WorldWideScience

Sample records for broadcast service security

  1. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  2. Financing Public Service Broadcasting

    DEFF Research Database (Denmark)

    Berg, Christian Edelvold; Lund, Anker Brink

    2012-01-01

    Broadcasting (PSB) financing regimes in Europe, concluding that Denmark, Finland, Iceland, Norway, and Sweden may still be considered conventional, licence fee PSB countries, but with some interesting differences in relation to competitive and market oriented alternatives of resource provision......Recently several European countries have abolished the traditional public service licence fee system, replacing it with direct public funding. But except for Iceland, the Nordic countries have not followed suit. The article discusses this development within a comparative framework of Public Service...

  3. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  4. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  5. Histories of Public Service Broadcasters on the Web

    DEFF Research Database (Denmark)

    This edited volume details multiple and dynamic histories of relations between public service broadcasters and the World Wide Web. What does it mean to be a national broadcaster in a global communications environment? What are the commercial and public service pressures that were brought to bear...... when public service broadcasters implemented web services? How did “one- to-many” broadcasters adapt to the “many-to-many” medium of the internet? The thematic or- ganisation of this collection addresses such major issues, while each chapter offers a particular historical account of relations between...... public service broadcasters and the World Wide Web....

  6. 75 FR 10692 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-03-09

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Final... Television Commission, the licensee of noncommercial educational station WBIQ(TV), channel *10, Birmingham... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  7. 76 FR 52632 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-08-23

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  8. 76 FR 35831 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-06-20

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  9. 76 FR 14855 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-03-18

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29, RM-11622; DA 11-335] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission. Kevin R. Harding...

  10. 78 FR 44090 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-07-23

    ...] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... 73 Television, Television broadcasting. Federal Communications Commission. Hossein Hashemzadeh...

  11. Broadcast Services. Information Bulletin No. 3.

    Science.gov (United States)

    Federal Communications Commission, Washington, DC.

    Radio and television broadcasting is authorized and regulated by the Federal Communications Commission (FCC). Following a brief description of the development of broadcasting, broadcast regulations, and the Commission, this report examines various aspects of the subject pertaining to the fairness doctrine, political broadcasting, advertising, sale…

  12. User innovation in public service broadcasts

    DEFF Research Database (Denmark)

    Khajeheian, Datis; Tadayoni, Reza

    2016-01-01

    and develop user innovations into professional content. This study follows a qualitative approach with a document study of Denmark's public service broadcast and two interviews. Findings indicate that the commitment to quality and professional content prevents managers of PSBs from outsourcing......This research aims to understand how public service media can encourage media entrepreneurship in the society to enrich user innovations as a source of ideas, products, contents, talent and creativity. The assumption is that media entrepreneurs turn users into sources of external creativity...... their production to media entrepreneurs, but they trust large media companies as external producers. This research contributes to the field by proposing that public service media can foster media entrepreneurship in a society indirectly and by creating demand for external sources of creativity. Large media...

  13. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  14. The Use of Television Format Adaptation in Denmark: Public Service Broadcasters Compared to Commercial Broadcasters

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    brought about major changes in both production and scheduling. This paper evaluates the impact that format adaptation has had in Denmark on public service broadcasters (PSBs) compared to commercial broadcasters. To illustrate transnational differences, references are made to Germany and Australia. First......, a quantitative analysis of PSB and commercial schedules in Denmark is presented to establish the extent to which PSBs have employed formats between 2000 and 2012, and how this compares with commercial broadcasters. Secondly, a qualitative analysis looks into genre and the nature of the individual formats...... employed to assess any important differences between the formats in the two sectors. Most formats fall within entertainment and is well suited to providing the consumption friendly environment that commercial broadcasters seek to offer their advertising clients (Brennan 2012). Broadcasters also favour...

  15. 75 FR 76294 - Radio Broadcasting Services; Fairbanks, AK

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2211; MB Docket No. 10-81; RM-11600] Radio Broadcasting Services; Fairbanks, AK AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed in the preamble, the...

  16. 76 FR 9991 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-02-23

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-224; MB Docket No. 11-20; RM-11619] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  17. 75 FR 67077 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2010-11-01

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2000; MB Docket No. 08-194; RM-11488] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  18. 75 FR 1546 - Television Broadcasting Services; Bangor, ME

    Science.gov (United States)

    2010-01-12

    ...] Television Broadcasting Services; Bangor, ME AGENCY: Federal Communications Commission. ACTION: Final rule... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal Communications Commission...

  19. 76 FR 5119 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-96; MB Docket No. 11-8; RM-11618] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Proposed... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the...

  20. 75 FR 25119 - Television Broadcasting Services; Seaford, DE

    Science.gov (United States)

    2010-05-07

    ...] Television Broadcasting Services; Seaford, DE AGENCY: Federal Communications Commission. ACTION: Final rule... very high frequency commercial television channel to each State, if technically feasible. DATES: This... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  1. 76 FR 54188 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137, RM-11637; DA 11-1414] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 47 CFR Part 73 Television, Television broadcasting. Federal Communications Commission. Barbara A...

  2. 75 FR 9859 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-307; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  3. 76 FR 76337 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2011-12-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-192, RM-11646; DA 11-1924] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission Barbara A. Kreisman, Chief...

  4. 76 FR 13966 - Television Broadcasting Services; Topeka, KS

    Science.gov (United States)

    2011-03-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-33, RM-11623; DA 11-406] Television Broadcasting Services; Topeka, KS AGENCY: Federal Communications Commission. ACTION: Proposed rule... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  5. 75 FR 5015 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-02-01

    ...] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  6. 76 FR 5120 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-74; MB Docket No. 11-4; RM-11616] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  7. 76 FR 3875 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-01-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2426; MB Docket No. 10-264; RM-11615] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  8. 76 FR 5290 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2011-01-31

    ...] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Final... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  9. 78 FR 12010 - Radio Broadcasting Services; Pearsall, Texas

    Science.gov (United States)

    2013-02-21

    ... Broadcasting Services; Pearsall, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule... (``Petitioner''), licensee of FM Station KSAG, Channel 277A, Pearsall, Texas. Petitioner proposes to amend the... be allotted at Pearsall, Texas, in compliance with the Commission's minimum distance separation...

  10. 77 FR 46631 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-08-06

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Final... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... Subjects in 47 CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video...

  11. 77 FR 6481 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2012-02-08

    ...] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Final rule... power television rulemaking petitions requesting channel substitutions in May 2011, it subsequently... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  12. 78 FR 75306 - Television Broadcasting Services; Birmingham, Alabama

    Science.gov (United States)

    2013-12-11

    ...] Television Broadcasting Services; Birmingham, Alabama AGENCY: Federal Communications Commission. ACTION... Television Commission (``AETC''), the licensee of station WBIQ(TV), channel *39, Birmingham, Alabama... freeze on the filing of petitions for rulemaking by television stations seeking channel substitutions in...

  13. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2015-01-01

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  14. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal

    2015-11-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  15. 78 FR 27342 - Radio Broadcasting Services; Moran, Texas

    Science.gov (United States)

    2013-05-10

    ... Broadcasting Services; Moran, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY... service at Moran, Texas. Channel 281A can be allotted at Moran, Texas, in compliance with the Commission's... parties should serve petitioner as follows: Katherine Pyeatt, 215 Cedar Springs Rd., 1605, Dallas, Texas...

  16. 77 FR 2242 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-01-17

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as its second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road consistent...

  17. 77 FR 64792 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-10-23

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road...

  18. Reinventing public service broadcasting in Europe: prospects, promises and problems

    NARCIS (Netherlands)

    Bardoel, J.L.H.; d'Haenens, L.S.J.

    2008-01-01

    New information technologies, liberalizing policies and rapidly changing societies – from mono- to multicultural – entail serious consequences for the prospects of European public service broadcasters in a network society. The European concept of PSB as a comprehensive and universal service is

  19. 78 FR 71557 - Radio Broadcasting Services; Tohatchi, New Mexico

    Science.gov (United States)

    2013-11-29

    ...] Radio Broadcasting Services; Tohatchi, New Mexico AGENCY: Federal Communications Commission. ACTION... Channel 268C2, Tohatchi, New Mexico, as a first local service under the Tribal Priority. A staff... [Amended] 0 2. Section 73.202(b), the Table of FM Allotments under New Mexico, is amended by adding...

  20. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  1. 76 FR 12292 - Radio Broadcasting Services; Kualapuu, HI

    Science.gov (United States)

    2011-03-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-323; MB Docket No. 09-189; RM-11564] Radio Broadcasting Services; Kualapuu, HI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Kemp Communications, Inc., allots FM Channel 296C2 at Kualapuu, Hawaii...

  2. 75 FR 76294 - Radio Broadcasting Services: Pacific Junction, IA

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2236; MB Docket No. 10-108] Radio Broadcasting Services: Pacific Junction, IA AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The staff deletes FM Channel 299C2 at Pacific Junction, Iowa, because the record in this...

  3. 76 FR 67397 - Radio Broadcasting Services; Llano, Texas

    Science.gov (United States)

    2011-11-01

    ...] Radio Broadcasting Services; Llano, Texas AGENCY: Federal Communications Commission. ACTION: Proposed... substituting Channel 242C3 for vacant Channel 293C3, at Llano, Texas. The proposal is part of a contingently... required for the allotment of Channel 242C3 at Llano, Texas, because the proposed allotment is located...

  4. 78 FR 42700 - Radio Broadcasting Services; Matagorda, Texas

    Science.gov (United States)

    2013-07-17

    ... Broadcasting Services; Matagorda, Texas AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... FM Channel 252A at Matagorda, Texas. This allotment change is part of a hybrid rule making and FM... 291A at Matagorda, Texas, is located within 320 kilometers (199 miles) of the U.S.-Mexican border...

  5. 77 FR 38761 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-06-29

    ... Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposal rule..., Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local... Pike Road allotment. It is the Commission's policy to refrain from making an allotment to a community...

  6. 75 FR 3641 - Television Broadcasting Services; Anchorage, AK

    Science.gov (United States)

    2010-01-22

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-40; MB Docket No. 09-210; RM-11583] Television Broadcasting Services; Anchorage, AK AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  7. 76 FR 49697 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-08-11

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television...

  8. 78 FR 58470 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-09-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-182; RM-11701; DA 13-1882] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  9. 76 FR 33656 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-06-09

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29; RM-11622, DA 11-949] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  10. 76 FR 19275 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-8; RM-11618, DA 11-516] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal...

  11. 75 FR 13681 - Television Broadcasting Services; Atlantic City, NJ

    Science.gov (United States)

    2010-03-23

    ...] Television Broadcasting Services; Atlantic City, NJ AGENCY: Federal Communications Commission. ACTION: Final... not less than one very high frequency commercial television channel to each State, if technically... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  12. 76 FR 18415 - Television Broadcasting Services; New Haven, CT

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-123; RM-11546, DA 11-501] Television Broadcasting Services; New Haven, CT AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  13. 76 FR 19276 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-4; RM-11616, DA 11-530] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  14. 77 FR 33997 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-06-08

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Proposed... freeze on the acceptance of rulemaking petitions by full power television stations requesting channel... filed by full power television stations seeking to relocate from channel 51 pursuant to a voluntary...

  15. 76 FR 20248 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 10-264; RM-11615, DA 11-572] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  16. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Science.gov (United States)

    2011-11-03

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-115, RM-11543; DA 11-1502] Television Broadcasting Services; Fond du Lac, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this document, the Commission denies a petition for reconsideration of an August 12...

  17. 75 FR 19907 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-04-16

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-606; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  18. 76 FR 71909 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-11-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137; RM-11637, DA 11-1863] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  19. 76 FR 44280 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-74; RM-11630, DA 11-1185] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Final rule... U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal Communications...

  20. 76 FR 27914 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-05-13

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-20; RM-11619, DA 11-750] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Final rule... U.S.C. 801(a)(1)(A). [[Page 27915

  1. 75 FR 3695 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-01-22

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Television Commission (``AETC''), the licensee of noncommercial educational station WBIQ (TV), channel *10... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television...

  2. 76 FR 28946 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-05-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-74, RM-11630; DA 11-746] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... of Subjects in 47 CFR Part 73 Television Federal Communications Commission. Barbara A. Kreisman...

  3. 76 FR 66250 - Television Broadcasting Services; Cleveland, OH

    Science.gov (United States)

    2011-10-26

    ...] Television Broadcasting Services; Cleveland, OH AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Community Television of Ohio License, LLC (``Community Television''), the licensee of station WJW (TV), channel 8, Cleveland...

  4. 76 FR 18497 - Television Broadcasting Services; Augusta, GA

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-54, RM-11624; DA 11-499] Television Broadcasting Services; Augusta, GA AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division, Media...

  5. 76 FR 68117 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-11-03

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Commission grants a petition for rulemaking filed by Gray Television Licensee, LLC... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television...

  6. 75 FR 13236 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-395; MB Docket No. 10-19; RM-11589] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION: Final... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  7. 75 FR 81190 - Television Broadcasting Services; Yuma, AZ

    Science.gov (United States)

    2010-12-27

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2365; MB Docket No. 02-151; RM-10453] Television Broadcasting Services; Yuma, AZ AGENCY: Federal Communications Commission. ACTION: Dismissal. SUMMARY: The Commission dismisses the petition for rulemaking filed by Arizona Western College, requesting...

  8. Public Service Broadcasters and User Profiles

    DEFF Research Database (Denmark)

    Sørensen, Jannick Kirk

    2007-01-01

    as ‘recommender services’, and embedded in the overarching concept of ‘Customer Relation Management’ (CRM). On the other hand it is often stressed that it is the duty of PSB to serve the whole society, not only a few ‘star customers’ – as expressed in PSB remits and in so called ‘public service contracts...

  9. Altmark, Article 86(2) and Public Service Broadcasting

    DEFF Research Database (Denmark)

    Mortensen, Frands

    2008-01-01

    En analyse af EU-Kommissionens 17 Beslutninger angående statsstøtte til Public Service Broadcasting, der er truffet efter afsigelse af Altmark-dommen i juli 2003. Kommissionen har i alle tilfælde først analyseret om de fire Altmark-krav er opfyldt, og det er aldrig tilfældet. dernæst har den godk...

  10. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  11. Technological, political and economic changes and their implications for the evolution of broadcasting services

    DEFF Research Database (Denmark)

    Tadayoni, Reza

    2000-01-01

    The subject of this Ph.D. thesis is changes in the market for broadcasting services as a result of technological, political, and economic drivers. Broadcasting services can be categorised as a part of the ICT-based information and knowledge intensive services that have gone through radical changes...... and demand sites, scarcity of transmission resources, and the historical aspects that make the development of the broadcasting service market different from other information and knowledge intensive services....

  12. Using Digital Watermarking for Securing Next Generation Media Broadcasts

    Science.gov (United States)

    Birk, Dominik; Gaines, Seán

    The Internet presents a problem for the protection of intellectual property. Those who create content must be adequately compensated for the use of their works. Rights agencies who monitor the use of these works exist in many jurisdictions. In the traditional broadcast environment this monitoring is a difficult task. With Internet Protocol Television (IPTV) and Next Generation Networks (NGN) this situation is further complicated.

  13. 47 CFR 25.225 - Geographic Service Requirements for 17/24 GHz Broadcasting Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Geographic Service Requirements for 17/24 GHz Broadcasting Satellite Service. 25.225 Section 25.225 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.225 Geographic Service...

  14. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  15. Integrating Communication and Navigation: Next Generation Broadcast Service (NGBS)

    Science.gov (United States)

    Donaldson, Jennifer

    2017-01-01

    NASA Goddard has been investing in technology demonstrations of a beacon service, now called Next Generation Broadcast Services (NGBS). NGBS is a global, space-based, communications and navigation service for users of Global Navigation Satellite Systems (GNSS) and the Tracking and Data Relay Satellite System (TDRSS). NGBS will provide an S-band beacon messaging source and radio navigation available to users at orbital altitudes 1400 km and below, increasing the autonomy and resiliency of onboard communication and navigation. NGBS will deliver both one-way radiometric (Doppler and pseudorange) and fast forward data transport services to users. Portions of the overall forward data volume will be allocated for fixed message types while the remaining data volume will be left for user forward command data. The NGBS signal will reside within the 2106.43 MHz spectrum currently allocated for the Space Networks multiple access forward (MAF) service and a live service demonstration is currently being planned via the 2nd and 3rd generation TDRS satellites.

  16. 78 FR 78318 - Television Broadcasting Services; Oklahoma City, Oklahoma

    Science.gov (United States)

    2013-12-26

    ...: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Family Broadcasting Group, Inc. (``Family Broadcasting''), the licensee of station KSBI(TV), channel 51, Oklahoma City... instituted a freeze on the acceptance of full power television rulemaking petitions requesting channel...

  17. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Reiter, M.; Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2007-01-01

    We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is

  18. 76 FR 79113 - Amendment of Service and Eligibility Rules for FM Broadcast Translator Stations

    Science.gov (United States)

    2011-12-21

    ... of Service and Eligibility Rules for FM Broadcast Translator Stations AGENCY: Federal Communications... authorizing the use of FM translators with licenses or permits in effect as of May 1, 2009, to rebroadcast the... and Eligibility Rules for FM Broadcast Translator Stations, published at 74 FR 45126, September 1...

  19. 76 FR 4078 - Television Broadcasting Services; North Pole and Plattsburgh, NY

    Science.gov (United States)

    2011-01-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2443; MM Docket No. 99-238; RM-9669] Television Broadcasting Services; North Pole and Plattsburgh, NY AGENCY: Federal Communications Commission... CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the...

  20. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  1. From flip-flopping stereotypes to desecuritizing hybridity: Muslims as threats and security providers in Danish broadcast drama series

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2017-01-01

    by negative stereotypes; another is encouraged by how the very same stereotypes are ironically taken to extremes. Bearing in mind the intimate relation between identity and security, however, the stereotypical representation of difference is never innocent. The overall narratives of Danish public service...... broadcast series such as The Killing, Government and The Protectors rely on stereotypical security policy narratives identifying Muslims as threats. Even when stereotypes are creatively articulated to reverse the negative valuation, Muslim roles are distinctly charged or ‘securitized’ when compared to non......-Muslim roles. However, placing the ‘Muslim’ character centre stage allows a separate level of representation of a distinct role in the way stories articulate stereotypes, facilitating hybrid identities....

  2. The Use of International Television Formats by Public-Service Broadcasters in Australia, Denmark and Germany

    DEFF Research Database (Denmark)

    Esser, Andrea; Jensen, Pia Majbritt

    adaptations, as Jérôme Bourdon has noted, had no history here because they “contradicted almost everything public service broadcasting stood for” (2012: 114). Even though in many countries PSBs are also expected to provide entertainment, next to quality information and educational material, the overall idea...... the world is such, that it would be no exaggeration to speak of ‘creative destruction’ (Schumpeter 1942). How has this impacted on the production and provision of public-service broadcasting? Public-service broadcasters historically have different objectives to private commercial broadcasters and format...... of structural differences between the respective television markets. Moreover, a closer analysis of the genre and content of those formats employed, shows that the PSBs studied, even when buying and adapting formats from abroad, have tended to choose formats that fulfil the public-service remit....

  3. Coherent detection passive optical access network enabling converged delivery of broadcast and dedicated broadband services

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Prince, Kamau; Guerrero Gonzalez, Neil

    2011-01-01

    We propose a passive optical network architecture based on coherent detection for converged delivery of broadcast services from a dedicated remote broadcast server and user-specific services from a local central office. We experimentally demonstrate this architecture with mixed traffic types....... The broadcast channels were transmitted over 78 km of single mode fiber to a central office where they were multiplexed with the unicast channels for further fiber transmission over 34-km to reach the access network. Successful detection of all channels is demonstrated....

  4. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  5. The role of the public service broadcasting in the european countries

    Directory of Open Access Journals (Sweden)

    Budacia Elisabeta Andreea

    2008-04-01

    Full Text Available Broadcasting in particular has seen remarkable change from the days of single-channel public broadcasting systems. The audiovisual “explosion” is a cultural, social and economic phenomenon of global dimension. The audiovisual sector forms an essential part of Europe’s economic and cultural influence in the world. The fundamental principle of the Union’s audiovisual policy is to provide for the free circulation of reception of trans frontier broadcasts. So the European audiovisual industry is likely to become a stronger and more competitive player on the global scene. The future of public service broadcasting in Europe is increasingly challenged by unfavorable external factors, such as intensifying competition from commercial media, media concentrations, political and economic interests adversary to independent media, and by internal difficulties, such as cost ineffectiveness.

  6. Servicing a globally broadcast interrupt signal in a multi-threaded computer

    Science.gov (United States)

    Attinella, John E.; Davis, Kristan D.; Musselman, Roy G.; Satterfield, David L.

    2015-12-29

    Methods, apparatuses, and computer program products for servicing a globally broadcast interrupt signal in a multi-threaded computer comprising a plurality of processor threads. Embodiments include an interrupt controller indicating in a plurality of local interrupt status locations that a globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include a thread determining that a local interrupt status location corresponding to the thread indicates that the globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include the thread processing one or more entries in a global interrupt status bit queue based on whether global interrupt status bits associated with the globally broadcast interrupt signal are locked. Each entry in the global interrupt status bit queue corresponds to a queued global interrupt.

  7. 47 CFR 25.148 - Licensing provisions for the Direct Broadcast Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Licensing provisions for the Direct Broadcast Satellite Service. 25.148 Section 25.148 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Applications and Licenses Space Stations § 25.148...

  8. 47 CFR 25.215 - Technical requirements for space stations in the Direct Broadcast Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Technical requirements for space stations in the Direct Broadcast Satellite Service. 25.215 Section 25.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.215...

  9. 78 FR 14060 - Television Broadcasting Services; Seaford, Delaware and Dover, Delaware

    Science.gov (United States)

    2013-03-04

    ...] Television Broadcasting Services; Seaford, Delaware and Dover, Delaware AGENCY: Federal Communications... waiver of the Commission's freeze on the filing of petitions for rulemaking by televisions stations... first local television service, and that Seaford will remain well-served after the reallotment because...

  10. A Survivable Wavelength Division Multiplexing Passive Optical Network with Both Point-to-Point Service and Broadcast Service Delivery

    Science.gov (United States)

    Ma, Xuejiao; Gan, Chaoqin; Deng, Shiqi; Huang, Yan

    2011-11-01

    A survivable wavelength division multiplexing passive optical network enabling both point-to-point service and broadcast service is presented and demonstrated. This architecture provides an automatic traffic recovery against feeder and distribution fiber link failure, respectively. In addition, it also simplifies the protection design for multiple services transmission in wavelength division multiplexing passive optical networks.

