which makes them not secure enough to be deployed to protect restricted areas. We propose to deploy a new access control architecture based on the use of a smartphone to remove the physical card. Our secure access control system is based on Trusted Execution Environment (TEE) in the cloud and Identity Based Encryption (IBE) mechanisms. The authentication protocol deployed on our architecture is based on IBAKE. Finally, a performance evaluation of the protocol is provided.
Show more

7 Read more

Status of the new high intensity injection system for GANIL

Status of the new high intensity injection system for GANIL

HAL Id: in2p3-00665624 http://hal.in2p3.fr/in2p3-00665624 Submitted on 2 Feb 2012 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

4 Read more

Healthcare access for migrants in China : A new frontier

Healthcare access for migrants in China : A new frontier

3 Migrants in five big cities 3.1 The survey on five cities We use data from the Survey of Rural Migrant Workers Health and Social-economic Status in 2006. This survey was conducted by the National Population and Family Planning Commission of China and the Institute of Economics of the Chinese Academy of Social Sciences (CASS). The sample is composed of 2 398 interviewees with health and social-economic status information. Interviewees are rural-urban migrant workers. Rural-urban migrant workers are defined as workers who migrate from rural areas to cities. They come from rural areas and have rural hukou: they do not have the permanent city hukou from the place where they work. As noted above, the type of hukou has serious implications in term of public-service access, including health insurance. Rural-urban migrant workers are selected by their work unit. This sample was constructed to be representative of rural-urban migrant workers with a formal job and in a regular situation. Therefore, this sample is composed of migrants in socio-economic situations that are called non-critical. The sample excludes migrants with informal jobs and self-employed migrant workers.
Show more

29 Read more

The GANIL computer control system renewal

The GANIL computer control system renewal

HAL Id: in2p3-00665618 http://hal.in2p3.fr/in2p3-00665618 Submitted on 2 Feb 2012 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

4 Read more

A virtual curtain for the detection of humans and access control

A virtual curtain for the detection of humans and access control

The paper is organized as follows. As we propose an original placement of laser scanners and a new method to build a virtual curtain (which is an invisible and immaterial membrane), we first describe our set-up in Section 2. From this ar- rangement of scanners, we derive the notion of a virtual curtain, described in Section 2.2. This concept is the key of a classification process detailed in Sec- tion 3. First, surfacic features are extracted from the intersection of the curtain and an object or a person that crosses it. Then we concatenate these features over time to derive a windowed temporal signature. This signature is then used to identify the scene by a classification process; the purpose is to raise an alarm when the normal situation of a single person crossing the curtain is not met, for example when several persons want to pass the door simultaneously. Results of this classification method obtained over a database of more than 800 sequences are provided in Section 4. Section 5 concludes the paper.
Show more

12 Read more

The neutrons for science facility at SPIRAL-2

The neutrons for science facility at SPIRAL-2

Abstract . Numerous domains, in fundamental research as well as in applications, require the study of reactions induced by neutrons with energies from few MeV up to few tens of MeV. Reliable measurements also are necessary to improve the evaluated databases used by nuclear transport codes. This energy range covers a large number of topics like transmutation of nuclear waste, design of future fission and fusion reactors, nuclear medicine or test and development of new detectors. A new facility called Neutrons For Science (NFS) is being built for this purpose on the GANIL site at Caen (France). NFS is composed of a pulsed neutron beam for time-of-flight facility as well as irradiation stations for cross-section measurements. Neutrons will be produced by the interaction of deuteron and proton beams, delivered by the SPIRAL-2 linear accelerator, with thick or thin converters made of beryllium or lithium. Continuous and quasi-mono-energetic spectra will be available at NFS up to 40 MeV. In this fast energy region, the neutron flux is expected to be up to 2 orders of magnitude higher than at other existing time-of-flight facilities. In addition, irradiation stations for neutron-, proton- and deuteron-induced reactions will allow performing cross-section measurements by the activation technique. After a description of the facility and its characteristics, the experiments to be performed in the short and medium term will be presented.
Show more

