Filters








153 Hits in 8.4 sec

A Survey of Security Concepts for Common Operating Environments

Joseph Loyall, Kurt Rohloff, Partha Pal, Michael Atighetchi
2011 2011 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops  
The paper closes with a set of recommendations and steps forward for both research into and implementation of security in a SOA-based COE.  ...  We present and motivate security needs, tradeoffs, and solutions in the various layers of a SOA-based COE, including 1) the network, 2) computational platforms, and 3) the common software infrastructure  ...  NIST risk-based management process and the Security Content Automation Protocol (SCAP) are useful to assess this concern. E.  ... 
doi:10.1109/isorcw.2011.31 dblp:conf/isorc/LoyallRPA11 fatcat:oe4kughiu5g2bjhq7uyoqblply

5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust

. Carrozzo, P.G. Giardina, J. Brenes, E. Bucchianeri, G. Landi, C. Herranz, A. Fernandez, M. S. Siddiqui, Javier Fernandez, K. Meth, K. Barabash, Diego R. López, P. Diogo, L. Conceicao, T. Subramanya, R. Behravesh, J.M. Jorquera Valero, P. M. Sánchez Sánchez, M. Gil Pérez, G. Martínez Pérez, J. Taylor, J. Bonnet, P. Chainho, M. Mertiri, T. Bozios, A. Lekidis, V. Theodorou, D. Laskaratos, F. Bravo Díaz, A. Ramos, J.M. Mifsud, A. Sciberreas
2021 Zenodo  
Notes none e-Licensing Management Overview The e-License management service is designed for the metric-based control of the proprietary Virtual Functions (VFs) in the different domains.  ...  In [114] , SBA is described as a middle ground between SOA and MSA.  ... 
doi:10.5281/zenodo.5561042 fatcat:o5ecnvwvifhmveigarvfgih3l4

A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures

Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, Joseph Brown
2020 Computers  
In addition, the paper presents a comprehensive taxonomy of attacks on IoT based on the three-layer architecture model; perception, network, and application layers, as well as a suggestion of the impact  ...  The explosive growth and integration of IoT in different domains and areas of our daily lives has created an Internet of Vulnerabilities (IoV).  ...  Architectural Internet of Things research has primarily been divided into two fields from a wider pool of options, three-layer architecture and SoA-based architecture [180] .  ... 
doi:10.3390/computers9020044 fatcat:v2iru7ncd5gppjd2qwse4v4axi

Radiation Tolerant Electronics

Paul Leroux
2019 Electronics  
Research on radiation tolerant electronics has increased rapidly over the last few years, resulting in many interesting approaches to model radiation effects and design radiation hardened integrated circuits  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/electronics8070730 fatcat:wjo5prr5xjeqtlhxlj4kqz5st4

Synthesis of secure adaptors

J.A. Martín, F. Martinelli, E. Pimentel
2012 The Journal of Logic and Algebraic Programming  
In addition, if the transition relation of C presents a tree structure, then ia(A) also presents a tree structure.  ...  Appendix A. Proofs Proposition 2.1. Given an adaptor A compliant with a contract C, ia(A) is a deterministic interface.  ...  Acknowledgements Work partially supported by EU-funded project FP7-231167 CONNECT and by EU-funded project FP7-256980 NESSOS, project P06-TIC-02250 funded by the Andalusian local government and project  ... 
doi:10.1016/j.jlap.2011.08.001 fatcat:57xdccscszaojecw3fgnjobwfe

Australia: Financial Sector Assessment Program: Detailed Assessment of Observance of Standards and Codes

International Monetary Fund
2006 IMF Staff Country Reports  
It is based on the information available at the time it was completed in October 2006.  ...  The views expressed in this document are those of the staff team and do not necessarily reflect the views of the government of Australia or the Executive Board of the Contents Page I.  ...  Risk management and procedures: RITS regulations and agreements with the participants clearly provide information on risk management and procedures.  ... 
doi:10.5089/9781451802146.002 fatcat:r2qmoovdefbulebovk6aqq66s4

Semantic hierarchies for extracting, modeling, and connecting compliance requirements in information security control standards

Matthew L. Hale, Rose F. Gamble
2017 Requirements Engineering  
This paper introduces a step-wise process, based on semantic hierarchies, that systematically extracts relevant security requirements from control standards to build a certification baseline for organizations  ...  To mitigate these risks and ensure that their information systems meet regulatory standards, organizations must be able to (a) contextualize regulatory documents in a way that extracts the relevant technical  ...  Acknowledgements This material is based on research sponsored in part by the Air Force Office of Scientific Research (AFOSR), under Agreement No. FA-9550-09-1-0409.  ... 
doi:10.1007/s00766-017-0287-5 fatcat:2o2ynjgo3reqnkb4o57zxnb3ce