  11. Nation Binding: How Public Service Broadcasting Mitigates Political Selective Exposure

    Science.gov (United States)

    Kruikemeier, Sanne; de Vreese, Claes

    2016-01-01

    Recent research suggests that more and more citizens select news and information that is congruent with their existing political preferences. This increase in political selective exposure (PSE) has allegedly led to an increase in polarization. The vast majority of studies stem from the US case with a particular media and political system. We contend that there are good reasons to believe PSE is less prevalent in other systems. We test this using latent profile analysis with national survey data from the Netherlands (n = 2,833). We identify four types of media use profiles and indeed only find partial evidence of PSE. In particular, we find that public broadcasting news cross-cuts all cleavages. This research note offers an important antidote in what is considered a universal phenomenon. We do find, however, a relatively large segment of citizens opting out of news consumption despite the readily available news in today’s media landscape. PMID:27218659

  12. 75 FR 3871 - Promoting Diversification of Ownership in Broadcast Services; Suspension of Filing Date

    Science.gov (United States)

    2010-01-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket Nos. 07-294, 06-121, 02-277, 04-228; MM Docket Nos. 01-235, 01-317, 00-244; DA 09-2618] Promoting Diversification of Ownership in...); Promoting Diversification in the Broadcasting Services, Order, DA 09-2165 (rel. Oct. 2, 2009). See also...

  13. 78 FR 21565 - Television Broadcasting Services; Jackson, Wyoming to Wilmington, DE

    Science.gov (United States)

    2013-04-11

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-73; RM-11695; DA 13-450] Television Broadcasting Services; Jackson, Wyoming to Wilmington, DE AGENCY: Federal Communications... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal...

  14. 78 FR 16816 - Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City...

    Science.gov (United States)

    2013-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-139; RM-11636; DA 13-258] Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, North Carolina... modify its television station, WHRO-TV's license to specify Norfolk, Virginia-Elizabeth City, North...

  15. 78 FR 21849 - Television Broadcasting Services; Ely, NV to Middletown Township, NJ

    Science.gov (United States)

    2013-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-72; RM-11694, DA 13-448] Television Broadcasting Services; Ely, NV to Middletown Township, NJ AGENCY: Federal Communications... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  16. 76 FR 54189 - Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, NC

    Science.gov (United States)

    2011-08-31

    ...] Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, NC AGENCY... licensee of noncommercial educational television station WHRO-TV, channel *16, Hampton-Norfolk, Virginia... freeze on the filing of television allotment rulemaking petitions, but since HRETA'S proposal...

  17. 76 FR 44279 - Radio Broadcasting Services; Clinchco, VA, and Coal Run, KY

    Science.gov (United States)

    2011-07-25

    ...] Radio Broadcasting Services; Clinchco, VA, and Coal Run, KY AGENCY: Federal Communications Commission... Station WPKE-FM, Coal Run Kentucky, from Channel 276A to Channel 221C3. DATES: Effective August 1, 2011... 221C3 at Coal Run, Kentucky, are 37-23-57 NL and 82-23-42 WL, and for Channel 276A at Clinchco, Virginia...

  18. WPSS: Watching people security services

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Borsboom, S.; Zon, K. van; Luo, X.; Loke, B.; Stoeller, B.; Kuilenburg, H. van; Dijk, J.

    2013-01-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most

  19. Broadcast, Denial-of-Service, and Secure Communication

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    unsolicited messages and lacking of expected communication. Moreover, standard cryptographic mechanisms can be implemented in the calculus via term rewriting. The modelling framework is complemented by an executable specification of the semantics of the calculus in Maude, thereby facilitating solving a number...

  20. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  1. RESTful Java web services security

    CERN Document Server

    Enríquez, René

    2014-01-01

    A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

  2. Debunking public service? Meta-academic and personal reflections from inside the Swedish Public Service Broadcasting Commission

    Directory of Open Access Journals (Sweden)

    Pelle Snickars

    2016-12-01

    Full Text Available During the last half of 2015, a number of Swedish publishing and broadcasting companies—Bonnier, Schibsted Sweden, Mittmedia, Bauer Group—agreed to fund and establish a national Public Service Broadcasting Commission. The purpose was to initiate a public debate about the behaviour and operation of Swedish public service broadcasters—in particular, how they affected the commercial media market, and generally, to discuss the role of national public service broadcasting in a networked media environment. I was a Commission member, and this article describes the background, debates and proposals put forward by the Commission. On one hand, it focuses the work of the Commission with an emphasis on the different public debates the Commission stirred. On the other hand, the article will in a meta-scholarly fashion elaborate on the academic tradition of doing scholarly work focused on public service in Sweden. A recurrent notion in the article is hence meta-academic. Importantly, the article stresses the scholarly bias in favour of public service that is usually present within this tradition (primarily emanating from the field of political communication. Thus, the article is devoted to various debates surrounding the work of the Commission and the role of academics within these discussions (including myself. Finally, the article presents a few thoughts about what it might mean for academics to be (or become lobbyists.

  3. Bridging Gaps in Cross-Cutting Media Exposure: The Role of Public Service Broadcasting

    DEFF Research Database (Denmark)

    Castro, Laia; Nir, Lilach; Skovsgaard, Morten

    2018-01-01

    Abstract Previous studies show that individual political interest is an antecedent of news media exposure, particularly of exposure to differing views. Nevertheless, little is known about this effect from a comparative perspective: How do media institutions affect the relationship between political...... interest and exposure to cross-cutting viewpoints? One institutional feature that varies between countries is the ownership of broadcast media. This study investigates the extent to which the relative dominance of public service broadcasting alters the relationship between political interest and non-like-minded......, or cross-cutting, news media exposure across 27 European Union countries. The analyses employ survey data from 27,079 individuals and media content from 48,983 news stories. The results confirm that the extent to which political interest contributes to cross-cutting exposure is contingent on the strength...

  4. Bridging Gaps in Cross-Cutting Media Exposure: The Role of Public Service Broadcasting

    DEFF Research Database (Denmark)

    Castro, Laia; Nir, Lilach; Skovsgaard, Morten

    2018-01-01

    Abstract Previous studies show that individual political interest is an antecedent of news media exposure, particularly of exposure to differing views. Nevertheless, little is known about this effect from a comparative perspective: How do media institutions affect the relationship between political...... interest and exposure to cross-cutting viewpoints? One institutional feature that varies between countries is the ownership of broadcast media. This study investigates the extent to which the relative dominance of public service broadcasting alters the relationship between political interest and non......-like-minded, or cross-cutting, news media exposure across 27 European Union countries. The analyses employ survey data from 27,079 individuals and media content from 48,983 news stories. The results confirm that the extent to which political interest contributes to cross-cutting exposure is contingent on the strength...

  5. Innovative Secure Mobile Banking Services

    Directory of Open Access Journals (Sweden)

    Mousa T AL-Akhras

    2011-01-01

    Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following

  6. Public service broadcasting (PSB regulation in Indonesia: Between market and public interest

    Directory of Open Access Journals (Sweden)

    Masduki

    2017-01-01

    Full Text Available The reform of public service broadcasting (PSB faces many obstacles in countries with political transition such as Indonesia. After 1998-political change, the arrival of ideas to establish PSB in Indonesia in two decades lacks of appropriate policies. As in other transitional states in Eastern Europe, there is the lack of regulatory design as well as its implementation. This paper examines process of formulating PSB law in 2002, particularly pays attention to industry capture over the making process as a critical tool to observe a long-controvercial of broadcasting law revision process in Indonesia (2012-2016. By use public interest and capture theories in regulation, this paper answers why the outcome of PSB regulation is weak by observing how the law was made. This study provides new analysis on PSB media law that still rare in Indonesia. As independent and non-profit body, Indonesian PSB represented by RRI (Radio of the Republic Indonesia and TVRI (Television of the Republic Indonesia is protected by Broadcasting Act.32/2002. It was enacted in favor of two actors: authoritarian officials with interest to use PSB as their mouthpiece in one side and the industry groups with interest to apply free market policy on the other.

  7. Willingness to Pay for Elderly Telecare Service Using the Internet and Digital Terrestrial Broadcasting.

    Science.gov (United States)

    Kaga, Satoshi; Suzuki, Teppei; Ogasawara, Katsuhiko

    2017-10-24

    In Japan over the past few years, more attention has been focused on unnoticed solitary death in the context of an aging society and the trend toward nuclear family. A number of institutions and companies have implemented a prevention measure with digital terrestrial broadcasting telecare services for the elderly: Hokkaido University; TV-Asahi Corporation; Hitachi, Ltd; Iwamizawa City; Hokkaido Television Broadcasting Co, Ltd; and Hamanasu Information Co, Ltd. Although this system is provided free of charge as a demonstration test, determining the appropriate price for the service is required for its sustainable operation. The aim of this study was to quantify individual willingness to pay (WTP) so as to test the tenability of digital terrestrial broadcasting service for elderly telecare. We used the contingent valuation method (CVM) to estimate the WTP for this service among 305 citizens (valid response rate 76.0%) living in Japan. A questionnaire survey was conducted for people aged 18 to 100 years according to Japanese age distribution from September 2016. To elicit WTP, we adopted a double-bound dichotomous choice method to ask the respondents whether they agree or disagree with the price we offered. The median WTP for this service's monthly fee is estimated to be 431 JPY (approximately US $3.7). The finding suggests that gender (0.66, P=.01), health consciousness (1.08, P=.01), willingness to use (2.38, PWTP. We conclude that reliable WTP was elicited by CVM based on an Internet survey. Calculated median WTP for digital terrestrial broadcasting service for elderly telecare was 431 JPY (approximately US $3.7). In the analysis of factors that affect WTP, constant factors, log-bid, health consciousness, gender, see others less than one time for week, and willingness to use made positive effect to probability of acceptance. In comparison of WTP in different groups, age groups showed that WTP of the elderly group was higher than WTP of the middle age group and

  8. 75 FR 27199 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2010-05-14

    ...'' in explaining the requirements for broadcasters to certify that their advertising contracts do not... for the Commission to require broadcasters renewing their licenses to certify that their advertising... broadcast licensee, cable television system, daily newspaper, or other media outlet subject to the broadcast...

  9. WPSS: watching people security services

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Borsboom, Sander; van Zon, Kasper; Luo, Xinghan; Loke, Ben; Stoeller, Bram; van Kuilenburg, Hans; Dijk, Judith

    2013-10-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software platform that contributes to the retrieval and observation of humans and to the analysis of their behavior. The platform consists of mono- and stereo-camera tracking, re-identification, behavioral feature computation, track analysis, behavior interpretation and visualization. This system is demonstrated in a busy shopping mall with multiple cameras and different lighting conditions.

  10. Willingness to Pay for Elderly Telecare Service Using the Internet and Digital Terrestrial Broadcasting

    Science.gov (United States)

    Kaga, Satoshi; Suzuki, Teppei

    2017-01-01

    Background In Japan over the past few years, more attention has been focused on unnoticed solitary death in the context of an aging society and the trend toward nuclear family. A number of institutions and companies have implemented a prevention measure with digital terrestrial broadcasting telecare services for the elderly: Hokkaido University; TV-Asahi Corporation; Hitachi, Ltd; Iwamizawa City; Hokkaido Television Broadcasting Co, Ltd; and Hamanasu Information Co, Ltd. Although this system is provided free of charge as a demonstration test, determining the appropriate price for the service is required for its sustainable operation. Objective The aim of this study was to quantify individual willingness to pay (WTP) so as to test the tenability of digital terrestrial broadcasting service for elderly telecare. Methods We used the contingent valuation method (CVM) to estimate the WTP for this service among 305 citizens (valid response rate 76.0%) living in Japan. A questionnaire survey was conducted for people aged 18 to 100 years according to Japanese age distribution from September 2016. To elicit WTP, we adopted a double-bound dichotomous choice method to ask the respondents whether they agree or disagree with the price we offered. Results The median WTP for this service’s monthly fee is estimated to be 431 JPY (approximately US $3.7). The finding suggests that gender (0.66, P=.01), health consciousness (1.08, P=.01), willingness to use (2.38, PCalculated median WTP for digital terrestrial broadcasting service for elderly telecare was 431 JPY (approximately US $3.7). In the analysis of factors that affect WTP, constant factors, log-bid, health consciousness, gender, see others less than one time for week, and willingness to use made positive effect to probability of acceptance. In comparison of WTP in different groups, age groups showed that WTP of the elderly group was higher than WTP of the middle age group and younger age group. However, WTP surveys need to

  11. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  12. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  13. An Improved Mathematical Scheme for LTE-Advanced Coexistence with FM Broadcasting Service.

    Science.gov (United States)

    Shamsan, Zaid Ahmed; Al-Hetar, Abdulaziz M

    2016-01-01

    Power spectral density (PSD) overlapping analysis is considered the surest approach to evaluate feasibility of compatibility between wireless communication systems. In this paper, a new closed-form for the Interference Signal Power Attenuation (ISPA) is mathematically derived to evaluate interference caused from Orthogonal Frequency Division Multiplexing (OFDM)-based Long Term Evolution (LTE)-Advanced into Frequency Modulation (FM) broadcasting service. In this scheme, ISPA loss due to PSD overlapping of both OFDM-based LTE-Advanced and FM broadcasting service is computed. The proposed model can estimate power attenuation loss more precisely than the Advanced Minimum Coupling Loss (A-MCL) and approximate-ISPA methods. Numerical results demonstrate that the interference power is less than that obtained using the A-MCL and approximate ISPA methods by 2.8 and 1.5 dB at the co-channel and by 5.2 and 2.2 dB at the adjacent channel with null guard band, respectively. The outperformance of this scheme over the other methods leads to more diminishing in the required physical distance between the two systems which ultimately supports efficient use of the radio frequency spectrum.

  14. 47 CFR 74.690 - Transition of the 1990-2025 MHz band from the Broadcast Auxiliary Service to emerging technologies.

    Science.gov (United States)

    2010-10-01

    ... Broadcast Auxiliary Service to emerging technologies. 74.690 Section 74.690 Telecommunication FEDERAL... of the 1990-2025 MHz band from the Broadcast Auxiliary Service to emerging technologies. (a) New... licensed emerging technology services will maintain primary status in the band until the Existing Licensee...

  15. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  16. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  17. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  18. Public broadcasting, media engagement, and 2-1-1: using mass communication to increase the use of social services.

    Science.gov (United States)

    Shah, Dhavan V; McLeod, Douglas M; Rojas, Hernando; Sayre, Benjamin G; Vraga, Emily; Scholl, Rosanne M; Jones, Clive; Shaw, Amy

    2012-12-01

    The 2008-2009 subprime mortgage crisis was catastrophic, not only for the global economy but for families across the social spectrum. The resultant economic upheaval threatened the livelihoods, well-being, and health of many citizens, who were often unsure where to turn for help. At this critical juncture, public broadcasting stations worked to connect viewers to support resources through 2-1-1. This study was designed to evaluate the ability of public broadcasting to increase the use of information and referral services. Autoregressive integrated moving average (ARIMA) modeling and regression analysis document the relationship between public broadcasting initiatives and 2-1-1 call volume in 35 highly affected U.S. markets. Time-series data from St. Louis MO were collected and analyzed in 2008. Station-level data from across the nation were collected during 2009-2010 and analyzed in 2010. ARIMA results show a distinct linkage between the timing and duration of Channel 9 in St. Louis MO (KETC) programming and a subsequent (approximately 400%) increase in 2-1-1 calls regarding financial services and assistance. Regression path analysis not only found evidence of this same effect nationally but also showed that differences in the broadcaster's orientation and approach mediated effects. Specifically, stations' orientations toward engagement were mediated through strong outreach strategies to increase 2-1-1 use. This study documents the ability of public broadcasting to help citizens in need connect with social resources through 2-1-1 services. By focusing attention on the mortgage crisis and its attendant consequences, and by publicizing 2-1-1 services as a gateway to supportive resources, public broadcasters fostered linkages between those in need and social resources. Moreover, the level of a station's commitment to engaging citizens had a strong bearing on the success of its programming initiatives and community partnerships with organizations such as 2

  19. A fast inter mode decision algorithm in H.264/AVC for IPTV broadcasting services

    Science.gov (United States)

    Kim, Geun-Yong; Yoon, Bin-Yeong; Ho, Yo-Sung

    2007-01-01

    The new video coding standard H.264/AVC employs the rate-distortion optimization (RDO) method for choosing the best coding mode. However, since it increases the encoder complexity tremendously, it is not suitable for real-time applications, such as IPTV broadcasting services. Therefore we need a fast mode decision algorithm to reduce its encoding time. In this paper, we propose a fast mode decision algorithm considering quantization parameter (QP) because we have noticed that the frequency of best modes depends on QP. In order to consider these characteristics, we use the coded block pattern (CBP) that has "0" value when all quantized discrete cosine transform (DCT) coefficients are zero. We also use both the early SKIP mode and early 16x16 mode decisions. Experimental results show that the proposed algorithm reduces the encoding time by 74.6% for the baseline profile and 72.8% for the main profile, compared to the H.264/AVC reference software.

  20. The Viability of Mobile Services (SMS and Cell Broadcast in Emergency Management Solutions: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Mahmoud Al-dalahmeh

    2018-01-01

    Full Text Available In this paper the path forward in location-based mobile phone warning systems is given against a concise backdrop of their deployment worldwide. Of relevance here is (i how the systems are implemented using legislation, contractual service level agreement instruments or a hybrid approach, (ii whether or not governments who deploy these systems will carry the cost of the deployment during an emergency or disaster, and (iii whether or not carrier participation is mandated. Of particular importance are also the underlying technologies of this kind of emergency systems. To date, the short message service and cell broadcast service have been the main technologies to be utilised by governments in the application of location-based services in modern emergency management solutions. However, these technologies will most certainly be superseded by newer, more powerful capabilities. A comprehensive list of requirements for the future location-based emergency systems is presented also in this paper. In essence, these are recommendations to be adhered to if robust solutions using new technologies are to be deployed in a nation state.

  1. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  2. Civilization versus Commerce: On the Sociolinguistic Effects of the Deregulation of the TV Market on Flemish Public Service Broadcasting

    Science.gov (United States)

    Van Hoof, Sarah

    2018-01-01

    In the globalized economy, old metadiscursive regimes have been challenged by new conditions which are often considered to be more favourable to heteroglossic practices. In Flemish Belgium, the liberalization of the TV market is said to have transformed the broadcaster VRT from a public service aiming at educating viewers into a competitive…

  3. 78 FR 73109 - Radio Broadcasting Services; Benjamin and Cisco, TX; De Beque, CO; Port Lions, AK; Rule and...

    Science.gov (United States)

    2013-12-05

    ... Broadcasting Services; Benjamin and Cisco, TX; De Beque, CO; Port Lions, AK; Rule and Shamrock, TX AGENCY... 237C3 at Benjamin, Texas; Channel 261C3 at Cisco, Texas; Channel 288C2 at Rule, Texas; and Channel 225C2..., Channel 237C3; by removing Cisco, Channel 261C3; by removing Channel 288C2 at Rule; and by removing...

  4. 78 FR 42036 - Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule, and Shamrock, TX

    Science.gov (United States)

    2013-07-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-156; DA 13-1377] Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule, and Shamrock, TX AGENCY: Federal..., under Texas, Channel 237C3; Cisco, Channel 261C3; Rule, Channel 288C2; and Shamrock, Channel 225C2. [FR...

  5. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  6. Broadcast Advertising of Medical Products and Services: Its Regulation by Other Nations.

    Science.gov (United States)

    Powell, Jon T.

    1972-01-01

    Restraints imposed on medical advertising through the broadcast media reflect a worldwide concern for public protection in a sensitive area, where problems of ignorance and misrepresentation are enlarged by false hope. The author examines the broadcast codes of seventeen free-world nations, with respect to their provisions on medical advertising.…

  7. Secure Service Discovery in Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.; De Cock, Danny; Preneel, Bart; Kung, Antonio; d'Hooge, Michel

    2006-01-01

    This paper presents an architecture for secure service discovery for use in home networks. We give an overview and rationale of a cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and

  8. Secure Data Service Outsourcing with Untrusted Cloud

    OpenAIRE

    Xiong, Huijun

    2013-01-01

    Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of out...

  9. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  10. Survivability Using Controlled Security Services

    Science.gov (United States)

    2005-06-01

    signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281–308, 1988. [29] ISO TC86 Committee. ISO 8583 : Financial...fsIKXZO ISO bbDU?M&D*P$JSIKD F$LKD[*J>RKX$J\\OINTP$`p]Wf�OP_f�INX$TL’Q�FZOeLNINTJMnTP_[*D*b[^J QhG��J:RObb?OuINX$TL’Q�FZOeLNIf�U?X$D

  11. Global Broadcast Service Reach Back Via Ultra High Frequency Demand Assigned Multiple Access Satellite Communications

    National Research Council Canada - National Science Library

    Arthur, Joseph

    1998-01-01

    .... An integral part of the user pull is the reach back channel. The reach back channel allows users to speciiy the information they need broadcast and tailor the information to meet their mission needs...

  12. Global Broadcast Service Reach Back via Ultra High Frequency Demand Assigned Multiple Satellite Communications

    National Research Council Canada - National Science Library

    Arthur, Joseph

    1998-01-01

    .... An integral part of the user pull is the reach back channel. The reach back channel allows users to specify' the information they need broadcast and tailor the information to meet their mission needs...

  13. Context aware adaptive security service model

    Science.gov (United States)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  14. Work environment and health determinants : Longitudinal, controlled intervention and cross-sectional studies in public-service broadcasting companies

    OpenAIRE

    Schell, Elisabet

    2008-01-01

    This thesis focuses on ongoing working life. The overall aim was to identify determinants for work health. Various occupational groups in two public service broadcasting companies in Sweden were included. Study persons: Participants were from all over the country (n=1961, participation rate 74%) divided in 11 occupational groups. Those on leave more than 6 months were excluded. Mean age was 48 yrs (21-67 yrs), 58% were males. Questionnaire and company register data were col...

