39,579 Hits in 8.5 sec

Secure Information Sharing in a Virtual Multi-Agency Team Environment

Nabil Adam, Ahmet Kozanoglu, Aabhas Paliwal, Basit Shafiq
2007 Electronical Notes in Theoretical Computer Science  
This paper proposes a two tier RBAC approach for secure and selective information sharing among virtual multi-agency response team (VMART) and allows expansion of the VMART by admitting new collaborators  ...  Secure, selective and fine-grained information sharing is realized through the encryption of XML documents according to RBAC policies defined for the corresponding XML schema.  ...  Conclusion & Future Work In this paper we proposed a two tier RBAC approach for secure and selective information sharing in a virtual environment which has two levels: 1) Inter-agency; 2) Intra-agency.  ... 
doi:10.1016/j.entcs.2006.08.034 fatcat:hza64bxf7naxhdnhgqrcvmfql4

Research on Construction of Cloud Service Platform of Sci-tech Information for Agricultural Research System [chapter]

Ruixue Zhao, Yuantao Kou, Ruopeng Du, Liangliang Gu, Honglei Yang
2015 IFIP Advances in Information and Communication Technology  
co-construction and sharing among information service institutions in agricultural research system.  ...  The platform will integrate resources and services of co-construction institutions into a shared body, and form a new science and technology information service system to provide network infrastructure  ...  First of all, CAAS has provided a good network information environment, and established the first agricultural science and technology information network in China.  ... 
doi:10.1007/978-3-319-19620-6_62 fatcat:iwj4gnbzajevplu5n7us2lki2m

From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities [chapter]

Leonidas Anthopoulos, Panos Fitsilis
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Moreover, digital cities can succeed in simplifying citizen access to public information and services.  ...  , which share knowledge of common interest.  ...  is a virtual organization, consisting of various virtual teams [24] .  ... 
doi:10.1007/978-3-642-11631-5_33 fatcat:4cnujodc3fhjdkzdauu5xjnw6i

Design of a collaborative virtual environment for training security agents in big events

Claudio Passos, Márcio H. da Silva, Antonio C. A. Mol, Paulo V. R. Carvalho
2017 Cognition, Technology & Work  
This paper describes a design of a collaborative virtual environment (CVE) for training security agents in big events.  ...  The CVE was modelled with Autodesk 3ds Max, while Unity 3D was used to create the terrain and implement the features that make up a virtual environment.  ...  Acknowledgements The authors gratefully acknowledge the support of Conselho Nacional de Pesquisas (CNPq) and Fundação de Amparo a Pesquisa do Rio de Janeiro (FAPERJ).  ... 
doi:10.1007/s10111-017-0407-5 fatcat:osa26zbx5zej3mouvxc7xhvdwy

ICWorld: An MMOG-Based Approach to Analysis

Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko
2008 Journal of Strategic Security  
The concept has evolved over the This article is available in Journal of Strategic Security:  ...  The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can only  ...  Communication in the virtual environment occurs through a variety of means.  ... 
doi:10.5038/1944-0472.1.1.3 fatcat:5h5bj7l7kreqbeonvm2z2ycemu

A cloud computing based platform for sharing healthcare research information

Mu-Hsing Kuo, Andre Kushniruk, Elizabeth Borycki, Feipei Lai, Sarangerel Dorjgochoo, Erdenebaatar Altangerel, Chinburen Jigjidsuren
2012 2012 International Conference on Collaboration Technologies and Systems (CTS)  
The aim of this paper is to propose a cloud-based data mining (DM) platform for researchers in three different geographic locations (Canada, Taiwan and Mongolia) for sharing research data/results through  ...  the Internet while remaining cost effective, flexible, secure and privacy-preserved.  ...  a shared resource and multi tenancy environment for capacity, storage, and network.  ... 
doi:10.1109/cts.2012.6261097 dblp:conf/cts/KuoKBLDAJ12 fatcat:4rcefbvu7zbr7e6bxarphv4y4m

Agent-Based Technologies in Defense and Security

2002 Information & Security An International Journal  
In this special issue of Information & Security we shall present the results achieved in this area, discuss the benefits (and drawbacks) that agent-based systems may bring to the military and the broader  ...  security community, and provide a list of research and practical challenges that should be tackled in the near future so that the full potential of agent-based systems is realized.  ...  In their paper, Javier Carbo, José Molina and Jorge Davila present a scheme for multi-agent argumentative negotiation in the generic domain encompassing intelligence agencies and informers.  ... 
doi:10.11610/isij.0800 fatcat:zuuhjrekqzej3hkirnbqwfwnyq

Cyber Warriors For Cyber Security And Information Assurance- An Academic Perspective

Ronald F. Gonzales, Gordon W. Romney, Pradip Peter Dey, Mohammad Amin, Bhaskar Raj Sinha
2012 Zenodo  
not structured in the area of cyber security and information assurance.  ...  The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality  ...  administrators, faculty, students, interns and contractors (iNetwork) and individuals who have devoted of their time and subject matter expertise to qualify those dimensions contained within the function of the Virtual  ... 
doi:10.5281/zenodo.1076641 fatcat:z3k3frxkybfvnhklhl2plyk54i

