A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Security Concepts for Common Operating Environments
2011
2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops
The paper closes with a set of recommendations and steps forward for both research into and implementation of security in a SOA-based COE. ...
We present and motivate security needs, tradeoffs, and solutions in the various layers of a SOA-based COE, including 1) the network, 2) computational platforms, and 3) the common software infrastructure ...
NIST risk-based management process and the Security Content Automation Protocol (SCAP) are useful to assess this concern. E. ...
doi:10.1109/isorcw.2011.31
dblp:conf/isorc/LoyallRPA11
fatcat:oe4kughiu5g2bjhq7uyoqblply
5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust
2021
Zenodo
Notes none
e-Licensing Management
Overview The e-License management service is designed for the metric-based control of the proprietary Virtual Functions (VFs) in the different domains. ...
In [114] , SBA is described as a middle ground between SOA and MSA. ...
doi:10.5281/zenodo.5561042
fatcat:o5ecnvwvifhmveigarvfgih3l4
A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures
2020
Computers
In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact ...
The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV). ...
Architectural Internet of Things research has primarily been divided into two fields from a wider pool of options, three-layer architecture and SoA-based architecture [180] . ...
doi:10.3390/computers9020044
fatcat:v2iru7ncd5gppjd2qwse4v4axi
Radiation Tolerant Electronics
2019
Electronics
Research on radiation tolerant electronics has increased rapidly over the last few years, resulting in many interesting approaches to model radiation effects and design radiation hardened integrated circuits ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/electronics8070730
fatcat:wjo5prr5xjeqtlhxlj4kqz5st4
Synthesis of secure adaptors
2012
The Journal of Logic and Algebraic Programming
In addition, if the transition relation of C presents a tree structure, then ia(A) also presents a tree structure. ...
Appendix A. Proofs Proposition 2.1. Given an adaptor A compliant with a contract C, ia(A) is a deterministic interface. ...
Acknowledgements Work partially supported by EU-funded project FP7-231167 CONNECT and by EU-funded project FP7-256980 NESSOS, project P06-TIC-02250 funded by the Andalusian local government and project ...
doi:10.1016/j.jlap.2011.08.001
fatcat:57xdccscszaojecw3fgnjobwfe
Australia: Financial Sector Assessment Program: Detailed Assessment of Observance of Standards and Codes
2006
IMF Staff Country Reports
It is based on the information available at the time it was completed in October 2006. ...
The views expressed in this document are those of the staff team and do not necessarily reflect the views of the government of Australia or the Executive Board of the Contents Page I. ...
Risk management and procedures: RITS regulations and agreements with the participants clearly provide information on risk management and procedures. ...
doi:10.5089/9781451802146.002
fatcat:r2qmoovdefbulebovk6aqq66s4
Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards
2017
Requirements Engineering
This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations ...
To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical ...
Acknowledgements This material is based on research sponsored in part by the Air Force Office of Scientific Research (AFOSR), under Agreement No. FA-9550-09-1-0409. ...
doi:10.1007/s00766-017-0287-5
fatcat:2o2ynjgo3reqnkb4o57zxnb3ce
Journal of Computer Science IJCSIS June 2021 Full Volume
2021
Zenodo
The aim is to support you to achieve success in your research and scholarly experience. ...
PT XYZ is a customer relationship management-based company. ...
feasible domain of variable X , there exists interval IA and IB. ...
doi:10.5281/zenodo.5556913
fatcat:yineojxcujg4jnvqt6i742dhii
Hungarian Peacekeepers in Africa and a Hungarian Perspective on the UN Mission in Mozambique
2018
Figshare
The significance of the NATO/EU a n d U N m i s s i o n s i n t h e l i f e of Hungarian Defence Forces is well known. ...
There is a training centre in Szolnok, where applicants can prepare for international service, yet, there still can be noticed some deficiencies as far as training is concerned. ...
The current spatial configuration of the Romanian forces, as well as the missions assigned a n d / o r a s s u m e d i n t h e a t r e have influenced the dimensions of their support with communications ...
doi:10.6084/m9.figshare.7108646.v1
fatcat:ltmbq7644fbj3fywbusldmfh5u
D3.1 Review of Social Science in Air Quality and Carbon Management FINAL REVISED April 2018
2017
Zenodo
D3.1 consists of a review of the current interaction between social science and air quality and carbon management. ...
indications of its uptake within policy; 2: A review of EU funded research and projects on air quality management from the CORDIS database; 3: A review of a selection of air quality policy and plan documents ...
1 In ClairCity we are not considering e.g. overseas flights or consuming products that cause air pollution elsewhere. 2 For example burning low-quality fuel. ...
doi:10.5281/zenodo.3972105
fatcat:k52wt2aspjamvn6qpl3qflbwtu
An Event Reporting and Early-Warning Safety System Based on the Internet of Things for Underground Coal Mines: A Case Study
2017
Applied Sciences
centroid localization algorithm for improving safety management and preventing accidents in underground coal mines. ...
This study introduces a real-time monitoring, event-reporting and early-warning platform, based on cluster analysis for outlier detection, spatiotemporal statistical analysis, and an RSS range-based weighted ...
Thus, the temporal statistical models govern intelligent decision-making and work well in the harsh environment of an underground mine. ...
doi:10.3390/app7090925
fatcat:krzt3xft2badfphtgtikyrlnqe
Developing a grid-enabled spatial Web portal for Internet GIServices and geospatial cyberinfrastructure
2009
International Journal of Geographical Information Science
Acknowledgments This work was partially funded by the NASA REASoN-0118-0209 project (A Border Spatial Decision Support System) at San Diego State University and the National Developing a grid-enabled spatial ...
In addition, most three-tier client/server systems are vulnerable on the server side in disaster recovery and fault tolerant events. ...
The OGCE portal framework has built-in management portlets for user account management and user profiling. ...
doi:10.1080/13658810802698571
fatcat:yvzzhukpanhurjmio33cpvshcy
State of the art analysis
2017
Zenodo
On one side, and probably the most important one, a CHP unit may provide enough electrical power to the kiln to grant its functions even in case of a prolongated blackout on the grid. ...
The DREAM project proposed to find a cogeneration system that would allow a dual fuel feeding wherein one of them would be a bio‐fuel. ...
Michael E. ...
doi:10.5281/zenodo.2602683
fatcat:x7hlyqxlmfhtbdsexu2i2rejlq
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project
2019
Zenodo
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project ...
architecture (SOA). ...
Cantador: "Citizen participation
and the rise of digital media
platforms in smart governance and
smart cities", Int. Journal of E-
Planning Research (IJEPR), 8(1),
19-34, 2019. ...
doi:10.5281/zenodo.4294256
fatcat:ovybcpqny5eppniw7hb5vcsevy
LESSONS OF THE FALKLANDS
1983
Naval engineers journal (Print)
After t•,e Argentine landing of troops in the Falkiands on the night of 1-2 April, the British government initiated a number of military and political actions. ...
A similar U.S. operation would rely primarily on amphibious ships that are configured for "combat loading" of materiel. A U.S. ...
The following ships participated in British operations in the South Atlantic. ...
doi:10.1111/j.1559-3584.1983.tb01271.x
fatcat:bvuw7r3anzby7exryv6twajlti
« Previous
Showing results 1 — 15 out of 153 results