  15. A Fast and Reliable Broadcast Service for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions

    Directory of Open Access Journals (Sweden)

    Giovanni Nardini

    2017-11-01

    Full Text Available Several applications, from the Internet of Things for smart cities to those for vehicular networks, need fast and reliable proximity-based broadcast communications, i.e., the ability to reach all peers in a geographical neighborhood around the originator of a message, as well as ubiquitous connectivity. In this paper, we point out the inherent limitations of the LTE (Long-Term Evolution cellular network, which make it difficult, if possible at all, to engineer such a service using traditional infrastructure-based communications. We argue, instead, that network-controlled device-to-device (D2D communications, relayed in a multihop fashion, can efficiently support this service. To substantiate the above claim, we design a proximity-based broadcast service which exploits multihop D2D. We discuss the relevant issues both at the UE (User Equipment, which has to run applications, and within the network (i.e., at the eNodeBs, where suitable resource allocation schemes have to be enforced. We evaluate the performance of a multihop D2D broadcasting using system-level simulations, and demonstrate that it is fast, reliable and economical from a resource consumption standpoint.

  16. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  17. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  18. 76 FR 50425 - Service Rules and Policies for the Broadcasting Satellite Service (BSS)

    Science.gov (United States)

    2011-08-15

    ... video-on-demand, to consumers in the United States and promote increased competition among satellite and... innovative services, including video, audio, data, and video-on-demand, to consumers in the United States and... variation is 26.3 km. Thus, the measurement range of 30[deg] from the X axis in the X-Z plane proposed by...

  19. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  20. Bluetooth broadcasting

    OpenAIRE

    Ho, Johan

    2006-01-01

    Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did w...

  1. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  2. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  3. 78 FR 2934 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2013-01-15

    ... with fewer than 25 employees.'' I. Introduction 1. The Commission seeks comment on whether to collect... Commission determined that, in order to measure the extent of minority and female ownership of broadcast outlets and assess the need for and effectiveness of any policies designed to promote minority and female...

  4. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  5. On the Efficient Broadcasting of Heterogeneous Services over Band-Limited Channels: Unequal Power Allocation for Wavelet Packet Division Multiplexing

    Directory of Open Access Journals (Sweden)

    Maurizio Murroni

    2008-01-01

    Full Text Available Multiple transmission of heterogeneous services is a central aspect of broadcasting technology. Often, in this framework, the design of efficient communication systems is complicated by stringent bandwidth constraint. In wavelet packet division multiplexing (WPDM, the message signals are waveform coded onto wavelet packet basis functions. The overlapping nature of such waveforms in both time and frequency allows improving the performance over the commonly used FDM and TDM schemes, while their orthogonality properties permit to extract the message signals by a simple correlator receiver. Furthermore, the scalable structure of WPDM makes it suitable for broadcasting heterogeneous services. This work investigates unequal error protection (UEP of data which exhibit different sensitivities to channel errors to improve the performance of WPDM for transmission over band-limited channels. To cope with bandwidth constraint, an appropriate distribution of power among waveforms is proposed which is driven by the channel error sensitivities of the carried message signals in case of Gaussian noise. We address this problem by means of the genetic algorithms (GAs, which allow flexible suboptimal solution with reduced complexity. The mean square error (MSE between the original and the decoded message, which has a strong correlation with subjective perception, is used as an optimization criterion.

  6. Broadcasting house

    DEFF Research Database (Denmark)

    Sattrup, Peter Andreas

    2008-01-01

    Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change.......Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change....

  7. TV Recommendation and Personalization Systems: Integrating Broadcast and Video On demand Services

    Directory of Open Access Journals (Sweden)

    SOARES, M.

    2014-02-01

    Full Text Available The expansion of Digital Television and the convergence between conventional broadcasting and television over IP contributed to the gradual increase of the number of available channels and on demand video content. Moreover, the dissemination of the use of mobile devices like laptops, smartphones and tablets on everyday activities resulted in a shift of the traditional television viewing paradigm from the couch to everywhere, anytime from any device. Although this new scenario enables a great improvement in viewing experiences, it also brings new challenges given the overload of information that the viewer faces. Recommendation systems stand out as a possible solution to help a watcher on the selection of the content that best fits his/her preferences. This paper describes a web based system that helps the user navigating on broadcasted and online television content by implementing recommendations based on collaborative and content based filtering. The algorithms developed estimate the similarity between items and users and predict the rating that a user would assign to a particular item (television program, movie, etc.. To enable interoperability between different systems, programs? characteristics (title, genre, actors, etc. are stored according to the TV-Anytime standard. The set of recommendations produced are presented through a Web Application that allows the user to interact with the system based on the obtained recommendations.

  8. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  9. 47 CFR 73.6011 - Protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of TV broadcast stations. 73.6011... RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6011 Protection of TV broadcast stations. Class A TV stations must protect authorized TV broadcast stations, applications for minor changes...

  10. How to securely replicate services (preliminary version)

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth

    1992-01-01

    A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.

  11. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  12. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  13. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  14. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  15. Implications of Internet on Broadcasting

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    One of the main challenges within broadcasting research in the recent years has been to understand the evolution from traditional broadcasting to digital broadcasting. The aim of this paper is to step further and give an analysis of Internet’s influence on traditional broadcasting services....... In this analysis an inter-disciplinary approach is used, where technological, economic, political and cultural drivers and barriers in this development are identified. It is then shown to what degree these parameters and the inter-relation between them influence this development....

  16. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  17. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  18. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  19. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  20. 75 FR 67227 - Relocation Cost Sharing in the Broadcast Auxiliary Service

    Science.gov (United States)

    2010-11-02

    ... that parties have several options to resolve disputes that may arise including mediation, arbitration... providing commercial service. However, given that as of December 31, 2008, these MSS operators had assets of... annual revenue of over $15 million once they are able to offer commercial services.\\10\\ Consequently, we...

  1. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  2. 47 CFR 73.4102 - FAA communications, broadcast of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FAA communications, broadcast of. 73.4102 Section 73.4102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4102 FAA communications...

  3. 78 FR 18527 - Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed...

    Science.gov (United States)

    2013-03-27

    ... Broadcast and Instructional Television Fixed Service Licenses AGENCY: Federal Communications Commission... Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed Service... for Commercial Broadcast and Instructional Television Fixed Service Licenses, MM Docket No. 97- 234 et...

  4. Web-Services Development in Secure Way for Highload Systems

    Directory of Open Access Journals (Sweden)

    V. M. Nichiporchouk

    2011-12-01

    Full Text Available This paper describes approach to design of web-services in secure, high load and fault tolerant implementation for mass message processing. The multicomponent architecture of web-service with possibility for high security zone is provided as well as scalability evaluation of the architecture.

  5. The use of international television formats by public-service broadcasters in Australia, Denmark and Germany

    DEFF Research Database (Denmark)

    Esser, Andrea; Jensen, Pia Majbritt

    2015-01-01

    the provision of content that informs and educates, helps imagine the nation, enriches the lives and culture of its citizens and provides an inclusive public sphere to support democracy. Can internationally franchised programmes fulfil these remits? And to what extent are they employed by public service...

  6. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  7. Evolution of broadcast content distribution

    CERN Document Server

    Beutler, Roland

    2017-01-01

    This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer. Outlines the shift in broadcast content distribution paradigms and related strategic issues Provides an overview of the new broadcasting ecosystem encompassing new types of content, user habits, expectations, and devices Discusses complementary usage of different distribution technologies and platforms.

  8. Commercial satellite broadcasting for Europe

    Science.gov (United States)

    Forrest, J. R.

    1988-12-01

    A review is presented of the current television broadcasting situation in European countries, which involves a varied mix of terrestrial VHF or UHF systems and cable networks. A small market has emerged in Europe for receivers using the low-power telecommunications satellite transmission between the program providers and cable network companies. This is expected to change with the launch of medium-power pan-European telecommunication satellites (e.g. ASTRA, EUTELSAT II), which are now directly addressing the market of home reception. DBS (direct broadcast satellite) in the UK, using the D-MAC transmission standard, will offer three additional television channels, data broadcasting services, and a planned evolution to compatible forms of wide-screen, high-definition television. Comments are given on receiver and conditional access system standardization. Some views are expressed on satellite broadcasting as part of an overall broadcasting framework for the future.

  9. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  10. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  11. 47 CFR 74.705 - TV broadcast analog station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV broadcast analog station protection. 74.705... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.705 TV broadcast analog station protection. (a) The TV broadcast...

  12. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  13. Technological innovation and convergent journalism. Case study on the transformation process of Bavaria’s public broadcasting service

    Directory of Open Access Journals (Sweden)

    Klaus MEIER

    2017-01-01

    Full Text Available As a consequence of technological innovations and their social utilisation, media organisations and newsrooms are undergoing a fundamental transformation process. This article analyses the interrelations between technological innovations and the challenges of convergent journalism. Studies conducted on newsroom convergence to date set out from one-sided influences: They investigated the extent to which technical innovations determine the newsrooms, or whether journalistic structures and long-range trends are so strong as to largely obstruct the adoption of new technologies in journalism. Therefore technology — especially in studies carried out on newsroom convergence — is considered as an influencing factor on somehow resisting or non-resisting newsrooms. We broaden the scope of this investigation by considering that any such influence might not come exclusively from technology, but that impulses can come also from innovative newsrooms: technological gaps, wishes and obstacles are identified from the journalist's viewpoint and brought to the attention of the developers of newsroom technologies — on the basis of empirical research findings from a case study of Bavaria’s public broadcasting service, Bayerischer Rundfunk (BR. With its 5.000 employees, BR is one of Germany's largest media organisations. It is undergoing a fundamental and long-term convergence process. A variety of gaps, problems and wishes came to light from 25 in-depth interviews with journalists working on innovative projects. For example, criticism is expressed of complicated, partly unknown or non-existent networking of cross-media production systems. There is a desire for the increased use of consumer devices like smartphones in professional news production. There exists a creative potential for innovative solutions, but these are not comprehensively evaluated. To date, there has been no systematic implementation of the findings of innovative media projects in everyday

  14. Quality of Security Service Costing Demonstration for the MSHN Project

    National Research Council Canada - National Science Library

    Spyropoulou, Evdoxia

    2000-01-01

    .... Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.

  15. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  16. Resource optimization and security for cloud services

    CERN Document Server

    Xiong , Kaiqi

    2014-01-01

    This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is

  17. A new data collaboration service based on cloud computing security

    Science.gov (United States)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  18. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  19. Language Policy, Tacit Knowledge, and Institutional Learning: The Case of the Swiss Public Service Broadcaster SRG SSR

    Science.gov (United States)

    Perrin, Daniel

    2011-01-01

    "Promoting public understanding" is what the programming mandate asks the Swiss public broadcasting company SRG SSR to do. From a sociolinguistic perspective, this means linking speech communities with other speech communities, both between and within the German-, French-, Italian-, and Romansh-speaking parts of Switzerland. In the…

  20. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  1. Service oriented architecture governance tools within information security

    OpenAIRE

    2012-01-01

    M.Tech. Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it ...

  2. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  3. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  4. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  5. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  6. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  7. Economic differences among regional public service broadcasters in Spain according to their management model. An empirical analysis for period 2010-2013

    Directory of Open Access Journals (Sweden)

    Víctor Orive Serrano

    2016-03-01

    Full Text Available Purpose: This piece of research quantifies and analyses empirically the given economic differences among public service television in Spain according to the adopted management model (classic or outsourced. Design/methodology/approach: In so doing, an average contrast of different economic variables studied in the literature is conducted (audience share, total assets, public subsidies, cost of personnel, suppliers spending and profit after taxes. In addition, these variables are related so as to calculate productivity obtained by each two groups of television operators. This analysis is conducted for period 2010-2013, featured by a crisis context in the Spanish economy. Findings: Management model adopted by each regional broadcaster impacts on different economic variables as obtained share, total assets, public subsidies, cost of personnel, suppliers spending or profit after taxes. Moreover, those public corporations adopting an outsourced management model present better productivity values. Research limitations/implications: Only one country has been analyzed for a 4 years period. Practical implications: Regional public service broadcasters with an outsourced model present less economic losses and require less public subsidies by their corresponding regional governments. Social implications: Outsourcing part of the value chain can be useful so as to guarantee sustainability of regional public service television. Originality/value: It has been proven empirically that the management model of a regional public service television impacts its economic results.

  8. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  9. South African Egov: Secure E-Services

    CSIR Research Space (South Africa)

    Dlamini, IZ

    2010-10-01

    Full Text Available Electronic government and e-services development in South Africa is moving at a snail-pace but has potential to improve. Nothing much has been done regarding the implementation of e-government applications. There are bits and pieces for different...

  10. 39 CFR 761.8 - Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

  11. SERVICE AND SECURITY MONITORING IN CLOUD

    Directory of Open Access Journals (Sweden)

    Cristian IVANUŞ

    2015-05-01

    Full Text Available In the cloud computing context, Quality of Software (QoS is defined as the extent to which user requirements are met by the providers of cloud resources. Users can define their requirements using low level metrics such as processing power of the Central Processing Unit (CPU or the amount of memory for a virtual machine, but they are interested in defining their requirements using more abstract concepts at a higher level, such as response time and service availability. Increasing complexity, size and number of areas in which cloud penetrated makes it difficult for anticipating how the system will behave. Because of this, different research groups have started to work on QoS level fields for defining the conditions that must be accomplished by a service in order to be delivered. Likewise, it was invested effort in developing of means for managing and assessing efficiently the status of these conditions.

  12. Instant SQL Server Analysis Services 2012 Cube Security

    CERN Document Server

    Jayanty, Satya SK

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear, step-by-step exercises for getting started with cube security.This book is aimed at Database Administrators, Data Architects, and Systems Administrators who are managing the SQL Server data platform. It is also beneficial for analysis services developers who already have some experience with the technology, but who want to go into more detail on advanced

  13. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  14. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  15. The design of an ultra-low sidelobe offset-fed 1.22m antenna for use in the broadcasting satellite service

    Science.gov (United States)

    Janky, J. M.

    1981-01-01

    A feed design and reflector geometry were determined for an ultra low sidelobe offset fed 1.22 meter antenna suitable for use in the 12 GHz broadcasting satellite service. Arbitrary constraints used to evaluate the relative merits of the feed horns and range of f/D geometries are: minimum efficiency of 55 percent, -30 dB first sidelobe level (relative to on axis gain), a 0 dBi plateau beyond the near in sidelobe region, and a Chebyshev polynomial based envelope (borrowed from filter theory) for the region from the -3 dB beamwidth points to the 0 dBi plateau region. This envelope is extremely stringent but the results of this research effort indicate that two steps of corrugated feed and a cluster array of small 1 lambda horns do meet the constraints. A set of performance specifications and a mechanical design suitable for a consumer oriented market in the broadcasting satellite service was developed. Costs for production quantities of 10,000 units/yr. are estimated to be around $150.

  16. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  17. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  18. SECURE SERVICE DISCOVERY BASED ON PROBE PACKET MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    S. Pariselvam

    2015-03-01

    Full Text Available In MANETs, Service discovery process is always considered to be crucial since they do not possess a centralized infrastructure for communication. Moreover, different services available through the network necessitate varying categories. Hence, a need arises for devising a secure probe based service discovery mechanism to reduce the complexity in providing the services to the network users. In this paper, we propose a Secure Service Discovery Based on Probe Packet Mechanism (SSDPPM for identifying the DoS attack in MANETs, which depicts a new approach for estimating the level of trust present in each and every routing path of a mobile ad hoc network by using probe packets. Probing based service discovery mechanisms mainly identifies a mobile node’s genuineness using a test packet called probe that travels the entire network for the sake of computing the degree of trust maintained between the mobile nodes and it’s attributed impact towards the network performance. The performance of SSDPPM is investigated through a wide range of network related parameters like packet delivery, throughput, Control overhead and total overhead using the version ns-2.26 network simulator. This mechanism SSDPPM, improves the performance of the network in an average by 23% and 19% in terms of packet delivery ratio and throughput than the existing service discovery mechanisms available in the literature.

  19. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  20. 47 CFR 73.6026 - Broadcast regulations applicable to Class A television stations.

    Science.gov (United States)

    2010-10-01

    ... television stations. 73.6026 Section 73.6026 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6026 Broadcast regulations applicable to Class A television stations. The following rules are applicable to Class A...

  1. 47 CFR 73.9001 - Redistribution control of digital television broadcasts.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Redistribution control of digital television... RADIO SERVICES RADIO BROADCAST SERVICES Digital Broadcast Television Redistribution Control § 73.9001 Redistribution control of digital television broadcasts. Licensees of TV broadcast stations may utilize the...

  2. Optic Fibers as a Broadcasting Media

    Directory of Open Access Journals (Sweden)

    Jusuf QARKAXHIJA

    2018-04-01

    Full Text Available Fast brodcasting of an information is always a challange from our daily activities. Through fast broadcasting of the information always created pre-eminence in military activities, business, researching, etc. From ancient times we know that information was orally and hand in hand broadcasted which in most of the times casused in loss of information and due to this also in loss of activities which are mentioned above. Due to information technology notably computer networks and internet overtime information started broadcasting faster. Information started broadcasting through copper wires and through wireless. Big applications started to develop with the increased use of Internet, high quality broadcasting (HD, video on demand broadcasting (VoD, triple pay broadcasting (three services on a medium, etc., then these two mediums couldn’t complete all these requests. Therfore after these problems, optic fiber began to be used as a broadcasting medium which eleminated all the defects of other mediums. Importance of this paper work is telling developing stages of optic fiber, it’s characteristics and it’s losses. Then it is shown that which devises enforce the signal of fibers and in the end all three mediums that we mentioned are compared on the basis of attributes. Findings form the paper will only enforce that knowledge we had before about optic fiber, the best broadcasting medium.

  3. A security architecture for the ALICE grid services

    CERN Document Server

    Schreiner, Steffen; Buchmann, Johannes; Betev, Latchezar; Grigoras, Alina

    2012-01-01

    Globally distributed research cyberinfrastructures, like the ALICE Grid Services, need to provide traceability and accountability of operations and internal interactions. This document presents a new security architecture for the ALICE Grid Services, allowing to establish non-repudiation with respect to creatorship and ownership of Grid files and jobs. It is based on mutually authenticated and encrypted communication using X.509 Public Key Infrastructure and the Transport Layer Security (TLS) protocol. Introducing certified Grid file entries and signed Grid jobs by implementing a model of Mediated Definite Delegation it allows to establish long-term accountability concerning Grid jobs and files. Initial submissions as well as any alteration of Grid jobs are becoming verifiable and can be traced back to the originator. The architecture has been implemented as a prototype along with the development of a new central Grid middleware, called jAliEn.

  4. Security and privacy in billing services in cloud computing

    OpenAIRE

    Μακρή, Ελένη - Λασκαρίνα

    2013-01-01

    The purpose of this master thesis is to define cloud computing and to introduce its basic principles. Firstly, the history of cloud computing will be briefly discussed, starting from the past and ending up to the current and future situation. Furthermore, the most important characteristics of cloud computing, such as security, privacy and cost, will be analyzed. Moreover the three service and three deployment models of cloud computing will be defined and analyzed with examples. Finally, the a...

  5. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  6. Economic Theory and Broadcasting.

    Science.gov (United States)

    Bates, Benjamin J.

    Focusing on access to audience through broadcast time, this paper examines the status of research into the economics of broadcasting. The paper first discusses the status of theory in the study of broadcast economics, both as described directly and as it exists in the statement of the basic assumptions generated by prior work and general…

  7. Theme Issue: European Broadcasting.

    Science.gov (United States)

    Howkins, John, Ed.

    1977-01-01

    In this document separate articles deal with the following topics: recommendations for future British broadcasting policies that recently were proposed to the British Parliament by the Committee on the Future of Broadcasting; specific media goals set by the Swedish Committee on Broadcasting; communications policy making in Austria; a new…

  8. Applied Anthropology in Broadcasting

    Science.gov (United States)

    Eiselein, E. B.

    1976-01-01

    Three different applied media anthropology projects are described. These projects stem from the broadcasters' legal need to know about the community (community ascertainment), the broadcasters' need to know about the station audience (audience profile), and the broadcasters' desire to change a community (action projects). (Author)

  9. Design of a Secure System Considering Quality of Service

    Directory of Open Access Journals (Sweden)

    Seondong Heo

    2014-11-01

    Full Text Available Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS and quality of security service (QoSS in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.

  10. INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

    OpenAIRE

    Mr. A Mustagees Shaikh *; Prof. Nitin B. Raut

    2016-01-01

    Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data st...

  11. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  12. Metadata for the description of broadcast assets

    DEFF Research Database (Denmark)

    Efthimiadis, Efthimis N.; Mai, Jens Erik; Burrows, Paul E.

    2003-01-01

    The Corporation for Public Broadcasting (CPB) and public broadcasters consider Media Asset Management (MAM) of critical importance since without a concerted and cooperative plan to manage their vast library of content, broadcasters are unable to reach their potential for service in the digital age....... The concerns for Media Asset Management, human and technical, are myriad. Media Asset Management is the framework upon which many of the largest technology projects will be built, including the future interconnection system between and among CPB member stations. It is CPB's hope that its licensees...... and their partners in university, museum, and library communities, will work together to contribute to Media Asset Management solutions. These issues are not unique to Public Broadcasters. Similar issues are faced by all networks at different levels of complexity. This panel will present efforts by broadcasters...

  13. Analysis and Implement of Broadcast Program Monitoring Data

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available With the rapid development of the radio and TV industry and the implementation of INT (the integration of telecommunications networks, cable TV networks and the Internet, the contents of programs and advertisements is showing massive, live and interactive trends. In order to meet the security of radio and television, the broadcast of information have to be controlled and administered. In order to master the latest information of public opinion trends through radio and television network, it is necessary research the specific industry applications of broadcast program monitoring. In this paper, the importance of broadcast monitoring in public opinion analysis is firstly analysed. The monitoring radio and television programs broadcast system architecture is proposed combining with the practice, focusing on the technical requirements and implementation process of program broadcast, advertisement broadcast and TV station broadcast monitoring. The more efficient information is generated through statistical analysis, which provides data analysis for radio and television public opinion analysis.

  14. Security Issues for Intelligence Information System based on Service-Oriented Architecture

    OpenAIRE

    Ackoski, Jugoslav; Trajkovik, Vladimir; Davcev, Danco

    2011-01-01

    Security is important requirement for service-oriented architecture (SOA), because SOA considers widespread services on different location and diverse operational platforms. Main challenge for SOA Security still drifts around “clouds” and that is insufficient frameworks for security models based on consistent and convenient methods. Contemporary security architectures and security protocols are in the phase of developing. SOA based systems are characterized with differences ...