7 Read more

Beam Dynamics Studies for the Spiral-2 Project

Beam Dynamics Studies for the Spiral-2 Project

INTRODUCTION The SPIRAL-2 project aims at building at GANIL a new ISOL-type facility for the production of high intensity rare isotope beams. The project has now entered the construction phase, for first beam production around 2012. The driver accelerator must accelerate a 5 mA CW deuteron beam up to 40 MeV, and a 1 mA CW ion beam with mass-to-charge ratio A/q=3 up to 14.5 A.MeV. It must also have the capability to accelerate protons (new requirement) and, in a future stage, to host a second injector to accelerate ions of mass-to-charge ratio A/q up to 6. Naturally, this driver accelerator is a linac with independently-phased superconducting cavities for high safety and maximum flexibility in the acceleration of different ion species with different charge-to-mass ratios at various final energies. The linac is divided into 3 main parts: injector, superconducting linac, and high-energy beam transport lines (HEBTs).
Show more

4 Read more

A new scalable authentication and access control mechanism for 5G-based IoT

A new scalable authentication and access control mechanism for 5G-based IoT

the device, establishing the RRC Connection between the device and the RCP. After these two steps, the device can use the radio resources allocated through the RRC Connection Setup message. 3.2. Slice Selection: The RRC Connection Setup Complete message is sent from the device to the RAN. This message contains the Attach Request. The Attach Request consists of the device’s subscription identity and the device’s network capabilities (the device’s network capabilities’ content depends on the security requirements of the 3rd party slice. In LTE, these capabilities consist of the device’s algorithms for the 4G AAC procedures). The RRC Connection Setup Complete message also includes the slice’s ID. The device informs the RAN about the slice that it wants to connect to by using this ID (In LTE, the device sends the PLMN ID in the RRC Connection Setup message during the first attachment to the network, and in 5G, as mentioned in [35], the device sends the NSSAI in this message). Upon receiving the RRC Connection Setup message from the device, the RCP gets the 3GW information from the GFR to then forward the device’s attach request to the right slice. It obtains this information by sending the Slice Information Request message to the 3GW, specifying the Slice ID (the RCP extracts the Slice ID from the attach request embedded in the RRC Connection Setup Complete message). The GFR sends the slice information related to this Slice ID to the RCP through the Slice Information Response message. The RCP is now able to establish a connection with the 3GW Function. This connection is called an S1 Signaling Connection. If the RCP does not find its intended 3GW information from the GFR, it releases all the connections related to that device (the RRC Connection and theS1 Signaling Connection).
Show more

34 Read more

GANIL / SPIRAL - 2001-2007 - Achievements, Highlights and Perspectives

GANIL / SPIRAL - 2001-2007 - Achievements, Highlights and Perspectives

Technical developments for low energy measurements To fully exploit the low energy SPIRAL1 and the future SPIRAL2 beams, progresses in the domain of charged particles detection have to be made, taking advantage of our experimental knowledge on that level. This is the aim of the FAZIA project. New experimental apparatus have then to be designed for low energy reaction products, adapted to SPIRAL1/SPIRAL2 beams, together with a good mass resolution, taking advantage of accurate Time-of-Flight measurements and Digital Electronics. In the long-term R&D program called FAZIA (Four- A and Z Identification Array), the capability of doing Pulse Shape Analysis of digitalized current signals for Silicon detectors will be used in order to realize the best possible charge and mass identification. For the moment, tests with single detectors have been performed at the TANDEM Orsay in 2001/2002, GANIL/LISE in 2003, GANIL/CIME in 2006. The results are very encouraging since it is possible to discriminate Carbon, Argon and event Krypton isotopes respectively with A=1,2 and 4. Eight prototypes of detection cells composed by two Silicon detectors (some of them Double-sided Silicon Strip Detector) followed by a Cesium Iodide scintillator are presently under construction and will be tested during the years 2007-2008 in order to choose among the possible technical solutions. We hope to realize a prototype array in 2012, taking advantage of the advent of SPIRAL2. In a more long-term range, experiments at EURISOL are planned in order to extend our research program at higher incident energies.
Show more