Journal of Computer Science IJCSIS June 2021 Full Volume

IJCSIS Editor
2021 Zenodo  
The aim is to support you to achieve success in your research and scholarly experience.  ...  PT XYZ is a customer relationship management-based company.  ...  feasible domain of variable X , there exists interval IA and IB.  ... 
doi:10.5281/zenodo.5556913 fatcat:yineojxcujg4jnvqt6i742dhii

Hungarian Peacekeepers in Africa and a Hungarian Perspective on the UN Mission in Mozambique

Besenyő János
2018 Figshare  
The significance of the NATO/EU a n d U N m i s s i o n s i n t h e l i f e of Hungarian Defence Forces is well known.  ...  There is a training centre in Szolnok, where applicants can prepare for international service, yet, there still can be noticed some deficiencies as far as training is concerned.  ...  The current spatial configuration of the Romanian forces, as well as the missions assigned a n d / o r a s s u m e d i n t h e a t r e have influenced the dimensions of their support with communications  ... 
doi:10.6084/m9.figshare.7108646.v1 fatcat:ltmbq7644fbj3fywbusldmfh5u

D3.1 Review of Social Science in Air Quality and Carbon Management FINAL REVISED April 2018

Tim Chatterton, Laura De Vito, Eva Csobod, Peter Szuppinger, Gabor Heves
2017 Zenodo  
D3.1 consists of a review of the current interaction between social science and air quality and carbon management.  ...  indications of its uptake within policy; 2: A review of EU funded research and projects on air quality management from the CORDIS database; 3: A review of a selection of air quality policy and plan documents  ...  1 In ClairCity we are not considering e.g. overseas flights or consuming products that cause air pollution elsewhere. 2 For example burning low-quality fuel.  ... 
doi:10.5281/zenodo.3972105 fatcat:k52wt2aspjamvn6qpl3qflbwtu

An Event Reporting and Early-Warning Safety System Based on the Internet of Things for Underground Coal Mines: A Case Study

2017 Applied Sciences  
centroid localization algorithm for improving safety management and preventing accidents in underground coal mines.  ...  This study introduces a real-time monitoring, event-reporting and early-warning platform, based on cluster analysis for outlier detection, spatiotemporal statistical analysis, and an RSS range-based weighted  ...  Thus, the temporal statistical models govern intelligent decision-making and work well in the harsh environment of an underground mine.  ... 
doi:10.3390/app7090925 fatcat:krzt3xft2badfphtgtikyrlnqe

Developing a grid-enabled spatial Web portal for Internet GIServices and geospatial cyberinfrastructure

Tong Zhang, Ming-Hsiang Tsou
2009 International Journal of Geographical Information Science  
Acknowledgments This work was partially funded by the NASA REASoN-0118-0209 project (A Border Spatial Decision Support System) at San Diego State University and the National Developing a grid-enabled spatial  ...  In addition, most three-tier client/server systems are vulnerable on the server side in disaster recovery and fault tolerant events.  ...  The OGCE portal framework has built-in management portlets for user account management and user profiling.  ... 
doi:10.1080/13658810802698571 fatcat:yvzzhukpanhurjmio33cpvshcy

State of the art analysis

N. Raule E. Bongiovanni
2017 Zenodo  
On one side, and probably the most important one, a CHP unit may provide enough electrical power to the kiln to grant its functions even in case of a prolongated blackout on the grid.  ...  The DREAM project proposed to find a cogeneration system that would allow a dual fuel feeding wherein one of them would be a bio‐fuel.  ...  Michael E.  ... 
doi:10.5281/zenodo.2602683 fatcat:x7hlyqxlmfhtbdsexu2i2rejlq

Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project

Maria Pateraki, Manolis Lourakis, Leonidas Kallipolitis, Frank Werner, Petros Patias, Christos Pikridas
2019 Zenodo  
Supporting the Wellness at Work and Productivity of Ageing Employees in Industrial Environments: The sustAGE Project  ...  architecture (SOA).  ...  Cantador: "Citizen participation and the rise of digital media platforms in smart governance and smart cities", Int. Journal of E- Planning Research (IJEPR), 8(1), 19-34, 2019.  ... 
doi:10.5281/zenodo.4294256 fatcat:ovybcpqny5eppniw7hb5vcsevy

LESSONS OF THE FALKLANDS

JOHN W. WALKER
1983 Naval engineers journal (Print)  
After t•,e Argentine landing of troops in the Falkiands on the night of 1-2 April, the British government initiated a number of military and political actions.  ...  A similar U.S. operation would rely primarily on amphibious ships that are configured for "combat loading" of materiel. A U.S.  ...  The following ships participated in British operations in the South Atlantic.  ... 
doi:10.1111/j.1559-3584.1983.tb01271.x fatcat:bvuw7r3anzby7exryv6twajlti
« Previous Showing results 1 — 15 out of 153 results