  15. Broadcasting, Reacting, Engaging

    DEFF Research Database (Denmark)

    Etter, Michael

    2014-01-01

    Purpose - Symmetric communication and relationship building are core principles of public relations, which have been highlighted for CSR communication. In this paper three different communication strategies for CSR communication in Twitter are developed, of which each contributes differently...... to the ideals of symmetric communication and relationship building. The framework is then applied to analyze how companies use the micro-blogging service Twitter for CSR communication. Design/methodology/approach - Social network analysis is used to identify the 30 most central corporate accounts in a CSR...... Twitter-Network. From these accounts over 40´000 tweets are extracted and manually coded. Anova is applied to investigate differences in the weighting of CSR topics between the different strategies. Findings - The analysis reveals that corporations adhere to a broadcasting strategy or a reactive strategy...

  16. 47 CFR 74.1204 - Protection of FM broadcast, FM Translator and LP100 stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of FM broadcast, FM Translator and... SERVICES FM Broadcast Translator Stations and FM Broadcast Booster Stations § 74.1204 Protection of FM broadcast, FM Translator and LP100 stations. (a) An application for an FM translator station will not be...

  17. ENTREPRENEURSHIP ECONOMIC SAFETY AND DEVELOPMENT OF SECURITY SERVICES

    Directory of Open Access Journals (Sweden)

    G. V. Goudkov

    2011-01-01

    Full Text Available Successful functioning of the industry that provides for safety of organizations and physical entities exercises strategic impacts on development of society and economics of any state including Russia. Economic safety of Russia is directly linked with economic and information safety of itsbusiness structures. Extension of the scope and use of services offered by experienced state and private security enterprises including licensed individuals is one of most important directions of business safety perfection. Further improvement of Russian legislation on non-governmentalsecurity structures and coordination of their activities with those of state law enforcement bodies is obligatory condition of attaining higherpublic and economic safety levels.

  18. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  19. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  20. Secure Service Oriented Architectures (SOA) Supporting NEC [Architecture orientée service (SOA) gérant la NEC

    NARCIS (Netherlands)

    Meiler, P.P.; Schmeing, M.

    2009-01-01

    Combined scenario ; Data management ; Data processing ; Demonstrator ; Information systems ; Integrated systems ; Interoperability ; Joint scenario ; Network Enabled Capability (NEC) ; Operational effectiveness ; Operations research ; Scenarios ; Secure communication ; Service Oriented Architecture

  1. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  2. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  3. A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Directory of Open Access Journals (Sweden)

    Jamal Talbi

    2017-03-01

    Full Text Available Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs increase and require secure, reliable and trustworthy cloud service providers (CSPs from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.

  4. Legitimizing Security in the Ivory Tower: Canadian University Corporate Security Services' Public Quest for Legitimacy.

    Science.gov (United States)

    Wilkinson, Blair

    2016-05-01

    This article examines how university corporate security (UCS) services engage in legitimation work in their attempts to make their university communities (i.e., faculty, staff, students) and political masters (i.e., university administrators, boards of governors, senators) believe that they are honest, trustworthy, and caring and have authority that should be deferred to. This is accomplished through the analysis of interview and observational data collected as part of a research project exploring UCS services at five Canadian universities and an examination of how UCS services at 14 Canadian universities communicate using the social media service Twitter. These UCS services were found to primarily use Twitter for the purposes of soliciting or requesting information and for networking. In communicating through Twitter, UCS services engage in public legitimation work in which they make claims about and attempt to demonstrate their expertise, authority, and accountability. This article argues that both UCS services' particular legitimacy problem (i.e., their possession of both private and public attributes) and the interactive nature of public legitimation work create tensions that may serve to disrupt UCS services' ability to attain legitimacy. Cet article examine la manière dont les services de sécurité d'entreprise à l'université (SEU) s'engagent à légitimer leurs tentatives de persuader leurs communautés universitaires (c'est-à-dire le corps professoral, le personnel et les étudiants) ainsi que la haute administration (c'est-à-dire les administrateurs de l'université, le conseil des gouverneurs et les sénateurs) qu'ils sont honnêtes, attentifs, dignes de confiance, et qu'ils possèdent un niveau d'autorité auquel quiconque devrait se référer. Ceci sera accompli en analysant un corpus d'entrevues et d'observations dans le cadre d'un projet de recherche examinant les services de type SEU dans cinq universités canadiennes, ainsi qu'une étude sur

  5. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  6. Ethical Disputes and Public Service Televison. Case Study: Otvoreno Political Talk Show, Broadcasted on 21st of January, 2010

    Directory of Open Access Journals (Sweden)

    Gordana Škaljac Narančić

    2011-12-01

    Full Text Available Ratings of the television programs as well as commercial effects become crucial measures of the media success and journalists’ efficiency neglecting minimal ethical standards. The profit maximisation logic and mere survival in times of the economic crisis also has the impact on preserving the sensitive ethical standards. In this respect, the television, as the most influential medium, especially public television, has the biggest responsibility. Violation of the ethical norms on public television means that it does not fulfil its key role – the role of public service. In important cases of the violation of ethical rules, the lack of clear responses of the regulators is the other side of the problem. The case study in this text shows us how easy it is to turn to the contempt of the professional journalistic standards and, consequently, ethical norms. This leads us to think how difficult is today to remain professional and ethical in times of the tangible commercialism and sensationalism.

  7. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  8. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  9. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong; Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical

  10. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  11. Olympic Broadcast Rights

    OpenAIRE

    Žižka, Martin

    2014-01-01

    Title: Olympic Broadcast Rights Objectives: The main objective of this thesis is to analyse the revenue derived from the sale of the broadcasting rights to the Olympics by Olympic Movement. In the thesis are analysed the total sum of revenue, selected territory and compared the proportion that belongs to the International Olympic Committee and the Organizing Committee of the Olympic Games. The secondary objective is to adapt and calculation of the conversion mechanism for the transfer of amou...

  12. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  13. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  14. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  15. Securing cloud services a pragmatic approach to security architecture in the cloud

    CERN Document Server

    Newcombe, Lee

    2012-01-01

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.

  16. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  17. Service Oriented Architecture in Network Security - a novel Organisation in Security Systems

    OpenAIRE

    Hilker, Michael; Schommer, Christoph

    2008-01-01

    Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is disting...

  18. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  19. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  20. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  1. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  2. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    National military strategy involves evaluating all elements of power, analyzing their capabilities and limitations, and incorporating these tools into a course of military action to secure political goals...

  3. The Role of Corporate Defense Services in International Security Strategy

    National Research Council Canada - National Science Library

    Baroody, J. R

    2000-01-01

    .... The privatization and outsourcing of activities that were once solely the province of sovereign governments provide challenges and opportunities to planners and analysts involved in national security strategy...

  4. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  5. FlySec: a risk-based airport security management system based on security as a service concept

    Science.gov (United States)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  6. Broadcasting of inseparability

    International Nuclear Information System (INIS)

    Adhikari, Satyabrata; Choudhury, B S; Chakrabarty, Indranil

    2006-01-01

    Suppose we are given an entangled pair and asked how well we can produce two entangled pairs starting from a given entangled pair using only local operations. To respond to this question, we study broadcasting of entanglement using a state-dependent quantum cloning machine as a local copier. We show that the length of the interval for probability-amplitude-squared α 2 for broadcasting of entanglement using a state-dependent cloner can be made larger than the length of the interval for probability-amplitude-squared for broadcasting entanglement using a state-independent cloner. Further we show that there exists a local state-dependent cloner which gives better quality copy (in terms of average fidelity) of an entangled pair than the local universal cloner

  7. Data broadcasting: merging digital broadcasting with the Internet

    DEFF Research Database (Denmark)

    2001-01-01

    , and for what means it can be used. It also analyses data broadcasting from the perspectives of both the medium and business. * Features the latest developments in electronic media * Discusses the major media opportunities of data broadcasting * Shows how data broadcasting can overcome many notorious problems...... and developers in the telecommunications, software, hardware and media industries of the main commercial, editorial and technical opportunities of data broadcasting....

  8. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  9. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Directory of Open Access Journals (Sweden)

    Jun Wu

    2017-07-01

    Full Text Available Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  10. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  11. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  12. Between Postage Stamps and Digitalization: The Changing Roles of Educational Broadcasting.

    Science.gov (United States)

    Fleisher, Frederic

    1995-01-01

    Provides a broadcasting practitioner's perspective of educational broadcasting in Europe, and how, with data compression, the emergence of more television channels can affect the educationalist and public service broadcasting. Discusses technological development, equal access to education, cultural maintenance, advertising, future outlooks, and…

  13. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  14. Probabilistic broadcasting of mixed states

    International Nuclear Information System (INIS)

    Li Lvjun; Li Lvzhou; Wu Lihua; Zou Xiangfu; Qiu Daowen

    2009-01-01

    It is well known that the non-broadcasting theorem proved by Barnum et al is a fundamental principle of quantum communication. As we are aware, optimal broadcasting (OB) is the only method to broadcast noncommuting mixed states approximately. In this paper, motivated by the probabilistic cloning of quantum states proposed by Duan and Guo, we propose a new way for broadcasting noncommuting mixed states-probabilistic broadcasting (PB), and we present a sufficient condition for PB of mixed states. To a certain extent, we generalize the probabilistic cloning theorem from pure states to mixed states, and in particular, we generalize the non-broadcasting theorem, since the case that commuting mixed states can be exactly broadcast can be thought of as a special instance of PB where the success ratio is 1. Moreover, we discuss probabilistic local broadcasting (PLB) of separable bipartite states

  15. The quandry of benchmarking broadcasts

    International Nuclear Information System (INIS)

    Karonis, N T; Supinski, B R

    1999-01-01

    A message passing library's implementation of broadcast communication can significantly affect the performance of applications built with that library. In order to choose between similar implementations or to evaluate available libraries, accurate measurements of broadcast performance are required. As we demonstrate, existing methods for measuring broadcast performance are either inaccurate or inadequate. Fortunately, we have designed an accurate method for measuring broadcast performance. Measuring broadcast performance is not simple. Simply sending one broadcast after another allows them to proceed through the network concurrently, thus resulting in accurate per broadcast timings. Existing methods either fail to eliminate this pipelining effect or eliminate it by introducing overheads that are as difficult to measure as the performance of the broadcast itself. Our method introduces a measurable overhead to eliminate the pipelining effect

  16. CATV and the Broadcasters.

    Science.gov (United States)

    Flanagan, Bill

    Competition between cable television systems (CATV) and regular broadcast stations concerns pay-TV and distant signal importation. The pay-TV that CATV provides competes with the networks by "siphoning" away sports and feature films, while the distant signals that CATV imports to a local market "fragment" the local audience and…

  17. From Broadcast to Podcast

    DEFF Research Database (Denmark)

    Fibiger, Bo

    2007-01-01

    This paper will present the development from broadcasted educational television up to the actual use of streaming video and mobile units in eLearning. The paper will discuss the following topics: what can we learn from history? – and what are the new challenges and possibilities in mobile...

  18. Virtue Broadcasting - directorate change

    CERN Multimedia

    2003-01-01

    The Board of Virtue Broadcasting Plc ("Virtue") have announced the appointment of Mr. Klaus Ackerstaff as the CEO of the main Board. He began his professional career at CERN, where he was responsible for the IT infrastructure of the OPAL (particle physics) project (1/2 page).

  19. Restricted broadcast process theory

    NARCIS (Netherlands)

    F. Ghassemi; W.J. Fokkink (Wan); A. Movaghar; A. Cerone; S. Gruner

    2008-01-01

    htmlabstractWe present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad hoc networks, i.e. local broadcast, connectivity of nodes and connectivity changes. Connectivity and

  20. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.......The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  1. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  2. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On

    National Research Council Canada - National Science Library

    Wrage, Lutz; Simanta, Soumya; Lewis, Grace A; Jaspan, Saul

    2007-01-01

    .... This technical note presents the results of applying the T-Check approach in an initial investigation of two Web services standards, WS-Security and SAML, to create an SSO solution that works inside...

  3. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  4. Internet of people, things and services - the convergence of security, trust and privacy

    CSIR Research Space (South Africa)

    Eloff, JHP

    2009-12-01

    Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...

  5. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  6. Towards Formal Validation of Trust and Security of the Internet of Services

    DEFF Research Database (Denmark)

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  7. Seamless Mobile Multimedia Broadcasting Using Adaptive Error Recovery

    Directory of Open Access Journals (Sweden)

    Carlos M. Lentisco

    2017-01-01

    Full Text Available Multimedia services over mobile networks present several challenges, such as ensuring a reliable delivery of multimedia content, avoiding undesired service disruptions, or reducing service latency. HTTP adaptive streaming addresses these problems for multimedia unicast services, but it is not efficient from the point of view of radio resource consumption. In Long-Term Evolution (LTE networks, multimedia broadcast services are provided over a common radio channel using a combination of forward error correction and unicast error recovery techniques at the application level. This paper discusses how to avoid service disruptions and reduce service latency for LTE multimedia broadcast services by adding dynamic adaptation capabilities to the unicast error recovery process. The proposed solution provides a seamless mobile multimedia broadcasting without compromising the quality of the service perceived by the users.

  8. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    Science.gov (United States)

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of

  9. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  10. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  11. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Lagos Journal of Library and Information Science ... Data was analysed with the aid of Statistical Package for Social Sciences (SPSS. ... To curb this menace, library management must educate users on use of library resources ... Keywords: Library security, Theft, Mutilation, Vandalism, Library resources; Laz Otti Memorial ...

  12. Load control services in the management of power system security costs

    International Nuclear Information System (INIS)

    Jayantilal, A.; Strbac, G.

    1999-01-01

    The new climate of deregulation in the electricity industry is creating a need for a more transparent cost structure and within this framework the cost of system security has been a subject of considerable interest. Traditionally power system security has been supplied by out-of-merit generation, in the short term, and transmission reinforcement, in the long term. This paper presents a method of analysing the role of load-demand in the management of power system security costs by utilising load control services (LCS). It also proposes a competitive market to enable bidding from various participants within the electricity industry to supply system security. (author)

  13. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical broadcasting method over cellular network, is inefficient in terms of radio resource usage. To solve this problem, the audience-driven live TV scheduling (ADTVS) framework is proposed, to maximize radio resource usage when providing TV broadcasting services over LTE networks. ADTVS, a system-level scheduling framework, considers both available radio resources and audience preferences, in order to dynamically schedule TV channels for broadcasting at various time and locations. By conducting a simulation using real-life data and scenarios, it is shown that ADTVS significantly outperforms the static broadcast method. Numerical results indicate that, on average, ADTVS enables substantial improvement to broadcast efficiency and conserves considerable amount of radio resources, while forgoing less than 5% of user services compared to the benchmark system.

  14. Research on the Safe Broadcasting of Television Program

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available The existing way of broadcasting and television monitoring has a lot of problems in China. On the basis of the signal technical indicators monitoring in the present broadcasting and television monitoring system, this paper further extends the function of the monitoring network in order to broaden the services of monitoring business and improve the effect and efficiency of monitoring work. The problem of identifying video content and channel in television and related electronic media is conquered at a low cost implementation way and the flexible technology mechanism. The coverage for video content and identification of the channel is expanded. The informative broadcast entries are generated after a series of video processing. The value of the numerous broadcast data is deeply excavated by using big data processing in order to realize a comprehensive, objective and accurate information monitoring for the safe broadcasting of television program.

  15. A special broadcast of CERN's Video news

    CERN Multimedia

    2003-01-01

    A special edition of CERN's video news giving a complete update on the LHC project is to be broadcast in the Main Auditorium. After your lunch make a small detour to the Main Auditorium, where you see the big picture. On 14, 15 and 16 May, between 12:30 and 14:00, a special edition of CERN's video news bulletin will be broadcast in the Main Auditorium. You will have the chance get up-to-date on the LHC project and its experiments. With four years to go before the first collisions in the LHC, the LHC Project Leader Lyn Evans will present a status report on the construction of the accelerator. The spokesmen of the five LHC experiments (ALICE, ATLAS, CMS, LHCb and TOTEM) will explain how the work is going and what the state of play will be in four years' time. This special video news broadcast is the result of collaboration between the CERN Audiovisual Service, the Photo Service and the External communication section. The broadcast will begin with a brand-new programme title sequence. And just as in the real c...

  16. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  17. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  18. Security framework for virtualised infrastructure services provisioned on-demand

    NARCIS (Netherlands)

    Ngo, C.; Membrey, P.; Demchenko, Y.; de Laat, C.

    2011-01-01

    Cloud computing is developing as a new wave of ICT technologies, offering a common approach to on-demand provisioning computation, storage and network resources which are generally referred to as infrastructure services. Most of currently available commercial Cloud services are built and organized

  19. Broadcast sound technology

    CERN Document Server

    Talbot-Smith, Michael

    1990-01-01

    Broadcast Sound Technology provides an explanation of the underlying principles of modern audio technology. Organized into 21 chapters, the book first describes the basic sound; behavior of sound waves; aspects of hearing, harming, and charming the ear; room acoustics; reverberation; microphones; phantom power; loudspeakers; basic stereo; and monitoring of audio signal. Subsequent chapters explore the processing of audio signal, sockets, sound desks, and digital audio. Analogue and digital tape recording and reproduction, as well as noise reduction, are also explained.

  20. An end-to-end security auditing approach for service oriented architectures

    NARCIS (Netherlands)

    Azarmi, M.; Bhargava, B.; Angin, P.; Ranchal, R.; Ahmed, N.; Sinclair, A.; Linderman, M.; Ben Othmane, L.

    2012-01-01

    Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement

  1. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

    DEFF Research Database (Denmark)

    Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran

    2012-01-01

    The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our...

  2. Service task partition and distribution in star topology computer grid subject to data security constraints

    Energy Technology Data Exchange (ETDEWEB)

    Xiang Yanping [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Levitin, Gregory, E-mail: levitin@iec.co.il [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Israel electric corporation, P. O. Box 10, Haifa 31000 (Israel)

    2011-11-15

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: > Grid service with star topology is considered. > An algorithm for evaluating service reliability and data security is presented. > A tradeoff between the service reliability and data security is analyzed. > A procedure for optimal service task partition and distribution is suggested.

  3. Service task partition and distribution in star topology computer grid subject to data security constraints

    International Nuclear Information System (INIS)

    Xiang Yanping; Levitin, Gregory

    2011-01-01

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: → Grid service with star topology is considered. → An algorithm for evaluating service reliability and data security is presented. → A tradeoff between the service reliability and data security is analyzed. → A procedure for optimal service task partition and distribution is suggested.

  4. SIS Security White Paper: Managing privacy and security for the Service Information System

    OpenAIRE

    Kerr, Gillian; Johnson, Alberta; Gaudon, Sara

    2018-01-01

    The Service Information System (SIS) is a monitoring and evaluation platform built on open source software and donated Microsoft services that is offered on a subscription basis to nonprofits providing any kind of service. It is developed and managed by LogicalOutcomes, a Canadian nonprofit, and launched in March 2018. The first implementation was created in partnership with the Ontario Coalition of Agencies Serving Immigrants, funded by the Ontario Ministry of Citizenship and Immigration. ...

  5. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  6. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  7. Legislating Civil Service Reform: The Homeland Security Act of 2002

    National Research Council Canada - National Science Library

    Brook, Douglas A; King, Cynthia L; Anderson, David; Bahr, Joshua

    2006-01-01

    .... It includes a review of the recent history of civil service reform, a chronology of the major events leading up to passage of the legislation, and a detailed examination of the rhetorical framing...

  8. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  9. National association of broadcasters engineering handbook NAB engineering handbook

    CERN Document Server

    Jones, Graham A; Osenkowsky, Thomas G; Williams, Edmund A

    2013-01-01

    The NAB Engineering Handbook provides detailed information on virtually every aspect of the broadcast chain, from news gathering, program production and postproduction through master control and distribution links to transmission, antennas, RF propagation, cable and satellite. Hot topics covered include HD Radio, HDTV, 2 GHz broadcast auxiliary services, EAS, workflow, metadata, digital asset management, advanced video and audio compression, audio and video over IP, and Internet broadcasting. A wide range of related topics that engineers and managers need to understand are also covered, includ

  10. Enforcement of Security and Privacy in a Service-Oriented Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    inhabitants. With the vision, it is therefore necessity to enforce privacy and security of the data in all phases of its life cycle. The life cycle starts from acquiring the data to it is stored. Therefore, this dissertation follows a system-level and application-level approach to manage data with respect...... to privacy and security. This includes first a design of a service-oriented architecture that allows for the deployment of home-oriented and grid-oriented IASs on a Home Energy Management System (HEMS) and in the cloud, respectively. Privacy and security of electricity data are addressed by letting...... the residential consumer control data dissemination in a two-stage process: first from the HEMS to the cloud and from the cloud to the IASs. Then the dissertation focuses on the critical phases in securing the residential home as well as securing the cloud. It presents a system-level threat model of the HEMS...

  11. Modelling a web service approach to secure data access ...

    African Journals Online (AJOL)

    ... and timely means to transmit official information in every working environment. ... The 3-tier architecture adopted in this work would have the front-end to allow officers log in ... At the middle-end, users are authenticated for specific services.

  12. Designing and implementing the logical security framework for e-commerce based on service oriented architecture

    OpenAIRE

    Luhach, Ashish Kr.; Dwivedi, Sanjay K; Jha, C K

    2014-01-01

    Rapid evolution of information technology has contributed to the evolution of more sophisticated E- commerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logical security because of their poor designing and to face the highly equipped and trained intruders. This editorial proposed a security framework for small and medium sized E-commerce, based on service oriented architecture and gives an analysis of the emin...

  13. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  14. Practical Aspects of Outsourcing as a Mean of Security Service Provision

    Directory of Open Access Journals (Sweden)

    D.B. Frolov

    2012-06-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion. With the development of mobile technology protecting of user data becomes more and more important. The article is dedicated to the vulnerability of devices running on the iOS platform, potentially allowing an attacker to obtain information about the movements of their owners, and suggests ways to protect against these attacks.

  15. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  16. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  17. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2017-01-01

    -main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  18. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2016-01-01

    -main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  19. Time-Zone-Pattern Satellite Broadcasting Antenna

    Science.gov (United States)

    Galindo, Victor; Rahmat-Samii, Yahya; Imbriale, William A.; Cohen, Herb; Cagnon, Ronald R.

    1988-01-01

    Direct-broadcast satellite antenna designs provide contoured beams to match four time zones in 48 contiguous states and spot beams for Alaska, Hawaii, and Puerto Rico presented in 29-page report. Includes descriptions of procedures used to arrive at optimized designs. Arrangements, amplitudes, and phases of antenna feeds presented in tables. Gain contours shown graphically. Additional tables of performance data given for cities in service area of Eastern satellite.

