WorldWideScience

Sample records for building secure cognitive

  1. Soft Computing - A step towards building Secure Cognitive WLAN

    CERN Document Server

    Lingareddy, S C; Babu, Dr Vinaya; Dhruve, Kashyap

    2010-01-01

    Wireless Networks rendering varied services has not only become the order of the day but the demand of a large pool of customers as well. Thus, security of wireless networks has become a very essential design criterion. This paper describes our research work focused towards creating secure cognitive wireless local area networks using soft computing approaches. The present dense Wireless Local Area Networks (WLAN) pose a huge threat to network integrity and are vulnerable to attacks. In this paper we propose a secure Cognitive Framework Architecture (CFA). The Cognitive Security Manager (CSM) is the heart of CFA. The CSM incorporates access control using Physical Architecture Description Layer (PADL) and analyzes the operational matrices of the terminals using multi layer neural networks, acting accordingly to identify authorized access and unauthorized usage patterns.

  2. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  3. Cognitive Study of Building Metaphor

    Institute of Scientific and Technical Information of China (English)

    牛惠君

    2015-01-01

    Metaphor is a universal phenomenon,the traditional metaphor studies it as a means of rhetoric,but metaphor of modern sees it as a cognitive phenomenon.In our life most of the everyday language is metaphor,our mind is also the metaphor.Meta-phor has become an indispensable tool for understanding the world.There are a lot of “building”metaphorical expressions in the life, construction is an important component of people’s lives. K?vecses (2002)discussed briefly some conceptual metaphors of the construction in English,Deignan (2001)make a compre-hensive study on building metaphors which underlie some metaphor expression of “building and construction”.Lan Chun (2003)only referred to “theory is building”,but the concept of “life,relationships”can be understood through building concept,these relative ab-stract concepts can be understood by clear concrete building concept.Hence the studies of building metaphors have not been systematic and comprehensive,people seldom study it.We plan to give a contrastive study of building metaphors.This will further deepen peo-ple’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  4. Building a strategic security organisation.

    Science.gov (United States)

    Howard, Mike

    2016-01-01

    In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size. PMID:27318284

  5. Using Expert Systems To Build Cognitive Simulations.

    Science.gov (United States)

    Jonassen, David H.; Wang, Sherwood

    2003-01-01

    Cognitive simulations are runnable computer programs for modeling human cognitive activities. A case study is reported where expert systems were used as a formalism for modeling metacognitive processes in a seminar. Building cognitive simulations engages intensive introspection, ownership and meaning making in learners who build them. (Author/AEF)

  6. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  7. Building Secure Networked Systems with Code Attestation

    Science.gov (United States)

    Perrig, Adrian

    Attestation is a promising approach for building secure systems. The recent development of a Trusted Platform Module (TPM) by the Trusted Computing Group (TCG) that is starting to be deployed in common laptop and desktop platforms is fueling research in attestation mechanisms. In this talk, we will present approaches on how to build secure systems with advanced TPM architectures. In particular, we have designed an approach for fine-grained attestation that enables the design of efficient secure distributed systems, and other network protocols.We demonstrate this approach by designing a secure routing protocol.

  8. Cognitive hacking and intelligence and security informatics

    Science.gov (United States)

    Thompson, Paul

    2004-08-01

    This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.

  9. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    ’s flexibility allows for the addition of constructs that model new security properties as well as new plugins that implement the security properties. In order to provide higher security assurances, the system specification can be verified by formal methods tools such as the Beliefs and Knowledge (BAK) tool......This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables...

  10. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  11. Human Capacity Building in Nuclear Security

    International Nuclear Information System (INIS)

    Nuclear security continuously calls for professionals, familiar with established approaches and challenged by innovations and state-of-the art developments in the associated technology and procedures. The constant loss of qualified personnel due to career development, retirement and administrative changes negatively affects a State’s readiness to carry out nuclear security tasks effectively. At the same time, technology and procedures are evolving at an increasing pace with the introduction of new equipment and techniques. Consequently, there is a rapidly growing need for highly qualified experts in nuclear security at the national level. It was estimated by the World Institute for Nuclear Security, WINS, [1] that worldwide several thousands of people would benefit from education and training in nuclear security. Many employers do not have such a route to realize demonstrable competence. As such, the associated capacity building is to be delivered by the academia, matching education in academic skills with basic knowledge in nuclear security and with the latest trends in associated fields such as nuclear physics, security sciences and (international) legislation

  12. Autopoiesis + extended cognition + nature = can buildings think?

    OpenAIRE

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and bio...

  13. Autopoiesis + extended cognition + nature = can buildings think?

    Science.gov (United States)

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and biocomputation. I trace computation and botanic simulations back to Alan Turing's little-known 1950s Morphogenetic drawings, reaction-diffusion algorithms, and pioneering artificial intelligence (AI) in order to establish bioarchitecture's generative point of origin. I ask provocatively, Can buildings think? as a question echoing Turing's own, "Can machines think?" PMID:26478784

  14. Progress in building a cognitive vision system

    Science.gov (United States)

    Benjamin, D. Paul; Lyons, Damian; Yue, Hong

    2016-05-01

    We are building a cognitive vision system for mobile robots that works in a manner similar to the human vision system, using saccadic, vergence and pursuit movements to extract information from visual input. At each fixation, the system builds a 3D model of a small region, combining information about distance, shape, texture and motion to create a local dynamic spatial model. These local 3D models are composed to create an overall 3D model of the robot and its environment. This approach turns the computer vision problem into a search problem whose goal is the acquisition of sufficient spatial understanding for the robot to succeed at its tasks. The research hypothesis of this work is that the movements of the robot's cameras are only those that are necessary to build a sufficiently accurate world model for the robot's current goals. For example, if the goal is to navigate through a room, the model needs to contain any obstacles that would be encountered, giving their approximate positions and sizes. Other information does not need to be rendered into the virtual world, so this approach trades model accuracy for speed.

  15. Security-aware cooperation in cognitive radio networks

    CERN Document Server

    Zhang, Ning

    2014-01-01

    This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into

  16. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  17. Building Secure Systems using Mobile Agents

    OpenAIRE

    Shibli, Muhammad Awais

    2006-01-01

    The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some...

  18. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  19. ROLE OF NET ZERO ENERGY BUILDING IN ENERGY SECURITY

    OpenAIRE

    Santosh D Jadhav

    2015-01-01

    Buildings have significant impact on energy use and the environment which in turn affects the development of country. Buildings are significant cause of climate change and energy security. In India , Buildings consumes more than 40% of country’s energy and responsible for almost 40% of greenhouse gas emissions. Many initiatives taken by Government of India to increase the efficiency of buildings such as Bachat Lamp Yojna, Use of Energy Efficient Lamps. Suc...

  20. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.

    Science.gov (United States)

    Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017

  1. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism

    Directory of Open Access Journals (Sweden)

    Dongmei Han

    2015-01-01

    Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.

  2. Methodological Approach to Risk Assessment in Building Security

    OpenAIRE

    Adelsberger, Zdenko; Grubor, Gojko; Nađ, Ivan

    2014-01-01

    Building object (or asset) security has always been a burning subject in all systems and regimes since ancient times, and will always be. The reason for this lies solely in the fact that these objects have a high material, historical, cultural and other value. Therefore, the owners of such buildings, regardless of whether they are the public, civic or some other social institutions, organizations or individuals, have always paid, more or less, attention to the issue of security of such object...

  3. Cognitive Radio for Smart Grid with Security Considerations

    Directory of Open Access Journals (Sweden)

    Khaled Shuaib

    2016-04-01

    Full Text Available In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large.

  4. Management and Security for Grid, Cloud and Cognitive Networks

    Directory of Open Access Journals (Sweden)

    WESTPHALL, C. B

    2011-12-01

    Full Text Available This paper present a number of research initiatives related to innovative and cut-edge technologies for Cloud Computing. These are chiefly in the fields of (i environment security, (ii quality assurance, (iii service composition, and (iv system management. We present technologies for intrusion detection; a SLA perspective in security management; customer security concerns; a Cloud-based solution for eHealth; experimental assessment of routing for grid and cloud; simulator improvements to validate the green cloud computing approach, and; a framework to radio layer operation in cognitive networks.

  5. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  6. Building Cognitive Radio System Using Matlab

    Directory of Open Access Journals (Sweden)

    Anurag Bansal

    2012-06-01

    Full Text Available Cognitive radio is an emerging and fascinating technology for the opportunistic use of under-utilized spectrum that promises to change the future technological trends forever if employed properly. This work focuses on the practical implementation of a cognitive radio network.

  7. Security-Control Systems and Automation in Contemporary Buildings

    Directory of Open Access Journals (Sweden)

    Saadet Aytıs

    1999-05-01

    Full Text Available As a result of the developing technology, major renovations related to the security control systems and to building automation applications on contemporary buildings have appeared. The main item of the control systems is the entry system with cards and passwords and this is applied almost in all the large contemporary buildings. The entry and exit to/from the carparking is getting to be as important as the entry and exit to/from the building. Thus, specific measures to stop the security system being already perforated in the parking are needed. Warning systems with a great range of different detectors against various dangers that run connected to the mainframe computers and that turn on the system in case of danger are taken into consideration. The fact of obtaining all comfort conditions desired in the contemporary high space buildings and functioning of the first-aid systems are fully realized by computers with the help of systems that are called “Building Automation System” (BAS. All inspection, energy saving and security controls are achieved through these systems. In the buildings where building automation systems are applied, trained personel is needed to keep the system running; and the training of the residents about the system gains more and more importance.

  8. ENHANCING BUILDING SECURITY with RFID and ZIGBEE

    Directory of Open Access Journals (Sweden)

    Hemalatha.M

    2013-02-01

    Full Text Available ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by the smart node are transmitted to the base node through ZigBee. If the temperature exceeds or an overload occurs, a set of remote control instructions are executed in the PC. The base node instructs the smart node to cut off the power to the corresponding branch circuit. The entire operation can be monitored from a remote station. In this proposed system, RFID technique is added to provide a theft control mechanism. To prevent theft of valuables from an unauthorized person,RFID tags are used. RFID reader senses the RFID labels (master/slave tags continuously and sends the information to a PC through ZigBee protocol. The database is checked in PC with the received information. If there is any mismatch in the RFID tags, it is considered to be an illegal input and a warning message is generated at the PC. The database is checked for the owner of that particular item and a confirming message is send to that owner. To search for that item the owner can login WEB. The valuable will be stopped by the entrance guard.

  9. Cognitive Radio for Smart Grid: Theory, Algorithms, and Security

    Directory of Open Access Journals (Sweden)

    Raghuram Ranganathan

    2011-01-01

    Full Text Available Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is presented. A brief overview of the cognitive radio, IEEE 802.22 standard and smart grid, is provided. Experimental results obtained by using dimensionality reduction techniques such as principal component analysis (PCA, kernel PCA, and landmark maximum variance unfolding (LMVU on Wi-Fi signal measurements are presented in a spectrum sensing context. Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. From the power system point of view, a supervised learning method called support vector machine (SVM is used for the automated classification of power system disturbances. The impending problem of securing the smart grid is also addressed, in addition to the possibility of applying FPGA-based fuzzy logic intrusion detection for the smart grid.

  10. Humility pills: building an ethics of cognitive enhancement.

    Science.gov (United States)

    Goodman, Rob

    2014-06-01

    The use of cognition-enhancing drugs (CEDs) appears to be increasingly common in both academic and workplace settings. But many universities and businesses have not yet engaged with the ethical challenges raised by CED use. This paper considers criticisms of CED use with a particular focus on the Accomplishment Argument: an influential set of claims holding that enhanced work is less dignified, valuable, or authentic, and that cognitive enhancement damages our characters. While the Accomplishment Argument assumes a view of authorship based on individual credit-taking, an impersonal or collaborative view is just as possible. This paper considers the benefits of this view-including humility, a value often claimed by critics of enhancement-and argues that such a view is consistent with open CED use. It proposes an ethics of cognitive enhancement based on toleration, transparency, and humility, and it discusses how institutions and individuals can build a culture of open cognitive enhancement. PMID:24847120

  11. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  12. Building Blocks for Cognitive Robots: Embodied Simulation and Schemata in a Cognitive Architecture

    OpenAIRE

    Hemion, Nikolas

    2013-01-01

    Building robots with the ability to perform general intelligent action is a primary goal of artificial intelligence research. The traditional approach is to study and model fragments of cognition separately, with the hope that it will somehow be possible to integrate the specialist solutions into a functioning whole. However, while individual specialist systems demonstrate proficiency in their respective niche, current integrated systems remain clumsy in their performance. Recent findings in ...

  13. Making Our Buildings Safer: Security Management and Equipment Issues.

    Science.gov (United States)

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  14. How to build resilience to conflict: The role of food security

    OpenAIRE

    Breisinger, Clemens; Ecker, Olivier; Maystadt, Jean-François; Trinh Tan, Jean-François; Al-Riffai, Perrihan; Bouzar, Khalida; Sma, Abdelkarim; Abdelgadir, Mohamed

    2014-01-01

    This Food Policy Report explains why there is a need to place even higher priority on food security-related policies and programs in conflict-prone countries, and offers insights for policymakers regarding how to do so. To understand the relationship between conflict and food security, this report builds a new conceptual framework of food security and applies it to four case studies on Egypt, Somalia, Sudan, and Yemen. It argues that food security-related policies and programs build resilienc...

  15. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  16. Children and Security Sector Reform in Post-conflict Peace-building

    OpenAIRE

    David Nosworthy

    2010-01-01

    The restoration of justice and security is a priority of post-conflict peace-building, but children and youth - two groups especially affected by armed conflict - rarely receive consideration in this process. This paper considers how reform of the security sector can contribute to making security provision more relevant to the concerns of young people and more reflective of their needs and aspirations. Security sector reform and transitional justice have been recognized as central elements of...

  17. HUMAN SECURITYBUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    OpenAIRE

    Andreea IANCU

    2015-01-01

    This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declara...

  18. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  19. Design Considerations for a Cognitive Radio Trust and Security Framework

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.;

    2012-01-01

    towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the critical challenges with respect to reliability, robustness and security, which hinder operators from investing in this new technology. We propose a new conceptual framework for trust and security...... to be integrated with the performance architecture and protocols for CR networks (CRNs). Our target is increasing trustworthiness from users and operators perspective in support of their successful deployment....

  20. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2014-03-01

    Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.

  1. COGNITIVE AGENTS BASED SECURITY SCHEME TO HANDLE ROUTING LOOPS IN WIRELESS NETWORKS

    OpenAIRE

    Kumar, R.; G. Kousalya

    2014-01-01

    Routers in wireless networks are often prone to variety of attacks like a man in the middle, distributed denial of service, smurf, ping of death, routing loops, counting to infinity. Among all these attacks routing loop is the most common one and it have a harmful effect on network performance. In this study, we have proposed a novel cognitive agents based security scheme to handle routing loops in wireless networks. The proposed scheme uses Cognitive Agents (CAs) on every routers with Observ...

  2. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  3. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  4. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  5. Dual Antenna Selection in Secure Cognitive Radio Networks

    OpenAIRE

    Chen, G.; Gong, Y; Xiao, P; CHAMBERS, J.

    2016-01-01

    This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most e...

  6. Building a cognitive map by assembling multiple path integration systems.

    Science.gov (United States)

    Wang, Ranxiao Frances

    2016-06-01

    Path integration and cognitive mapping are two of the most important mechanisms for navigation. Path integration is a primitive navigation system which computes a homing vector based on an animal's self-motion estimation, while cognitive map is an advanced spatial representation containing richer spatial information about the environment that is persistent and can be used to guide flexible navigation to multiple locations. Most theories of navigation conceptualize them as two distinctive, independent mechanisms, although the path integration system may provide useful information for the integration of cognitive maps. This paper demonstrates a fundamentally different scenario, where a cognitive map is constructed in three simple steps by assembling multiple path integrators and extending their basic features. The fact that a collection of path integration systems can be turned into a cognitive map suggests the possibility that cognitive maps may have evolved directly from the path integration system.

