A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Information Sharing in a Virtual Multi-Agency Team Environment
2007
Electronical Notes in Theoretical Computer Science
This paper proposes a two tier RBAC approach for secure and selective information sharing among virtual multi-agency response team (VMART) and allows expansion of the VMART by admitting new collaborators ...
Secure, selective and fine-grained information sharing is realized through the encryption of XML documents according to RBAC policies defined for the corresponding XML schema. ...
Conclusion & Future Work In this paper we proposed a two tier RBAC approach for secure and selective information sharing in a virtual environment which has two levels: 1) Inter-agency; 2) Intra-agency. ...
doi:10.1016/j.entcs.2006.08.034
fatcat:hza64bxf7naxhdnhgqrcvmfql4
Research on Construction of Cloud Service Platform of Sci-tech Information for Agricultural Research System
[chapter]
2015
IFIP Advances in Information and Communication Technology
co-construction and sharing among information service institutions in agricultural research system. ...
The platform will integrate resources and services of co-construction institutions into a shared body, and form a new science and technology information service system to provide network infrastructure ...
First of all, CAAS has provided a good network information environment, and established the first agricultural science and technology information network in China. ...
doi:10.1007/978-3-319-19620-6_62
fatcat:iwj4gnbzajevplu5n7us2lki2m
From Online to Ubiquitous Cities: The Technical Transformation of Virtual Communities
[chapter]
2010
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Moreover, digital cities can succeed in simplifying citizen access to public information and services. ...
, which share knowledge of common interest. ...
is a virtual organization, consisting of various virtual teams [24] . ...
doi:10.1007/978-3-642-11631-5_33
fatcat:4cnujodc3fhjdkzdauu5xjnw6i
Design of a collaborative virtual environment for training security agents in big events
2017
Cognition, Technology & Work
This paper describes a design of a collaborative virtual environment (CVE) for training security agents in big events. ...
The CVE was modelled with Autodesk 3ds Max, while Unity 3D was used to create the terrain and implement the features that make up a virtual environment. ...
Acknowledgements The authors gratefully acknowledge the support of Conselho Nacional de Pesquisas (CNPq) and Fundação de Amparo a Pesquisa do Rio de Janeiro (FAPERJ). ...
doi:10.1007/s10111-017-0407-5
fatcat:osa26zbx5zej3mouvxc7xhvdwy
ICWorld: An MMOG-Based Approach to Analysis
2008
Journal of Strategic Security
The concept has evolved over the This article is available in Journal of Strategic Security: ...
The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can only ...
Communication in the virtual environment occurs through a variety of means. ...
doi:10.5038/1944-0472.1.1.3
fatcat:5h5bj7l7kreqbeonvm2z2ycemu
A cloud computing based platform for sharing healthcare research information
2012
2012 International Conference on Collaboration Technologies and Systems (CTS)
The aim of this paper is to propose a cloud-based data mining (DM) platform for researchers in three different geographic locations (Canada, Taiwan and Mongolia) for sharing research data/results through ...
the Internet while remaining cost effective, flexible, secure and privacy-preserved. ...
a shared resource and multi tenancy environment for capacity, storage, and network. ...
doi:10.1109/cts.2012.6261097
dblp:conf/cts/KuoKBLDAJ12
fatcat:4rcefbvu7zbr7e6bxarphv4y4m
Agent-Based Technologies in Defense and Security
2002
Information & Security An International Journal
In this special issue of Information & Security we shall present the results achieved in this area, discuss the benefits (and drawbacks) that agent-based systems may bring to the military and the broader ...
security community, and provide a list of research and practical challenges that should be tackled in the near future so that the full potential of agent-based systems is realized. ...
In their paper, Javier Carbo, José Molina and Jorge Davila present a scheme for multi-agent argumentative negotiation in the generic domain encompassing intelligence agencies and informers. ...
doi:10.11610/isij.0800
fatcat:zuuhjrekqzej3hkirnbqwfwnyq
Cyber Warriors For Cyber Security And Information Assurance- An Academic Perspective
2012
Zenodo
not structured in the area of cyber security and information assurance. ...
The Master of Science in Cyber Security and Information Assurance (MSCSIA) is a professional degree for those who endeavor through technical and managerial measures to ensure the security, confidentiality ...
administrators, faculty, students, interns and contractors (iNetwork) and individuals who have devoted of their time and subject matter expertise to qualify those dimensions contained within the function of the Virtual ...
doi:10.5281/zenodo.1076641
fatcat:z3k3frxkybfvnhklhl2plyk54i
Ambient Intelligence and Simulation in Health Care Virtual Scenarios
[chapter]
2007
Establishing the Foundation of Collaborative Networks
With such experience, in addition to extensive practice in managing change, knowledge sharing and innovation, it would be interesting in offering a contribution by facilitating a dialogue, knowledge café ...