  20. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  1. End-to-End Service Oriented Architectures (SOA) Security Project

    Science.gov (United States)

    2012-02-01

    Java 6.0 (javax.ws) platform and deployed on boston.cs.purdue.edu. TB stores all data regarding sessions and services in a MySQL database, setup on...pointcut designators. JBoss AOP [JBO2] and AspectJ [ASP1] are powerful frameworks that implement AOP for Java programs. Its pointcut designators... hibernate cglib enhanced proxies <attribute name="Ignore">*$$EnhancerByCGLIB$$*</attribute> --> <attribute name="Optimized">true</attribute

  2. Exploring a security protocol for secure service migration in commercial cloud environments

    OpenAIRE

    Karthick, Gayathri; Mapp, Glenford E.; Kammueller, Florian; Aiash, Mahdi

    2017-01-01

    Mobile users are making more demands of networks. They want to run applications such as network steaming of audio and video as well as immersive gaming that demand high Qualities-of-Service. One way to address this problem is by using mobile services that move around as users move around. This ensures that low latencies are maintained between the client and the server resulting in a better Quality-of-Experience. In addition, the advent of virtual machine technology for example, VMware, and co...

  3. 78 FR 75563 - Commission Policies and Procedures Under the Communications Act, Foreign Investment in Broadcast...

    Science.gov (United States)

    2013-12-12

    ... competitive opportunities (ECO) approach for broadcast foreign ownership similar to that applied in common... Technology, a firm that consults with financial institutions and broadcast owners. Adelante Comments at 1-2... threats and national security issues have arisen as technology has advanced,\\33\\ we do not believe that...

  4. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  5. WiMAX security and quality of service an end-to-end perspective

    CERN Document Server

    Tang, Seok-Yee; Sharif, Hamid

    2010-01-01

    WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements.

  6. Secure positioning technique based on encrypted visible light map for smart indoor service

    Science.gov (United States)

    Lee, Yong Up; Jung, Gillyoung

    2018-03-01

    Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.

  7. Sense of security felt by the armed police with different service length and influential factors

    Directory of Open Access Journals (Sweden)

    Jing CHEN

    2011-02-01

    Full Text Available Objective To investigate the status of sense of security felt by the armed police and the influential factors thereof.Methods The sense of security,stress level,comprehension of social supports and the coping styles were measured and evaluated by use of Security Questionnaire(SQ,Psychological Stress Self-Evaluation Test(PSET,Perceived Social Support Scale(PSSS and Coping Style Scale(CSS in 725 armed police,and the differences were compared between the servicemen with different service length(1,2 and 3 years.The correlation between security sense(expressed as personal safety and determination of control and comprehension of social supports,coping styles and T score on stress level were analyzed.A stepwise regression analysis was done to screen the factors influencing the security sense of servicemen with the overall score of security sense as the dependent variable and the comprehension of social supports(expressed as inside-and outside-family support,coping styles(expressed as illusion,resignation,rationalization,self-condemned determinant,resort and problem-solving capacity and T score on stress level as the independent variables.Results Compared with the armed police with 1 year of military service,those with 2 or 3 years of military service got lower scores in personal safety,determination of control,inside-and outside-family support,and resort and problem-solving capacity(P 0.05.The two factors of comprehension of social supports(inside-and outside-family support,and the two factors of coping styles(resort and problem-solving capacity were positively correlated with the sense of security(personal safety and determination of control(P < 0.001;while the four factors of coping styles(illusion,resignation,rationalization and self-condemned determinant and the T score on stress level were negatively correlated with the sense of security(P < 0.001.It was proved by multivariate linear regression analysis that outside-family support

  8. Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems

    OpenAIRE

    Himanshu Khurana; Radostina K. Koleva

    2006-01-01

    Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large-scale dynamic applications. However, widespread use of these systems is hindered by a lack of suitable security services. In this paper, we present scalable solutions for confidentiality, integrity, and authentication for these systems. We also provide verifiable usage-based accounting services, which are required for e-commerce and e-business applications that use publish/subscribe ...

  9. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  10. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...

  11. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...

  12. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  13. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  14. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  15. Characteristics of hybrid broadcast broadband television (HbbTV

    Directory of Open Access Journals (Sweden)

    Jakšić Branimir

    2017-01-01

    Full Text Available This paper describes the working principle of hybrid broadcast-broadband TV (Hybrid Broadcast Broadband TV - HbbTV. The architecture of HbbTV system is given, the principle of its operation, as well as an overview of HbbTV specification standards that are in use, with their basic characteristics. Here are described the services provided by Hybrid TV. It is also provided an overview of the distribution of HbbTV services in Europe in terms of the number of TV channels that HbbTV services offer, the number of active hybrid TV devices, HbbTV standards which are in use and models of broadcast networks used to distribute HbbTV service.

  16. A Resource Curriculum in Broadcast Media. Bulletin No. 8025.

    Science.gov (United States)

    Herian, Roger; Moen, Mary

    A resource for teachers who design instructional programs in broadcast media, this curriculum guide consists of eight units which deal with the nature of broadcast media, broadcast programming and public interest, broadcast advertising, broadcast regulation, societal effects of broadcasting, broadcasting and future technology, radio broadcasting,…

  17. Using secure web services to visualize poison center data for nationwide biosurveillance: a case study.

    Science.gov (United States)

    Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine

    2010-01-01

    Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.

  18. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  19. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  20. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  1. Constructing RBAC based security model in u-healthcare service platform.

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  2. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Directory of Open Access Journals (Sweden)

    Moon Sun Shin

    2015-01-01

    Full Text Available In today’s era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation’s healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR, recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  3. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104

  4. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    Science.gov (United States)

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  5. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers

    Science.gov (United States)

    2015-01-01

    Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155

  6. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.

    Science.gov (United States)

    de la Torre-Díez, Isabel; Lopez-Coronado, Miguel; Garcia-Zapirain Soto, Begonya; Mendez-Zorrilla, Amaia

    2015-07-27

    The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.

  7. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  8. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  9. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  10. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  11. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  12. How we use online broadcasting - Web TV - for community engagement

    Science.gov (United States)

    Allison, M. L.; Conway, F. M.; Matti, J.; Palmer, R.

    2013-12-01

    The Arizona Geological Survey uses online broadcasting (Webcast or 'Web TV') to help fulfill our statutory mission to 'Inform, advise and assist the public in matters concerning the geological processes, materials and landscapes and the development and use of the mineral resources of this state.' We launched a monthly online broadcast called 'Arizona Mining Review' via Livestream, a low-cost or free video streaming service. The show provides news, interviews, and discussions about mining and mineral resources topics of interest in Arizona, the nation's second largest non-fuel mining state. The costs to set up and broadcast are minor. Interviews with local guests are held in a corner of the AZGS conference room with easy chairs and a couch; long-distance interviews are held via Skype. The broadcast originates from a desktop computer with a webcam, a $60 microphone, three sets of earbud headphones and a powered amplifier. During broadcasts, we supplement interview footage with slides, photos, or video clips that we have or are provided by guests. Initial broadcasts were live; recordings of these were later uploaded to our YouTube channel. Because scheduling and executing a live Internet broadcast is stressful and demanding for both the production team and guests, we recently elected to record and produce episodes prior to broadcasting them. This allows us more control over supplementary materials used during the broadcast; it also permits us to record the broadcast using a high-definition digital video camera that cannot be used for streaming video. In addition to the Arizona Mining Review, we record conferences and workshops and special presentations on topical issues. A video on the recently discovered Little Chino fault has drawn over 3,000 views. Our latest presentations are short 1-2 minute 'video abstracts' delivered by authors of new publications released by the Survey. These include maps and graphics from the reports to help illustrate the topics and their

  13. Data Security Measures in the IT Service Industry: A Balance between Knowledge & Action

    Directory of Open Access Journals (Sweden)

    N. Mlitwa

    2008-12-01

    Full Text Available That knowledge is power is fast becoming a cliche within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www, it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even theft of confidential information, leading to financial losses in information dependant competitive institutions is therefore high. Improving efficiencies through ICT therefore, comes with security responsibilities. The problem however is that most organizations tend to focus on task-enhancing efficiencies and neglect security. Possibly due to limited awareness about security, underestimating the problem, concerns about security costs, or through plain negligence. The activity theory of Engestrm and the activity analysis development framework of Mursu et al are used as analytical lenses to the cybercrime challenge in this paper. A practical case study of Company X, an IT service provider in Malawi is then used to understand the extent to which organisations that offer electronic data solutions prioritise security in their operations. It is found that even better informed organisations fall short in taking adequate data security measures. A recommendation for all organisations is that they should not only have a clear policy, but also ensure that it is routinely and consistently implemented throughout the operations if information capital is to be secured. A framework towards a holistic approach to thinking about, and in addressing cybercrime is suggested, and recommended in the paper.

  14. Behavioral analysis of use personal service e-balance Indonesian social security

    Science.gov (United States)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  15. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  16. Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services

    Directory of Open Access Journals (Sweden)

    Chenglong Cao

    2018-01-01

    Full Text Available Ride-hailing service solves the issue of taking a taxi difficultly in rush hours. It is changing the way people travel and has had a rapid development in recent years. Since the service is offered over the Internet, there is a great deal of uncertainty about security and privacy. Focusing on the issue, we changed payment pattern of existing systems and designed a privacy protection ride-hailing scheme. E-cash was generated by a new partially blind signature protocol that achieves e-cash unforgeability and passenger privacy. Particularly, in the face of a service platform and a payment platform, a passenger is still anonymous. Additionally, a lightweight hash chain was constructed to keep e-cash divisible and reusable, which increases practicability of transaction systems. The analysis shows that the scheme has small communication and computation costs, and it can be effectively applied in the ride-hailing service with privacy protection.

  17. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

    Science.gov (United States)

    Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni

    The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.

  18. A Framework for Smart Home Services with Secure and QoS-aware Communications

    Directory of Open Access Journals (Sweden)

    Markus Hager

    2013-01-01

    Full Text Available The scenario of smart home services will be discussed with regard to two important aspects: the quality of service problem for the in-house communication and the need for a security scheme for the whole system. We focus on an installation with smart computers in each flat interconnected using a switched Ethernet network. These smart devices are responsible for performing local services, user control and operate as a gateway for the different types of sensor and actor networks installed at each flat. We propose a QoS scheme to prevent congestion situation for the Ethernet network which is applicable to currently available cost-sensitive hardware. Furthermore, the whole system, all communication channels, user data and the access to the framework are secured by our proposed security architecture. Finally, we will present the latest improvements on Ethernet network standards, the ongoing work on this topics and our next steps for future work.

  19. PKI-based secure mobile access to electronic health services and data.

    Science.gov (United States)

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  20. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Naixue Xiong

    2014-12-01

    Full Text Available Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs. The quality of service (QoS of services composition applications (SCAs are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  1. Analyzing comprehensive QoS with security constraints for services composition applications in wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Wu, Zhao; Huang, Yannong; Xu, Degang

    2014-12-01

    Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique-vector universal generating function (VUGF)-which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  2. High data-rate video broadcasting over 3G wireless systems

    NARCIS (Netherlands)

    Atici, C.; Sunay, M.O.

    2007-01-01

    In cellular environments, video broadcasting is a challenging problem in which the number of users receiving the service and the average successfully decoded video data-rate have to be intelligently optimized. When video is broadcasted using the 3G packet data standard, 1xEV-DO, the code space may

  3. 77 FR 71104 - Determination of Reasonable Rates and Terms for Noncommercial Broadcasting

    Science.gov (United States)

    2012-11-29

    ... full-time students 2013 2014 2015 2016 2017 Level 1 =20% Feature Music programming: Population count..., Composers and Publishers (``ASCAP''); SESAC, Inc.; Broadcast Music, Inc. (``BMI''); Educational Media Foundation (``EMF''); Music Reports, Inc. (``MRI''); National Public Radio, the Public Broadcasting Service...

  4. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  5. Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT

    Directory of Open Access Journals (Sweden)

    Zahid Mahmood

    2017-10-01

    Full Text Available Internet-of-Things (IoT include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS also includes a number of devices connected to the internet where wearable devices are also included. Both systems enable researchers to develop healthcare systems with additional intelligence as well as prediction capabilities both for lifestyle and in hospitals. It offers as much persistence as a platform to ubiquitous healthcare by using wearable sensors to transfer the information over servers, smartphones, and other smart devices in the Telecare Medical Information System (TMIS. Security is a challenging issue in TMIS, and resourceful access to health care services requires user verification and confidentiality. Existing schemes lack in ensuring reliable prescription safety along with authentication. This research presents a Secure Authentication and Prescription Safety (SAPS protocol to ensure secure communication between the patient, doctor/nurse, and the trusted server. The proposed procedure relies upon the efficient elliptic curve cryptosystem which can generate a symmetric secure key to ensure secure data exchange between patients and physicians after successful authentication of participants individually. A trusted server is involved for mutual authentication between parties and then generates a common key after completing the validation process. Moreover, the scheme is verified by doing formal modeling using Rubin Logic and validated using simulations in NS-2.35. We have analyzed the SAPS against security attacks, and then performance analysis is elucidated. Results prove the dominance of SAPS over preliminaries regarding mutual authentication, message integrity, freshness, and session key management and attack prevention.

  6. Secure Service Proxy: A CoAP(s Intermediary for a Securer and Smarter Web of Things

    Directory of Open Access Journals (Sweden)

    Floris Van den Abeele

    2017-07-01

    Full Text Available As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP: a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.

  7. Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things.

    Science.gov (United States)

    Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet; Hoebeke, Jeroen

    2017-07-11

    As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.

  8. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  9. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  10. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  11. Secure Service Oriented Architectures (SOA) Supporting NEC (Architecture orientee service (soa) gerant la NEC)

    Science.gov (United States)

    2009-01-01

    develop this demonstrator within a so short period of time without the availability of products from the commercial market and the open source...Binary Web Services [FastInfoset]. There seems to be no .NET implementation available. BiM . BiM [ BiM ] is based on the MPEG-7 standard and has been...designed and implemented by Siemens and Expway. This is a commercial product (although an evaluation version is available). BiM generally ANNEX A

  12. The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers

    Science.gov (United States)

    Brock, Linda

    2012-01-01

    Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…

  13. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Representation of Parties § 410.686b Fee for services performed for an individual before the Social Security... person or in writing; (ii) There was a death or serious illness in the individual's family; (iii...

  14. A multidisciplinary approach to team nursing within a low secure service: the team leader role.

    Science.gov (United States)

    Nagi, Claire; Davies, Jason; Williams, Marie; Roberts, Catherine; Lewis, Roger

    2012-01-01

    This article critically examines the clinical utility of redesigning a nursing practice model within the Intensive Support and Intervention Service, a new low secure mental health facility in the United Kingdom. Specifically, the "team nursing" approach to care delivery has been adapted to consist of multidisciplinary team leaders as opposed to nursing team leaders. The authors describe the role, properties, and functions of the multidisciplinary team leader approach. The authors provide examples of the benefits and challenges posed to date and the ways in which potential barriers have been overcome. Nursing care leadership can be provided by multidisciplinary staff. An adapted model of team nursing can be implemented in a low secure setting. © 2011 Wiley Periodicals, Inc.

  15. 76 FR 5521 - Innovation in the Broadcast Television Bands

    Science.gov (United States)

    2011-02-01

    ... broadcasters serving minority, foreign language and niche interests that might have smaller audiences and lower... signals, including those not specifically raised in this NPRM. Improving Reception of VHF TV Service 34... band that can cause interference, and reception of VHF signals requires physically larger antennas that...

  16. Resource allocation for multichannel broadcasting visible light communication

    Science.gov (United States)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  17. Integrating Ecosystem Services and Eco-Security to Assess Sustainable Development in Liuqiu Island

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-06-01

    Full Text Available Developing sustainable island tourism must be thoroughly evaluated in consideration of ecological, economic, and social factors on account of the fragility of island ecosystems. This study evaluated the ecological footprint (EF and ecological capacity of Liuqiu Island from 2010 to 2015 using the EF model, establishing an indicator to estimate the value of ecosystem service and eco-security. The empirical results include: (1 the overall value of ecosystem service on Liuqiu Island increased from US$3.75 million in 2010 to US$5.11 million in 2015; (2 the total per capita EF considerably increased from 0.5640 gha/person in 2010 to 4.0845 gha/person in 2015; and (3 the ecological footprint index increased from 0.30 in 2010 to 2.28 in 2015. These findings indicate that island tourism recreational zones gradually increased the pressure on its ecosystem, reduced the eco-security level, and severely damaged the environment, thereby threatening the function and structure of the entire ecosystem. The innovations and contributions of this study is integrating ecological footprint and ecosystem services valuation provide insights into sustainability of an island. The theoretical and practical implications identified in this study should contribute to reducing the gap between research and practice.

  18. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  19. Scheduling Broadcasts in a Network of Timelines

    KAUST Repository

    Manzoor, Emaad A.

    2015-05-12

    Broadcasts and timelines are the primary mechanism of information exchange in online social platforms today. Services like Facebook, Twitter and Instagram have enabled ordinary people to reach large audiences spanning cultures and countries, while their massive popularity has created increasingly competitive marketplaces of attention. Timing broadcasts to capture the attention of such geographically diverse audiences has sparked interest from many startups and social marketing gurus. However, formal study is lacking on both the timing and frequency problems. In this thesis, we introduce, motivate and solve the broadcast scheduling problem of specifying the timing and frequency of publishing content to maximise the attention received. We validate and quantify three interacting behavioural phenomena to parametrise social platform users: information overload, bursty circadian rhythms and monotony aversion, which is defined here for the first time. Our analysis of the influence of monotony refutes the common assumption that posts on social network timelines are consumed piecemeal independently. Instead, we reveal that posts are consumed in chunks, which has important consequences for any future work considering human behaviour over social network timelines. Our quantification of monotony aversion is also novel, and has applications to problems in various domains such as recommender list diversification, user satiation and variety-seeking consumer behaviour. Having studied the underlying behavioural phenomena, we link schedules, timelines, attention and behaviour by formalising a timeline information exchange process. Our formulation gives rise to a natural objective function that quantifies the expected collective attention an arrangement of posts on a timeline will receive. We apply this formulation as a case-study on real-data from Twitter, where we estimate behavioural parameters, calculate the attention potential for different scheduling strategies and, using the

  20. RFID Platform as a Service, Containerized Ecosystem, Feasibility and Security Impact Analysis

    Directory of Open Access Journals (Sweden)

    Lukas Kypus

    2015-01-01

    Full Text Available This paper presents a new concept as a special type of virtualization of particular event based communication components in RFID ecosystems. The new approach is containers based virtualization, and it is applied and tested on the container of Object name service. The results of the experiment allowed us to do the preliminary analysis of security consequences on the isolated containerized DNS-based RFID sub-service. We confirmed feasibility with this sandboxing technology represented by the special container. They bring the benefits in terms of efficient software component life-cycle management and integrity improvements. Experiments results of the containerization are discussed to show the possible isolation ways of other components like EPCis and middleware. There is present evaluation towards external threats and vulnerabilities. The result is a higher level of integrity, availability of whole ecosystem and resiliency against external threats. This gives a new opportunity to build robust RFID as Platform as a service, and it proves the ability to achieve a positive impact on the end to end service Quality of service.

  1. Health Education by Open Broadcast.

    Science.gov (United States)

    ICIT Report, 1976

    1976-01-01

    This issue focuses on uses and techniques of radio for educational purposes in developing nations. Two health education projects are described which are utilizing open broadcasting to attract a mass audience of listeners not committed to a structured radio education program. Kenya's Swahili language radio serial, "Giving Birth and Caring for your…

  2. Broadcast and Aggregation in BBC

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kiilerich Pratas, Nuno

    2015-01-01

    In this paper we introduce a process calculus BBC that has both forms of communication. For both many-to-one and one-to-many communication, it is often a natural assumption that communication is bounded; this reflects two distinct aspects of the limitations of a medium. In the case of broadcast, ...

  3. Broadcasting Stations of the World; Part III. Frequency Modulation Broadcasting Stations.

    Science.gov (United States)

    Foreign Broadcast Information Service, Washington, DC.

    This third part of "Broadcasting Stations of the World", which lists all reported radio broadcasting and television stations, with the exception of those in the United States which broadcast on domestic channels, covers frequency modulation broadcasting stations. It contains two sections: one indexed alphabetically by country and city, and the…

  4. Anthropologists and Broadcasting: Roles and Entry Strategies

    Science.gov (United States)

    Eiselein, E. B.; Topper, Martin

    1976-01-01

    The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)

  5. Service Innovations

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    This article discusses the challenges in relation to an ongoing project named converged advanced mobile media platform (CAMMP), where all the different stakeholders need to have a saying in the service development for the upcoming rich, mobile broadcasting services....

  6. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved. PMID:24078906

  7. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Weizhe Zhang

    2013-01-01

    Full Text Available Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  8. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives

    Directory of Open Access Journals (Sweden)

    Delphine Christin

    2010-04-01

    Full Text Available Wireless Sensor Networks (WSNs are gradually adopted in the industrial world due to their advantages over wired networks. In addition to saving cabling costs, WSNs widen the realm of environments feasible for monitoring. They thus add sensing and acting capabilities to objects in the physical world and allow for communication among these objects or with services in the future Internet. However, the acceptance of WSNs by the industrial automation community is impeded by open issues, such as security guarantees and provision of Quality of Service (QoS. To examine both of these perspectives, we select and survey relevant WSN technologies dedicated to industrial automation. We determine QoS requirements and carry out a threat analysis, which act as basis of our evaluation of the current state-of-the-art. According to the results of this evaluation, we identify and discuss open research issues.

  9. Noninvasive brain stimulation can induce paradoxical facilitation . Are these neuroenhancements transferable and meaningful to security services?

    Directory of Open Access Journals (Sweden)

    Jean eLevasseur-Moreau

    2013-08-01

    Full Text Available For ages, we have been looking for ways to enhance our physical and cognitive capacities in order to augment our security. One potential way to achieve this goal may be to externally stimulate the brain. Methods of noninvasive brain stimulation (NIBS, such as repetitive transcranial magnetic stimulation and transcranial electrical stimulation, have been recently developed to modulate brain activity. Both techniques are relatively safe and can transiently modify motor and cognitive functions outlasting the stimulation period. The purpose of this paper is to review data suggesting that NIBS can enhance motor and cognitive performance in healthy volunteers. We frame these findings in the context of whether they may serve security purposes. Specifically, we review studies reporting that NIBS induces paradoxical facilitation in motor (precision, speed, strength, acceleration endurance, and execution of daily motor task and cognitive functions (attention, impulsive behaviour, risk-taking, working memory, planning, and deceptive capacities. Although transferability and meaningfulness of these NIBS-induced paradoxical facilitations into real life situations are not clear yet, NIBS may contribute at improving training of motor and cognitive functions relevant for military, civil and forensic security services. This is an enthusiastic perspective that also calls for fair and open debates on the ethics of using NIBS in healthy individuals to enhance normal functions.