  7. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  8. EASTPHALIA: BUILDING A SECURITY COMMUNITY IN EAST ASIA

    OpenAIRE

    Tyler, J.

    2013-01-01

    Globalization has had a significant on the dynamics of trade. Moreover, these effects have also brought with it negative externalities that exacerbate a country’s propensity towards conflict. Countries today face new threats to security that were not included in a traditional security matrix: piracy, smuggling, transnational criminal organizations, cyber-attacks, terrorism, and ethnic/religious movements. Moreover, there are natural threats such as epidemics, climate change, and natural disas...

  9. Building trust into light-handed regulations for cognitive radio

    OpenAIRE

    Woyach, Kristen Ann

    2013-01-01

    This thesis introduces an incentive-based trust model to let wireless spectrum regulation embrace diverse current and future means of implementing cognitive radio.Cognitive radio has emerged as a way to combat inefficient spectrum use by allowing independently designed networks to share the same frequency band. This philosophy has been embraced by the FCC, which has already allowed cognitive use in the TV bands, and plans to make spectrum sharing the norm in other bands as well. To enact spec...

  10. Building a Cognitive Radio: From Architecture Definition to Prototype Implementation

    OpenAIRE

    Le, Bin

    2007-01-01

    Cognitive radio (CR) technology introduces a revolutionary wireless communication mechanism in terminals and network segments, so that they are able to learn their environment and adapt intelligently to the most appropriate way of providing the service for the user's exact need. By supporting multi-band, mode-mode cognitive applications, the cognitive radio addresses an interactive way of managing the spectrum that harmonizes technology, market and regulation. This dissertation gives ...

  11. A systemic and cognitive approach for IoT security

    OpenAIRE

    Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio

    2014-01-01

    Invited Paper International audience The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, tec...

  12. Ensuring security for cognitive radio networks is the goal of CAREER research

    OpenAIRE

    Crumbley, Liz

    2008-01-01

    Improving the security of cognitive radio technology is the goal of Virginia Tech College of Engineering researcher Jung-Min Park, who has received a $430,000 National Science Foundation Faculty Early Career Development Program (CAREER) Award to support his research.

  13. Building Blocks of Fetal Cognition: Emotion and Language

    Science.gov (United States)

    Huotilainen, Minna

    2010-01-01

    Magnetoencephalography (MEG) can be effectively used to record fetal and neonatal cognitive abilities/functions by recording completely non-invasively the magnetic fields produced by the active neurons in the brain. During the last trimester and the first months of life, the cognitive capabilities related to emotion recognition and language…

  14. Crucial problems on security assessment of a building site adjacent to an excavated high slope

    Institute of Scientific and Technical Information of China (English)

    文海家; ZHANG; Jialan; 等

    2002-01-01

    The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope,which is frequently encountered in town construction in mountainous areas due to terrain limit.On the base of some typical engineering cases in Chongqing,several crucial problems on security assessment of building site adjacent to an excavated high slope,including the natural geological conditions and man-destroyed degree,engineering environment,potential failure pattern of the high slope,calculation parameters and analysis methods,are roundly discussed.It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned,and the security assessment is one of the fundamental data to insure the safety of the related construction,site and buildings.

  15. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  16. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  17. A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio

    Science.gov (United States)

    Nhan, Nguyen-Thanh; Koo, Insoo

    Distributed spectrum sensing provides an improvement for primary user detection but leads a new security threat into CR system. The spectrum sensing data falsification malicious users can decrease the cooperative sensing performance. In this paper, we propose a distributed scheme in which the presence and absence hypotheses distribution of primary signal is estimated based on past sensing received power data by robust statistics, and the data fusion are performed according to estimated parameters by Dempster-Shafer theory of evidence. Our scheme can achive a powerful capability of malicious user elimination due to the abnormality of the distribution of malicious users compared with that of other legitimate users. In addition, the performance of our data fusion scheme is enhanced by supplemented nodes’ reliability weight.

  18. Cognitive Study of Building Metaphor建筑的隐喻认知研究

    Institute of Scientific and Technical Information of China (English)

    孔艳君

    2013-01-01

    Metaphor is a universal phenomenon. Tradition-ally metaphor is seen as as a means of rhetoric, but now it is seen as a cognitive phenomenon. In our life most of the everyday language is metaphor, our mind is also the metaphor. Metaphor has become an indispensable tool for understanding the world. There are a lot of“building”metaphorical expressions in life, as construction is an important component of people’s lives. But the studies of building metaphors have not been systematic and comprehensive. This thesis gives a contrastive study of building metaphors to deepen people’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  19. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological...

  20. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  1. Building Bridges between Neuroscience, Cognition and Education with Predictive Modeling

    Science.gov (United States)

    Stringer, Steve; Tommerdahl, Jodi

    2015-01-01

    As the field of Mind, Brain, and Education seeks new ways to credibly bridge the gap between neuroscience, the cognitive sciences, and education, various connections are being developed and tested. This article presents a framework and offers examples of one approach, predictive modeling within a virtual educational system that can include…

  2. Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    JIANG Limin; JIANG Du

    2007-01-01

    In retrospect of the architecture design of Exit- Entry Administration Building of Shanghai Municipal Public Security Bureau, this paper elaborates on the architect's pursuit of the symbol of the image, the fluidity of the space and the sequence of the function. It promotes a case which deals with the harmony of the architecture individuality and the urban space commonness in city center.

  3. Math Learning Model That Accommodates Cognitive Style to Build Problem-Solving Skills

    Science.gov (United States)

    Warli; Fadiana, Mu'jizatin

    2015-01-01

    The purpose of this research is to develop mathematical learning models that accommodate the cognitive styles reflective vs. impulsive students to build problem-solving skills, quality (valid, practical, and effective). To achieve the target would do research development (development research) and method development that consists of five stages,…

  4. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience. PMID:26642176

  5. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  6. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  7. Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

    Directory of Open Access Journals (Sweden)

    Shashi Ranjan

    2012-05-01

    Full Text Available India is striving to become a knowledge economy by the year 2020. In order to achieve this goal, there is a growing focus both at the government level as well as private sector level to leverage the expertise of the IT and ITES sector of the country which has become one of the main drivers of growth for the Indian Economy. This has lead to increasing investment in IT infrastructure. In this paper we review this trend and analyze the importance of Information Security Infrastructure for the country.We propose a comprehensive conceptual framework for building a robust, resilient and dependable Information Security Infrastructure which will help in establishing India as the secure and trusted hub of the future.

  8. A High End Building Automation and Online Video Surveillance Security System

    Directory of Open Access Journals (Sweden)

    Iyer Adith Nagarajan

    2015-02-01

    Full Text Available This paper deals with the design and implementation of a building automation and security system which facilitates a healthy, flexible, comfortable and a secure environment to the residents. The design incorporates a SIRC (Sony Infrared Remote Control protocol based infrared remote controller for the wireless operation and control of electrical appliances. Alternatively, the appliances are monitored and controlled via a laptop using a GUI (Graphical User Interface application built in C#. Apart from automation, this paper also focuses on indoor security. Multiple PIR (Pyroelectric Infrared sensors are placed within the area under surveillance to detect any intruder. A web camera used to record the video footage is mounted on the shaft of a servo motor to enable angular motion. Corresponding to which sensor has detected the motion; the ARM7 LPC2148 microcontroller provides appropriate PWM pulses to drive the servo motor, thus adjusting the position and orientation of the camera precisely. OpenCV libraries are used to record a video feed of 5 seconds at 30 frames per second (fps. Video frames are embedded with date and time stamp. The recorded video is compressed, saved to predefined directory (for backup and also uploaded to specific remote location over the internet using Google drive for instant access. The entire security system is automatic and does not need any human intervention.

  9. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. PMID:26421843

  10. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  11. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  12. Building secure wireless access point based on certificate authentication and firewall captive portal

    Science.gov (United States)

    Soewito, B.; Hirzi

    2014-03-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  13. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  14. Building Fit-For-Purpose Land Administration Systems: Providing Secure Tenure for All

    DEFF Research Database (Denmark)

    Lemmen, Christiaan; Enemark, Stig; McLaren, Robin

    2016-01-01

    administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended.  ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased....... This paper discusses the building of the FFP approach at country level. Implementation is strongly related to the recognition of the continuum of land rights. Implementation of the FFP approach means to recognise, record and review land rights:  ’Recognise’ involves a procedure for recognition....... A complete overview is required of the tenure systems and land rights related to the areas affected. All formal and informal tenure categories and sub-categories should be identified and related to space. It is recommended that a National Tenure Atlas will be developed in order to get overview of the spatial...

  15. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  16. 认知无线电网络安全综述%Security in cognitive radio networks

    Institute of Scientific and Technical Information of China (English)

    裴庆祺; 李红宁; 赵弘洋; 李男; 闵莹

    2013-01-01

      认知无线电网络通过认知用户对无线环境的感知,获得频谱空洞信息,在不干扰主用户的前提下,伺机接入空闲频谱,从而满足更多用户的频谱需求,提高频谱资源的利用率,然而,也带来了前所未有的安全挑战。依托认知环,从数据信道、控制信道和终端设备三方面介绍其安全性所面临的问题,以及现有的解决方案,最后给出认知无线电网络的安全建议。%Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wire-less environment to meet with the more spectrum requirement of users and improve spectrum utilization. However, it also brings new secure challenges that different from traditional wireless networks. Relying cognition cycle, the security is-sues in cognitive radio networks are presented from data channel, control channel and terminal equipment, then the ex-isting defensive measures and propose the secure recommendations of cognitive radio networks are introduced.

  17. We can work it out: Group decision-making builds social identity and enhances the cognitive performance of care residents.

    Science.gov (United States)

    Haslam, Catherine; Alexander Haslam, S; Knight, Craig; Gleibs, Ilka; Ysseldyk, Renate; McCloskey, Lauren-Grace

    2014-02-01

    Group-based interventions have been argued to slow the cognitive decline of older people residing in care by building social identification and thereby increasing motivation and engagement. The present study explored the identity-cognition association further by investigating the impact of a group decision-making intervention on cognition. Thirty-six care home residents were assigned to one of three conditions: an Intervention in which they made decisions about lounge refurbishment as a group, a Comparison condition in which staff made these decisions, or a no-treatment Control. Cognitive function, social identification, home satisfaction, and lounge use were measured before and after the intervention. Participants in the Intervention condition showed significant increases on all measures, and greater improvement than participants in both Comparison and Control conditions. Consistent with social identity theorizing, these findings point to the role of group activity and social identification in promoting cognitive integrity and well-being among care residents. PMID:24387094

  18. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    Science.gov (United States)

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  19. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  20. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    Energy Technology Data Exchange (ETDEWEB)

    Ntuen, Celestine (North Carolina Agricultural and Technical State University, Greensboro, NC); Winchester, Woodrow III (North Carolina Agricultural and Technical State University, Greensboro, NC)

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  1. Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle

    Directory of Open Access Journals (Sweden)

    Dr.Ghossoon M.Waleed Al-Saadoo

    2010-12-01

    Full Text Available Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agents. Very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists to facilitate provisioning of the required security qualities of mobile agent software while extensively focusing on easing the software development burden.The aim is to build a distributed secure system using multi-agents by applying the principles of software engineering. The objectives of this paper is to introduce multi agent systems that enhance security rules through the access right to building a distributed secure system integrating with principles of software engineering system life cycle, as well as satisfy the security access right for both platform and agents to improve the three characteristics of agents adaptively, mobility and flexibility, which is the main problem that depending on the principles of software engineering life cycle. There are 3 characteristics that satisfied using agent; mobility, adaptively and flexibility. Adaptively (which is the capability to respond to other agencies and/or environment to some degree. Mobility (the ability to transport itself from one environment to another and Flexibility (can be defined to include the following properties; responsive, pro-active and social. This project based on the platform of PHP and MYSQL (Database which can be presented in a website. The implementation and test are applied in both Linux and Windows platforms, including Linux Red Hat 8, Linux Ubuntu 6.06 LTS and Microsoft Windows XP Professional. Since PHP

  2. Building a highly available and intrusion tolerant database security and protection system (DSPS)

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  3. Building a highly available and intrusion tolerant database security and protection system ( DSPS)

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performane analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections ; and that proactive security is very useful and practical for large, critical applications.

  4. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Karthik, Rajasekar [ORNL; Patlolla, Dilip Reddy [ORNL; Sorokine, Alexandre [ORNL; Myers, Aaron T [ORNL

    2014-01-01

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, it is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.

  5. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS for Building Security

    Directory of Open Access Journals (Sweden)

    Wahyudi

    2007-01-01

    Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the user’s identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.

  6. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri

    OpenAIRE

    Ohaeri, Ifeoma Ugochi

    2012-01-01

    With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as a promising solution to the scarcity of spectrum. A basic operation of the CRs is spectrum sensing. Whenever a primary signal is detected, CRs have to vacate the specific spectrum band. Malicious users can mimic incumbent transmitters so as to enforce CRs to vacate the specific band. Cognitive radio networks (CRNs) a...

  7. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  8. Building bridges : a cognitive science approach to a human Dolphin dialog protocol

    OpenAIRE

    2002-01-01

    Cognitive science is the interdisciplinary study of cognition, mind and intelligence that has come out of the bridging between philosophy, psychology, artificial intelligence, neuroscience, linguistics, and anthropology. It has so far not been too concerned with cognition in an inter-species perspective. This thesis is looking at inter-species communication, or more specifically, human-dolphin communication, from a cognitive science perspective. Three aspects of language: a system, a...

  9. Building Partnerships for Sustainable Land Management and Food Security in Cuba

    International Nuclear Information System (INIS)

    Full text: Soil erosion and the associated land degradation have long been recognized as major environmental concerns and a constraint to food security and sustainable development. The United Nations has highlighted soil degradation as one of the most significant challenges for sustainable food production in the 21st century (World Summit on Sustainable Development, 2002 Johannesburg, South Africa). The ARCAL (Regional Cooperative Agreement for the Advancement of Nuclear Science and Technology in Latin America and the Caribbean) Regional Strategy Profile identified the inefficient use of soil resources and the resulting permanent loss of productive agricultural land as major limitations to achieving food security in the Latin American and Caribbean region. Currently, about 300 million hectares of land have been affected by degradation. Indicators of the present soil conservation status and probable environmental consequences are essential for an assessment of national economic potential and evaluation of political and social consequences. Large-scale soil erosion assessments, for example in a watershed, cannot be based on direct conventional measurements because of methodological restrictions and excessively high temporal and spatial variability. This can be addressed through the use of fallout radionuclides (caesium-137, lead-210 and beryllium-7), which are widely distributed in the environment, adsorbed by soil particles and hence transported in the landscape in a similar way to soil particles. Therefore the monitoring of their redistribution provides an excellent fingerprint for soil redistribution by erosion or sedimentation. These radionuclide techniques also offer an advantage over the conventional methods, by being much less laborious and pinpointing the sources of soil loss. In 2009, a regional technical cooperation project (RLA/5/051 - ARCAL) was initiated for Latin America, with 15 countries (Argentina, Bolivia, Brazil, Chile, Cuba, El Salvador, Haiti

  10. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  11. Capacity Building on Food-Crop Farming to Improve Food Production and Food Security in Central Java, Indonesia

    Directory of Open Access Journals (Sweden)

    Waridin

    2013-03-01

    Full Text Available This paper describes the capacity of food-crop production for improving regional food security in Central Java, Indonesia. It is also identify crops which have high and prospective economic-values. The results of the study might help in formulating a proposed model to improve food crops production in supporting food security. The case study was conducted in districts which play the important roles on agriculture (rice production in Central Java, Indonesia. These are Klaten and Magelang districts. Data were collected from farmers and officers from agriculture-related institutions. The results show that Central Java Province has the capacity on food crop (rice production for securing food availability, distribution, and accessibility for people in the region. It has a moderate on food security for the products, and surplus of production have distributed to other regions within the country. However, other food crops still facing shortage of supply since lack of productions. It requires a commitment from government and stakeholders for improving capacity building on agricultural development.

