Author: Sukhanov, A.
Paper Title Page
WE3AO07 Measurement of Magnetic Field Using System-On-Chip Sensors 1083
 
  • A. Sukhanov
    BNL, Upton, New York, USA
 
  Funding: Work supported by Brookhaven Science Associates, LLC under Contract No. DE-SC0012704 with the U.S. Department of Energy.
Magnetic sensors have been developed utilizing various physical phenomena such as Electromagnetic Induction, Hall Effect, Tunnel Magnetoresistance(TMR), Giant Magnetoresistance (GMR), Anisotropic Magnetoresistance (AMR) and Giant Magnetoimpedance (GMI). The compatibility of solid-state magnetic sensors with complementary metal-oxide-semiconductor (CMOS) fabrication processes makes it feasible to achieve integration of sensor with sensing and computing circuitry at the same time, resulting in systems on chip. In this paper we describe application of AMR, TMR and Hall effect integrated sensors for precise measurement of 3D static magnetic field in wide range of magnitudes from 10-6 T to 0.3 T, as well as pulsed magnetic field up to 0.3 T.
 
DOI • reference for this paper ※ doi:10.18429/JACoW-ICALEPCS2023-WE3AO07  
About • Received ※ 03 October 2023 — Revised ※ 09 November 2023 — Accepted ※ 17 December 2023 — Issued ※ 18 December 2023
Cite • reference for this paper using ※ BibTeX, ※ LaTeX, ※ Text/Word, ※ RIS, ※ EndNote (xml)  
 
TH2AO05 Secure Role-Based Access Control for RHIC Complex 1150
 
  • A. Sukhanov, J. Morris
    BNL, Upton, New York, USA
 
  Funding: Work supported by Brookhaven Science Associates, LLC under Contract No. DE-SC0012704 with the U.S. Department of Energy.
This paper describes the requirements, design, and implementation of Role-Based Access Control (RBAC) for RHIC Complex. The system is being designed to protect from accidental, unauthorized access to equipment of the RHIC Complex, but it also can provide significant protection against malicious attacks. The role assignment is dynamic. Roles are primarily based on user id but elevated roles may be assigned for limited periods of time. Protection at the device manager level may be provided for an entire server or for individual device parameters. A prototype version of the system has been deployed at RHIC complex since 2022. The authentication is performed on a dedicated device manager, which generates an encrypted token, based on user ID, expiration time, and role level. Device managers are equipped with an authorization mechanism, which supports three methods of authorization: Static, Local and Centralized. Transactions with token manager take place ’atomically’, during secured set() or get() requests. The system has small overhead: ~0.5 ms for token processing and ~1.5 ms for network round trip. Only python based device managers are participating in the prototype system. Testing has begun with C++ device managers, including those that run on VxWorks platforms. For easy transition, dedicated intermediate shield managers can be deployed to protect access to device managers which do not directly support authorization.
 
DOI • reference for this paper ※ doi:10.18429/JACoW-ICALEPCS2023-TH2AO05  
About • Received ※ 04 October 2023 — Revised ※ 14 November 2023 — Accepted ※ 19 December 2023 — Issued ※ 22 December 2023
Cite • reference for this paper using ※ BibTeX, ※ LaTeX, ※ Text/Word, ※ RIS, ※ EndNote (xml)