APECS: A Distributed Access Control Framework For Pervasive Edge .

1y ago
19 Views
2 Downloads
1.84 MB
16 Pages
Last View : 15d ago
Last Download : 3m ago
Upload by : Azalea Piercy
Transcription

APECS: A Distributed Access Control Framework for PervasiveEdge Computing ServicesSean DoughertyReza TouraniGaurav PanwarSaint Louis UniversitySt. Louis, U.S.sean.dougherty@slu.eduSaint Louis UniversitySt. Louis, U.S.reza.tourani@slu.eduNew Mexico State UniversityLas Cruces, U.S.gpanwar@cs.nmsu.eduRoopa VishwanathanSatyajayant MisraSrikathyayani SrikanteswaraNew Mexico State UniversityLas Cruces, U.S.roopav@nmsu.eduNew Mexico State UniversityLas Cruces, U.S.misra@cs.nmsu.eduABSTRACTEdge Computing is a new computing paradigm where applicationsoperate at the network edge, providing low-latency services withaugmented user and data privacy. A desirable goal for edge computing is pervasiveness, that is, enabling any capable and authorizedentity at the edge to provide desired edge services–pervasive edgecomputing (PEC). However, efficient access control of users receiving services and edge servers handling user data, without sacrificingperformance is a challenge. Current solutions, based on “always-on”authentication servers in the cloud, negate the latency benefits ofservices at the edge and also do not preserve user and data privacy. In this paper, we present APECS, an advanced access controlframework for PEC, which allows legitimate users to utilize anyavailable edge services without need for communication beyondthe network edge. The APECS framework leverages multi-authorityattribute-based encryption to create a federated authority, whichdelegates the authentication and authorization tasks to semi-trustededge servers, thus eliminating the need for an “always-on” authentication server in the cloud. Additionally, APECS prevents accessto encrypted content by unauthorized edge servers. We analyzeand prove the security of APECS in the Universal Composabilityframework and provide experimental results on the GENI testbedto demonstrate the scalability and effectiveness of APECS.CCS CONCEPTS Security and privacy Access control; Distributed systemssecurity; Networks Security protocols.KEYWORDSDistributed access control, authentication, authorization, attributebased encryption, edge computing.Permission to make digital or hard copies of all or part of this work for personal orclassroom use is granted without fee provided that copies are not made or distributedfor profit or commercial advantage and that copies bear this notice and the full citationon the first page. Copyrights for components of this work owned by others than ACMmust be honored. Abstracting with credit is permitted. To copy otherwise, or republish,to post on servers or to redistribute to lists, requires prior specific permission and/or afee. Request permissions from permissions@acm.org.CCS ’21, November 15–19, 2021, Virtual Event, Republic of Korea 2021 Association for Computing Machinery.ACM ISBN 978-1-4503-8454-4/21/11. . . 15.00https://doi.org/10.1145/3460120.3484804Intel LabsPortland, U.S.srikathyayani.srikanteswara@intel.comACM Reference Format:Sean Dougherty, Reza Tourani, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra, and Srikathyayani Srikanteswara. 2021. APECS: A DistributedAccess Control Framework for Pervasive Edge Computing Services. InProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS ’21), November 15–19, 2021, Virtual Event, Republic ofKorea. ACM, New York, NY, USA, 16 pages. ONThe number of wireless devices and connections are growing rapidly,the major drivers being the increasing number of smartphonesand machine to machine communications from smart meters, autonomous vehicles, video cameras, and more [5]. As an example,real-time video analytics data from Internet of Things (IoT) devicessuch as surveillance cameras [4], estimated to be over 1 billion bythe end of 20211 , supports several practical, useful applicationssuch as traffic control, autonomous driving, providing cognitiveassistance to users [25, 31], and more. The video feed data generatedby cameras needs to be processed quickly and in proximity to theuser, which precludes transferring the data to the Cloud for processing. This need is particularly accentuated for latency-sensitiveapplications such as autonomous driving.To address this challenge, various edge computing ecosystemshave been proposed, including cloudlets, fog computing, and MultiAccess Edge Computing [21] with the premise of deploying powerful servers and gateways to serve users in regions with highcomputation demand. Recently, the notion of Pervasive Edge Computing (PEC) [23] has emerged, aiming to create an ecosystem inwhich the computation capability of every peer device at the edge,e.g., smartphones, tablets, and vehicles, can be brought to bear toserve users’ computation needs.Motivation: Current access control enforcement solutions designedfor cloud computing cannot be trivially ported to the distributed,multi-stakeholder PEC environment. In a PEC ecosystem, relyingon an always-online cloud service for access control is undesirablefor several reasons, such as high latency due to several rounds of direct client-server communication, the Cloud might become a singlepoint of failure, and cloud server(s) going rogue and undermininguser privacy and/or user data confidentiality. Furthermore, in the1 llance-installed-base-report-2019