Ambient Intelligence and Simulation in Health Care Virtual Scenarios [chapter]

António Abelha, Cesar Analide, José Machado, José Neves, Manuel Santos, Paulo Novais
2007 Establishing the Foundation of Collaborative Networks  
With such experience, in addition to extensive practice in managing change, knowledge sharing and innovation, it would be interesting in offering a contribution by facilitating a dialogue, knowledge café  ...  In this paper it will be presented a logical theory of Situation Awareness (SA) and discusses the methods required for developing an objective measure of SA within the context of a simulated medical environment  ...  Running applications in distributed environment is a huge problem when applications have not been developed to share knowledge and actions.  ... 
doi:10.1007/978-0-387-73798-0_49 dblp:conf/ifip5-5/AbelhaAMNSN07 fatcat:ph3sgyidpjefvlrcukgr5456q4

Using augmented reality for supporting information exchange in teams from the security domain

Dragos Datcu, Stephan Lukosch, Heide Lukosch, Marina Cidota
2015 Security Informatics  
The first evaluation shows that the scenarios are well defined and the AR environment can successfully support information exchange in teams operating in the security domain. which permits unrestricted  ...  The performance of operational teams in the security domain relies on quick and adequate exchange of contextrelated information.  ...  Acknowledgements The presented results have been achieved as part of a joint project with the Dutch Police and the Netherlands Forensic Institute (NFI) sponsored by the National Coordinator for Security  ... 
doi:10.1186/s13388-015-0025-9 fatcat:2x7dqyj4ungpjoedvjllchzk5q

Information Communication Technology Use for Public Safety in the United States

Naim Kapucu, Brittany Haupt
2016 Frontiers in Communication  
Information communication technology (ICT) is a crucial tool to support effective communication and decision-making under complex and uncertain environments of disasters by enhancing cognitive capacity  ...  Although a national public safety communication system was proposed, there are implementation challenges between local, state, and federal agencies.  ...  However, a challenge faced is redundancy between virtual organizations, virtual emergency operations centers, and another avenue of Virtual Operations Support Teams (VOSTs) to monitor disasters and events  ... 
doi:10.3389/fcomm.2016.00008 fatcat:pbyqf5bg5vhozi7cydk3737qwa

Multi-agent systems in defense and security: Research projects, systems, and software tools

I&S Monitor
2002 Information & Security An International Journal  
IMMACCS assists military commanders and crisis management teams under battlelike conditions when dynamic information changes, complex relationships, and time RETSINA Demining This is a robotic demining  ...  The Integrated Marine Multi-Agent Command and Control System (IMMACCS) provides an objectified picture of the battlespace to aid in exploiting opportunities and accelerating tempo.  ...  of platoon units, and plan joint missions via a shared virtual environment TIE-3 Demo: Interoperability of Multi-agent Systems to Support an Escalating Noncombatant Evacuation Operation (NEO) http://www  ... 
doi:10.11610/isij.0806 fatcat:fpl5hnajcbhzhau5ivfvlbq2bu

Cloud Security Monitoring and Vulnerability Management [chapter]

M. Kozlovszky
2016 Topics in Intelligent Engineering and Informatics  
It is virtualized, it is agent based and collects assessment information by the decentralized Security Monitor and it archives the results received from the components and visualize them via a web interface  ...  In this paper we present our virtualized cloud security monitor and assessment solution, we describe its functionalities and provide some examples of its results captured in real systems.  ...  Security A [17] is a freeware tool designed to determ most of the MS based environment in Microsoft security recommendations a remediation guidance.  ... 
doi:10.1007/978-3-319-28091-2_11 fatcat:rv7cal43pnajda6kb4ov2vp62a

Collaborative Engineering Across Organizational Boundaries

Art Boyars, W. Aldo Kusmik, Mike Yukish
2002 Naval engineers journal (Print)  
Presented here are some of the lessons learned in that work, focusing on the barriers to collaboration in multi-organizational teams. FIGURE 1.  ...  Security Federal laws and regulations govern protection of National Security information (Under SECDEF R&E).  ... 
doi:10.1111/j.1559-3584.2002.tb00149.x fatcat:bxzxkz5lp5dyrh5zx5toxkoc3y

Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies

Velizar Shalamanov, Stoyan Avramov
2005 Information & Security An International Journal  
of interoperability, security and information sharing issues in coalition and emergency operations.  ...  The modules integrate advanced, commercially available technologies, and may serve as a pool of building blocks in the creation of advanced C4 systems for a variety of multinational, multi-agency operations  ...  Combining virtual flat networks with vertical hierarchies presents considerable challenges for security and horizontal information sharing.  ... 
doi:10.11610/isij.1608 fatcat:kw5emqkdpfcuzie72mcxlsraxm
« Previous Showing results 1 — 15 out of 39,579 results