  10. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  11. Childhood Sexual Abuse, Adult Psychiatric Morbidity, and Criminal Outcomes in Women Assessed by Medium Secure Forensic Service

    Science.gov (United States)

    Dolan, Mairead; Whitworth, Helen

    2013-01-01

    There is little literature on childhood sexual abuse in women seen by forensic services. A cohort of 225 cases of women seen by forensic services in a medium secure unit in the UK were examined, and childhood sexual abuse and non-childhood sexual abuse cases were compared. Over half the sample had a history of childhood sexual abuse, and 5.6% of…

  12. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  13. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  14. The experience of clinical supervision for nurses and healthcare assistants in a secure adolescent service: Affecting service improvement.

    Science.gov (United States)

    McCarron, R H; Eade, J; Delmage, E

    2018-04-01

    WHAT IS KNOWN ON THE SUBJECT?: Regular and effective clinical supervision for mental health nurses and healthcare assistants (HCAs) is an important tool in helping to reduce stress and burnout, and in ensuring safe, effective and high-quality mental health care. Previous studies of clinical supervision within secure mental health environments have found both a low availability of clinical supervision, and a low level of staff acceptance of its value, particularly for HCAs. WHAT DOES THIS PAPER ADD TO EXISTING KNOWLEDGE?: In previous studies, the understanding shown by HCAs and nurses around the benefits of clinical supervision may have been limited by the methods used. This study was specifically designed to help them best express their views. In contrast to previous studies, both nurses and HCAs showed a good understanding of the function and value of clinical supervision. Significant improvements in the experience of, and access to, clinical supervision for nurses and HCAs working in secure mental health services may be achieved by raising staff awareness, demonstrating organizational support and increasing monitoring of clinical supervision. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Organizations should consider reviewing their approach to supervision to include raising staff awareness, multidisciplinary supervision, group supervision, and recording and tracking of supervision rates. Organizations should be mindful of the need to provide effective clinical supervision to HCAs as well as nurses. Introduction Studies have found a low availability and appreciation of clinical supervision, especially for healthcare assistants (HCAs). Qualitative research is needed to further understand this. Aims Increase understanding of nurses' and HCAs' experiences of, and access to, clinical supervision. Identify nurses' and HCAs' perceptions of the value and function of clinical supervision. Assess how interventions affect staff's experiences of clinical supervision. Methods In

  15. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  16. Secure provision of reactive power ancillary services in competitive electricity markets

    Science.gov (United States)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  17. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  18. Unified broadcast in sensor networks

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg; Jurdak, Raja; Kusy, Branislav

    2011-01-01

    of the network stack. UB is implemented as a transparent layer between the link and network layers, where it delays, schedules, and combines broadcasts from upper layer protocols before transmission on the wireless channel. Our empirical results in simulation and on a testbed show that UB can decrease...... the overall packet transmissions in the network by more than 60%, corresponding to more than 40% energy savings, without requiring new interfaces or affecting the correctness of the upper layer protocols....

  19. Oral health service utilization by elderly beneficiaries of the Mexican Institute of Social Security in México city

    Directory of Open Access Journals (Sweden)

    Solórzano-Santos Fortino

    2007-12-01

    Full Text Available Abstract Background The aging population poses a challenge to Mexican health services. The aim of this study is to describe recent oral health services utilization and its association with socio-demographic characteristics and co-morbidity in Mexican Social Security beneficiaries 60 years and older. Methods A sample of 700 individuals aged 60+ years was randomly chosen from the databases of the Mexican Institute of Social Security (IMSS. These participants resided in the southwest of Mexico City and made up the final sample of a cohort study for identifying risk factors for root caries in elderly patients. Sociodemographic variables, presence of cognitive decline, depression, morbidity, medication consumption, and utilization of as well as reasons for seeking oral health services within the past 12 months were collected through a questionnaire. Clinical oral assessments were carried out to determine coronal and root caries experience. Results The sample consisted of 698 individuals aged 71.6 years on average, of whom 68.3% were women. 374 participants (53.6% had made use of oral health services within the past 12 months. 81% of those who used oral health services sought private medical care, 12.8% sought social security services, and 6.2% public health services. 99.7% had experienced coronal caries and 44.0% root caries. Female sex (OR = 2.0, 6 years' schooling or less (OR = 1.4, and caries experience in more than 22 teeth (OR = 0.6 are factors associated with the utilization of these services. Conclusion About half the elderly beneficiaries of social security have made use of oral health services within the past 12 months, and many of them have to use private services. Being a woman, having little schooling, and low caries experience are factors associated with the use of these services.

  20. BOF4WSS : a business-oriented framework for enhancing web services security for e-business

    OpenAIRE

    Nurse, Jason R. C.; Sinclair, Jane

    2009-01-01

    When considering Web services' (WS) use for online business-to-business (B2B) collaboration between companies, security is a complicated and very topical issue. This is especially true with regard to reaching a level of security beyond the technological layer, that is supported and trusted by all businesses involved. With appreciation of this fact, our research draws from established development methodologies to develop a new, business-oriented framework (BOF4WSS) to guide e-businesses in def...

  1. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  2. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal

    2016-10-27

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  5. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  6. New Generation of Broadcasting Satellite Systems: New Markets and Business Developments

    Science.gov (United States)

    Perrot, Bruno; Michel, Cyril; Villaret, Stéfanie

    2002-01-01

    Since the deployment of the first Digital Broadcasting Satellite Systems, European satellite operators and service providers have been faced with the continuously increasing demand for Digital Broadcasting Services. Their success is built on the availability of the MPEG and DVB standards. Undoubtedly, conventional digital television broadcasting is today the `Killer' application. Various service providers already offer multimedia applications through DVB-S systems based upon the `Push' technology. Although these services do not currently represent the core business for broadcasting satellite operators, their percentage is increasing. `Push' technology services include Data Carousel, Webcasting, Turbo Internet, File casting and so on. Such technology can support the implementation of different emerging multimedia services scenarios from Newsgroups, Network collaborative learning, and tele-medicine, to others that may be invented in the near future. The penetration rate of multi-channel television reception is still increasing. Broadcasting satellites benefit both from the development of new, more segmented and sophisticated offers and from the development of Internet services. Satellite is likely to enter these new markets at different levels of the value chain: Even if the satellite has demonstrated its capacity to fully serve the television, combinations with other networks may be necessary to address the new markets: at the consumer premises, Internet-related services will require a return path; at the backbone level, satellite becomes a component of a full telecommunications solution. This article focuses on the European market and proposes:

  7. Freshwater Ecosystem Service Flow Model To Evaluate Regional Water Security: A Case Study In Beijing-Tianjin-Hebei Region, China

    Science.gov (United States)

    Li, D.; Li, S.

    2016-12-01

    Freshwater service, as the most important support ecosystem service, is essential to human survival and development. Many studies have evidenced the spatial differences in the supply and demand of ecosystem services and raised the concept of ecosystem service flow. However, rather few studies quantitatively characterize the freshwater service flow. This paper aims to quantify the effect of freshwater ecosystem service flow on downstream areas in Beijing-Tianjin-Hebei (BTH) region, China over 2000, 2005 and 2010. We computed the freshwater ecosystem service provision with InVEST model. We calculated freshwater ecosystem service consumption with water quota method. We simulated the freshwater ecosystem service flow using our simplified flow model and assessed the regional water security with the improved freshwater security index. The freshwater provision service mainly depends on climatic factors that cannot be influenced by management, while the freshwater consumption service is constrained by human activities. Furthermore, the decrease of water quota for agricultural, domestic and industrial water counteracts the impact of increasing freshwater demand. The analysis of freshwater ecosystem service flow reveals that the majority area of the BTH (69.2%) is affected by upstream freshwater. If freshwater ecosystem service flow is considered, the water safety areas of the whole BTH account for 66.9%, 66.1%, 71.3%, which increase 6.4%, 6.8% and 5.7% in 2000, 2005 and 2010, respectively. These results highlight the need to understand the teleconnections between distant freshwater ecosystem service provision and local freshwater ecosystem service use. This approach therefore helps managers choose specific management and investment strategies for critical upstream freshwater provisions across different regions.

  8. Developments in the Regulation of Broadcasting Advertising

    OpenAIRE

    Morris, Yvonne; Randle, Paul

    2005-01-01

    This Intervention provides a review of developments in the regulation of broadcast advertising within the UK. The piece focuses on the implications of media convergence on broadcast advertising, and provides a brief history and analysis of the regulation of broadcast advertising within the UK. The piece also reviews Advertising Codes and provides an overview of regulatory bodies such as OFCOM and the ASA, and their respective roles.

  9. The CAMI Project - Weather and Climate Services for Caribbean Food Security

    Science.gov (United States)

    Trotman, Adrian; Van Meerbeeck, Cedric

    2013-04-01

    Food security is major focus of Caribbean governments, with production being of particular concern. For the past three decades, Caribbean agriculture has been declining in relative importance, both in terms of its contribution to GDP and its share of the labour force. One of the problems Caribbean agriculture faces is the destructive impacts from weather and climate extremes. These include flood, drought, extreme temperatures, and strong winds from tropical cyclones. Other potential disasters, such as from pests and diseases attacks, are also weather and climate driven. These make weather and climate information critically important to decision-making in agriculture in the Caribbean region. In an effort to help reduce weather and climate related risks to the food security sector, The Caribbean Institute for Meteorology and Hydrology, along with its partners the Caribbean Agricultural Research and Development Institute, the World Meteorological Organization (WMO) and ten National Meteorological Services from within the Caribbean Community launched and implemented the Caribbean Agrometeorological Initiative (CAMI). From 2010 to 2013, CAMI set out to provide relevant information to farmers, and the industry in general, for decision and policy making. The project is funded by the European Union through the Science and Technology Programme of the African, Caribbean and Pacific Group of Countries' (ACP). The overarching objective of CAMI was to increase and sustain agricultural productivity at the farm level in the Caribbean region through improved applications of weather and climate information, using an integrated and coordinated approach. Currently, this is done through (i) provision of relevant climate information appropriately disseminated, (ii) predictions on seasonal rainfall and temperature, (iii) support for improved irrigation management, (iv) the development of strategically selected weather-driven pest and disease models, (v) use of crop simulation models

  10. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  11. eHealth in Belgium, a new "secure" federal network: role of patients, health professions and social security services.

    Science.gov (United States)

    France, Francis Roger

    2011-02-01

    eHealth platform is the official federal network in Belgium (created by law on 21 August 2008) devoted to a secure exchange of health data in many types of applications, such as health care purposes, simplification of administrative procedures and contribution to health policy. It implies a controlled access to decentralized databases and uses encrypted personal data. The national identification number has been chosen in order to authenticate the requester, the patient, and the receiver of information exchange. Authorizations have to be respected in order to obtain personal health data. Several questions are raised about its security: the lack of mandatory request for systematic journaling on accesses to the electronic patient record as well as the absence of explicit procedures for sanctions in case of unauthorized access, the new role of social security administration in managing security where a eHealth manager can be both judge and party (in the function of trusted third party for health data encryption and of a required lawyer for texts proposed by physicians to the Commission for the protection of private life). Another critic concerns the number of physicians in minority and the absence of patients' delegates in the eHealth Board. At a time when the patient is becoming a partner in the care team, should not he be the gate-keeper for the access to his own health record? How could networks help him to get the appropriate knowledge to contribute to care and to write his testament of life? Recent laws (on private life, patient rights and euthanasia) have contributed to a behavioural change in citizens and physician attitudes. Recommendations are made in order to improve the acceptability of eHealth platform. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  12. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  13. Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis

    OpenAIRE

    Princely Ifinedo

    2015-01-01

    Threats to data and information assets of Global Financial Services Industry (GFSI) are ever-present; such problems, if not well understood, could lead to huge negative impact. To some extent, the environment where a business operates does matter for its success. This study presents information about the relationships between selected socio-economic factors and information security threats and controls in the financial services industry. Essentially, it seeks to enrich the information provide...

  14. Watershed Education for Broadcast Meteorologists

    Science.gov (United States)

    Lamos, J. P.; Sliter, D.; Espinoza, S.; Spangler, T. C.

    2006-12-01

    The National Environmental Education and Training Organization (NEETF) published a report in 2005 that summarized the findings of ten years of NEETF and Roper Research. The report stated, "Our years of data from Roper surveys show a persistent pattern of environmental ignorance even among the most educated and influential members of society." Market research has also shown that 80% of television viewers list the weather as the primary reason for watching the local news. Broadcast meteorologists, with a broader understanding of environmental and related sciences have an opportunity to use their weathercasts to inform the public about the environment and the factors that influence environmental health. As "station scientists," broadcast meteorologists can use the weather, and people's connection to it, to broaden their understanding of the environment they live in. Weather and watershed conditions associated with flooding and drought have major human and environmental impacts. Increasing the awareness of the general public about basic aspects of the hydrologic landscape can be an important part of mitigating the adverse effects of too much or too little precipitation, and of protecting the environment as well. The concept of a watershed as a person's natural neighborhood is a very important one for understanding hydrologic and environmental issues. Everyone lives in a watershed, and the health of a watershed is the result of the interplay between weather and human activity. This paper describes an online course to give broadcast meteorologists a basic understanding of watersheds and how watersheds are impacted by weather. It discusses how to convey watershed science to a media- savvy audience as well as how to model the communication of watershed and hydrologic concepts to the public. The course uses a narrative, story-like style to present its content. It is organized into six short units of instruction, each approximately 20 minutes in duration. Each unit is

  15. Reliability of Broadcast Communications Under Sparse Random Linear Network Coding

    OpenAIRE

    Brown, Suzie; Johnson, Oliver; Tassi, Andrea

    2018-01-01

    Ultra-reliable Point-to-Multipoint (PtM) communications are expected to become pivotal in networks offering future dependable services for smart cities. In this regard, sparse Random Linear Network Coding (RLNC) techniques have been widely employed to provide an efficient way to improve the reliability of broadcast and multicast data streams. This paper addresses the pressing concern of providing a tight approximation to the probability of a user recovering a data stream protected by this kin...

  16. IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Aymen Abdullah Alsaffar

    2015-01-01

    Full Text Available These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc. capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second.

  17. 78 FR 70313 - Privacy Act of 1974; Department of Homeland Security U.S. Citizenship and Immigration Services...

    Science.gov (United States)

    2013-11-25

    ... performing or working on a contract, service, grant, cooperative agreement, or other assignment for DOS, when...; Date of Birth; Gender; A-Number; Social Security number; Immigration Status; Date of Arrival in the U.S... disclosure made to such agencies, entities, and persons is reasonably necessary to assist in connection with...

  18. Database security - how can developers and DBAs do it together and what can other Service Managers learn from it

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    This talk gives an overview of security threats affecting databases, preventive measures that we are taking at CERN and best practices in the industry. The presentation will describe how generic the threats are and how can other service managers profit from the database experience to protect other systems.

  19. 8 CFR 204.13 - How can the International Broadcasting Bureau of the United States Broadcasting Board of...

    Science.gov (United States)

    2010-01-01

    ... description of the job to be performed; and (ii) The broadcasting expertise held by the alien, including how... broadcasts; hosts for news broadcasts, news analysis, editorial and other broadcast features; or a news analysis specialist. The term broadcaster does not include individuals performing purely technical or...

  20. Population planning broadcasts in Bangladesh.

    Science.gov (United States)

    Ali, S A

    1982-06-01

    Bangladesh's growth rate of 2.36%/year is one of the highest in the world and, if present population trends continue, Bangladesh will have 153 million people by the year 2000. The Government adopted a comprehensive population policy in 1976 and seeks to reduce the population growth rate to 0 by 1992. Bangladesh's population control program further aims to raise the contraceptive acceptance rate from the current level of 14% of eligible couples to 38% by 1985, to raise the number of current contraceptive users from 2.4 to 7.3 million couples, and to achieve a sterilization level of 3.4 million people. Radio Bangladesh, which has been broadcasting programs on family planning since 1965, is playing an important motivational role in this effort. A Population Planning Cell was established within Radio Bangladesh in 1975 and 5 subcells located throughout the country broadcast independent programs on family planning 6 days/week. Evaluative surveys have confirmed the belief that radio is the most popular form of mass communication in rural areas. 47% of respondents in 1 survey identified radio as their main source of information about family planning, although only 12% reported contraceptive usage. An important task for radio in Bangladesh is to convince listeners that family planning practice is not incompatible with Islamic ideals and to overcome other superstitions and misconceptions about contraception.

  1. Live broadcast from the Globe

    CERN Multimedia

    La tête au carréTuesday, 17 June 2008 between 2.00 and 3.00 p.m.“La tête au carré”, a France Inter radio programme devoted to science, will set up its sound booth at CERN for a special broadcast on the LHC.The journalist Mathieu Vidard will interview the following guests: - Pierre Van Hove, an experimental physicist working on CMS. He is a CNRS research scientist from the Institut Hubert Curien in Strasbourg, France.- Abdelhak Djouadi is a theoretical physicist. He is a research director at the CNRS’s Laboratoire de physique théorique at Orsay, France and holder of the CNRS silver medal.- Magali Gruwe, one of the engineers in charge of LHC operations at CERN.» To take part in this live broadcast, which is open to the public, come to the Globe at 1:30 p.m. The number of places is limited.» No specialist knowledge required.» See the programme's homepage

  2. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  3. History of Satellite TV Broadcasting and Satellite Broadcasting Market in Turkey

    Directory of Open Access Journals (Sweden)

    Mihalis KUYUCU

    2015-09-01

    Full Text Available The present study analyses the satellite broadcasting that is the first important development that emerged as a result of digitalization in communication technologies and its reflections in Turkey. As the first milestone in the globalization of television broadcasting, satellite broadcasting provided substantial contribution towards the development of the media. Satellite bro adcasting both increased the broadcasting quality and geographical coverage of the television media. A conceptual study was carried out in the first part of the study in connection with the history of satellite broadcasting in Turkey and across the world. In the research part of the study, an analysis was performed on 160 television channels that broadcast in Turkey via Turksat Satellite. Economic structure of the television channels broadcasting in Turkey via satellite was studied and an analysis was perfo rmed on the operational structure of the channels. As a result of the study, it was emphasized that the television channels broadcasting via satellite platform also use other platforms for the purpose of spreading their broadcasts and television channel ow ners make investments in different branches of the media, too. Capital owners invest in different business areas other than the media although television channels broadcasting via Turksat mostly focus on thematic broadcasting and make effort to generate ec onomic income from advertisements. Delays are encountered in the course of the convergence between the new media and television channels that broadcast only from the satellite platform and such television channels experience more economic problems than the other channels. New media and many TV broadcasting platforms emerged as a result of the developments in the communication technologies. In television broadcasting, satellite platform is not an effective platform on its own. Channels make effort to reach t o more people by using other platforms in addition to

  4. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  5. Ecological Security and Ecosystem Services in Response to Land Use Change in the Coastal Area of Jiangsu, China

    Directory of Open Access Journals (Sweden)

    Caiyao Xu

    2016-08-01

    Full Text Available Urbanization, and the resulting land use/cover change, is a primary cause of the degradation of coastal wetland ecosystems. Reclamation projects are seen as a way to strike a balance between socioeconomic development and maintenance of coastal ecosystems. Our aim was to understand the ecological changes to Jiangsu’s coastal wetland resulting from land use change since 1977 by using remote sensing and spatial analyses. The results indicate that: (1 The area of artificial land use expanded while natural land use was reduced, which emphasized an increase in production-orientated land uses at the expense of ecologically important wetlands; (2 It took 34 years for landscape ecological security and 39 years for ecosystem services to regain equilibrium. The coastal reclamation area would recover ecological equilibrium only after a minimum of 30 years; (3 The total ecosystem service value decreased significantly from $2.98 billion per year to $2.31 billion per year from 1977 to 2014. Food production was the only one ecosystem service function that consistently increased, mainly because of government policy; (4 The relationship between landscape ecological security and ecosystem services is complicated, mainly because of the scale effect of landscape ecology. Spatial analysis of changing gravity centers showed that landscape ecological security and ecosystem service quality became better in the north than the south over the study period.

  6. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  7. Perceptions of Advertising Influence on Broadcast News.

    Science.gov (United States)

    Brown, Hubert W.; Barnes, Beth E.

    2001-01-01

    Finds that while students (studying broadcast journalism or advertising) and practitioners (station news directors and agency media directors) were in agreement on the majority of opinion statements discussing advertising's influence on broadcast news content, except students were less bothered by advertising's influence on news content than were…

  8. Beyond the Anchor: Students and Broadcasting Opportunities.

    Science.gov (United States)

    Marks, Rick

    1999-01-01

    Describes how the author taught a class (called "Editing for Broadcasting") for 19 neophyte newspeople through total immersion: students learned how to run a newsroom while operating one. Notes that students learned the principles and fundamentals of broadcast journalism, including news judgment, writing, editing, reporting, and…

  9. Management Theories and Broadcasting: A Handbook.

    Science.gov (United States)

    Craig, J. Robert; Hindmarsh, Wayne A.

    Today's contemporary management and motivation theories, as applied to the business of broadcasting, are the focus of the first section of this paper. It deals with the kinds and reactions of employees in broadcasting stations in relation to 11 motivational theories: (1) Theories X and Y, (2) Immaturity-Maturity Theory, (3) V Theory, (4) Z Theory,…

  10. 47 CFR 73.1217 - Broadcast hoaxes.

    Science.gov (United States)

    2010-10-01

    ... broadcast station shall broadcast false information concerning a crime or a catastrophe if: (a) The licensee... harm would occur. A “crime” is any act or omission that makes the offender subject to criminal punishment by law. A “catastrophe” is a disaster or imminent disaster involving violent or sudden event...

  11. Broadcast Copywriting and Computer Assisted Instruction.

    Science.gov (United States)

    Hagerman, William L.

    The teaching of broadcast copywriting can be enhanced by computer assisted instruction, especially in screening students' writing for adherence to classic "formulas" or "rules" for broadcast writing. Such rules might include avoiding cliches or not beginning a sentence with a subordinate clause. Other rules the computer can…

  12. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process by issuers registering securities on Form F-8, F-9, F-10 or F-80 (§ 239.38... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8...