highly dynamic PEC environment with quick nodes turnover, lackof mutual authentication between the user and edge servers, and delayed revocation of rogue servers (particularly with high turnoverrates) is an added challenge. This necessitates re-envisioning accesscontrol mechanisms without involving the Cloud.Use Cases: We consider two application use cases to motivate theneed for distributed and fine-grained access control for secure execution of edge services. The extensive deployment of security,traffic, and dash cameras motivated crowdsensing applications,including a vehicle-tracking AMBER Alert system [30, 31] and aparking spot locating service for dense urban areas [10]. Theseapplications collect user generated video feed for low latency processing by the authorized edge servers, available in the data sourceslocale to identify occupied parking spots or vehicles using their license plates. Such data sharing applications, however, raise privacyand security concerns over how user generated data is collected,processed, and utilized. For instance, in the AMBER Alert example,parents may accept sharing their children’s information with theauthorities but not the larger public community, or a driver in theregion of interest may be willing to share the video feed of her ondash camera only with the police department. In another scenario,the police department might require the location (or the annotatedimage) of the alleged kidnapper’s vehicle to only be shared withactive duty officers in order to mitigate the risk of vigilantes.The second use case is post disaster rescue, in which first responders and civilian volunteers spontaneously form rescue teamsto collect information such as the video feed from body camerasand updates from cameras/sensors on disaster victims devices. Thedata will be opportunistically shared with the available and authorized edge servers (e.g., vehicles, drones, or base stations) forprocessing and critical decision-making–often in this case thereis no centralized cloud available. In this use case, only relevantinformation should be shared with each participant. For instance, acivilian volunteer should not be able to access the private healthinformation of a victim while a paramedic at the same site shouldbe able to obtain such information. These use cases elucidate thedemand for distributed and fine-grained access control, enablingusers and the dynamic edge infrastructure to mutually authenticate and authorize each other without relying on an always onlineauthentication server, which will often be difficult to provision.Unique Constraints in the PEC Environment: The PEC ecosystem is highly dynamic and is composed of mobile devices, e.g., cars,smartphones, and PEC servers with high turnover. Providing services in such a fast-changing, evolving environment is a challenge.This will be further compounded by the low-latency and highbandwidth requirements of the next generation services, e.g., autonomous driving and industrial IoT, where significant amounts ofdata need to be transferred to a server quickly, processed rapidly,and delivered back to a customer, sometimes in mere milliseconds.This necessitates the need for quick authentication and rapid interchanges between the consumer and the servers before the connection is lost–potentially forever. Further, the personal nature of theuser data, such as images, puts stringent privacy requirements onit. Providing personal data to an unauthorized or unauthenticatedserver for service becomes a high stakes operation and the impactof data falling