  12. Building a contingency menu: using capabilities-based planning for Homeland Defense and Homeland Security

    OpenAIRE

    Goss, Thomas J.

    2005-01-01

    Approved for public release, distribution is unlimited A capabilities-based approach to contingency planning offers important opportunities to strengthen both Homeland Defense and Homeland Security. The Department of Defense (DOD) and the Department of Homeland Security (DHS) have already begun moving beyond traditional threat-based and scenario-based planning methodologies toward a more capabilities-based approach, but require embracing this concept more in order to counter challenges in ...

  13. Building methodology, assessing the risks: the case of energy security in the Baltic States

    OpenAIRE

    Arūnas Molis

    2011-01-01

    The purpose of this article is not confined to analysis of risks to the Baltic States' energy security. The research aimed to develop methods for risk intensity assessment tools as well empirical examples. It encompasses an effort to tailor a system of damage and probability (i.e. risk intensity) assesment used by other authors to risk analysis. The analysis performed by using this methodology shows the existence of at least two major energy security risks of intolerable intensity for the Bal...

  14. Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach

    Science.gov (United States)

    Oakes, Charles G.

    2010-01-01

    The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…

  15. 烟草企业WLAN安全建设%Tobacco Enterprise WLAN Security Building

    Institute of Scientific and Technical Information of China (English)

    赖日君

    2012-01-01

    随着记本电脑、PDA、IPAD等移动终端的普及和移动办公需求的增加,无线网络在烟草行业卷烟物流、烟叶生产收购、移动办公等领域得到广泛应用与发展,无线网络的安全也势必成为烟草行业网络安全的一个重要部分,本文介绍无线局域网的概念和技术标准,分析目前烟草企业WLAN面临的安全威胁,介绍了目前WLAN可能使用的加密、认证、VPN、无线入侵检测、一体化安全防护等安全防范技术,重点阐述有线和无线安全一体化是烟草企业WLAN安全未来发展的必然趋势。%With the increased popularity of notebook computers,PDAs, iPad and other mobile terminals and mobile office needs,the wireless network in the tobacco industry,cigarette logistics,tobacco production and acquisition,mobile office,and other fields has been widely used and development of wireless network security is bound to become an important part of the tobacco industry of network security This article describes the conceptual and technical standard of the wireless LAN,analyze security threats facing tobacco companies WLAN WLAN may use encryption, authentication,VPN,wireless intrusion detection,integrated security and security technology,and focuses on wired and wireless security integration is the development trend of the tobacco enterprise WLAN security.

  16. To Build the Sino-Japanese Security Cooperation Featuring Strategically Mutual Benefit

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    In the past forty years, even with frictions and conflicts, friendship and cooperation remain the main theme in the development of Sino-Japanese relations, which has been especially reflected in the economic domain with significant increase of economic interdependence between the two countries. Nevertheless, no one can deny the fact that the Sino-Japanese security cooperation has far lagged behind their economic cooperation. Therefore, enhancing the cooperation in security area has become a major issue that the Chinese and the Japanese governments have to face up to.

  17. Goodness-of-fit based secure cooperative spectrum sensing for cognitive radio network.

    Science.gov (United States)

    Vu-Van, Hiep; Koo, Insoo

    2014-01-01

    Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.

  18. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  19. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 - Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or ''clean,'' building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, ''Final Status Survey Plan for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201'') was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one

  20. Nation-building e segurança internacional: Um debate em construção Nation-building and international security: A debate under construction

    Directory of Open Access Journals (Sweden)

    Aureo de Toledo Gomes

    2009-08-01

    Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.

  1. Capacity Building In Information And Communication Management (ICM) Towards Food Security

    OpenAIRE

    Temu, Andrew; Msuya, Elibariki Emmanuel

    2004-01-01

    This paper addresses capacity strengthening needs in the area of ICM to support food security initiatives. It fully acknowledges that FS is a state of assuring physical availability and economic accessibility to enough food in terms of quantity (amount, distribution, calories), quality (safe, nutritious, balanced) and cultural acceptability for all people at all times for a healthy and active life. It starts by outlining how ICM can support strategies to ensure availability, access, acce...

  2. Linking adaptation science to action to build food secure Pacific Island communities

    OpenAIRE

    C. Cvitanovic; S. Crimp; Fleming, A; Bell, J.; Howden, M.; Hobday, A. J.; Taylor, M; R. Cunningham

    2016-01-01

    Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform ...

  3. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room

  4. Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.

    Science.gov (United States)

    Usman, Muhammad; Koo, Insoo

    2014-01-01

    Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations. PMID:25295288

  5. Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.

    Science.gov (United States)

    Usman, Muhammad; Koo, Insoo

    2014-01-01

    Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.

  6. Navigation experience and mental representations of the environment: do pilots build better cognitive maps?

    Science.gov (United States)

    Sutton, Jennifer E; Buset, Melanie; Keller, Mikayla

    2014-01-01

    A number of careers involve tasks that place demands on spatial cognition, but it is still unclear how and whether skills acquired in such applied experiences transfer to other spatial tasks. The current study investigated the association between pilot training and the ability to form a mental survey representation, or cognitive map, of a novel, ground-based, virtual environment. Undergraduate students who were engaged in general aviation pilot training and controls matched to the pilots on gender and video game usage freely explored a virtual town. Subsequently, participants performed a direction estimation task that tested the accuracy of their cognitive map representation of the town. In addition, participants completed the Object Perspective Test and rated their spatial abilities. Pilots were significantly more accurate than controls at estimating directions but did not differ from controls on the Object Perspective Test. Locations in the town were visited at a similar rate by the two groups, indicating that controls' relatively lower accuracy was not due to failure to fully explore the town. Pilots' superior performance is likely due to better online cognitive processing during exploration, suggesting the spatial updating they engage in during flight transfers to a non-aviation context.

  7. Therapist Strategies for Building Involvement in Cognitive-Behavioral Therapy for Adolescent Depression

    Science.gov (United States)

    Jungbluth, Nathaniel J.; Shirk, Stephen R.

    2009-01-01

    This study examined predictive relations between 9 therapist behaviors and client involvement in manual-guided, cognitive-behavioral therapy for adolescent depression. Analyses included 42 adolescents who met criteria for a depressive disorder (major depressive disorder, dysthymic disorder, or adjustment disorder with depressed mood) and who were…

  8. Using Cognitive Coaching to Build School Leadership Capacity: A Case Study in Alberta

    Science.gov (United States)

    Rogers, W. Todd; Hauserman, Cal P.; Skytt, Jacqueline

    2016-01-01

    The impact of Cognitive Coaching? included as part of the Leader2Leader (L2L) Leadership Pilot Program for beginning principals in Alberta, Canada, was evaluated in the present study. Fifteen qualified principals (coaches) and 23 new principals completed the L2L Pilot Program that took place over 18 months. Questionnaires for coaches and new…

  9. A race we can win. The world can - and must - build a stronger security framework

    International Nuclear Information System (INIS)

    Nuclear proliferation and terrorism represent the single most important threat to global security. Yet fundamental differences of opinion remain on how to deal with this ever growing menace to our survival. Should we opt for diplomacy or force? What are the relative merits of collective versus unilateral action? Is it more effective to pursue a policy of containment or one based on inclusiveness? These are not new questions, by any measure. But they have taken on renewed urgency as nations struggle, both regionally and globally, to cope with an extended array of conflicts, highly sophisticated forms of terrorism, and a growing threat of weapons of mass destruction. In a real sense, we are in a race against time - but it's a race we can win if we work together. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits - by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. The question is how do we best move ahead to achieve the security we seek

  10. Linking adaptation science to action to build food secure Pacific Island communities

    Directory of Open Access Journals (Sweden)

    C. Cvitanovic

    2016-01-01

    Full Text Available Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform their decision-making processes. However, effective engagement of Pacific Island communities in climate adaption remains variable and is an ongoing and significant challenge. Here, we use a qualitative research approach to identify the impediments to engaging Pacific Island communities in the adaptations needed to safeguard food security. The main barriers include cultural differences between western science and cultural knowledge, a lack of trust among local communities and external scientists, inappropriate governance structures, and a lack of political and technical support. We identify the importance of adaptation science, local social networks, key actors (i.e., influential and trusted individuals, and relevant forms of knowledge exchange as being critical to overcoming these barriers. We also identify the importance of co-ordination with existing on-ground activities to effectively leverage, as opposed to duplicating, capacity.

  11. Agile enterprise development framework utilizing services principles for building pervasive security

    Science.gov (United States)

    Farroha, Deborah; Farroha, Bassam

    2011-06-01

    We are in an environment of continuously changing mission requirements and therefore our Information Systems must adapt to accomplish new tasks, quicker, in a more proficient manner. Agility is the only way we will be able to keep up with this change. But there are subtleties that must be considered as we adopt various agile methods: secure, protect, control and authenticate are all elements needed to posture our Information Technology systems to counteract the real and perceived threats in today's environment. Many systems have been tasked to ingest process and analyze different data sets than they were originally designed for and they have to interact with multiple new systems that were unaccounted for at design time. Leveraging the tenets of security, we have devised a new framework that takes agility into a new realm where the product will built to work in a service-based environment but is developed using agile processes. Even though these two criteria promise to hone the development effort, they actually contradict each other in philosophy where Services require stable interfaces, while Agile focuses on being flexible and tolerate changes up to much later stages of development. This framework is focused on enabling a successful product development that capitalizes on both philosophies.

  12. Building momentum to minimize highly enriched uranium use, improve nuclear security and combat nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: Much has been done to reduce the risk of nuclear terrorism under the auspices of international programs such as the G-8 Global Partnership, the Global Initiative to Combat Nuclear Terrorism, and the Global Threat Reduction Initiative. Despite the practical progress in removing the threat that terrorist groups could obtain the fissile material for an improvised nuclear device, however, much more work remains. In 1980, the 59 states participating in the International Nuclear Fuel Cycle Evaluation agreed that the civilian use of highly enriched uranium (HEU) should be minimized. Decades later, and despite dramatic new threats to world peace, the pledge to forego the use of HEU is not yet universal or legally binding. Nor have improvements to the physical security of this material been sufficient in many locations. This paper surveys the international measures that have been taken towards the formation of an international norm to minimize BEU risks through established mechanisms and suggests several additional approaches that may help to solidify support for practical measures and accelerate the process of civil HEU minimization and improved security globally. HEU reduction requires global cooperation: eliminating a small holding of HEU at a single facility or upgrading its security does not greatly reduce terrorist risks overall. Policymakers must be sure that their counterparts in other states arc engaged in similar efforts. A global HEU minimization norm would validate each nation's efforts, no matter how small, and provide a disincentive for inaction. Clearer standards for the security of this material and commitments to meet these standards would serve the same purpose. While each failure 10 act poses its own risks, it also erodes the usefulness of HEU elimination programs elsewhere and sends the wrong political message to the rest of the world. Moreover, it is technically impossible to minimize the largest REU holdings-those at fuel cycle facilities

  13. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces. PMID:24080620

  14. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    CERN Document Server

    Gouider, Mohamed Salah; 10.5121/ijdms.2010.2207

    2010-01-01

    The amounts of data available to decision makers are increasingly important, given the network availability, low cost storage and diversity of applications. To maximize the potential of these data within the National Social Security Fund (NSSF) in Tunisia, we have built a data warehouse as a multidimensional database, cleaned, homogenized, historicized and consolidated. We used Oracle Warehouse Builder to extract, transform and load the source data into the Data Warehouse, by applying the KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledge extraction has been performed using the Oracle Discoverer tool. This allowed users to take maximum advantage of knowledge as a regular report or as ad hoc queries. We started by implementing the main topic for this public institution, accounting for the movements of insured persons. The great success that has followed the completion of this work has encouraged the NSSF to complete the achievement of other topics of interest within the NSSF. ...

  15. Going with the Grain of Cognition: Applying Insights from Psychology to Build Support for Childhood Vaccination

    Science.gov (United States)

    Rossen, Isabel; Hurlstone, Mark J.; Lawrence, Carmen

    2016-01-01

    Childhood vaccination is widely considered to be one of the most successful public health interventions. Yet, the effective delivery of vaccination depends upon public willingness to vaccinate. Recently, many countries have faced problems with vaccine hesitancy, where a growing number of parents perceive vaccination to be unsafe or unnecessary, leading some to delay or refuse vaccines for their children. Effective intervention strategies for countering this problem are currently sorely lacking, however. Here, we propose that this may be because existing strategies are grounded more in intuition than insights from psychology. Consequently, such strategies are sometimes at variance with basic psychological principles and assumptions. By going against the grain of cognition, such strategies potentially run the risk of undermining persuasive efforts to reduce vaccine hesitancy. We demonstrate this by drawing on key insights from cognitive and social psychology to show how various known features of human psychology can lead many intuitively appealing intervention strategies to backfire, yielding unintended and undesirable repercussions. We conclude with a summary of potential avenues of investigation that may be more effective in addressing vaccine hesitancy. Our key message is that intervention strategies must be crafted that go with the grain of cognition by incorporating key insights from the psychological sciences.

  16. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    Directory of Open Access Journals (Sweden)

    Mohamed Salah GOUIDER

    2010-05-01

    Full Text Available The amounts of data available to decision makers are increasingly important, given the networkavailability, low cost storage and diversity of applications. To maximize the potential of these data withinthe National Social Security Fund (NSSF in Tunisia, we have built a data warehouse as amultidimensional database, cleaned, homogenized, historicized and consolidated. We used OracleWarehouse Builder to extract, transform and load the source data into the Data Warehouse, by applyingthe KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledgeextraction has been performed using the Oracle Discoverer tool. This allowed users to take maximumadvantage of knowledge as a regular report or as ad hoc queries. We started by implementing the maintopic for this public institution, accounting for the movements of insured persons. The great success thathas followed the completion of this work has encouraged the NSSF to complete the achievement of othertopics of interest within the NSSF. We suggest in the near future to use Multidimensional Data Mining toextract hidden knowledge and that are not predictable by the OLAP.

  17. The human capacity building support activities of the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security and the cooperation with the international or foreign organizations which handles human capacity building support

    International Nuclear Information System (INIS)

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency has started its human capacity building activities, domestically and internationally, for the government officials and employees of companies of emerging nuclear power countries mainly in Asia. In this paper, we will describe the activities of ISCN on capacity building for these countries and also I will briefly describe, focusing on nuclear security, the activities of IAEA, Sandia National Laboratory of United States, Russia and the development of human capacity building support activities of neighboring countries of China and Korea. By doing this, we will describe the relationship and cooperation of ISCN with these organizations and hope that this would help us for the future development with these organizations and ISCN. (author)

  18. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  19. Simulation of a dead reckoning embedded system security patrol robot for deployment inside structures and buildings

    Science.gov (United States)

    Tickle, Andrew J.; Meng, Yan; Smith, Jeremy S.