  13. Design of cloud security in the EHR for Indian healthcare services

    Directory of Open Access Journals (Sweden)

    Pradeep Deshmukh

    2017-07-01

    Full Text Available An ease of data or record sharing at will has compelled most of the physicians to adopt EHR (Electronic Health Record for record-keeping of patients. It also makes convenient to the other stake holders of healthcare ecosystem such as nurses, specialists and patient. Due to lower costs and scalability of application, the cloud is becoming the infrastructure for most of the EHR but without comprising the privacy of data. In this paper we have proposed a frame work for storing the health records and accessing them by patients and physicians as authorized by key-control scheme. The scenarios we have considered here are of rural and urban health care centers and hence more appropriate for Indian health care services. The proposed scheme has double data security by introducing isolation between encryption schemes of transmitted data and stored data. The experimental result shows that it has a capability of scaling in number of patients and also no of elements in health record.

  14. Patient protection in radiotherapy (Radio neurosurgery National Service of the Social Security Mexican Institute)

    International Nuclear Information System (INIS)

    Espiritu R, R.

    2008-12-01

    The perspective of patient protection at the Radio neurosurgery National Service of the Social Security Mexican Institute is divided into three parts: the testing program for equipment acceptance, an assurance quality program based on periodic tests, an also other assurance quality based on tests during the application. Among the technical aspects that influence in the equipment acceptance tests, it is the collimation type, the characteristics of the lineal accelerator, the platform for planning and the network type. In the case of the collimation system and the accelerator characteristics, we consider the manufacturer's specifications and requirements of Mexican Official Standard NOM-033-NUCL-1999, T echnical Specifications for the Teletherapy Units Operation, Linear Accelerators . Planning for the platform takes into account the manufacturer's specifications. In the case of computed tomography as well as review the calibration according to manufacturer's specifications should be considered the standard NOM-229-SSA1-2002. In the case of the linear accelerator must be the radiological characterization of radiation beam as part of this, the absolute dose determination. As for the periodic tests is verified the dose constancy, as well as the flattening and symmetry of X-rays beam. There are also tests battery with daily, monthly and yearly frequencies, which make up the assurance quality program. (Author)

  15. Secure Mix-Zones for Privacy Protection of Road Network Location Based Services Users

    Directory of Open Access Journals (Sweden)

    Rubina S. Zuberi

    2016-01-01

    Full Text Available Privacy has been found to be the major impediment and hence the area to be worked out for the provision of Location Based Services in the wide sense. With the emergence of smart, easily portable, communicating devices, information acquisition is achieving new domains. The work presented here is an extension of the ongoing work towards achieving privacy for the present day emerging communication techniques. This work emphasizes one of the most effective real-time privacy enhancement techniques called Mix-Zones. In this paper, we have presented a model of a secure road network with Mix-Zones getting activated on the basis of spatial as well as temporal factors. The temporal factors are ascertained by the amount of traffic and its flow. The paper also discusses the importance of the number of Mix-Zones a user traverses and their mixing effectiveness. We have also shown here using our simulations which are required for the real-time treatment of the problem that the proposed transient Mix-Zones are part of a viable and robust solution towards the road network privacy protection of the communicating moving objects of the present scenario.

  16. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  17. Random broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [ICSI/BERKELEY; Sauerwald, Tomas [ICSI/BERKELEY

    2009-01-01

    In this work, we consider the random broadcast time on random geometric graphs (RGGs). The classic random broadcast model, also known as push algorithm, is defined as: starting with one informed node, in each succeeding round every informed node chooses one of its neighbors uniformly at random and informs it. We consider the random broadcast time on RGGs, when with high probability: (i) RGG is connected, (ii) when there exists the giant component in RGG. We show that the random broadcast time is bounded by {Omicron}({radical} n + diam(component)), where diam(component) is a diameter of the entire graph, or the giant component, for the regimes (i), or (ii), respectively. In other words, for both regimes, we derive the broadcast time to be {Theta}(diam(G)), which is asymptotically optimal.

  18. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    Full Text Available Problem setting. The status of comprehensive support of military units in the world’s leading powers is considered to be one of the key factors which defines the success of the social emergency settling operations. The experience of service and military application of the National Guard of Ukraine in the anti-terrorist operation zone on the South-East of Ukraine shows that emergency response tasks are generally carried out in cooperation with other Ukrainian security sector authorities, mostly with the Security Service of Ukraine. However, the forces joint managing authority chiefs usually do not cover the matter of such activities’ comprehensive support, which forces the commanders of the military units to rely on themselves in this question. Recent research and publications analysis. The analysis of research of status and development prospects of the comprehensive support of the Armed Forces of Ukraine, other security authorities, armies of the world’s leading powers, peculiarities of creation and functioning of such systems, application of their means and powers, scientific thought on the problems of service and military application of the National Guard units has shown the problematic tasks of the joint unit comprehensive support system optimization. Therefore, the question of regulatory and legal support of this process is of current importance. Paper objective. The objective of this paper is to define regulatory and legal aspects of comprehensive support optimization of the Security Service of Ukraine and the National Guard of Ukraine service and combat activities during social emergencies. Paper main body. According to the current legislation, comprehensive support comprises of the following types of support: operative (also called military, moral and psychological, materiel (logistical. All other types of support are parts of these three basic ones. Their examination is necessary due to the fact, that there is confusion in the

  19. Lossless Compression of Broadcast Video

    DEFF Research Database (Denmark)

    Martins, Bo; Eriksen, N.; Faber, E.

    1998-01-01

    We investigate several techniques for lossless and near-lossless compression of broadcast video.The emphasis is placed on the emerging international standard for compression of continous-tone still images, JPEG-LS, due to its excellent compression performance and moderatecomplexity. Except for one...... cannot be expected to code losslessly at a rate of 125 Mbit/s. We investigate the rate and quality effects of quantization using standard JPEG-LS quantization and two new techniques: visual quantization and trellis quantization. Visual quantization is not part of baseline JPEG-LS, but is applicable...... in the framework of JPEG-LS. Visual tests show that this quantization technique gives much better quality than standard JPEG-LS quantization. Trellis quantization is a process by which the original image is altered in such a way as to make lossless JPEG-LS encoding more effective. For JPEG-LS and visual...

  20. Broadcast media and the dissemination of weather information

    Science.gov (United States)

    Byrnes, J.

    1973-01-01

    Although television is the public's most preferred source of weather information, it fails to provide weather reports to those groups who seek the information early in the day and during the day. The result is that many people most often use radio as a source of information, yet preferring the medium of television. The public actively seeks weather information from both radio and TV stations, usually seeking information on current conditions and short range forecasts. forecasts. Nearly all broadcast stations surveyed were eager to air severe weather bulletins quickly and often. Interest in Nowcasting was high among radio and TV broadcasters, with a significant portion indicating a willingness to pay something for the service. However, interest among TV stations in increasing the number of daily reports was small.

  1. The large satellite program of ESA and its relevance for broadcast missions

    Science.gov (United States)

    Fromm, H.-H.; Herdan, B. L.

    1981-03-01

    In an investigation of the market prospects and payload requirements of future communications satellites, it was concluded that during the next 15 years many space missions will demand larger satellite platforms than those currently available. These platforms will be needed in connection with direct-broadcasting satellites, satellites required to enhance capacities in the case of traditional services, and satellites employed to introduce new types of satellite-based communications operating with small terminals. Most of the larger satellites would require the Ariane III capability, corresponding to about 1400 kg satellite mass in geostationary orbit. Attention is given to L-SAT platform capabilities and broadcast payload requirements, taking into account a European direct-broadcast satellite and Canadian direct-broadcast missions.

  2. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  3. Bio-inspiring cyber security and cloud services trends and innovations

    CERN Document Server

    Kim, Tai-Hoon; Kacprzyk, Janusz; Awad, Ali

    2014-01-01

    This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting–edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.  

  4. Satellite Media Broadcasting with Adaptive Coding and Modulation

    Directory of Open Access Journals (Sweden)

    Georgios Gardikis

    2009-01-01

    Full Text Available Adaptive Coding and Modulation (ACM is a feature incorporated into the DVB-S2 satellite specification, allowing real-time adaptation of transmission parameters according to the link conditions. Although ACM was originally designed for optimizing unicast services, this article discusses the expansion of its usage to broadcasting streams as well. For this purpose, a general cross-layer adaptation approach is proposed, along with its realization into a fully functional experimental network, and test results are presented. Finally, two case studies are analysed, assessing the gain derived by ACM in a real large-scale deployment, involving HD services provision to two different geographical areas.

  5. Pragmatism and Effective Fragmented Governance: Comparing Trajectories in Small Arms and Military and Security Services

    Directory of Open Access Journals (Sweden)

    Deborah Avant

    2013-10-01

    Full Text Available A hallmark of contemporary global governance is its complex nature. Understanding the implications of the array of “governors” and their efforts is paramount for scholars of global law and global politics. Most analyses have treated fragmented governance as a piece, arguing about its general effects. I concentrate instead on variation within fragmented situations, seeking to understand the conditions under which complexity yields more or less effective governance. I propose an analytical scheme for gauging effectiveness focused on how the array of governance efforts in an issue area relate to one another. I then compare these efforts in two issue arenas: small arms and private military and security services. Despite a similar complexity, similar array of actors trying to exert influence, and similar timing, complexity in small arms generated what most see as less effective results while in military and security services it has generated what seems to be a more promising path toward effective governance mechanisms. This difference is best explained with insights from pragmatism and network theory. When a broader range of relevant governors engage pragmatically to form linked networks governance is more likely. When governors engage ideologically and break off ties governance is less likely. Pragmatic engagement among the variety of relevant governors, including the US, is most likely to generate effective global governance. Una característica distintiva del gobierno mundial contemporáneo es su naturaleza compleja. Entender las implicaciones de la serie de "gobernadores" y sus esfuerzos es fundamental para los estudiosos del derecho internacional y la política mundial. La mayoría de los análisis han tratado el gobierno fragmentado como una pieza, discutiendo sobre sus efectos generales. El análisis se centra en cambio en la variación dentro de situaciones fragmentadas, buscando entender las condiciones en las que la complejidad produce

  6. An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

    Science.gov (United States)

    Alomari, Firas

    2013-01-01

    The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…

  7. The Change in The Activity of The American Intelligence Services in The Security Context of the Last 24 Years

    Directory of Open Access Journals (Sweden)

    Georgescu - Stefan

    2014-11-01

    Full Text Available The security events dynamics poses an overwhelming challenge for the decision makers’political agenda, priorities. The wide range of risks and rhythm of significant security events determine a difficult enterprise for security theories. A scientific analysis of the security evolutions entails a profound historical introspection and an appropriate understanding of the security events with significant impact over the global evolutions. Probably in the next period of time, hundreds of papers will be written regarding the period since 9/11. The aim of this paper is to provide a perspective over the security context, and the intelligence services activity of the last 15 years, period of time dramatically divided by the unprecedented shock and suffering in the history of the from 9/11. The reorganization of the Western Intelligence Community was ordered as a result of the September 11th attacks and with future counterterrorism efforts in mind. Specifically, the 9/11 terrorists exploited the wall between the U.S.’s foreign and domestic intelligence collection efforts, and yet the IRTPA and EO 12333 avoid the issue of how to best integrate foreign and domestic intelligence while minimizing the threat to civil liberties. This manner in which the Western Countries separates its foreign and domestic intelligence collection is particularly exploitable by terrorists and non-state actors–those currently posing one of the most serious threats to international security. To ensure both the best intelligence integration possible as well as the defense of civil liberties, clear and sensible rules should be formed which dictate how intelligence from these two spheres is collected and in what way and at what level it is integrated and disseminated.

  8. A Comparative Assesment of Facility Location Problem via fuzzy TOPSIS and fuzzy VIKOR: A Case Study on Security Services

    Directory of Open Access Journals (Sweden)

    Dilşad GÜZEL

    2015-05-01

    Full Text Available Today, law enforcement and security services are critically important for peace and prosperity of communities. The law enforcement forces serve citizens using security materials. The distribution of security materials is the dominant factor in determining the outcome of law enforcement duties. Failing to supply the required amounts of security materials properly, when and where it is needed, can lead to chaos. In this study, it is aimed to provide a decision support tool that can help to select the most appropriate location of security materials distribution center. The distribution center location problem is a complex multi-criteria problem including both quantitative and qualitative factors which may be in conflict and may also be uncertain. We proposed a comparative analysis that exploits fuzzy TOPSIS and fuzzy VIKOR techniques. Fuzzy weights of the 20 criteria and fuzzy judgments about 4 potential locations of distribution center as alternatives are employed to compute evaluation scores and ranking. Based on the evaluation criteria, Konya has been found the best alternative accourding to both techniques as well.

  9. The Future of television is personalized : analysis of the internet streaming platform NRK on demand : a public broadcast study

    OpenAIRE

    Sørlie, Ida Elisabeth

    2014-01-01

    Portraying a public broadcasters’ digital challenge, the thesis presents an analysis of the new reality, which is disrupting the world of media, entertainment and news. Targeting the dilemmas of the Norwegian Broadcasting Corporation, NRK, it seeks to offer alternatives for maximizing their public service mandate through their On Demand platform. Discussing its strengths and weaknesses, this thesis presents a proposal for the next strategic step of public service broadcasters: ...

  10. 47 CFR 76.1601 - Deletion or repositioning of broadcast signals.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Deletion or repositioning of broadcast signals... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1601 Deletion or... to § 76.1601: No deletion or repositioning of a local commercial television station shall occur...

  11. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  12. ESA personal communications and digital audio broadcasting systems based on non-geostationary satellites

    Science.gov (United States)

    Logalbo, P.; Benedicto, J.; Viola, R.

    1993-01-01

    Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.

  13. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  14. Analysis and Transceiver Design for the MIMO Broadcast Channel

    CERN Document Server

    Hunger, Raphael

    2013-01-01

    This book deals with the optimization-based joint design of the transmit and receive filters in   MIMO broadcast channel in which the user terminals may be equipped with several antenna elements. Furthermore, the maximum performance of the system in the high power regime as well as the set of all feasible quality-of-service requirements is analyzed. First, a fundamental duality is derived that holds between the MIMO broadcast channel and virtual MIMO multiple access channel. This duality construct allows for the efficient solution of problems originally posed in the broadcast channel in the dual domain where a possibly hidden convexity can often be revealed. On the basis of the established duality result, the gradient-projection algorithm is introduced as a tool to solve constrained optimization problems to global optimality under certain conditions. The gradient-projection tool is then applied to solving the weighted sum rate maximization problem which is a central optimization that arises in any network u...

  15. Political Broadcast Advertising and Primary Election Voting

    Science.gov (United States)

    Wanat, John

    1974-01-01

    Results of a research project which hypothisized that: Other things being equal, the heavier a candidate's usage of broadcast advertising in a primary election campaign, the greater will be his share of the votes in the election. (Author/HB)

  16. Mass storage system by using broadcast technology

    International Nuclear Information System (INIS)

    Fujii, Hirofumi; Itoh, Ryosuke; Manabe, Atsushi; Miyamoto, Akiya; Morita, Youhei; Nozaki, Tadao; Sasaki, Takashi; Watase, Yoshiyuko; Yamasaki, Tokuyuki

    1996-01-01

    There are many similarities between data recording systems for high energy physics and broadcast systems; the data flow is almost one-way, requires real-time recording; requires large-scale automated libraries for 24-hours operation, etc. In addition to these functional similarities, the required data-transfer and data-recording speeds are also close to those for near future experiments. For these reasons, we have collaborated with SONY Broadcast Company to study the usability of broadcast devices for our data storage system. Our new data storage system consists of high-speed data recorders and tape-robots which are originally based on the digital video-tape recorder and the tape-robot for broadcast systems. We are also studying the possibility to use these technologies for the online data-recording system for B-physics experiment at KEK. (author)

  17. The Digital Dividend of Terrestrial Broadcasting

    CERN Document Server

    Beutler, Roland

    2012-01-01

    The “digital revolution” of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications—audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a “digital dividend” of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the “dividend” itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any...

  18. Engagement and Implications for Future National Security Strategies: Can the Services Adapt

    National Research Council Canada - National Science Library

    Hodge, Michael

    2000-01-01

    ...: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal...

  19. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1993-01-01

    ... programs from one another. Security software provides access controls that restrict the use of computer resources to authorized individuals and limit those individuals to the computer resources required to perform their jobs...

  20. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    This is the final in a series of three audits of management controls over the operating systems and security software used by the information processing centers that support the Defense Finance and Accounting Centers (DFAS...

  1. A Concise Analysis of Argentina's Post-Junta Reform of Its Major Security Services

    National Research Council Canada - National Science Library

    Kitt, John J

    2006-01-01

    .... The implementation of appropriate security-sector reform by transitional governments in areas of regional instability, such as Iraq, Argentina, and El Salvador, is an issue of considerable concern...

  2. Risk management and security services interaction--a must in today's health care environment.

    Science.gov (United States)

    Stultz, M S

    1990-01-01

    The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.

  3. Broadcasting and Telecommunications Industries in the Convergence Age: Toward a Sustainable Public-Centric Public Interest

    Directory of Open Access Journals (Sweden)

    Hwanho Choi

    2018-02-01

    Full Text Available The emergence of new digital technologies, such as the Internet and new business models such as over-the-top (OTT operators that utilize them, has transformed the media and broadcasting industries. As advanced technologies and business models are adopted, convergence between the broadcasting and telecommunication (“telecom” sectors has become a common business practice. Using the South Korean case study of a failed acquisition attempt of CJ HelloVision by SK Telecom, this research identifies the three essential features (economic, sociocultural, and industrial structure issues related to convergence in the broadcasting and media industries. Further, this study reveals the potential consequences of convergence to the public, industry, and society, and offers critical implications for future policy direction. Finally, this study suggests the need for a change in the policy direction in the age of convergence in the broadcasting and media industries. In addition, it calls for the importance of a public-centric public benefit. Social and consumer welfare, and not profit or industrial growth, should dictate the public interest orientation in the broadcasting and media industries. Therefore, the meaning of public interest in broadcasting and media should not be limited in the industrial context of media; rather, it should consider the access to service by the public, the condition of consumption, and its consequences in the perspective of social and consumer welfare.

  4. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  5. An audit of nursing reports for First-Tier Tribunals in a secure inpatient service.

    Science.gov (United States)

    Haw, C

    2015-08-01

    Very little research has been conducted into the role of nurses in relation to patients' mental health tribunals (known in some countries as review panels). In England nurses are playing an increasingly important role in giving evidence at tribunals and, since October 2013, are required to provide much more detailed written reports than previously. This is the first published study to examine the content of nursing tribunal reports. Overall, the quality of nursing reports was patchy and not as good as those of psychiatrists or social workers, but there was improvement when the audit was repeated. Writing reports for tribunals is a comparatively new and perhaps unfamiliar requirement for nursing staff. Nurses need training in report writing and protected time and a quiet area to write reports. Providing these things is a real challenge on busy inpatient wards. In October 2013, the Tribunals Judiciary of England issued a new practice direction stipulating how tribunal reports should be completed. This paper aimed to study the quality of nursing tribunal reports in a secure inpatient service before and after the introduction of the latest practice direction and the issuing of a local template to aid report writing. A total of 160 reports (80 written in 2013 and 80 in 2014) were scored on the presence of 24 key items derived from the latest practice direction. The quality of nursing reports improved in the re-audit from an average of 36.3% of key items present to 51.3% but still lagged behind that of medical and social circumstances reports. Even in the second audit, few reports were signed or commented on why the patient should remain detained. Report length increased from a mean of 2.9 to 4.0 pages but only 27.5% of reports used the template despite widespread publicity. Use of the template resulted in better quality reports. Among other interventions, a training programme in report writing is now underway to assist nurses with meeting the new practice direction

  6. 47 CFR 0.434 - Data bases and lists of authorized broadcast stations and pending broadcast applications.

    Science.gov (United States)

    2010-10-01

    ... stations and pending broadcast applications. 0.434 Section 0.434 Telecommunication FEDERAL COMMUNICATIONS... Commission § 0.434 Data bases and lists of authorized broadcast stations and pending broadcast applications... broadcast stations, pending applications for such stations, and rulemaking proceedings involving amendments...

  7. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  8. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  9. TELECOMMUNICATIONS AND BROADCASTING: A QUESTION OF REGULATORY DISSOCIATION

    Directory of Open Access Journals (Sweden)

    Chalini Torquato Gonçalves de Barros

    2009-08-01

    Full Text Available The legislation governing the communication in Brazil is marked by significant normative paradox between the telecommunication and broadcasting services, from the privatization of the sector at the time of President Fernando Henrique Cardoso. Among the factors that contribute to the establishment of such situation are practices of patronage, inherent in the Brazilian political culture. In the same manner, the communication sector of Brazil follows an opposite direction to the worldwide trend of technological and legislative convergence besides weakening the State with regard to the compliance of its regulatory role, especially because it is vulnerable to pressures from more influential sector actors.

  10. 17 CFR 269.5 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process by issuers registering securities on Form F-8, F-9, F-10 or F-80 (§§ 239... INDENTURE ACT OF 1939 § 269.5 Form F-X, for appointment of agent for service of process by issuers...

  11. Challenges in the Licensing of New Nuclear Power Plant, Service Life Extension of Operating Ones (Safeguards-Safety-Security Aspects)

    International Nuclear Information System (INIS)

    Horvath, K.