in the wrong hands (especially if authentication isnot rigorous) could be significant. The high dynamicity may notadequately equip the consumers to verify the servers’ access rightsand authenticity in the short time window available for interaction.These constraints are major motivating challenges.Overview: We address these motivating challenges by proposingAPECS–a distributed, multi-authority access control frameworkfor dynamic PEC ecosystems. APECS enables the users and PECservers to mutually authenticate and authorize each other via afederated access control model without relying on a centralized rootof trust. Utilizing multiple trust authorities regulates access to users’personal data and prevents a malicious authority from breachingusers’ privacy by unilaterally accessing the user’s personal data. Toensure that users can provide access right proofs and this access canbe verified at the PEC server directly, APECS employs a token-basedauthorization scheme (similar to OAuth), which includes a novelauthentication method for verifying token ownership–a featurenot provided in OAuth. In addition, APECS removes the “alwayson” authentication server requirement and allows asynchronousauthentication of PEC servers. Thus, in the highly dynamic andintermittent edge environment, APECS allows the users to securelysubmit their data for processing, without edge server discovery andwith implicit authenticity verification; ensuring that only availableand authorized PEC servers can decipher the data for processing.Contributions: In summary, the contributions of this paper include: a) Design of APECS, a distributed mutual access control enforcement framework that operates at the edge after bootstrappingby the Cloud. APECS uses multi-authority attribute based encryption [3], is agnostic of the underlying network architecture, thus isportable to future internet architectures. b) Design of APECS PKC(public key cryptosystem), an alternative APECS implementationusing traditional public key cryptosystems. APECS PKC is suitablefor static networks, in which PEC servers’ availability is known tothe users prior to service requests, allowing the users to establishsecure channels to the desired PEC server. c) APECS has an efficient and quick revocation mechanism for edge entities that doesnot need immediate communication with the Cloud, and requiresminimal (not system-wide) re-keying of the remaining entities anddata re-encryption in the system. d) Rigorous security analysis ofAPECS using the Universal Composability framework and discussion of enhancements using traditional public key cryptosystems.e) APECS prototype implementation in the GENI testbed [1] andperformance evaluation with the existing set-up and an IP-basedpotential design set-up.The paper is organized as follows. We discuss the related work inSection 2. Section 3 includes our models and assumptions. Section 4presents APECS building blocks and overview with detailed designin Section 5. Section 6 includes the security analysis of APECS.We discuss the reference implementation of APECS along with itsevaluation in Section 7 and draw our conclusion in Section 8.2RELATED WORKThe majority of access control for services today happens far fromthe edge, either on the Cloud or the Content Provider premises.Recently, a few initiatives have proposed edge computing as a platform for providing security services at the edge [6, 12, 18]. However,access control enforcement at the network’s edge has received littleattention. Despite some similarities, edge-centric access control