    2010-10-01

    Dead Reckoning (DR) is the process of estimating a robot's current position based upon a previously determined position, and advancing that position based upon known speed and direction over time. It is therefore a simple way for an autonomous mobile robot to navigation within a known environment such as a building where measurements have been taken and a predetermined route planned based upon which doors (or areas) the robot would have enough force to enter. Discussed here is the design of a DR navigation system in Altera's DSP Builder graphical design process. The wheel circumference to the step size of stepper motor used to drive the robot are related and so this ratio can be easily changed to easily accommodate changes to the physical design of a robot with minimal changes to the software. The robot calculates its position in relation to the DR map by means of the number of revolutions of the wheels via odometry, in this situation there is no assumed wheel slippage that would induce an accumulative error in the system overtime. The navigation works by using a series of counters, each corresponding to a measurement taken from the environment, and are controlled by a master counter to trigger the correct counter at the appropriate time given the position of robot in the DR map. Each counter has extra safeguards built into them on their enables and outputs to ensure they only count at the correct time and to avoid clashes within the system. The accuracy of the navigation is discussed after the virtual route is plotted in MATLAB as a visual record in addition to how feedback loops, identification of known objects (such as fire safety doors that it would navigate through), and visual object avoidance could later be added to augment the system. The advantages of such a system are that it has the potential to upload different DR maps so that the end robot for can be used in new environments easily.

  20. Combining cognitive engineering and information fusion architectures to build effective joint systems

    Science.gov (United States)

    Sliva, Amy L.; Gorman, Joe; Voshell, Martin; Tittle, James; Bowman, Christopher

    2016-05-01

    The Dual Node Decision Wheels (DNDW) architecture concept was previously described as a novel approach toward integrating analytic and decision-making processes in joint human/automation systems in highly complex sociotechnical settings. In this paper, we extend the DNDW construct with a description of components in this framework, combining structures of the Dual Node Network (DNN) for Information Fusion and Resource Management with extensions on Rasmussen's Decision Ladder (DL) to provide guidance on constructing information systems that better serve decision-making support requirements. The DNN takes a component-centered approach to system design, decomposing each asset in terms of data inputs and outputs according to their roles and interactions in a fusion network. However, to ensure relevancy to and organizational fitment within command and control (C2) processes, principles from cognitive systems engineering emphasize that system design must take a human-centered systems view, integrating information needs and decision making requirements to drive the architecture design and capabilities of network assets. In the current work, we present an approach for structuring and assessing DNDW systems that uses a unique hybrid DNN top-down system design with a human-centered process design, combining DNN node decomposition with artifacts from cognitive analysis (i.e., system abstraction decomposition models, decision ladders) to provide work domain and task-level insights at different levels in an example intelligence, surveillance, and reconnaissance (ISR) system setting. This DNDW structure will ensure not only that the information fusion technologies and processes are structured effectively, but that the resulting information products will align with the requirements of human decision makers and be adaptable to different work settings .

  1. Build Security Mechanism for Serious Illness%构建重特大疾病保障机制

    Institute of Scientific and Technical Information of China (English)

    褚福灵

    2015-01-01

    The occurrence of serious illness is a misfortune of life, which will cause catastrophic medical expense of a family and impact social harmony. We should move forward the prevention pass of serious illness risks, and prevent the risks of serious illness from its occurrence. To reduce the risk of serious illness effectively, we should to do well in four aspects, i.e., disease preventing, medical costs reducing, income increasing and benets level improving, and build a comprehensive security mechanism for serious illness.%重特大疾病的发生是人生的不幸,将给家庭带来灾难性医疗支出,影响社会的和谐安宁.应当将防控重特大疾病风险的关口前移,从源头上化解重特大疾病风险,在"防病、减费、增收、提待"等四方面综合发力,构建重特大疾病的综合保障机制,确保重特大疾病风险得到有效化解.

  2. 环境心理学在建筑施工安全管理中的应用%Application of environmental psychology in building construction security management

    Institute of Scientific and Technical Information of China (English)

    陈志源; 陈桂芬

    2012-01-01

    This article describes the dialectical relation of connotation,environment,and performance of environmental psychology,discusses the application of environmental psychology in building construction security management,which has significant meaning for reducing building construction accidents.%阐述了环境心理学的内涵、环境与行为的辩证关系,探讨了环境心理学在建筑施工安全管理中的应用,对减少建筑施工安全事故的发生具有重要现实意义。

  3. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  4. Integrating - VPN and IDS - An approach to Networks Security

    Directory of Open Access Journals (Sweden)

    Prabha Rani

    2007-10-01

    Full Text Available The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points in mind we have chosen to integrate VPN and IDS to provide an efficient solution for security engineers.

  5. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  6. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  7. Teacher Language Awareness and Cognitive Linguistics (CL): Building a CL-Inspired Perspective on Teaching Lexis in EFL Student Teachers

    Science.gov (United States)

    Giebler, Ralf

    2012-01-01

    It has been suggested recently that it may be useful for language teaching practitioners to have some knowledge of cognitive linguistics. Cognitive linguistics (CL) provides tools that may help the language-teaching practitioner to gain insight into the semantic potential of words and communicate the meaning of lexical chunks in greater detail…

  8. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  9. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union

    Science.gov (United States)

    Bartholomew, James C.; Pearson, Andrew D.; Stenseth, Nils Chr.; LeDuc, James W.; Hirschberg, David L.; Colwell, Rita R.

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world’s great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  10. Using fuzzy cognitive mapping to understand farmers' perception of sustainable agricultural practices for enhanced food security in Nepal

    OpenAIRE

    Halbrendt, Jacqueline; Gray, S.; Crow, S.; Shariq, L.; Tamang, Bishal B.

    2012-01-01

    With the world population having reached unprecedented levels, the need for improved food security and sustainable agricultural practices has become all the more pressing. This is especially relevant for subsistence farmers, such as those in the Mid-hill region of Nepal, who typically rely on crop yields for sustenance and have limited access to opportunities for income generation. Although promoting agricultural development in areas like the Mid-hill region has been a priority for NGOs and r...

  11. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  12. 认知计算在网络安全态势感知中的应用研究%Research on the application of cognitive computing in network security situation awareness

    Institute of Scientific and Technical Information of China (English)

    肖晓飞; 贾颖

    2014-01-01

    This paper summarizes the cognitive computing research literature of foreign scholars and domestic scholars, analyses the research hot spot in the field of cognitive computing, summarizes the situation of its application in network security situation awareness, and constructs the network security situation based on multi-ring MACDE cognitive model.%文章总结了认知计算领域国外学者和国内学者的研究文献,对认知计算的热点研究领域做了分析,对其在网络安全态势感知中的应用情况进行了回顾和总结,并构建了基于多MACDE环的网络安全态势认知计算模型。

  13. Sustainable Development--Education, Business and Management--Architecture and Building Construction--Agriculture and Food Security

    Science.gov (United States)

    Ghenai, Chaouki, Ed.

    2012-01-01

    Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…

  14. [Nutritional challenges in the Brazilian Unified National Health System for building the interface between health and food and nutritional security].

    Science.gov (United States)

    Rigon, Silvia do Amaral; Schmidt, Suely Teresinha; Bógus, Cláudia Maria

    2016-03-01

    This article discusses the establishment of inter-sector action between health and food and nutritional security in Brazil from 2003 to 2010, when this issue was launched as a priority on the government's agenda. A qualitative study was developed according to constructivist epistemology, using key-informant interviews in the field's nationwide social oversight body. Advances and challenges in this process are addressed as analytical categories. The National Food and Nutrition Policy (PNAN) was mentioned as the link between the two fields, decentralized through a network with activity in the states and municipalities. However, the study found political, institutional, and operational obstacles to the effective implementation of the PNAN in the Brazilian Unified National Health System and consequently to a contribution to the advancement of Health and Food and Nutritional Security in the country. The predominance of the biomedical, curative, and high-complexity model was cited as the principal impediment, while health promotion policies like the PNAN were assigned secondary priority.

  15. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report

    International Nuclear Information System (INIS)

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  16. Building Peace and/or Gender Equality. Changing Attitudes around Peace, Development and Security in International Cooperation in Rwanda.

    OpenAIRE

    Aguiari, Sabrina

    2014-01-01

    The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level o...

  17. The Effect of Managerial Cognition on Firm Capability Building%管理认知对企业能力构建的影响

    Institute of Scientific and Technical Information of China (English)

    王涛; 张雁; 李姝

    2012-01-01

    能力构建的本质在于通过跨层次知识转移形成新的组织知识来对能力内在的知识集合进行替代、补充和增强,以构建出具有新功能企业能力的组织活动。管理认知是推动企业能力构建的关键因素,然而,企业是由不同层次主体构成的复杂组织体系,不同层次的管理认知也会存在明显的层次间分工和合作。通过引入能级的概念可以区别不同组织层次间知识活动的差异,不同层次的管理者在能力构建活动中会代表相应的高层次主体来与低层次主体进行互动,并以差异化管理认知对低层次知识进行再加工,并赋予相应的活化能使其发生活化反应,最终以能级跃迁的形式来完成知识在个体、团队和组织三个层次间的跨层次转移,从而完成能力构建。%The essence of firm capability building lies in that through cross-level knowledge transfer, organizational activities may produce new organizational knowledge to substitute, supplement and strengthen the inner knowledge set so as to build up firm capabilities with new functions. Managerial cognition is one of the critical factors that may promote firm capability building. However, firm is a complicated multi-level organizational system which consists of subjects of varied levels, and there always exists obvious division and cooperation among managerial cognitions of different levels. In the highly competitive market environment, capability building has been an effective approach to promote firm competitiveness which may form strategic assets through continuous evolution of resources. Therefore, it is of high importance to study the effect of managerial cognition on firm capability building, which may carry both theoretical and practical implications. On the one hand, focusing on the micro level of internal firm, the paper firstly introduces the concept of organizational energy level to show the differences of varied

  18. Preparation of a Competent Nuclear Security and Safety Workforce. The Role of Technical Safety Organisations in Building Up Integrated Knowledge and Skills

    International Nuclear Information System (INIS)

    The European Nuclear Safety Training and Tutoring Institute (ENSTTI), an initiative of the European Technical Safety Organizations Network-ETSON, provides a high quality training and tutoring programme addressed to professionals at Technical Safety Organizations (TSOs) and nuclear regulatory authorities (NRAs). Through this programme ENSTTI shares, inter alia, the operational experience gained by TSOs in dealing with the interfaces between nuclear security and nuclear safety with international experts. At present, ENSTTI is in the process of broadening its services by developing a comprehensive training programme tailored to the training needs of junior and senior professionals at TSOs and NRAs.This effort aims at building-up mutually recognized technical and regulatory competencies, foster global nuclear security and safety culture, increase workforce mobility and contribute to the lifelong learning efforts of the European Union. In order to give value to learning achieved in the training programme under development, ENSTTI will apply the European Credit System for Vocational Education and Training (ECVET) that is characterized by flexible procedures for validation, transfer and recognition of learning outcomes. This approach should also be of great value for trainees from other regions in the world. (author)

  19. Investigation report on team building of Tieling Municipal Public Security Bureau%铁岭市公安局队伍建设情况调研报告

    Institute of Scientific and Technical Information of China (English)

    李安君

    2011-01-01

    为了应对新形势下公安机关队伍建设面临的各种挑战,推动各项公安工作再上新台阶,铁岭市公安局深入基层,实地开展队伍建设调研,总结了铁岭市当前公安队伍中存在的主要问题及其产生原因,并提出了加强公安队伍建设的建议和对策。%In response to the challenges faced in the team building of public security organs under the new situation, and to promote all aspects of public work to a new level,Tieling Municipal Public Security Bureau went to grassroots level to carry out onsite research on teambuilding. The paper summed up the current exist major problems and the causes in police force in Tieling and made recommendations and response to strengthen the police contingent.

  20. 构筑坚固的政府网站安全防护体系%Building a Strong Security Protection System for Government Websites

    Institute of Scientific and Technical Information of China (English)

    赵莹

    2015-01-01

    剖析了我国政府网站的安全现状和存在问题,从技术角度详细论述了加强政府网站安全防护的8项措施,主要包括:统一的用户身份验证、数据访问的权限控制、信息追溯管理、数据库并发控制、“三层架构”建设模式、网站目录权限最小化、部署网站防护体系、定期备份和日志检查。最后重点指出只有多项安全策略综合应用、共同构筑坚固的政府网站安全防护体系,才能有效抵御日益猖獗且形式多样的黑客攻击,维护政府部门的良好形象。%This paper analyzes the security situation and existing problems of government websites in China,and thor-oughly discusses eight measures of strengthening the security protection of the websites,including unified authentication of users,access control of data,message retrospect management,database concurrency control,“three-layer structure”construction mode,minimization of website directory permissions,deployment of website protection system,regular backups and log check. In the end,it points out that only through a comprehensive application of multiple security strategies and jointly building a strong government website protection system,can government websites effectively resist the increas-ingly rampant hacker attacks and maintain a good image of government departments.

  1. Can fuel services supply be secured? Building trust in a multi-lateral approach to nuclear fuel cycles

    International Nuclear Information System (INIS)

    Global climate change and concerns about energy supply security fuelling the nuclear desires of an increasing number of states, there is growing interest within the nonproliferation community to promote the establishment of an international system for the provision of nuclear fuel cycle services that would be 'equitable and accessible to all users of nuclear energy' (Rauf, 2008) while reducing proliferation risks. Although the idea was already voiced on the cradle of civilian use of nuclear energy (Baruch, 1946), the IAEA director's 2003 call for a group of international experts to examine the issue (ElBaradei, 2003) triggered renewed interest that resulted in up to twelve different proposals for multilateral nuclear fuel cycle arrangements (Rauf, 2008; Simpson, 2008). Nonproliferation experts have examined the conditions under which equitable and accessible access to enrichment, reprocessing and spent fuel disposal services can be granted to all users (Rauf, 2008; Braun 2006; Pellaud and al 2005). They suggested putting together multilateral nuclear approaches (MNA) that could consist in the establishment of mechanisms to assure fuel cycle services, or the shared ownership by recipient and host countries of fuel services facilities through either the creation of new multilateral centers or the conversion of existing national facilities into multinational enterprises. While countries that possess nuclear fuel facilities would benefit from the increased global security and strengthened non-proliferation situation that would result from the establishment of these MNAs, they would also be baited into participating by possible attraction of foreign investments as well as the opportunity to export high value services (Rushkin, 2006). Yet, what incentives would there be for a recipient non-nuclear state to participate in an arrangement that would intrinsically strip it of its sovereign right to ensure its fuel supply security? In addition to the economic benefits of

  2. Can playing the computer game "Tetris" reduce the build-up of flashbacks for trauma? A proposal from cognitive science.

    Directory of Open Access Journals (Sweden)

    Emily A Holmes

    Full Text Available BACKGROUND: Flashbacks are the hallmark symptom of Posttraumatic Stress Disorder (PTSD. Although we have successful treatments for full-blown PTSD, early interventions are lacking. We propose the utility of developing a 'cognitive vaccine' to prevent PTSD flashback development following exposure to trauma. Our theory is based on two key findings: 1 Cognitive science suggests that the brain has selective resources with limited capacity; 2 The neurobiology of memory suggests a 6-hr window to disrupt memory consolidation. The rationale for a 'cognitive vaccine' approach is as follows: Trauma flashbacks are sensory-perceptual, visuospatial mental images. Visuospatial cognitive tasks selectively compete for resources required to generate mental images. Thus, a visuospatial computer game (e.g. "Tetris" will interfere with flashbacks. Visuospatial tasks post-trauma, performed within the time window for memory consolidation, will reduce subsequent flashbacks. We predicted that playing "Tetris" half an hour after viewing trauma would reduce flashback frequency over 1-week. METHODOLOGY/PRINCIPAL FINDINGS: The Trauma Film paradigm was used as a well-established experimental analog for Post-traumatic Stress. All participants viewed a traumatic film consisting of scenes of real injury and death followed by a 30-min structured break. Participants were then randomly allocated to either a no-task or visuospatial ("Tetris" condition which they undertook for 10-min. Flashbacks were monitored for 1-week. Results indicated that compared to the no-task condition, the "Tetris" condition produced a significant reduction in flashback frequency over 1-week. Convergent results were found on a clinical measure of PTSD symptomatology at 1-week. Recognition memory between groups did not differ significantly. CONCLUSIONS/SIGNIFICANCE: Playing "Tetris" after viewing traumatic material reduces unwanted, involuntary memory flashbacks to that traumatic film, leaving deliberate

  3. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  4. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    International Nuclear Information System (INIS)

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  5. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Staude, Fabio, E-mail: fstaude@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN-RJ), Rio de Janeiro, RJ (Brazil); Ramirez, Matias, E-mail: matias.ramirez@sussex.ac.uk [University of Sussex (SPRU/US), Brighton (United Kingdom). Science and Technology Policy Research

    2013-07-01

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  6. Building a Community-Academic Partnership: Implementing a Community-Based Trial of Telephone Cognitive Behavioral Therapy for Rural Latinos

    Directory of Open Access Journals (Sweden)

    Eugene Aisenberg

    2012-01-01

    Full Text Available Concerns about the appropriate use of EBP with ethnic minority clients and the ability of community agencies to implement and sustain EBP persist and emphasize the need for community-academic research partnerships that can be used to develop, adapt, and test culturally responsive EBP in community settings. In this paper, we describe the processes of developing a community-academic partnership that implemented and pilot tested an evidence-based telephone cognitive behavioral therapy program. Originally demonstrated to be effective for urban, middle-income, English-speaking primary care patients with major depression, the program was adapted and pilot tested for use with rural, uninsured, low-income, Latino (primarily Spanish-speaking primary care patients with major depressive disorder in a primary care site in a community health center in rural Eastern Washington. The values of community-based participatory research and community-partnered participatory research informed each phase of this randomized clinical trial and the development of a community-academic partnership. Information regarding this partnership may guide future community practice, research, implementation, and workforce development efforts to address mental health disparities by implementing culturally tailored EBP in underserved communities.