    2016-01-01

    The Hungarian Atomic Energy Authority (HAEA), as the Hungarian nuclear regulator is faced with dual challenges meant by the licensing of the planned construction of two AES-2006 type nuclear power plant units and the licensing of the service life extension of the existing units that have been operating for more than 30 years. The HAEA has full regulatory competence; its mission is to oversee the safety and security of all the peaceful applications of atomic energy. Accordingly, the licensing scope covers safeguards, safety as well as security. The paper shows the current status of the Hungarian nuclear programme and the future plans, as well as summarizes the regulatory approach followed by HAEA. (author)

  12. Can fuel services supply be secured? Building trust in a multi-lateral approach to nuclear fuel cycles

    Energy Technology Data Exchange (ETDEWEB)

    Antoine, B. [Engineering Systems Division, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Room E40-261, Cambridge, MA 02139 (United States); Rodriguez-Vieitez, E. [Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard University, One Brattle Sq., Room 503, Cambridge, MA 02138 (United States)

    2009-06-15

    Global climate change and concerns about energy supply security fuelling the nuclear desires of an increasing number of states, there is growing interest within the nonproliferation community to promote the establishment of an international system for the provision of nuclear fuel cycle services that would be 'equitable and accessible to all users of nuclear energy' (Rauf, 2008) while reducing proliferation risks. Although the idea was already voiced on the cradle of civilian use of nuclear energy (Baruch, 1946), the IAEA director's 2003 call for a group of international experts to examine the issue (ElBaradei, 2003) triggered renewed interest that resulted in up to twelve different proposals for multilateral nuclear fuel cycle arrangements (Rauf, 2008; Simpson, 2008). Nonproliferation experts have examined the conditions under which equitable and accessible access to enrichment, reprocessing and spent fuel disposal services can be granted to all users (Rauf, 2008; Braun 2006; Pellaud and al 2005). They suggested putting together multilateral nuclear approaches (MNA) that could consist in the establishment of mechanisms to assure fuel cycle services, or the shared ownership by recipient and host countries of fuel services facilities through either the creation of new multilateral centers or the conversion of existing national facilities into multinational enterprises. While countries that possess nuclear fuel facilities would benefit from the increased global security and strengthened non-proliferation situation that would result from the establishment of these MNAs, they would also be baited into participating by possible attraction of foreign investments as well as the opportunity to export high value services (Rushkin, 2006). Yet, what incentives would there be for a recipient non-nuclear state to participate in an arrangement that would intrinsically strip it of its sovereign right to ensure its fuel supply security? In addition to the economic

  13. RSS based CERN Alerter. Information broadcast to all CERN offices.

    CERN Multimedia

    Otto, R

    2007-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS€™s SPM_quotMESSAGE command, Zephyr and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simpl...

  14. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  15. Composite Broadcasting and Ranging via a Satellite Dual-Frequency MPPSK System

    Directory of Open Access Journals (Sweden)

    Yu Yao

    2013-01-01

    Full Text Available Since digital video broadcasting via satellite (DVB-S signals are “inefficient”, regarding the amount of information they convey on the bandwidth they occupy, a joint broadcasting and ranging system would constitute a unique platform for future digital video broadcasting satellite services effecting the essential tasks of satellite navigation system and direct to home (DTH services, in terms of both spectrum efficiency and cost effectiveness. In this paper, the design of dual frequency M-ary position phase shift keying (MPPSK system which is suitable for, respectively, performing both data transmission and range measurement is proposed. The approach is based on MPPSK modulation waveforms utilized in digital video broadcasting. In particular, requirements that allow for employing such signals for range measurements with high accuracy and high range are investigated. Also, the relationship between the frequency difference of dual frequency MPPSK system and range accuracy is discussed. Moreover, the selection of MPPSK modulation parameter for data rate and ranging is considered. In addition to theoretical considerations, the paper presents system simulations and measurement results of new systems, demonstrating the high spectral utilization of integrated broadcasting and ranging applications.

  16. 29 CFR 801.14 - Exemption for employers providing security services.

    Science.gov (United States)

    2010-07-01

    ... industry, generally, administrative employees may have access to customer accounts, schedules, information... securities, precious commodities or instruments, or proprietary information. (b)(1) Section 7(e) permits the...” which would be of vital importance during periods of war or civil emergency, or whose sabotage would...

  17. Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System

    National Research Council Canada - National Science Library

    Guild, Jennifer

    2004-01-01

    .... The focus will be on the security of the DOD information infrastructure and the accomplishment of the mission, as well as the usability and the standardization of the INFOCON warning system. The end result is a prototype that is a set of predefined escalation scripts for the evolved INFOCON system's safeguard measures.

  18. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Science.gov (United States)

    2010-06-22

    ... and the host cities. In private security alone, Brazil spent over US$ 17 billion in 2008. In... intelligence, as well as an overview of the country's economic and political environment. A networking...-users and partners. Follow-on business meetings in other cities in the region can be set up before or...

  19. Secure Broadcast in Energy-Aware Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Lazos, Loukas; Poovendran, Radha

    2002-01-01

    .... The authors show that existing efficient key distribution techniques for wired networks that rely on logical hierarchies are extremely energy inefficient for energy-constrained wireless ad-hoc networks...

  20. TMR-MCDB: Enhancing Security in a Multi-cloud Model through Improvement of Service Dependability

    OpenAIRE

    Mohammed Alzain; Ben Soh; Eric Pardede

    2014-01-01

    In IT enterprises, different computing needs are provided as a service. The service providers take care of the customers’ needs by, for example, maintaining software or purchasing expensive hardware. In addition, there are many benefits of using the technology available from cloud service providers, such as access to large-scale, on-demand, flexible computing infrastructures. However, increasing the dependability of cloud computing is important in order for its potential to be realized. Data ...

  1. Community Perception of the Security and Acceptance of Mobile Banking Services in Bahrain: An Empirical Study

    OpenAIRE

    Ahmad S. Mashhour; Zakarya Saleh

    2015-01-01

    Bahraini banks and financial organizations have applied remote enabled service using the internet and a mobile device to increase efficiency, reduce costs and improve quality of services. There is need for these organizations to identify factors that persuade customers and raise their attitudes towards adoption and usage of these services. This study identifies the most important factors affecting customer attitudes towards mobile banking acceptance in Bahrain. The model formulated in this re...

  2. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  3. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  4. Considerations Regarding the Security and Protection of E-Banking Services Consumers’ Interests

    OpenAIRE

    Marinela Vrancianu; Liana Anica Popa

    2010-01-01

    A significant number of breaches in the security of electronic banking (e-Banking) system is reported each year, drawing attention to the need to protect and inform customers about the risk of exposure to malicious actions initiated by cyber-criminals. Financial institutions and consumers recognize the fact that attacks and financial frauds are becoming more complex and are perpetrated by a different class of criminal. This class is increasingly sophisticated and uses technology as part of th...

  5. Enhancing Information Security in Cloud Computing Services using SLA based metrics

    OpenAIRE

    , Nia; Mganga, Ramadianti Putri;; Charles, Medard

    2011-01-01

    Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. As an initiative to address such risks, organizations can develop and implement SLA to establish common expectations and goals between the clo...

  6. A Concise Analysis of Argentina’s Post-Junta Reform of Its Major Security Services

    Science.gov (United States)

    2006-12-01

    Carlos Menem (1989–99), respectively a radical and a Peronist, implemented civil-military reform of the security forces. Initially, the reforms...purging the ranks, while Menem used indirect methods, while pointing to the on-going economic crisis to legitimize continuation of his reforms. In all...Politics 35, no. 1 (October 2002): 1. 93 Ibid., 2 94 David Pion-Berlin, 110. 39 civilian government, whereas Menem took advantage of the general

  7. Security analysis of Aspiro Music Platform, a digital music streaming service

    OpenAIRE

    Kachanovskiy, Roman

    2010-01-01

    The report is mainly based on recommendations given by the National Institute of Standards and Technology in special publication 800-30 ``Risk Management Guide for Information Technology Systems''. The risk analysis presented in this report emphasizes a qualitative approach. Firstly, the security requirements for Aspiro Music Platform were identified and classified by the level of importance. Secondly, potential threats to the system were discussed. In the next step the potential system ...

  8. Activity-based costing of security services for a Department of Energy nuclear site

    International Nuclear Information System (INIS)

    Togo, D.F.

    1997-01-01

    Department of Energy (DOE) nuclear facilities are being encouraged to reduce costs but the accounting data typically in use by the financial organizations at these laboratories cannot easily be used to determine which security activities offer the best reduction in cost. For example, labor costs have historically been aggregated over various activities, making it difficult to determine the true costs of performing each activity. To illustrate how this problem can be solved, a study was performed applying activity-based costing (ABC) to a hypothetical DOE facility. ABC is a type of cost-accounting developed expressly to determine truer costs of company activities. The hypothetical facility was defined to have features similar to those found across the DOE nuclear complex. ABC traced costs for three major security functions - Protective Force Operations, Material Control and Accountability, and Technical Security - to various activities. Once these costs had been allocated, we compared the cost of three fictitious upgrades: (1) an improvement in training or weapons that allows the protective force to have better capabilities instead of adding more response forces; (2) a change in the frequency of inventories; and (3) a reduction in the annual frequencies of perimeter sensor tests

  9. 75 FR 52185 - Use of Microwave for Wireless Backhaul; Provision for Additional Flexibility To Broadcast...

    Science.gov (United States)

    2010-08-24

    ...) link in the chain of distribution of the program material to broadcast stations. In light of recent.... These requirements serve to ensure productive use of the spectrum and to prevent noneconomic overuse. 9... completely out of service, so long as the values mandated by the rules were maintained both in normal...

  10. 47 CFR 73.801 - Broadcast regulations applicable to LPFM stations.

    Science.gov (United States)

    2010-10-01

    ....333Engineering charts. Section 73.503Licensing requirements and service. Section 73.508Standards of good... of taped, filmed, or recorded material. Section 73.1210TV/FM dual-language broadcasting in Puerto....3568Dismissal of applications. Section 73.3584Procedure for filing petitions to deny. Section 73.3587Procedure...

  11. On the coexistence of primary and secondary users in spectrum-sharing broadcast channels

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia

    2013-01-01

    strategy in the light of dirty paper coding. In order to promise the PUs' quality of service (QoS) in the broadcasting, the base station chooses codewords for the users by taking into account that the codewords pertaining to SUs can be pre-subtracted from

  12. Satellite broadcasting - The European experience and perspective

    Science.gov (United States)

    Watson, Alan

    1991-11-01

    The use of satellites is considered as a means for developing a European transnational broadcasting system with attention given to the control of technology. A tension is described between maintaining technology as the property of one nation when the DBSs are developed for multinational program broadcasting. The simultaneous development of satellite systems is theorized to lead eventually to a single merged program for a particular nation, and the effect is considered of the regulation of cross-holding and cross-selling systems by investors.

  13. Transmission Quality Measurements in DAB+ Broadcast System

    Directory of Open Access Journals (Sweden)

    Gilski Przemysław

    2017-12-01

    Full Text Available In the age of digital media, delivering broadcast content to customers at an acceptable level of quality is one of the most challenging tasks. The most important factor is the efficient use of available resources, including bandwidth. An appropriate way of managing the digital multiplex is essential for both the economic and technical issues. In this paper we describe transmission quality measurements in the DAB+ broadcast system. We provide a methodology for analysing parameters and factors related with the efficiency and reliability of a digital radio link. We describe a laboratory stand that can be used for transmission quality assessment on a regional and national level.

  14. Forest service access to and use of the Germplasm Information Network (GRIN-Global) database and security backup at the National Laboratory for Genetic Resource Preservation

    Science.gov (United States)

    B. Loth; R.P. Karrfalt

    2017-01-01

    The U.S. Department of Agriculture Forest Service (USDA FS) National Seed Laboratory (NSL) began long term seed storage for genetic conservation, in 2005, for USDA FS units and cooperators. This program requires secure storage of both seeds and the data documenting the identification of the seeds. The Agricultural Research Service (ARS) has provided both of these...

  15. Denial of Service Attacks on 802.1X Security Protocol

    National Research Council Canada - National Science Library

    Ozan, Orhan

    2004-01-01

    ... infrastructure, such as military and administrative government LANs. The IEEE 802.11 wireless standard specifies both an authentication service and encryption protocol, but research has demonstrated that these protocols are severely flawed...

  16. Secure Embedded Systems

    Science.gov (United States)

    2016-02-26

    enables each subsystem with a key management (KM) function and an Advanced Encryption Standard ( AES ) encryption and decryption function. Subsystem A...off, flies to its destination, and then collects video data. Video data containing target information are encrypted and broadcast to authorized ground...select these devices on the basis of their ability to encrypt and authenticate configuration bitstreams, incorporate security monitors to detect attacks

  17. WHO OWNS THE BROADCASTING TELEVISION NETWORK BUSINESS IN INDONESIA?

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-06-01

    Full Text Available Broadcasting TV occupies a significant position in the community. Therefore, all the countries in the world give attention to TV broadcasting business. In Indonesia, the government requires TV stations to broadcast locally, except through networking. In this state, there are 763 private TV companies broadcasting free to air. Of these, some companies have many TV stations and build various broadcasting networks. In this article, the author reveals the substantial TV stations that control the market, based on literature studies. From the data analysis, there are 14 substantial free to network broadcast private TV broadcasters but owns by eight companies; these include the MNC Group, EMTEK, Viva Media Asia, CTCorp, Media Indonesia, Rajawali Corpora, and Indigo Multimedia. All TV stations are from Jakarta, which broadcasts in 22 to 32 Indonesian provinces.

  18. 47 CFR 73.297 - FM stereophonic sound broadcasting.

    Science.gov (United States)

    2010-10-01

    ... broadcast station may, without specific authority from the FCC, transmit stereophonic (biphonic... broadcasting must measure the pilot subcarrier frequency as often as necessary to ensure that it is kept at all...

  19. CAPITALISM VS BUSINESS ETHICS IN INDONESIA’S TELEVISION BROADCASTING

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-05-01

    Full Text Available Generally, in every country, there is supervision of the television broadcasting system. In Indonesia, all television broadcasting is supervised by the Komisi Penyiaran Indonesia/KPI (Indonesian Broadcasting Commission. This commission oversees broadcast television, to ensure all TV broadcasts in Indonesia comply with government regulations. Often the KPI imposes sanctions, but frequent violations still occur. This article describes the results of research on the contradiction between business interests and ethics in the television industry in Indonesia. This study uses the method of evaluation research, where researchers analyze data, here in the form of sanctions documents released by broadcasting commissions. The results reveal that all national private television stations often violate regulations. They prioritize their business interests rather than follow broadcasting guidelines, especially since KPI does not have the full authority to grant and revoke a broadcasting license. The granting and revocation of permits remains under the authority of the government, where political lobbying plays a more significant role.

  20. Search in audiovisual broadcast archives

    NARCIS (Netherlands)

    Huurnink, B.

    2010-01-01

    Documentary makers, journalists, news editors, and other media professionals routinely require previously recorded audiovisual material for new productions. For example, a news editor might wish to reuse footage from overseas services for the evening news, or a documentary maker describing the

  1. [Direct service costs of diabetes mellitus hospitalisations in the Mexican Institute of Social Security].

    Science.gov (United States)

    Salas-Zapata, Leonardo; Palacio-Mejía, Lina Sofía; Aracena-Genao, Belkis; Hernández-Ávila, Juan Eugenio; Nieto-López, Emmanuel Salvador

    To estimate the direct costs related to hospitalizations for diabetes mellitus and its complications in the Mexican Institute of Social Security METHODS: The hospital care costs of patients with diabetes mellitus using diagnosis-related groups in the IMSS (Mexican Institute of Social Security) and the hospital discharges from the corresponding E10-E14 codes for diabetes mellitus were estimated between 2008-2013. Costs were grouped according to demographic characteristics and main condition, and were estimated in US dollars in 2013. 411,302 diabetes mellitus discharges were recorded, representing a cost of $1,563 million. 52.44% of hospital discharges were men and 77.26% were for type 2 diabetes mellitus. The biggest cost was attributed to peripheral circulatory complications (34.84%) and people from 45-64 years of age (47.1%). Discharges decreased by 3.84% and total costs by 1.75% in the period analysed. The complications that caused the biggest cost variations were ketoacidosis (50.7%), ophthalmic (22.6%) and circulatory (18.81%). Hospital care for diabetes mellitus represents an important financial challenge for the IMSS. The increase in the frequency of hospitalisations in the productive age group, which affects society as a whole, is an even bigger challenge, and suggests the need to strengthen monitoring of diabetics in order to prevent complications that require hospital care. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  2. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  3. Broadcast Condom Advertising: A Case Study.

    Science.gov (United States)

    Kaplan, Herb; Houlberg, Rick

    1990-01-01

    Examines a San Francisco television station's decision to accept paid condom advertising. Notes that station leaders debated questions of public interest and public tastes in a city hard hit by AIDS. Finds that the station devised careful guidelines and began broadcasting the commercials on a trial basis. Notes that nearly all public and media…

  4. Broadcast Journalism Education and the Capstone Experience

    Science.gov (United States)

    Tanner, Andrea; Forde, Kathy Roberts; Besley, John C.; Weir, Tom

    2012-01-01

    This study assesses the current state of the television news capstone experience in accredited journalism and mass communication programs in the United States. Specifically, the authors employed a mixed-methods approach, interviewing 20 television news capstone instructors and conducting an analysis of broadcast journalism curriculum information…

  5. Strategy and Space for Broadcasting Facilities

    DEFF Research Database (Denmark)

    Jensen, Per Anker

    2006-01-01

    The paper is based on results from an ongoing research project on space strategies and building values, which in-cludes a major case study of the development of facilities for the Danish Broadcasting Corporation over time. The focus is to identify, how different space strategies have been...

  6. Video Broadcasting Using Queue Proportional Scheduling

    Directory of Open Access Journals (Sweden)

    Dimitris Toumpakaris

    2007-01-01

    using a Markov Chain approach leading to a method for approximating the packet delay distribution. Based on the resulting distribution, it is discussed how the video encoding rate can be chosen in order to reduce the expected distortion of streams transmitted through Broadcast Channels.

  7. Radio broadcasting for sustainable development in southern ...

    African Journals Online (AJOL)

    Patrick O. Waeber and Yvonne Orengo

    2008-12-01

    Dec 1, 2008 ... ABSTRACT. The Millennium Development Goals have been written into the Madagascar Road Map (2007 - 2012) in order to improve the Malagasy social, economic and environmental situation. The Andrew Lees Trust Radio Broadcasting Project in southern. Madagascar has been set up to alleviate ...

  8. Covering Adoption: General Depictions in Broadcast News

    Science.gov (United States)

    Kline, Susan L.; Karel, Amanda I.; Chatterjee, Karishma

    2006-01-01

    Using theories of stigma (Goffman, 1963) and media frames (Iyengar, 1991), 292 news stories pertaining to adoption that appeared on major broadcast networks between 2001 and 2004 were analyzed. Media coverage of adoptees contained more problematic than positive depictions. Although birth parents were not always depicted, adoptive parent and…

  9. 77 FR 33098 - Unlicensed Operation in the TV Broadcast Band

    Science.gov (United States)

    2012-06-05

    ...] Unlicensed Operation in the TV Broadcast Band AGENCY: Federal Communications Commission. ACTION: Correcting... matter of ``Unlicensed Operation in the TV Broadcast Band Approval.'' This document contains corrections... of this correction relate to ``Unlicensed Operation in the TV Broadcast Band Approval'' under Sec. 15...

  10. Facilitating and securing offline e-medicine service through image steganography.

    Science.gov (United States)

    Kamal, A H M; Islam, M Mahfuzul

    2014-06-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.

  11. Facilitating and securing offline e-medicine service through image steganography

    Science.gov (United States)

    Islam, M. Mahfuzul

    2014-01-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation. PMID:26609382

  12. Avrupa Birliği’nin Görsel-İşitsel Politikası Bağlamında Almanya, Fransa, İngiltere ve İtalya’daki Radyo ve Televizyon Yayın Hizmetlerinin Denetimi / Supervision of Radio and Television Broadcasting Services in Germany, France, England and Italy in the Context of Audiovisual Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Sena COŞKUN

    2017-08-01

    Full Text Available Bu çalışmada, birçok alanda diğer Avrupa Birliği (AB ülkelerine öncülük eden Almanya, Fransa, İngiltere ve İtalya gibi AB ülkelerinde radyo ve televizyon yayın hizmetlerinin denetiminde görev yapan düzenleyici, izin verici ve denetleyici kuruluşlar üzerinde durulmaktadır. Çalışma, bunu, ülkelerdeki mevcut denetim sistemi ile denetleyici otoritenin görev ve yetkilerine değinmeyi ihmal etmeden ve onlar üzerine literatürdeki bilgi birikimini ortaya koyarak incelemektedir. Görsel-işitsel medya hizmetlerinin denetimine yoğunlaşan çalışmanın amacı, yapılan son yasal düzenlemeler çerçevesinde, radyo ve televizyon yayın hizmetlerinin Avrupa kıtasının dört önemli ülkesinde ne şekilde denetlendiğini ortaya koymaktır. Bu kapsamda çalışma, hem ülkemizde ilgili konudaki literatürün güncellenmesine hem de konuyla ilgili ileride yapılacak araştırmalara katkı sağlayacaktır. Çalışmanın AB’nin görsel-işitsel politikası ile birlikte ele alınmasının da gerekli olduğu düşünülmektedir. Zira, AB politikaları ile görsel-işitsel yayıncılık alanı arasında birbirlerini etkileyen, doğrusal bir ilişki bulunmaktadır. / This study focuses on regulatory, permitting and supervisory agencies working in the supervision of radio and television broadcasting services in EU countries, such as Germany, France, England and Italy, leading many other European Union (EU countries in this area. The study examines this by not neglecting to address the tasks and powers of the supervisory authority and the current supervisory system in the countries, and revealing their knowledge in the literature on them. The aim of the study focused on the supervising of audiovisual media services is to demonstrate how radio and television broadcasting services in the four major countries of Europe are audited in the framework of the recent legislative arrangements. In this context, the study will contribute both to

  13. User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services

    Science.gov (United States)

    Ko, Moo Nam

    2011-01-01

    Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…

  14. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

    Directory of Open Access Journals (Sweden)

    Alexandre Pinheiro

    2018-03-01

    Full Text Available Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  15. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    Science.gov (United States)

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  16. Secure eHealth-Care Service on Self-Organizing Software Platform

    Directory of Open Access Journals (Sweden)

    Im Y. Jung

    2014-01-01

    Full Text Available There are several applications connected to IT health devices on the self-organizing software platform (SoSp that allow patients or elderly users to be cared for remotely by their family doctors under normal circumstances or during emergencies. An evaluation of the SoSp applied through PAAR watch/self-organizing software platform router was conducted targeting a simple user interface for aging users, without the existence of extrasettings based on patient movement. On the other hand, like normal medical records, the access to, and transmission of, health information via PAAR watch/self-organizing software platform requires privacy protection. This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users. In addition, it provides powerful protection of the user’s health information.

  17. The business of medicine: how to overcome financial obstacles and secure financing for your private practice and ancillary services business.

    Science.gov (United States)

    Nayor, David

    2012-01-01

    Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms.

  18. Contracting for Reform: The Challenges of Procuring Security Training and Advisory Services in Fragile Environments

    Science.gov (United States)

    2014-04-30

    reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204...USA, Deputy Director of Contracting, U.S. Army Corps of Engineers The Efficacy of the Government’s Use of Past Performance Information: An... remuneration that we’re paying them. (author interview). Selecting the right people is an investment in quality and success, but this mindset was absent. The

  19. 47 CFR 73.3572 - Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster applications. 73.3572 Section 73.3572... Rules Applicable to All Broadcast Stations § 73.3572 Processing of TV broadcast, Class A TV broadcast...

  20. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...