3 MODELS AND ASSUMPTIONS3.1 System ModelOur system model comprises the computing environment, serviceconsumers, and service providers. The computing environmentServiceProvidersCloud ComputingProviders12AIAA IAPervasive EdgeComputingenforcement requires additional considerations due to its decentralized, dynamic, and multi-stakeholder nature, which limits theeffectiveness of conventional cloud-based solutions. We review theaccess control literature in both Cloud and edge ecosystems.In the literature, attribute-based access control (ABAC), in whichpolicies are used for granting access rights, has been widely studied [7, 8, 12, 19, 20, 26, 27, 33]. ABAC schemes can generically berealized by attribute-based encryption (ABE) [8, 20, 26], which haveproven to be very beneficial in cloud architectures [26] for providing flexible and fine-grained data sharing frameworks. However,the use of ABAC for user authentication and authorization canbe costly compared to capability based access control [7, 8, 12–14, 19, 20, 27, 33]. To alleviate this challenge, approaches havebeen proposed for reducing ABE’s computation cost [7, 12, 33].Xue et al. utilized hash-chains to limit the number of ABE operations in an information-centric setting [22, 27, 28]. The user’s initialcommunication is authenticated using a single ABE operation whilethe follow-up requests are authorized by a series of bootstrappedchained hashes. Xue et al. proposed proof-of-attribute challenges toprevent Economic Denials of Service (EDoS) [26], in which the receiver proves the possession of the attributes by solving a challengeencrypted with those attributes prior to communication.Capability-based access control (CapBAC) is an alternative access control model to ABAC systems. In CapBAC, unforgeableaccess tokens are given to subjects to represent subjects’ accessrights–enabling a more distributed and computationally cheap authentication and authorization [11, 24, 33]. In the majority of thetoken-based CapBAC implementations, such as OAuth [11] andHeracles [33], the cloud back-end is assumed to be the sole trustedauthority, responsible for token generation and distribution. InOAuth, the client in the possession of the access token (referred toas “bearer token”) can authorize themselves to the resource serverby including the access token in the requests. However, the OAuth’sbearer token does not include user specific information, allowingan intercepted token to be used by the attacker. Thus, underminingits effectiveness. Heracles [33] extended OAuth via a hybrid solution, in which both bulk operations and single target operationswere accomplished via ID-based tokens and attribute based tokens,respectively. Despite Heracles’ capability in promoting fine-grainedaccess control, it remains vulnerable if an unfaithful subject sharesits token. To remedy, FairAccess [19] proposed the utilization of ashared private blockchain at the edge to provide the accurate ledgerof access tokens, their rights, and their possession.Despite some initiatives for IoT device access control at the edge,no effort was able to build a holistic mutual access control systemfor computation offloading to the edge. We addressed this gap bybuilding a distributed framework for mutual authentication andauthorization of users and PEC servers. APECS provides a scalableand efficient access control enforcement in highly dynamic PEC environments, and enables federation with access control authoritiesfor quick access revocation without system-wide re-keying.64ResourceConsumer7Distribution635KeyAIA Key DistributionAIAFigure 1: APECS system model including the parties involved insecure delivery of edge services.includes Cloud providers and the PEC ecosystem [23]. The PECecosystem is itself composed of pre-deployed components such asthe multi-access edge computing (MEC) infrastructure [21] andthe users’ devices that are joining the computing resource pool forexecuting requested services. In the rest of the paper, we refer tothese users’ devices as PEC servers. A service can either be static,e.g., static videos or web content, or dynamic, e.g., annotation ofvideos or images. Dynamic services may require an input data fromthe user (e.g., a user’s image/video for performing annotation) orother service providers (e.g., the police department requesting thevehicle-tracking AMBER Alert information from other vehicles).A service provider owns the requested static/dynamic service.We assume that the service providers are well-known. A serviceconsumer is typically a user who requests a service. Given thefluid and highly dynamic nature of PEC, a user can have multipleroles at the same or different times, simultaneously acting as a service provider and consumer. In APECS, we employ multi-authorityattribute-based encryption (MABE) [3] with service providers designated as one set of attribute-issuing authorities (AIAs), and basestations (part of internet service providers) being the second set ofAIAs. Alternatively, MEC servers can act as base stations for thesecond AIA category.System Entities Interactions. As shown in Step (1) of Figure 1,each service provider initiates its AIA, hosted as a virtual machineon the Cloud. The AIAs onboard PEC servers and provide themwith attributes and secret keys for their registered services (Step (2)).Similarly, each base station initiates its AIA to onboard its local PECservers (Step (3))2 . At this stage, the PEC nodes are fully onboardedby both AIAs. A user, interested in a service, registers with theservice provider and obtains an authentication/authorization token(Step (4)). To request a service, the user encrypts her data using theexpected attributes of the service provider and her local base station,and sends the encrypted data (and her token) into the network viathe base station (Step (5)). The base station relays the user’s requestto the existing PEC servers (Step (6)) for enforcing access control2 AnISP may run a system-wide AIA rather than one per base station; but that is animplementation decision, which we do not discuss.