  7. 高校物联网建设与安全策略%Building and security strategy of university IoT

    Institute of Scientific and Technical Information of China (English)

    魏滢; 沙锋

    2014-01-01

    讨论物联网的组网过程和核心技术的基础上,着重分析了RFID、传感器、智能终端、校园云等物联网核心技术在高等学校信息化平台的综合应用,并针对校园中物联网所面临的安全隐患,从感知识别层、网络构建层、管理服务层、综合应用层探讨了各层应采用的安全策略。%The IoT technology, a fusion of computer, communication, microelectronics and automation, is one of the research hotspots in present international academia and industry. The comprehensive application of IoT core technologies such as RFID, sensors, smart terminals and school cloud in university informatization platform are analyzed on basis of discussing the IoT networking process and core technologies. The security strategies which should be used in each layer are discussed from the point of perceptual recognition layer, network building layer, service management layer and comprehensive application layer in view of the potential safety problems faced by campus IoT.

  8. 认知无线网络动态频谱感知决策安全协议框架研究%Research on security protocol framework of dynamic spectrum sensing in cognitive radio networks

    Institute of Scientific and Technical Information of China (English)

    高刃; 伍爵博; 唐龙

    2013-01-01

    对认知网络频谱感知安全研究现状进行了分析,提出了一个频谱感知决策安全协议框架.对认知无线网络模型中相关组件、符号进行了定义,并对其结构和安全性进行了详细描述.通过与相关方案比较,结果表明该协议框架能够用来抵御频谱感知所面临的潜在威胁,使之进行正确的频谱决策.%This paper analyzed the state of the art in spectrum sensing security of cognitive radio networks,and presented a security protocol framework of spectrum sensing.It gave the related definitions for cognitive radio network model and analyzed its structure and security.This paper carried out comparisons with other solutions.The results show that the proposed framework can be used to ward off the potential threat on spectnun sensing in order to make correct decision.

  9. Information security fundamentals

    CERN Document Server

    Blackley, John A; Peltier, Justin

    2004-01-01

    Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes

  10. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  11. Fragile States : Securing Development

    OpenAIRE

    Zoellick, R.

    2008-01-01

    Fragile states are the toughest development challenge of our era. But we ignore them at our peril: about one billion people live in fragile states, including a disproportionate number of the world's extreme poor, and they account for most of today's wars. These situations require a different framework of building security, legitimacy, governance, and the economy. Only by securing development - bringing security and development together to smooth the transition from conflict to peace and then ...

  12. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  13. Comparison of Adaptive Information Security Approaches

    OpenAIRE

    Antti Evesti; Eila Ovaska

    2013-01-01

    Dynamically changing environments and threat landscapes require adaptive information security. Adaptive information security makes it possible to change and modify security mechanisms at runtime. Hence, all security decisions are not enforced at design-time. This paper builds a framework to compare security adaptation approaches. The framework contains three viewpoints, that is, adaptation, security, and lifecycle. Furthermore, the paper describes five security adaptation approaches and compa...

  14. Cognitive Sensor Networks

    Science.gov (United States)

    Henderson, Thomas C.

    Our overall goal is to develop a cognitive architecture which will allow autonomous and robust operation of sensor-actuator networks. To achieve this, the perception, concept formation, action cycle will be informed by domain theories of signal analysis, physical phenomena, and behavior. Example scenarios include cognitive vehicles and buildings in which the system understands itself and the activities in and around it by means of distributed video and other sensors. This includes discovery of the cognitive system's own sensing and actuation capabilities.

  15. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  16. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  17. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  18. Alternative security

    International Nuclear Information System (INIS)

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  19. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  20. Social cognition in schizophrenia.

    Science.gov (United States)

    Green, Michael F; Leitman, David I

    2008-07-01

    Social cognition in schizophrenia is a rapidly emerging area of study. Because the number and diversity of studies in this area have increased, efforts have been made to better define terms and provide organizing frameworks. A key challenge confronting the study of social cognition in schizophrenia is building bridges between clinical scientists and social neuroscientists. The articles in this theme summarize data-based studies that have attempted to build or strengthen such bridges to better understand the neural bases of social cognitive impairment in schizophrenia.

  1. 粮食安全背景下基层水利人才队伍建设对策研究%Countermeasures for Building Primary Water Conservancy Talent Team under the Context of Grain Security

    Institute of Scientific and Technical Information of China (English)

    于法稳; 张海鹏; 于贤储

    2014-01-01

    粮食安全是中国的战略问题之一。水利对实现粮食安全起着重要的支撑作用,人才队伍对水利设施管护至关重要。因此,需要从国家粮食安全的战略高度,加强基层水利人才队伍建设。本文基于对黑龙江省、山东省18个县市的调研,分析了基层水利人才队伍的状况,剖析了其中存在的问题、矛盾及原因,并提出了加强基层水利人才队伍建设的对策建议。%Grain security is one of the strategic issues of China. Water conservancy plays an important supporting role for achieving grain security and talent team is essential for management and protection of water conservancy facilities. Therefore, strengthening primary water conservancy personnel building must be paid attention to from a strategic height of national grain security. This paper, based on the field survey of 18 counties of Heilongjiang Province and Shandong Province, analyzes the situation, issues and reasons of primary water conservancy talent team, and puts forwards some countermeasures to strengthen the building of primary water conservancy talent team.

  2. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  3. Security Psychology as Social Systemic Phenomenon

    OpenAIRE

    Yuri P. Zinchenko

    2011-01-01

    Security psychology is considered through social systemic search for reciprocal contiguity and mutual completion of existing advances of psychology and conceptual security understanding. The ability of systemic vision of security and its cognitive and practical specifics are demonstrated. The possibility to investigate safety psychology as social theoretical construct is suggested. Multi-aspect approach to security is substantiated. Methodological challenges of psychological security are disc...

  4. 基于等级保护的政府Web应用安全建设实践%Classified Protection Building-up Practice for Governmental Web Application Security

    Institute of Scientific and Technical Information of China (English)

    陈煜欣

    2012-01-01

    [Abstract] Promoted by many ministries such as Ministry of Public Security in recent years, the classified protection mechanism for national information security is gradually implemented. As important information systems, the portal websites of state departments, major provinces and cities, as well as Web application-based business systems, in principle, belong to the third or fourth security-protection class. Any attack against these systems would significantly affect government reputation, information network and core business. Combined with related policies and regulations on classified protection of information security, this paper, with the third-class Web application security building- up as an example, gives an in-depth analysis on the classified protection mechanism.%近年来,在公安部等部门推动下,国家信息安全等级保护制度正逐步得到落实。作为重要信息系统之一的国家机关和重要省市门户网站以及基于Web应用的业务系统,等级保护的安全级别原则上定为三级或四级,这些系统在受到攻击后将极大地影响政府和公众用户,给政府的政务形象、信息网络和核心业务造成严重的破坏。文中结合信息安全等级保护的相关政策以及制度要求,以三级Web应用安全建设为例进行了探讨分析。

  5. 后危机时代县域经济运行安全系统构建思路与对策%Ideas of Building Security System of County Economic Operation in Post-crisis Ara and the Countermeasures

    Institute of Scientific and Technical Information of China (English)

    胡杰

    2011-01-01

    This article analyzes the meaning and characteristics of the safe operation of county economy from the problems of county economic in crisis, and describes the idea of building security systems of county economic operation from strengthening government regulation, improving macroeconomic regulation and control mechanisms, enhancing executive power, building security system of industry, persisting in implementing brand economic strategy and other aspects.%本文从危机时期县域经济出现的问题着手,分析了县域经济运行安全的涵义和特点,并从强化政府规制、改善宏观调控机制,增强执行力、构建产业安全体系、坚持在对外开放中实施品牌经济战略等方面阐述了县域经济运行安全系统构建的思路.

  6. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  7. Wi-Fi Security

    OpenAIRE

    Vlach, Lukáš

    2011-01-01

    The thesis is focused on the problem of wireless networking and its security. The thesis is divided into two main parts, both parts builds on the bachelor thesis and some of its chapters are further extended and complemented by the issue. The theoretical part deals with the standards of IEEE organization and security policy of Wi-Fi networks with a focus on the distribution of wireless networks and its security. The practical part is focused on the survey of the Wi-Fi safety in selected...

  8. ICT Enhanced Buildings Potentials

    DEFF Research Database (Denmark)

    Christiansson, Per

    2007-01-01

    The paper describes and gives example on how Information and Communication, ICT, can and will enhance and support the building functional systems defined from client and end-user needs and requirements. The building systems may be derived from functional requirements on buildings such as usability...... and security on highest level with sub-systems definitions on lever levels. Building functional sub-systems may be defined for user comfort, indoor-climate, evacuation, space configuration, aesthetics, O&M etc. These building systems are supported by Information and Communication Technology, ICT, and building...... with focus on virtual building models support, new services and user environment definitions and development, virtual spaces and augmented reality, intelligent building components, application ontologies, and ICT systems integration to illustrate ICT enhanced buildings potentials and R&D needs.  ...

  9. Study on Commercial Building Fire Safety and Security Evacuation Design%商业建筑防火与安全疏散设计研究

    Institute of Scientific and Technical Information of China (English)

    毛应

    2014-01-01

    Since the reform and opening up, commercial buil-ding presents the trend of building body is more and more high, the body becomes more and more huge, and the structure be-comes more complex. Such a crowded place, building firepro-ofing and timely evacuation after dangerous has become one of the important issues builders should consider.%改革开放以来,商业建筑呈现楼体越来越高耸、身躯越来越庞大、结构越来越复杂的趋势。如此人员密集的场所,建筑的防火与发生危险后能否及时安全疏散便必然成为需要建设者重要考虑的问题之一。

  10. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  11. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  12. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas;

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper...... is an overview of the research project which attempts to build auctions for real applications using secure multiparty computation. The main contributions of this project are: A generic setup for secure evaluation of integer arithmetic including comparisons; general double auctions expressed by such operations...

  13. In Defense Of Ecological Security

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    China is building Tibet as an ecological buffer to secure climate systems and maintain environmental stability scientific evidence shows the Tibet Plateau, the main body of the Qinghai-Tibet Plateau, is the"starter" and "regulating area" of

  14. Controlling the intelligent building

    Energy Technology Data Exchange (ETDEWEB)

    LeBlanc, R.J.

    1985-08-01

    Companies will be able to locate in intelligent buildings that offer access to a variety of sophisticated communications equipment, at the heart of which are building controls that ensure a comfortable and safe working environment for the occupants. Future buildings will include advanced telephones or workstations with built-in building control sensors for temperature, light level, and security. Advanced telecommunication systems may have telephone cabinets with built-in control functions which eliminate the need for discrete control systems. The owners and tenants will both enjoy benefits if the controls are carefully selected and designed so that they integrate into a single building package.

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Financial security

    NARCIS (Netherlands)

    M. de Goede

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  17. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  18. Energy audit and energy security

    OpenAIRE

    Beata Agnieszka Kulessa

    2013-01-01

    In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency ...

  19. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  20. ENERGY SECURITY – A PART OF THE ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Maria-Floriana POPESCU

    2014-11-01

    Full Text Available Energy is in the centre of the economic development of each country, setting into motion and fuelling factories, government buildings and offices, schools and hospitals, heating homes and keeping perishable foods cold. Its importance explains its complexity. Energy is source of wealth and competition, base for the political controversies and technological investments, and also the core of the epochal challenges of our global environment. Energy is essential for a sustainable development. Security of supplyis a priority for many countries. In this context, there are more ways through it can be achieved: effective management of the demand, diversification of energy sources and the locations of supply, or even using military presence. Energy security can best be defined as the overlap between economic security, national security and the environmental security. This paper will present the economic component of the energy security concept, its purpose being to analyse the concept of energy security in the world.

  1. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  2. Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    Malottki, Christian von

    2012-07-27

    The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.

  3. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  4. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  5. 股票及期货术语中的“仓”隐喻%The "Store" Metaphor and its Cognitive Analysis in the Terms of Securities and Future

    Institute of Scientific and Technical Information of China (English)

    吴恩锋

    2011-01-01

    Based on The Dictionary of Modern Economics and the economic article title corpus composed of 62307 article titles from three main domestic economic newspapers--21 Century Business Herald, China Business, The Economic Observer Newspaper, this paper treated the "store" metaphors in the terms of securities and future with linguistic analysis and cognitive analysis, and tried to give definitions to the terms not concluded in the dictionary.%基于《现代经济词典》和由国内三大经济类报纸《21世纪经济报道》、《中国经营报》、《经济观察报》中62307条文章标题所构成的经济报道标题语料库,文章对股票及期货术语中的“仓”隐喻进行了语义分析和认知分析,并对辞典中未收录的“仓”隐喻术语进行了尝试性的定义。

  6. Asia’s New Security and China

    Institute of Scientific and Technical Information of China (English)

    Xia; Liping

    2014-01-01

    <正>Since the end of the cold war,China puts forward a series of new national security ideas with Chinese characteristics such as the"new security concept"and the goal of"building a harmonious world".In May 2014 at the Fourth Summit of Conference on Interaction and Confidence Building Measures in Asia(CICA Summit)held in Shanghai,Chinese President Xi Jinping explicitly put forward the Asian new security concept featured by"common,

  7. Episodic memories as building blocks of identity processing styles and life domains satisfaction: Examining need satisfaction and need for cognitive closure in memories.

    Science.gov (United States)

    Bouizegarene, Nabil; Philippe, Frederick L

    2016-01-01

    The interconnection between identity and memory is widely accepted, but the processes underlying this association remain unclear. The present study examined how specific experiential components of self-defining memories relate to identity processing styles. We also investigated whether those relationships occurred in a domain-specific manner. Participants (n = 583) completed the Identity Style Inventory-3, which we adapted to measure identity in the school and friend domains, as well as scales assessing their friend and school satisfaction. They then described a memory related to each of these domains and rated the level of need satisfaction and need for cognitive closure characterising each memory. Results from structural equation modeling revealed that need satisfaction in the school-related memory was positively associated with an informational identity style at school and with satisfaction at school, whereas need satisfaction in the friend-related memory was positively associated with an informational identity style in both the school and friend domain, and with satisfaction with friends. In addition, need for cognitive closure in both the friend- and school-related memory was associated with normative friend and school identity processing styles. These findings reveal that specific experiential components of self-defining memories are associated with certain identity processing styles. Furthermore, this relationship appears to be mostly domain-specific.