In this paper it will be presented a logical theory of Situation Awareness (SA) and discusses the methods required for developing an objective measure of SA within the context of a simulated medical environment ...
Running applications in distributed environment is a huge problem when applications have not been developed to share knowledge and actions. ...
doi:10.1007/978-0-387-73798-0_49
dblp:conf/ifip5-5/AbelhaAMNSN07
fatcat:ph3sgyidpjefvlrcukgr5456q4
Using augmented reality for supporting information exchange in teams from the security domain
2015
Security Informatics
The first evaluation shows that the scenarios are well defined and the AR environment can successfully support information exchange in teams operating in the security domain. which permits unrestricted ...
The performance of operational teams in the security domain relies on quick and adequate exchange of contextrelated information. ...
Acknowledgements The presented results have been achieved as part of a joint project with the Dutch Police and the Netherlands Forensic Institute (NFI) sponsored by the National Coordinator for Security ...
doi:10.1186/s13388-015-0025-9
fatcat:2x7dqyj4ungpjoedvjllchzk5q
Information Communication Technology Use for Public Safety in the United States
2016
Frontiers in Communication
Information communication technology (ICT) is a crucial tool to support effective communication and decision-making under complex and uncertain environments of disasters by enhancing cognitive capacity ...
Although a national public safety communication system was proposed, there are implementation challenges between local, state, and federal agencies. ...
However, a challenge faced is redundancy between virtual organizations, virtual emergency operations centers, and another avenue of Virtual Operations Support Teams (VOSTs) to monitor disasters and events ...
doi:10.3389/fcomm.2016.00008
fatcat:pbyqf5bg5vhozi7cydk3737qwa
Multi-agent systems in defense and security: Research projects, systems, and software tools
2002
Information & Security An International Journal
IMMACCS assists military commanders and crisis management teams under battlelike conditions when dynamic information changes, complex relationships, and time RETSINA Demining This is a robotic demining ...
The Integrated Marine Multi-Agent Command and Control System (IMMACCS) provides an objectified picture of the battlespace to aid in exploiting opportunities and accelerating tempo. ...
of platoon units, and plan joint missions via a shared virtual environment TIE-3 Demo: Interoperability of Multi-agent Systems to Support an Escalating Noncombatant Evacuation Operation (NEO) http://www ...
doi:10.11610/isij.0806
fatcat:fpl5hnajcbhzhau5ivfvlbq2bu
Cloud Security Monitoring and Vulnerability Management
[chapter]
2016
Topics in Intelligent Engineering and Informatics
It is virtualized, it is agent based and collects assessment information by the decentralized Security Monitor and it archives the results received from the components and visualize them via a web interface ...
In this paper we present our virtualized cloud security monitor and assessment solution, we describe its functionalities and provide some examples of its results captured in real systems. ...
Security A
[17] is a freeware tool designed to determ
most of the MS based environment in
Microsoft security recommendations a
remediation guidance. ...
doi:10.1007/978-3-319-28091-2_11
fatcat:rv7cal43pnajda6kb4ov2vp62a
Collaborative Engineering Across Organizational Boundaries
2002
Naval engineers journal (Print)
Presented here are some of the lessons learned in that work, focusing on the barriers to collaboration in multi-organizational teams.
FIGURE 1. ...
Security Federal laws and regulations govern protection of National Security information (Under SECDEF R&E). ...
doi:10.1111/j.1559-3584.2002.tb00149.x
fatcat:bxzxkz5lp5dyrh5zx5toxkoc3y
Ruggedized Commercial IT Modules for Field C2 Posts in Coalition Operations and Emergencies
2005
Information & Security An International Journal
of interoperability, security and information sharing issues in coalition and emergency operations. ...
The modules integrate advanced, commercially available technologies, and may serve as a pool of building blocks in the creation of advanced C4 systems for a variety of multinational, multi-agency operations ...
Combining virtual flat networks with vertical hierarchies presents considerable challenges for security and horizontal information sharing. ...
doi:10.11610/isij.1608
fatcat:kw5emqkdpfcuzie72mcxlsraxm
« Previous
Showing results 1 — 15 out of 39,579 results