and service execution. The PEC servers return the result of theservice to the base station, which forwards it to the user (Step (7)).3.2Security and Computational AssumptionsWe assume that all entities are capable of performing symmetric andasymmetric key cryptography, and have their clocks loosely synchronized. We assume the existence of a trusted public key infrastructure (PKI) by which all entities obtain certificates correspondingto their cryptographic key pairs from well-known authorities (e.g.,Verisign). For instance, a provider p obtains its certificate Certpand a user u obtains their certificate Certu . We further assume thatsymmetric and asymmetric key operations and cryptosystems aresecure. We assume the cloud providers and base stations are honestbut curious participants in that they do not deviate from the protocols but try to learn information about the system. It is a commonassumption when considering these entities as part of the infrastructure. We further assume attackers are Probabilistic Polynomial-time(PPT) adversaries and are computationally bounded.Our scheme relies on assumptions based on the decisional DiffieHellman (DDH) problem, the decisional Bilinear Diffie Hellman(BDH) problem, the k-decisional Diffie Hellman (k-DDH) problem,and the external Diffie Hellman (XDH) problem [3]. Please refer toAppendix 10 for formal definitions of these assumptions.3.3Threat ModelWe consider the following six threats from the service consumers,the computing ecosystem (including PEC servers and the cloudcomputing providers), and malicious third parties, which may playthe role of an edge server or a service consumer. An outsider maytry to unlawfully use a service (a) without registering and obtaininga valid token for the service, or (b) by using a forged token (not generated by the service provider or containing invalid information). Alegitimate user (service consumer) may try to (c) request a servicewith an expired token or a token with insufficient authorizationlevel (similarly reusing a token from one service provider to giveaccess to services of other providers), or (d) share their token withan unauthorized user to allow unauthorized service access.An unauthorized PEC server may try (e) to mount a spoofingattack by impersonating an authorized server to hijack or obtain auser’s data. An authorized but malicious PEC server may try to (f)collude with an unauthorized user to maliciously provide a service.This includes offering a static service (i.e., content) or the executionof a dynamic service to an unauthorized user. We do not considerthe situation where a malicious PEC server returns incorrect results, possibly for avoiding resource intensive computation. Foraddressing this, techniques for verifiable computing [32] can beused in conjunction with APECS.4APECS BLOCKS AND OVERVIEWIn this section, we give an overview of APECS and its buildingblocks. Table 1 presents the notations used in explaining APECS.4.1Table 1: Notations UsedNotationPUCEBTpuI DxCer t xLxTe x pTcMpk[Ae ]R ACS KxV Kxσxr evocT abl eserverT abl euserT abl eDescriptionSet of service providers.Set of clients.Access Control Cloud.Set of PEC servers.Set of base stations.User u’s token T from service provider p.Identifier of entity/service x .Entity x certificate containing verification key V K x .Authorization level of entity/data x .Token’s expiry time.Current time.Public key of MABE system for ABE operations.List of MABE decryption keys possessed by e.Service provider p’s registration request to C.Signing key of entity x .Signature verification key of entity x .Signature on data x .List of revoked users’ tokens stored at each e E.List of PEC servers maintained by each AIA.List of users and tokens maintained by each p P.providing service for p, when requesting the service, which can beeither static or dynamic. We note that p has to sign all the issuedtokens for integrity verification. Below, we elaborate on the token’sstructure, its components, and the rationale behind its components.Definition 4.1. Authentication TokenToken Tpu represents the unique JSON Web Token (JWT) that serviceprovider p generates for user u. The JWT format provides greaterfunctionality than traditional bearer tokens, such as those used inOAuth. Tpu is a unique token that includes the service provider’sunique identifier, IDp , the service identifier, ID s , (or a list of serviceidentifiers), the user’s certificate, Certu , the user’s authorization level,Lu , (or a list of authorization levels), and its expiry time, Texp : Tpu : ⟨IDp , [ID s ], Certu , [Lu ],Texp ⟩.The service provider’s identifier, IDp , in Tpu enables the accesscontrol enforcers, i.e., PEC servers, to fetch p’s certificate for tokensignature verification, thus ensuring token’s integrity and provenance. We note that lack of token integrity and provenance verificationis one of the major shortcomings of OAuth, which we address. Theservice identifier, ID s , indicates the name of service(s) that u isauthorized to use. By including ID s in Tpu , the PEC servers preventu’s unauthorized access to other services p provides that requiresindependent membership per service. For each service (static ordynamic), Lu indicates u’s authorization level, i.e., Bronze, Silver,or Gold, to be matched against the required authorization levelof the requested service. Token Tpu also includes u’s certificate,Certu , which enables the PEC servers to verify the authenticity ofu’s signed request, thus preventing unauthorized users from usinga hijacked token. Finally, Tpu includes an expiry time as a systemparameter. At the conclusion of Texp , u can request to renew hertoken, which is granted at the service provider’s discretion.User Authentication and AuthorizationIn APECS, a user u U interested in using a service provider’sp P services (e.g., Instagram) has to register herself with p toobtain a customized and time-bounded token. The token allowsu to authenticate herself to the corresponding PEC server e E4.2Asynchronous Server AuthenticationAPECS is designed for a dynamic edge computing ecosystem whereedge servers can leave and join at will. In such ecosystems, the traditional authentication mechanisms, in which the user has to first