  8. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  9. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  10. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  11. Grounded cognition.

    Science.gov (United States)

    Barsalou, Lawrence W

    2008-01-01

    Grounded cognition rejects traditional views that cognition is computation on amodal symbols in a modular system, independent of the brain's modal systems for perception, action, and introspection. Instead, grounded cognition proposes that modal simulations, bodily states, and situated action underlie cognition. Accumulating behavioral and neural evidence supporting this view is reviewed from research on perception, memory, knowledge, language, thought, social cognition, and development. Theories of grounded cognition are also reviewed, as are origins of the area and common misperceptions of it. Theoretical, empirical, and methodological issues are raised whose future treatment is likely to affect the growth and impact of grounded cognition.

  12. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  13. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  14. Does Retirement Affect Cognitive Functioning?

    OpenAIRE

    Bonsang, E.D.M.; S. Adam; S Perelman

    2010-01-01

    This paper analyzes the effect of retirement on cognitive functioning using two large scale surveys. On the one hand the HRS, a longitudinal survey among individuals aged 50+ living in the United States, allows us to control for individual heterogeneity and endogeneity of the retirement decision by using the eligibility age for Social Security as an instrument. On the other hand, a comparable international European survey, SHARE, allows us to identify the causal effect of retirement on cognit...

  15. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  16. Security and Architectural Patterns for Securing the Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Golajapu Venu Madhava Rao

    2015-09-01

    Full Text Available Operating a cloud securely and efficiently entails a great deal of advanceplanning. A data center and redundant internet connection is required at the beginning to connect to cloud. This can constitute the technology portion of an information security and some network devices that safely and securely serve the communication. National Institute of Standards and Technology states that the process of uniquely assigning the information resources to an information system will define the security boundary for that system. A massive amount of gear that is racked and cabled following defined patterns is enabled inside this boundary. Need for the infrastructure that is used to manage the cloud and its resources as it operates the cloud. Each component like server, network and storagerequires some degree of configuration. While designing or planning a complex systemit is important to look ahead the process and procedures required for operation of the system. Small cloud systems can be build without much of planning. But any Cloud system substantially bigger size needs significant planning and design. If we fail to plan it leads to higher cost due to inefficiency in design and process. In this paper we study on the architectural components that can be used to build a cloud with security as a priority. This can be achieved by identifying requirements for secured cloud architecture along with key patterns and architectural elements. This paper first discusses on security patterns and an architectural element required and also focuses on several different cloud architectures and secure cloud operation strategies.

  17. Extending Eurasia Security Cooperation

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    After 14 years of development, the Shanghai Cooperation Organization (SCO) , has set its sights on goals for the next de-cade at the 15th meeting of the Council of SCO Heads of State that was held in Ufa, the capital of Russia's Bashkortostan Republic, on July 9-10. The SCO, established in Shanghai in 2001, is committed to building fdendly neighbor rela- tions and maintaining security and stability in the Central Asian region through multilateral cooperation.

  18. Cognitive Changes

    Science.gov (United States)

    ... for Cognitive Problems? Page reviewed by Dr. Joash Lazarus, NPF Movement Disorders Fellow, Department of Neurology at ... What Are the Alternative Treatments for Cognitive Problems? Anxiety Hallucinations/Delusions Speech and Swallowing Problems Vision Changes ...

  19. Cognitive ecology.

    Science.gov (United States)

    Hutchins, Edwin

    2010-10-01

    Cognitive ecology is the study of cognitive phenomena in context. In particular, it points to the web of mutual dependence among the elements of a cognitive ecosystem. At least three fields were taking a deeply ecological approach to cognition 30 years ago: Gibson's ecological psychology, Bateson's ecology of mind, and Soviet cultural-historical activity theory. The ideas developed in those projects have now found a place in modern views of embodied, situated, distributed cognition. As cognitive theory continues to shift from units of analysis defined by inherent properties of the elements to units defined in terms of dynamic patterns of correlation across elements, the study of cognitive ecosystems will become an increasingly important part of cognitive science.

  20. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  1. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  3. Actively Promote Food Security Innovation to Build a Hospital Catering Services%积极推进伙食保障创新构建医院特色饮食服务

    Institute of Scientific and Technical Information of China (English)

    陈珵

    2015-01-01

    近年来,医院后勤保障坚持把“吃出营养、吃出健康、吃出战斗力”作为根本去想,努力构建适应保障需求的“高效”饮食机制,全面总结出一套科学办伙食的方法措施,伙食管理明显增强,伙食质量有效提升,为增强部队凝聚力、提高战斗力,促进部队全面建设发挥了重要作用。%in recent years, the hospital logistics guarantee adhere to "eat nutrition, eat healthy, eat a fighting force" as the fundamental to, and strive to build a meet the security needs of the "efficient" diet mechanisms, summarizes a set of office of the methods and measures of food science, food management markedly strong, food quality effectively enhance, to en-hance cohesion force and improving the battle effectiveness, promote the all round construction of the armed forces play an important role.

  4. Cognitive Engineering

    OpenAIRE

    Wilson, Kyle M.; Helton, William S; Wiggins, Mark W.

    2013-01-01

    Cognitive engineering is the application of cognitive psychology and related disciplines to the design and operation of human–machine systems. Cognitive engineering combines both detailed and close study of the human worker in the actual work context and the study of the worker in more controlled environments. Cognitive engineering combines multiple methods and perspectives to achieve the goal of improved system performance. Given the origins of experimental psychology itself in issues regard...

  5. Spectrum Sharing Security and Attacks in CRNs: a Review

    Directory of Open Access Journals (Sweden)

    Wajdi Alhakami

    2014-01-01

    Full Text Available Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

  6. 17 CFR 229.701 - (Item 701) Recent sales of unregistered securities; use of proceeds from registered securities.

    Science.gov (United States)

    2010-04-01

    ... SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND CONSERVATION ACT OF 1975.... Include sales of reacquired securities, as well as new issues, securities issued in exchange for property... net offering proceeds to the issuer used for construction of plant, building and facilities;...

  7. Security Solutions Lecture Presented by NSA Technical Director Neal Ziring

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    Neal Ziring, Technical Director in the Information Assurance Directorate at the National Security Agency (NSA), provided a lecture titled “Building Robust Security Solutions Using Layering and Independence,” Jan. 17.

  8. SMS Security in Mobile Devices: A Survey

    Directory of Open Access Journals (Sweden)

    Muhammad Waseem Khan

    2013-09-01

    Full Text Available The Short Message Service (SMS is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasnít achieved secure transmission of plaintext between different mobile phone devices. SMS doesnít have its own build-in mechanism to secure the transmitted data because security isnít considered as a priority application for mobile devices. Many SMS security schemes have been proposed by the researchers. This survey presents the existing schemes used to secure SMS message communication. State of the art SMS security solutions for mobile devices is presented from the period 2006-2013. Literature research of those security schemes is conducted and presented in this survey. The effect of each security scheme on mobile deviceís performance is also observed. Finally, a general summary of all security schemes with their limitations is presented.

  9. Building the quantum network

    International Nuclear Information System (INIS)

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  10. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  11. INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES: a cognitive-discoursive analysis of systematic metaphor emersion in opinion article genre

    Directory of Open Access Journals (Sweden)

    Ana Cristina Pelosi

    2016-03-01

    Full Text Available The article presents partial results of a research which is aimed at verifying how figurative language, specifically metaphoric and metonymic language, present in different textual genres such as the literary and the journalistic genres, contributes to the emergence and negotiation of meaning. The theoretic and methodological basis of the research comes from Conceptual Metaphor Theory, originally proposed by Lakoff and Johnson (1980 and expanded in the 90’s by theoreticians such as Grady (1997, and from Metaphor-Led Discourse Analysis (CAMERON ET AL, 2009; CAMERON; MASLEN, 2010. Research implementation involves two stages. An analysis of four exemplars of the genres under investigation according to Metaphor-Led Discourse Analysis and a second analysis, still to be carried out, of the talk of three focus groups composed by students of a state school in Santa Maria, RS, after the reading of the different genres. The preliminary analysis presented of the opinion article selected for this study reveals the presence of image-kinesthetic schemas and metaphoric/metonymic vehicles which structure the language present in the analyzed genre and contribute to the emergence of the systematic metaphor INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES.

  12. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  13. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... certificates in the attempt of framing innocents. Finally, we construct a secure two-party computation protocol for any functionality f that satisfies our definition, and our protocol is almost as efficient as the one of Aumann and Lindell. We believe that the fear of a public humiliation or even legal...

  14. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  15. Effects of Shanghai Citizens' Cognition of Leisure Sports Exercise on Building up a City of Health%上海市民休闲体育锻炼认知对构建健康城市的影响

    Institute of Scientific and Technical Information of China (English)

    顾红; 陈爱菊

    2012-01-01

    Based on the analysis of the relevant researches at home and abroad and by the methods of literature study,questionnaire and statistics,the article focuses on the different-background Shanghai citizens' attitude toward leisure sports exercise and the difference of experience.A further study has also been made on the cognition of building up a city of health with leisure sports exercise as well as the attitude toward exercise and exercise experience.%在分析国内、外相关研究的基础上,通过文献资料、问卷调查和数理统计等研究方法,对不同背景特征的上海市居民在休闲体育锻炼的态度和体验差异进行分析。在此基础上,进一步就以休闲体育锻炼建构健康城市为基础的认同感及运动态度和运动体验的相关性进行了研究。

  16. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  17. Individuality in nest building: do southern masked weaver (Ploceus velatus) males vary in their nest-building behaviour?

    Science.gov (United States)

    Walsh, Patrick T; Hansell, Mike; Borello, Wendy D; Healy, Susan D

    2011-09-01

    We currently have little understanding of how birds know what nest to build and what little we do know has been gained largely from investigations of the completed structures (morphology of finished nests) or of material selection. Here we looked at the behaviours performed by male Southern Masked weaverbirds when building their nests. During the two earliest phases of construction individual males varied in the direction in which they carried and inserted grass into their developing nest, the speed at which they completed phases of nest construction and in the frequency with which they dropped grass during weaving. Behaviours performed during the initial attachment phase, when grass is being secured to a bare branch, were not repeatable within males, whereas during the subsequent "ring" phase behaviours tended to be repeatable. Some males were biased as to which side of the nest they inserted grass blades and strongly lateralized individuals completed phases of nest-building more quickly. The lack of repeatability of most nest-building behaviours and the changes in those behaviours as males build more nests seems most readily explained by increasing dexterity. Further work is required to confirm any role for cognition in these experience-dependent changes. PMID:21736928

  18. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  19. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  20. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  1. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  2. 构建重要靶点人群社会医疗保险经济保障程度的评价方法%Building Evaluation Methodology of Economic Security Degree of Social Medical Insurance for Target Group

    Institute of Scientific and Technical Information of China (English)

    付文琦; 李宝玉; 张清华; 刘国祥

    2014-01-01

    Objective: Taking the households with catastrophic health expenditure as target group, building the methodology of economic security degree of social medical insurance, so as to reveal the implement effect of social medical insurance. Methods:Applying the method of catastrophic health expenditure and constructing model and index from four aspects to analyze the economic security degree of social medical insurance for catastrophic health expenditure households. Results: A series of indicators for different parts of the households, including households eliminating catastrophe after reimbursement, households remaining in catastrophe after reimbursement and households trapped into catastrophe before reimbursement has been established. In addition, the intensity indicator of the integrated impact on health insurance for the households has been constructed. Conclusion:The chonstructed indicators can be used to compare the effects of the same kind of health insurance at different times, different kinds of health insurance at the same time and different kinds of health insurance at different time.%目的:以灾难性卫生支出家庭作为重要靶点人群,构建社会医疗保险对这部分家庭经济保障程度的评价方法,以期从一个侧面揭示社会医疗保险的实施效果。方法:采用灾难性卫生支出测算方法,通过模型和指标的构建,从四大方面研究社会医疗保险对灾难性卫生支出家庭的经济保护程度。结果:构建了针对保险报销后免于发生灾难性卫生支出的家庭、仍然发生灾难性卫生支出的家庭以及全部灾难性卫生支出家庭的保险经济保障程度系数,并构建了保险对家庭灾难性卫生支出的作用系数。结论:构建的评价指标可以用于同一保险在不同时期、不同保险在同一时期以及不同保险在不同时期的作用效果的比较分析。

  3. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  4. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  6. Network Security

    CERN Document Server

    Huang, Scott; Du, Ding-Zhu

    2010-01-01

    This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose res

  7. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  8. 中国互联网+社会保障信息系统构建--基于大数据挖掘视角%Building of an Internet+Social Security Informatization System in China-From Perspective of Big Data Minning

    Institute of Scientific and Technical Information of China (English)

    郜凯英; 杨宜勇

    2016-01-01

    Every sector experiences changes caused by the huge data resources in the Age of Big Data,and the social security sector is no exception.In recent years,China’s social security system expands constantly,contributors increase rapidly,and more and more people are concerned about the management ability and service level of the relevant institutions.Using big data related technology to accelerate internet+social security informatization system building is of great significance for improving the efficiency of social security management,service quality and reduction of social costs. Based on the construction of a three -level index system for social security informatization building,AHP method is adopted in this paper to analyze the current situation and existing problems of social security informatization building in China,and suggestions on using mass data,cloud computing and other techniques for building the internet+social security informatization system are put forward.%大数据时代的到来促使各个领域都开始因庞大的数据资源而发生变革,社会保障领域也不例外。近些年中国社会保障制度不断扩面,参保人数激增,使得越来越多的人开始关注相关机构的管理能力及服务水平。如何利用大数据相关技术推进互联网+社会保障信息系统建设对于提升社保管理效率、服务质量和节约社会成本都是十分有意义的。本文在构建社会保障信息化建设三级指标体系的基础上采用AHP分析法分析了目前中国社会保障信息化建设现状与存在的问题,进而提出在社会保障制度广覆盖的今天应如何利用海量数据和云计算等技术构建中国互联网+社会保障信息系统。

  9. Cognitive Assessment System (CAS): Psychometric studies with Portuguese children.

    OpenAIRE

    Rosário, A.; Candeias, A.A.; Roazzi, A.

    2013-01-01

    The Cognitive Assessment System (CAS) is a new measure of cognitive abilities based on the Planning, Attention, Simultaneous and Successive (PASS) Theory. This theory is derived from research in neuropsychological and cognitive Psychology with particular emphasis on the work of Luria (1973). According to Naglieri (1999) and Naglieri and Das (1997), the PASS cognitive processes are the basic building blocks of human intellectual functioning. Planning processes provide cognitive control, utiliz...

  10. Can Cognitive Explanations Be Eliminated?

    Science.gov (United States)

    Hakkarainen, Kai

    The purpose of article is to analyze the arguments of Bruno Latour and Steve Woolgar aimed at eliminating `superfluous' cognitive explanations from discussion of scientific activity. They proposed to a ten-year moratorium on cognitive explanations of scientific activity and promised to reassess explanation in terms of cognition after this period of time if some aspects of scientific inquiry would not be accounted by sociological explanations. Intensive laboratory studies of scientific practice indicated that scientific thinking is not based on mental processes alone but relies on external tools and instruments. On the basis of these kinds of observations, they rejected all cognitive explanations of scientific inquiry. By building on sociocultural theories of cognition, the present study makes the case that the use of conceptual tools significantly transforms cognitive processes. It is concluded that the failure to appreciate cognitive explanations reflects a far toon arrow and non-social concept of cognition: Even after the ten-year moratorium there appears to be many good reasons to reassess the proposal of eliminating cognitive explanations altogether.