241 Read more

The radiation safety access control at GANIL and the RiB SPIRAL facility

The radiation safety access control at GANIL and the RiB SPIRAL facility

controlled rooms (e.g. Target_Ian_Source room, cyclotron ClME room,), two gating locks equipped with access badge readers for individual counting purpose and ten doors [r]

5 Read more

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

user authenticated or not. At this point the two users are able to communicate and to encrypt/decrypt messages. This Key extraction step is the main difference between Callas and the previous IBE schemes as it induces a commu- nication between the PKG and the user to find a public key. This is caused by the use of RSA where it is not possible to provide a way to generate a public key based only a master public key and the receiver identity. Therefore this operation has to be performed by the PKG. Nonetheless, due to its simplicity in terms of implementation we choose to rely on Callas Scheme as a starter for the proof of concept. After exposing IBE, we notice that all the security of such a mechanism is dependent on the secure storage of the master secret and the secure processing of the key generation operation. In order to achieve this, the use of a secure environment is mandatory. In the next section, we will present the secure environment chosen to implement our IBE-based solution: The Trusted Execution Environments (TEE).
Show more

8 Read more

Neutrons for science (NFS) at SPIRAL-2 (Part I: materiel irradiations)

Neutrons for science (NFS) at SPIRAL-2 (Part I: materiel irradiations)

Table 1 provides basic irradiation facility specifications concerning SPIRAL-2 and IFMIF. According to very simple estimates, it seems that SPIRAL-2 would be able to provide neutron fluxes by a factor of ~10 lower than IFMIF (more detailed analysis is given in the coming section). In addition, this will be valid only for much smaller irradiation volumes (in a first approximation by a factor of ~10, i.e. ratio between corresponding deuteron beam spots on the target; more detailed estimates on this observable will be given below). Another important finding is that at forward angles the d+C reaction results in a slightly harder neutron spectrum than d+Li as shown in Fig. 2. This is due to a higher contribution of neutron production from the target fragmentation and/or compound nucleus evaporation in the case of Li.
Show more

12 Read more

Model-Based Tests for Access Control Policies

Model-Based Tests for Access Control Policies

comes as a surprise and requires further investigations. Secondly, we find that pair-wise testing yields, for some strategies, tests with higher mutation scores than purely random tests. Because we have considered only four examples of moderate size, we refrain from draw- ing generalized conclusions as to which strategy is the best. However, we believe that our results provide evi- dence that combinatorial testing for access control policies is a promising avenue of future research. In addition to overcoming the threats to validity dis- cussed in §4, there are many possibilities for future work. We deliberately only use the policies, and not any code, for generating and assessing tests (generation is simple and the assessment does not run into the problem of equivalent mutants). The concretization of the tests, in contrast, is a manual process today. We believe in the potential of automatically generating this code from requirements in the form of sequence dia- grams. However, by their very nature, these sequence diagrams are likely to only modify one small part of the system’s state space. Yet, tests (that is, requests for accessing a resource) should be run in many different states. This suggests that one test target should be con- cretized into many concrete tests. This is currently not considered in our approach. Because of the separation of test target generation from all application logics, once the problem of putting the system in “interesting” states is solved, however, it seems easy to integrate this with our test target generation procedure.
Show more

11 Read more

UC$_x$ target design for the SPIRAL 2 project and the ALTO project

UC$_x$ target design for the SPIRAL 2 project and the ALTO project

1. The UCx targets For both projects: Spiral 2 with fast neutrons and Alto with electrons same kinds of targets will be used. Targets are based on the Isolde method [1]. Such a type of thick target is an assembly of disks (thickness about 1 mm) composed of a mixing of uranium carbide and graphite. These pellets are obtained by compressing a mix of uranium oxide and graphite powders. The carbonation is made by heating the pellets up to 2000 °C under vacuum to make the reaction:
Show more