discover the available PEC servers, create a secure connection, andauthenticate the selected server would not scale. Thus, APECS devises an asynchronous PEC server authentication framework usingthe MABE scheme proposed in [3]. In APECS’ asynchronous PECserver authentication framework, users encrypt their data (neededfor service execution) using the MABE scheme, allowing any PECserver with the requisite set of attributes obtained from multipleattribute-issuing authorities to decrypt the data and execute therequested service without the need for server discovery, securechannel establishment, or synchronous interactions between theuser and PEC servers. To obtain pertinent credentials (e.g., secretkeys and attributes), PEC servers should be associated with the corresponding service providers and a base station. Before presentingthe MABE scheme [3], we note that broadcast encryption (BE) is another relevant technique for asynchronous authentication [16, 17].Despite its simplicity, BE is not suitable for the PEC ecosystemsince it does not work well for several one-to-one (consumer-edgeserver) communications [9], and falls short in performing dynamicrevocation. Furthermore, a federated BE approach does not exist inthe literature.Definition 4.2. Multi-authority Attribute-Based Encryption (MABE) [3]A key policy ABE scheme (KPABE) with n attribute-issuing authorities (AIAs) consists of the following four algorithms. All algorithmsexcept decryption are randomized.1) (sysparam, (apk 1 , ask 1 ), . . . , (apkn , askn )) ABE.Setup(1λ , n):This algorithm runs once in the beginning to setup the system parameters and the AIAs. It takes in a security parameter, λ, and number ofAIAs n, as input, and outputs the system parameters, sysparam, andeach AIA’s public/private key pairs. The sysparam includes bilineargroup information, and the threshold value dk that denotes the minimum number of attributes each user needs to possess from an AIAk; k [1 . . . n]. Set public key, Mpk (sysparam, apk 1 . . . apkn ).2) SKk ABE.KeyGen(Mpk , askk , id, Ak ): This algorithm is runby AIA k, and takes as input Mpk , k’s secret key, askk , a userid, id,and a set of attributes, Ak , s.t., Ak dk . It outputs the user’s secretkeys SKk .3) C ABE.Encrypt(Mpk , (A1, . . . , An ), m): This algorithm takesin Mpk , a subset of at least dk attributes from an AIA k; k [1 . . . n],message m, and outputs ciphertext C.4) {m, } ABE.Decrypt(Mpk , (SK1, . . . , SKn ), C): This algorithmtakes in the public key Mpk and a set of secret keys from each AIAsufficient to decrypt the ciphertext C. If successful it outputs the plaintext message m, else outputs . Decryption is successful wheneverthe overlap between the set of secret keys and the set of attributesassociated with the ciphertext is above a threshold.4.3APECS OverviewAPECS consists of seven protocols that describe the interactionsbetween the cloud provider, C, service providers, P, PEC servers,E, and users, U. APECS consists of two phases: (i) distributed userauthentication and (ii) asynchronous server authentication andservice execution.In the first phase, PEC servers authenticate and authorize users’requests by validating the users’ requests and corresponding tokens.For token verification, PEC servers use service providers’ identifiers(included in the tokens) to fetch the corresponding certificates andvalidate tokens’ signatures; preventing token forgery. For users’requests verification, PEC servers use the users’ certificates includedin the corresponding tokens to verify requests’ signatures. Finally,the PEC servers use the other components of the tokens to authorizeusers for requested services. Token-based user authentication andauthorization in APECS enables mobile users to utilize edge serviceswhile moving across base stations without the need for obtainingnew tokens or updating cryptographic materials.In the second phase, upon successful user authentication, PECservers should fulfill service requests on a service provider’s behalf.In order to protect the user’s privacy, the user encrypts the dataneeded for her service execution using the set of attributes (fromboth AIAs) pertinent to the requested service. Following the MABEscheme mentioned in Definition 4.2, PEC servers use their attributesets for data decryption. A successful MABE decryption processproves the authenticity of the PEC server for service execution.APECS enables efficient revocation of users and PEC servers.For user revocation, service providers share their user revocationlists (revoked tokens) with the PEC servers. For PEC server revocation, instead of a system-wide re-keying of un-revoked users,the provider notifies the base station that is associated with thePEC server to revoke it. This localizes the PEC server revocation tothe base station, which invariably has a much smaller number ofconnected PEC servers.5APECS DESIGNThis section includes APECS architectural design and details ofprotocols for system setup and registration, users service requests,PEC servers’ service response (including mutual authentication),and user and PEC server revocation. We also discuss APECS PK