  11. Carrying Out Overseas Energy Cooperation, and Building China's Oil Supply Security System%开展海外能源合作,确保中国石油供应

    Institute of Scientific and Technical Information of China (English)

    钱学文; 李焕民

    2009-01-01

    China's rapid growth in oil demand has become a world-wide consensus. Due to the lack of domestic resources, the best choice for China is active in overseas energy cooperation to ensure oil supply. Considering a variety of factors, the Middle East oil-producing countries should be the primary choice for China's cooperation in the region. Energy cooperation abroad with a number of major oil-producing countries or the oil-exporting countries is necessary to attach importance to raising the safety factor of energy transport. With a positive and friendly attitude, China should cooperate with neighboring countries to build Asia's oil supply security system.%中国的石油需求增长迅速已成为世界性共识.在国内资源条件不理想的情况下,中国的最佳选择是,积极开展海外能源合作,以确保石油供应.各种因素表明,中东产油国应是中国的首选合作方.在开展海外能源合作,与一些主要的石油生产国或石油输出国互动时,既要重视提高海外能源运输的安全系数,也应以积极、友善的姿态,与周边邻国合作,构建亚洲石油供应保障体系.

  12. Cognitive reasoning a formal approach

    CERN Document Server

    Anshakov, Oleg M

    2010-01-01

    Dealing with uncertainty, moving from ignorance to knowledge, is the focus of cognitive processes. Understanding these processes and modelling, designing, and building artificial cognitive systems have long been challenging research problems. This book describes the theory and methodology of a new, scientifically well-founded general approach, and its realization in the form of intelligent systems applicable in disciplines ranging from social sciences, such as cognitive science and sociology, through natural sciences, such as life sciences and chemistry, to applied sciences, such as medicine,

  13. Space Telecommunications Radio System STRS Cognitive Radio

    Science.gov (United States)

    Briones, Janette C.; Handler, Louis M.

    2013-01-01

    Radios today are evolving from awareness toward cognition. A software defined radio (SDR) provides the most capability for integrating autonomic decision making ability and allows the incremental evolution toward a cognitive radio. This cognitive radio technology will impact NASA space communications in areas such as spectrum utilization, interoperability, network operations, and radio resource management over a wide range of operating conditions. NASAs cognitive radio will build upon the infrastructure being developed by Space Telecommunication Radio System (STRS) SDR technology. This paper explores the feasibility of inserting cognitive capabilities in the NASA STRS architecture and the interfaces between the cognitive engine and the STRS radio. The STRS architecture defines methods that can inform the cognitive engine about the radio environment so that the cognitive engine can learn autonomously from experience, and take appropriate actions to adapt the radio operating characteristics and optimize performance.

  14. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...... World War I it is not surprising that a salient feature of the defence debate is aversion against armed conflict. The Wilsonian agenda of a new system of collective security featuring prominently in the peace talks as well as in European debate generally does indeed have ramifications in Danish...... be implemented, the sooner the better. In order to accelerate peaceful development, and because their armed forces were seen rather as harmful than conducive to security, pacifist politicians believed that small states should set an example and disarm to a level just adequate for monitoring the borders so...

  15. Security of earthquake disaster reduction system

    Institute of Scientific and Technical Information of China (English)

    JIN Bo; TAO Xia-xin; WEN Rui-zhi; DAI Zhi-yong

    2005-01-01

    No matter whether a system is operated manually or automatically controlled by computer, the system' s vulnerability always exists. Earthquake Disaster Reduction System (EDRS) belongs to the category of information system. According to the features of security for EDRS, the steps and the methods on how to build the EDRS security were analyzed. The EDRS security features, security strategies and security measures were also given through a distributed EDRS skeleton that has been applied. Because there was still no appointed and authoritative agency or organization to certify and test EDRS security in China, a national information technology security certification center was introduced and suggested for the certification of the EDRS security. Finally,several discussions and tendencies for the EDRS development were presented.

  16. Privatising Security

    OpenAIRE

    Irina Mindova-Docheva

    2016-01-01

    The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research shou...

  17. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  18. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  19. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  20. Cognitive Economics

    OpenAIRE

    Kimball, Miles S.

    2015-01-01

    Cognitive Economics is the economics of what is in people’s minds. It is a vibrant area of research (much of it within Behavioral Economics, Labor Economics and the Economics of Education) that brings into play novel types of data—especially novel types of survey data. Such data highlight the importance of heterogeneity across individuals and highlight thorny issues for Welfare Economics. A key theme of Cognitive Economics is finite cognition (often misleadingly called “bounded rationality”),...

  1. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This book consists of essays covering issues in visual cognition presenting experimental techniques from cognitive psychology, methods of modeling cognitive processes on computers from artificial intelligence, and methods of studying brain organization from neuropsychology. Topics considered include: parts of recognition; visual routines; upward direction; mental rotation, and discrimination of left and right turns in maps; individual differences in mental imagery, computational analysis and the neurological basis of mental imagery: componental analysis.

  2. Cognitive remission

    DEFF Research Database (Denmark)

    Bortolato, Beatrice; Miskowiak, Kamilla W; Köhler, Cristiano A;

    2016-01-01

    BACKGROUND: Cognitive dysfunction in major depressive disorder (MDD) encompasses several domains, including but not limited to executive function, verbal memory, and attention. Furthermore, cognitive dysfunction is a frequent residual manifestation in depression and may persist during the remitted...... antidepressant, has significant precognitive effects in MDD unrelated to mood improvement. Lisdexamfetamine dimesylate was shown to alleviate executive dysfunction in an RCT of adults after full or partial remission of MDD. Preliminary evidence also indicates that erythropoietin may alleviate cognitive...

  3. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  4. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  5. Strengthening Global Approaches to Nuclear Security

    OpenAIRE

    Bunn, Matthew G.

    2013-01-01

    Despite substantial progress in improving nuclear security in recent years, there is more to be done. The threats of nuclear theft and terrorism remain very real. This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exch...

  6. Sound Security,Safe Beijing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ With the approach of the long a waited event,Chinese authorities have geared up to intensify security preparations.In line with the"people-oriented"and"athletes-centered"ideas,Beijing will spare no efforts to provide quality services and to build a safe and cornfort able environment that will satisfy all the Games' participants.

  7. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  8. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  9. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  10. Strengthening nuclear security

    International Nuclear Information System (INIS)

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  11. Explaining cognitive behaviour : a neurocomputational perspective

    OpenAIRE

    Rossi, Francesca Micol

    2014-01-01

    While the search for models and explanations of cognitive phenomena is a growing area of research, there is no consensus on what counts as a good explanation in cognitive science. This Ph.D. thesis offers a philosophical exploration of the different frameworks adopted to explain cognitive behaviour. It then builds on this systematic exploration to offer a new understanding of the explanatory standards employed in the construction and justification of models and modelling fra...

  12. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This collection of research papers on visual cognition first appeared as a special issue of Cognition: International Journal of Cognitive Science. The study of visual cognition has seen enormous progress in the past decade, bringing important advances in our understanding of shape perception, visual imagery, and mental maps. Many of these discoveries are the result of converging investigations in different areas, such as cognitive and perceptual psychology, artificial intelligence, and neuropsychology. This volume is intended to highlight a sample of work at the cutting edge of this research area for the benefit of students and researchers in a variety of disciplines. The tutorial introduction that begins the volume is designed to help the nonspecialist reader bridge the gap between the contemporary research reported here and earlier textbook introductions or literature reviews.

  13. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  14. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  15. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  16. Cognitive Performance and Cognitive Style.

    Science.gov (United States)

    International Journal of Behavioral Development, 1985

    1985-01-01

    Investigates (1) the relationships between cognitive performance and cognitive styles and predictive possibilities and (2) performance differences by sex, school, grade, and income in 92 Indian adolescents. Assessment measures included Liquid Conservation, Islands, Goat-Lion, Hanoi-Tower, Rabbits (Piagetian); Block Design (WISC-R); Paper Cutting…

  17. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  20. Energy security

    International Nuclear Information System (INIS)

    In the case of Cuba, energy security goes beyond the typical security framework of energy supply to encompass the economic blockade which affects Cuba's access to some markets for its traditional products and obstructs international credit options. Recent problems concerning security of national energy supply include: - Shortages of foreign exchange necessary for the purchase of fuel and spare parts, for new investments and for the implementation of programmes supporting the rational use of energy. - High dependence on imported energy, including oil and petroleum products. -Use of domestic crude oil, with energy performance slightly below that of the imported fuels it replaces, especially fuel oil. The main negative aspect is the high sulphur content, which has adverse operational and environmental effects. - Interruptions in energy services resulting from hurricanes and tropical storms, and from breakdowns and accidents related to the transport of fuels, especially coastal transport. The strategies employed to improve Cuba's energy security situation are based on: - Increased economic competitiveness; - Fuel conservation and rational use of energy; - Efficient exploration and use of oil and natural gas; - Development of renewable energy sources; - Legal and institutional support of activities in the energy sector; - Active involvement in the international arena focused on regional integration efforts and international forums related to technological, energy and environmental issues, and on strengthening bilateral alliances aimed at creating the necessary environment for trade, technological transfer and foreign investment for guaranteeing national energy supply

  1. COGNITION AND INTELLIGENT ENTREPRENEURSHIP

    Directory of Open Access Journals (Sweden)

    Meo Colombo Carlotta

    2012-07-01

    Full Text Available The aim of the paper is to study how it’s possible to enhance the cognitive enterprise model by the theory of autopoietic systems. I propose a model that considers the organization as a closed system in which all cognitive activity is necessary to develop coherent operations needed to adapt the firm to environmental perturbations. The central issue of the work consists in the presentation and description of the “chain thinking-action” as a cognitive basis that builds models from which derive the actions that characterize the transformation of a business enterprise in order to maintain the viability over time. A \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"winning\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" entrepreneurial thinking is able to give a direction (objectives-strategy always aimed at improving the organization’s vital parameters. The role of entrepreneurship and management, therefore, is to create the conditions to encourage a continuous development of cognitive models in organizations, in order to maintain the conditions of survival and to lead the company in a situation of evolution and improvement.

  2. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  3. Security Systems Consideration: A Total Security Approach

    Science.gov (United States)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  4. 云计算关键技术之云安全问题认知研究%Research on the cognition of cloud security issues-one of the key technology of cloud computing

    Institute of Scientific and Technical Information of China (English)

    龚强

    2014-01-01

    云计算面临的最大挑战是安全问题。云计算应用的无边界性、流动性等特点,较之传统的IT模式有很大差异。在云计算环境下,服务方式发生变化,安全的责任主体也发生了根本改变。作为云计算服务提供商,需要建立安全的云计算平台,为云安全服务提供保障;同时,服务一定是开放的、安全的,要保护云用户敏感信息的安全。整合桌面安全管理技术是行之有效的。云安全应用研究主要是从云计算平台系统安全和网络安全设备、安全基础设施的“云化”突破。%The security issue is the biggest challenge for cloud computing .There is a great difference between the characteristics of cloud computing applications including unboundedness and liquidity etc . and the traditional IT model .In the cloud computing environment , service method has changed ,the main responsibility for safety has also undergone a fundamental change .As cloud computing service providers , they need to establish safe cloud computing platform and provide guarantee for cloud security service ;meanwhile , the service must be open and safe to protect the security of cloud users ’ sensitive information.Integrating desktop security management technology is effective .This paper can make breakthrough from the system security of cloud computing platform and the “cloud” of network security equipment and security infrastructure .

  5. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  6. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  7. Cognitive Neuropsychology

    DEFF Research Database (Denmark)

    Starrfelt, Randi

    2012-01-01

    are disproportionally impaired in one task or domain compared to another. In many cases data for normal performance has not been referred to or reported. This has resulted in several theories of cognitive functioning in different domains such as language, visual perception, and memory, specifying a number of different...... in patients’ test performance can inform theories of (normal) cognitive function. In four talks, this symposium will present and discuss methods for investigating impairment patterns in neuropsychological patients: 1) a talk on basic assumptions and statistical methods in single case methodology; 2) a talk......Traditionally, studies in cognitive neuropsychology have reported single cases or small groups of patients with seemingly selective impairments of specific cognitive processes or modules. Many studies, particularly older ones, have used simple and coarse tasks to show that patients...

  8. Cognitive Systems

    OpenAIRE

    Larsen, Jan

    2008-01-01

    The tutorial will discuss the definition of cognitive systems as the possibilities to extend the current systems engineering paradigm in order to perceive, learn, reason and interact robustly in open-ended changing environments. I will also address cognitive systems in a historical perspective and its relation and potential over current artificial intelligence architectures. Machine learning models that learn from data and previous knowledge will play an increasingly important role in all lev...

  9. Water Resources Security and Its Countermeasure Suggestions in Building Silk Road Economic Belt%丝绸之路经济带建设中的水资源安全问题及对策

    Institute of Scientific and Technical Information of China (English)

    郭利丹; 周海炜; 夏自强; 黄峰; 鄢波

    2015-01-01

    The strategy of Silk Road Economic Belt brings about both opportunities of social-economic development and regional cooperation for countries along this belt, and many potential constraints and challenges. Water resources safety is one of strategic and prospective issues in promoting the economic belt construction, which should be paid high attention to. In this study, some key regions involved in the economic belt, including Northwest China, Central Asia and West Asia, were selected as the cases. And in-depth analyses of water resources security problems, including water distribution, water demand and environmental conditions, and transboundary water disputes and cooperation practices of these tranboundary basins had been conducted. To solve these water problems in the construction process of economic belt, and on the basis of experiences and lessons learned from transboundary river management in Central Asia and West Asia regions, countermeasure suggestions have been proposed from the perspective of strategic layout for Chinese government and policy-making sectors. The territorial scope linked to the Silk Road Economic Belt extends far beyond the scope of a specific tranboundary river basin, and so countries along the belt are facing with more complex and multiple constraints of water security problem. China should develop a strategic framework of water resources to coordinate development with neighboring countries in Central Asia, which should be followed with a propose to build water cooperation corridor in the economic belt along the Silk Road, in order to improve transboundary water cooperation mechanism to strengthen regional cooperation in water resources. Besides, the support system of the water resources security should be improved by focusing on strengthening critical technology research and information monitoring of regional co-development of water resources and protection.%“丝绸之路经济带”的战略构想既为沿线国家带来了经济社

  10. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  11. Blue Water and the Consequences of Alternative Food Security Policies in the Middle East and North Africa for Water Security

    OpenAIRE

    Larson, Donald F.

    2013-01-01

    In the Middle East and North Africa, food security and water security are tightly entwined. In particular, choices about the extent to which food security policies rely on trade rather than domestically produced staples have stark consequences for the region's limited water resources. This paper builds on previous modeling results comparing the cost and benefits of policies to protect cons...