8 Read more

The case for Access Control on XML relationships

The case for Access Control on XML relationships

6 Related Work As stated in the introduction, the problem of regulating access to XML documents has attracted a considerable attention from the database community in recent years. Most discretionary access control (DAC) models for XML [3,4,9,15] share the same foundation while proposing different interpretations or options to define subjects, to propagate rules down through the hierarchy and to solve conflicts among rules. [23] introduces static analysis rather than run-time checks for this class of models. [20] proposes a provisional access control model that allows for more sophisticated controls (e.g., an access can be granted provided it is recorded in a audit trail). All these models focus on node authorizations and then fail in answering the requirements introduced in our motivating example. In addition, and as mentioned in the introduction, expressing an exception to a negative rule may lead to tricky situations that are difficult to manage accurately without relationship authorization. While this situation is even not mentioned in most proposals, some models preclude it [3,15,23] while some others disclose the label of forbidden ancestors [9,20] or disclose at least the presence of these ancestors by replacing their label by a dummy value [12]. The former solution restrains the expressiveness of the model while the latter violates in some ways the least privilege principle. In addition to dummy labels, [12] provides a new answer to this problem by transforming the view of a given path thanks to an XPath expression (executed at traversal time), under the assumption that the resulting view remains compliant with the DTD provided to the subject.
Show more

24 Read more

Passivity-Based Control for a Micro Air Vehicle Using Unit Quaternions

Passivity-Based Control for a Micro Air Vehicle Using Unit Quaternions

approaches, such as [ 1 – 4 ]. Several strategies based on Euler angles provide an intuitive and easy way to visualize the quad-rotor kinematic and dynamical properties, but some obstacles are found with this representation, for instance, certain orientations can not be defined due to mathematical singularities, also a problem known as “gimbal lock” exists, which consists on an infinite number of possible representations for a single rotation. A potential solution for this problem is the use of unit quaternions to represent the rigid body rotations.
Show more

18 Read more

A Cross-Layer Medium Access Control and Routing Protocol for Wireless Sensor Networks

A Cross-Layer Medium Access Control and Routing Protocol for Wireless Sensor Networks

four-way RTS-CTS-DATA-ACK handshake; iii) a node broadcasts an RTS packet to all its neighbors when it has a data packet to send. However, comparing with XLM, RBF has some differences as follows: i) XLM implements an initiative determination based on thresholds of received RTS’s signal to noise ratio (SNR), buffer size and energy remaining in which a node will participate in the contention process if the conditions are satisfied; ii) XLM assumes a node knows the locations; the RTS frame contains source and destination locations information; iii) XLM implements a backoff scheme that differentiate nodes into different prioritization groups. In contrast, RBF does not use initiative determination based on threshold values for the RTS, buffer and energy remaining and it does not assume nodes to have knowledge of their locations. Instead, we use a received power of a beacon signal from the sink to decide whether a node should participate in the contention process. A next-hop node is selected for the forwarding task after the potential next-hop nodes, having larger RSSI values compared to the transmitter node wins in the contention process. This competition-based approach among the potential receiver nodes eliminates the need to select the next-hop forwarding sensor at the sender or to find a path toward the sink before the actual data transmission. It is noted that the usage of RTS/CTS mechanism helps to protect the network from hidden terminal problem [11]. It is also very effective in terms of system performance, especially when large packets are considered, as it reduces the length of the frames involved in the contention process [16].
Show more

7 Read more

The operation of the GANIL control system

The operation of the GANIL control system

HAL Id: in2p3-00996662 http://hal.in2p3.fr/in2p3-00996662 Submitted on 3 Apr 2020 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

6 Read more

Show all 10000 documents...