Edge Computing is a new computing paradigm where applications operate at the network edge, providing low-latency services with augmented user and data privacy. A desirable goal for edge comput-ing is pervasiveness, that is, enabling any capable and authorized entity at the edge to provide desired edge services-pervasive edge computing (PEC).

Related Documents:

DYNA 2000 DYNA 7000 DYNA 8000 APECS 0150 DYNA 2500 DYNA 70025 DYNA 8200 APECS 0250 DYNA 10141 DYNA 8400 APECS 0300 Power Flow Series Gas Valves APECS Linkage Free Integral Type . Ignition System: 40 V minimum during cranking (*) All cabling f

DYNA 2000 DYNA 70000 DYNA 8000 APECS 0150 EPG 512 DYNA 2500 DYNA 70025 DYNA 8200 APECS 0250 EPG 1724 . Ignition System: 40 V minimum during cranking (*) All cabling for these controllers is limite

DPG, APECS, L-Series & EPG Electronic Speed Controls Woodward's worldwide reputation as a leading manufacturer of control systems is enhanced by this full line of products for industrial engines: DPG (Digital Programmable Governor) digital controller family with enhanced software features.

Distributed Database Design Distributed Directory/Catalogue Mgmt Distributed Query Processing and Optimization Distributed Transaction Mgmt -Distributed Concurreny Control -Distributed Deadlock Mgmt -Distributed Recovery Mgmt influences query processing directory management distributed DB design reliability (log) concurrency control (lock)

DYNA 2000 DYNA 70000 DYNA 8000 APECS 0150 EPG 512 . DYNA 2500 DYNA 70025 DYNA 8200 APECS 0250 EPG 1724 . Ignition System: 40 V minimum during cranking (*) All cabling for these controlle

Distributed Control 20 Distributed control systems (DCSs) - Control units are distributed throughout the system; - Large, complex industrial processes, geographically distributed applications; - Utilize distributed resources for computation with information sharing; - Adapt to contingency scenarios and

the proposed distributed MPC framework, with distributed estimation, distributed target cal- culation and distributed regulation, achieves offset-free control at steady state are described. Finally, the distributed MPC algorithm is augmented to allow asynchronous optimization and

Artificial intelligence (AI) is reshaping business, economy, and society by transforming experiences and relationships among st stakeholders and citizens. The roots of AI may lie in ancient cultures of Greek (e.g., the mythological robot Talos), Chinese (e.g., Yueying Huang’ dogs) and other mythologies (Nahodil & Vitku, 2013), where automatons were believed to be imbued with real minds .