  12. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  13. The Relationship among Public Cognition,Perceived Value and Satisfaction of Disastrous Weather Service---A Case Study of 3 029 Questionnaires on Public Cognition of Meteorological Security in Shenzhen%公众认知、感知价值与灾害气象服务满意度的关系研究--以深圳市3029份《公众气象安全认知度调查问卷》数据为例

    Institute of Scientific and Technical Information of China (English)

    吴先华; 邹邁; 郭际; 朱薇薇

    2015-01-01

    Although studies on the evaluation of public satisfaction index are abundant,only a few have fo-cused on the relationship between public cognition and service satisfaction.An innovative concept on public meteor-ological cognition is proposed.Based on survey data from 3 029 Questionnaires on Public Cognition of Meteorologi-cal Security in Shenzhen,the relationship among public cognition,perceived value,and meteorological service sat-isfaction is evaluated by using a structural equation model (SEM).Research results demonstrated that:(1 )Public cognition can significantly affect the service satisfaction.(2 )Shenzhen residents are generally satisfied with the meteorological service,particularly during typhoon season.However,the residents are considerably dissatisfied with the availability of information on meteorological warnings.(3 )Both public meteorological cognition and per-ceived value of disaster meteorological services significantly affect public satisfaction.(4)The public meteorologi-cal cognition can be improved by increasing the perceived value of meteorological services,which enhances public satisfaction.Corresponding policy suggestions are provided with regard to these conclusions.%目前从公众认知水平的角度出发,评价灾害气象服务满意度的文献较少。该文创新性地提出了公众气象认知这一概念,以深圳市3029份公众气象安全认知度调查数据为例,采用结构方程模型,评估了公众认知、感知价值与灾害气象服务满意度之间的关系。研究发现,公众认知水平对灾害气象服务满意度的评价具有重要的影响。另外还发现:①深圳市公众对于气象服务总体评价良好,对台风期间的气象服务的满意度最高,而对气象预警信息获得的便捷性的满意度最低;②公众气象认知与灾害气象服务感知价值均显著影响公众对于灾害气象服务的满意度;③提高公众气象认知,可通过促进对气象

  14. Nuclear security

    International Nuclear Information System (INIS)

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  15. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  16. Energy Supply Security of Turkey and Measuring: an Application on Turkey’s Energy Supply Security

    OpenAIRE

    Hasan Sencer PEKER

    2015-01-01

    In this study, in which building an energy supply security index model in order to measure the energy supply security of Turkey, first, the four sub-indexes that compose overall index and their weighting coefficients were designated. These sub-indexes are availability index, reliability index, economic index and environmental index. According to index results, Turkey has to direct its necessary investments to fields that secure the energy import, regulate the electricity power market and rene...

  17. Password Security

    OpenAIRE

    Danuvasin Charoen

    2014-01-01

    This study investigates users’ behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among executive MBA students who hold managerial positions. The results of the survey indicate that users practice insecure behaviors in the utilization of passwords. The results support the li...

  18. Watermarking security

    OpenAIRE

    Furon, Teddy

    2016-01-01

    International audience This chapter deals with applications where watermarking is a security primitive included in a larger system protecting the value of multimedia content. In this context, there might exist dishonest users, in the sequel so-called attackers, willing to read/overwrite hidden messages or simply to remove the watermark signal.The goal of this section is to play the role of the attacker. We analyze means to deduce information about the watermarking technique that will later...

  19. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. Offloading Cognition onto Cognitive Technology

    CERN Document Server

    Dror, Itiel

    2008-01-01

    "Cognizing" (i.e., thinking, understanding, knowing, and having the capacity to do what cognizers can do) is a mental state. Systems without mental states, such as cognitive technology, can sometimes also do some of what cognizers can do, but that does not make them cognizers. Cognitive technology allows cognizers to offload some of the functions they would otherwise have had to execute with their own brains and bodies alone; it also extends cognizers' performance powers beyond those of brains and bodies alone. Language itself is a form of cognitive technology that allows cognizers to offload some of their brain functions onto the brains of other cognizers. Language also extends cognizers' individual and joint performance powers, distributing the load through interactive and collaborative cognition. Reading, writing, print, telecommunications and computing further extend cognizers' capacities. And now the web, with its distributed network of cognizers, digital databases and sofware agents, has become the Cogn...

  1. Reactor building

    International Nuclear Information System (INIS)

    The whole reactor building is accommodated in a shaft and is sealed level with the earth's surface by a building ceiling, which provides protection against penetration due to external effects. The building ceiling is supported on walls of the reactor building, which line the shaft and transfer the vertical components of forces to the foundations. The thickness of the walls is designed to withstand horizontal pressure waves in the floor. The building ceiling has an opening above the reactor, which must be closed by cover plates. Operating equipment for the reactor can be situated above the building ceiling. (orig./HP)

  2. Does Retirement Affect Cognitive Functioning?

    OpenAIRE

    Bonsang, Eric; Adam, Stéphane; Perelman, Sergio

    2010-01-01

    This paper analyzes the effect of retirement on cognitive functioning using two large scale surveys. On the one hand the HRS, a longitudinal survey among individuals aged 50+ living in the United States, allows us to control for individual heterogeneity and endogeneity of the retirement decision by using the eligibility age for Social Security as an instrument. On the other hand, a comparable international European survey, SHARE, allows us to identify the causal effect of retir...

  3. Security studies

    International Nuclear Information System (INIS)

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  4. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings. PMID:24781874

  5. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    Directory of Open Access Journals (Sweden)

    Muhammad Qaiser Saleem

    2011-01-01

    Full Text Available Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is quite difficult for developers because they are not security experts. Furthermore SOA security is cross-domain and all required information are not available at downstream phases. Furthermore, business process expert; who is the actual stakeholder of the business process model is unable to specify security objectives due to lake of security modelling elements in a general purpose modelling languages like UML. As a result, business process expert either ignore the security intents in their model or indicate them in textual way. A security intents DSL is presented as a UML profile where security intents can be modelled as stereotypes on UML modelling elements during the business process modelling. Aim is to facilitate the business process expert in modelling the security requirements along the business process modelling. This security annotated business process model will facilitate the architectural team in specifying the concrete security implementation. As a proof of work we apply our approach to a typical on-line flight booking system business process.

  6. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  7. Human cognition

    International Nuclear Information System (INIS)

    The study of human cognition encompasses the study of all mental phenomena, from the receipt and interpretation of sensory information to the final control of the motor system in the performance of action. The cognitive scientist examines all intermediary processes, including thought, decision making, and memory and including the effects of motivation, states of arousal and stress, the study of language, and the effects of social factors. The field therefore ranges over an enormous territory, covering all that is known or that should be known about human behavior. It is not possible to summarize the current state of knowledge about cognition with any great confidence that we know the correct answer about any aspect of the work. Nontheless, models provide good characterizations of certain aspects of the data and situations. Even if these models should prove to be incorrect, they do provide good approximate descriptions of people's behavior in some situations, and these approximations will still apply even when the underlying theories have changed. A quick description is provided of models within a number of areas of human cognition and skill and some general theoretical frameworks with which to view human cognition. The frameworks are qualitative descriptions that provide a way to view the development of more detailed, quantitative models and, most important, a way of thinking about human performance and skill

  8. Methodology for security development of an electronic prescription system.

    OpenAIRE

    Niinimäki, J.; M.; Savolainen; Forsström, J. J.

    1998-01-01

    Data security is an essential requirement in all health care applications. Developers of medical information systems should utilize the existing security development and evaluation methods to foresee as many of the technical and human factors that may endanger data security as possible and apply appropriate precautions. Modern smart card technology facilitates the building of robust security framework for interorganizational shared care systems. In this article, we describe the way we utilize...

  9. Multidimensional Household Food Security Measurement in Rural Zambia

    OpenAIRE

    Wineman, Ayala

    2014-01-01

    Food security is recognized as a multifaceted condition of complex causality that is related to, yet distinct from, poverty and hunger. Given its broad definition, it is no surprise that food security eludes precise measurement. This study considers there to be three components of household food security (quantity, quality, and stability), and attempts to address the "concept-to-measurement" gap in food security by building an index that spans these three dimensions. A panel data set is used ...

  10. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  11. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  12. Towards cognitive cities advances in cognitive computing and its application to the governance of large urban systems

    CERN Document Server

    Finger, Matthias

    2016-01-01

    This book introduces the readers to the new concept of cognitive cities. It demonstrates why cities need to become cognitive and why therefore a concept of cognitive city is needed. It highlights the main building blocks of cognitive cities and illustrates the concept by various cases. Following a concise introductory chapter the book features nine chapters illustrating various aspects and dimensions of cognitive cities. The logic of its structure proceeds from more general considerations to more specific illustrations. All chapters offer a comprehensive view of the different research endeavours about cognitive cities and will help pave the way for this new and innovative approach to governing cities in the future. .

  13. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  14. Cognitive linguistics.

    Science.gov (United States)

    Evans, Vyvyan

    2012-03-01

    Cognitive linguistics is one of the fastest growing and influential perspectives on the nature of language, the mind, and their relationship with sociophysical (embodied) experience. It is a broad theoretical and methodological enterprise, rather than a single, closely articulated theory. Its primary commitments are outlined. These are the Cognitive Commitment-a commitment to providing a characterization of language that accords with what is known about the mind and brain from other disciplines-and the Generalization Commitment-which represents a dedication to characterizing general principles that apply to all aspects of human language. The article also outlines the assumptions and worldview which arises from these commitments, as represented in the work of leading cognitive linguists. WIREs Cogn Sci 2012, 3:129-141. doi: 10.1002/wcs.1163 For further resources related to this article, please visit the WIREs website.

  15. Solar building

    OpenAIRE

    Zhang, Luxin

    2014-01-01

    In my thesis I describe the utilization of solar energy and solar energy with building integration. In introduction it is also mentioned how the solar building works, trying to make more people understand and accept the solar building. The thesis introduces different types of solar heat collectors. I compared the difference two operation modes of solar water heating system and created examples of solar water system selection. I also introduced other solar building applications. It is conv...

  16. Cognitive fitness.

    Science.gov (United States)

    Gilkey, Roderick; Kilts, Clint

    2007-11-01

    Recent neuroscientific research shows that the health of your brain isn't, as experts once thought, just the product of childhood experiences and genetics; it reflects your adult choices and experiences as well. Professors Gilkey and Kilts of Emory University's medical and business schools explain how you can strengthen your brain's anatomy, neural networks, and cognitive abilities, and prevent functions such as memory from deteriorating as you age. The brain's alertness is the result of what the authors call cognitive fitness -a state of optimized ability to reason, remember, learn, plan, and adapt. Certain attitudes, lifestyle choices, and exercises enhance cognitive fitness. Mental workouts are the key. Brain-imaging studies indicate that acquiring expertise in areas as diverse as playing a cello, juggling, speaking a foreign language, and driving a taxicab expands your neural systems and makes them more communicative. In other words, you can alter the physical makeup of your brain by learning new skills. The more cognitively fit you are, the better equipped you are to make decisions, solve problems, and deal with stress and change. Cognitive fitness will help you be more open to new ideas and alternative perspectives. It will give you the capacity to change your behavior and realize your goals. You can delay senescence for years and even enjoy a second career. Drawing from the rapidly expanding body of neuroscience research as well as from well-established research in psychology and other mental health fields, the authors have identified four steps you can take to become cognitively fit: understand how experience makes the brain grow, work hard at play, search for patterns, and seek novelty and innovation. Together these steps capture some of the key opportunities for maintaining an engaged, creative brain. PMID:18159786

  17. Human Security

    OpenAIRE

    Mary Kaldor

    2012-01-01

    The essay poses the question whether the so-called Arab spring offers the potential to complete the 1989 revolutions. It first discusses what was hoped to be achieved in 1989, and it then argues that the post-1989 arrangements failed to prevent new security challenges from emerging. The Islamist threat came to play the role that the Communist threat had played to the West or the Western threat had played to the East. The essay then turns to the question on what needs to happen if current even...

  18. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  19. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  20. Water, international peace and security

    OpenAIRE

    Tignino, Mara

    2010-01-01

    Water scarcity, accelerated by climate change, affects water availability and may threaten peace and security. This role of water, as a contributing factor for triggering wars, sheds light on the significance of the protection of water during armed conflict. Keeping water out of war not only contributes to preserving an indispensable natural resource for life but also serves as a tool for the hostile parties to start negotiations,building trust and peace.

  1. Moral Cognition

    NARCIS (Netherlands)

    Schleim, Stephan; Clausen, Jens; Levy, Neil

    2015-01-01

    Research on moral cognition is a growing and heavily multidisciplinary field. This section contains chapters addressing foundational psychological, neuroscientific, and philosophical issues of research on moral decision-making. Further- more, beyond summarizing the state of the art of their respecti

  2. 全面深化公安改革背景下加强警辅队伍建设和整合的探索--以上海市公安局嘉定分局为例%Discussion on the Building and Potency of Public-Security Managerial Assistants--Take for Example of Jiading Branch of Shanghai Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    姚方盛

    2015-01-01

    As the capable helper, the public-security managerial assistant has given great assistance to the public security organ in the public-security managerial process. At present, the public-security managerial assistants have become the new emerging forces to safeguard the public order. In the new situation, the public security organ should play a big role in the public order management and make the best possible use of public-security managerial assistants.%警辅队伍是指由《人民警察法》等法律法规规定的,政府认可并出资保障,由公安机关直接领导、管理的安全防范组织或在公安机关协助处理外部警务活动的组织。目前,警辅队伍已成为维护社会治安不可或缺的力量。在新的形势下,我们要进一步发挥警辅队伍的工作效能,激发其潜在活力,实现警力的无增长改善。

  3. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  4. SECURITY CHALLENGESASA FACTOR AFFECTINGTHE SECURITY OFMANET: ATTACKS, AND SECURITY SOLUTIONS

    OpenAIRE

    Dr.Nabeel Zanoon; Dr.Nashat Albdour; Dr.Hatem S. A. Hamatta; RashaMoh'd Al-Tarawneh

    2015-01-01

    The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.

  5. SECURITY CHALLENGESASA FACTOR AFFECTINGTHE SECURITY OFMANET: ATTACKS, AND SECURITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Dr.Nabeel Zanoon

    2015-06-01

    Full Text Available The Ad Hoc mobile network (MANET is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.

  6. 试论政府在食品质量安全体系建设中的作用%Role of the Government in the Building of Food Quality and Security System

    Institute of Scientific and Technical Information of China (English)

    陈瑛

    2011-01-01

    当前,我国食品安全仍处于风险高发期和矛盾凸显期。由于现代社会的生产经营者仍然是“经济人”,其主要特征是追求经济利益最大化。因此,要保证食品安全,除了生产经营者加强自律外,政府还要发挥应有的他律作用,帮助业主转变生产经营方式,实行诚信经营,同时要逐步完善食品安全法律法规,并严格执法,实施“零度容忍”。而为了充分发挥政府在食品质量安全体系建设中的作用,必须使食品安全工作制度化、常态化。%At present, China's food security is still in the high risk and the prominent contradictions period. To ensure food security, in addition to production operators to strengthen self - discipline, the government should play its due role to help owners transform production and management and to gradually improve the food security laws and regulations, and strict law enforcement. In order to play a full role for the government in food quality and security system, food security must be institutionalized and normalized.

  7. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  8. Potential of Cognitive Computing and Cognitive Systems

    Science.gov (United States)

    Noor, Ahmed K.

    2014-11-01

    Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The cognitive assistants engage, individually or collectively, with humans through a combination of adaptive multimodal interfaces, and advanced visualization and navigation techniques. The realization of future cognitive environments requires the development of a cognitive innovation ecosystem for the engineering workforce. The continuously expanding major components of the ecosystem include integrated knowledge discovery and exploitation facilities (incorporating predictive and prescriptive big data analytics); novel cognitive modeling and visual simulation facilities; cognitive multimodal interfaces; and cognitive mobile and wearable devices. The ecosystem will provide timely, engaging, personalized / collaborative, learning and effective decision making. It will stimulate creativity and innovation, and prepare the participants to work in future cognitive enterprises and develop new cognitive products of increasing complexity. http://www.aee.odu.edu/cognitivecomp

  9. Mathematical Approach to Security Risk Assessment

    OpenAIRE

    Robert Vrabel; Marcel Abas; Pavol Tanuska; Pavel Vazan; Michal Kebisek; Michal Elias; Zuzana Sutova; Dusan Pavliak

    2015-01-01

    The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk assessment tool that may assist security consultants at assessing the security risks in their protected systems/plants, nuclear power plants and stores of hazardous substances: explosive atmospheres and flammable and combustible gases and liquids, and so forth, and at building an appropriate risk mitigation policy. The probability of a penetration into the protected objects is estimated by com...

  10. China's Economic Security at Stake

    Institute of Scientific and Technical Information of China (English)

    Jiang Yong

    2007-01-01

    National economic security refers to the freedom of a sovereign state from any internal or external threats, either actual or perceived, to its economic interests. The notion varies in meaning from one country to another, due to their differences in security environment, cognition and defense capabilities. It took quite a long time for China to form its own definition in an overall, profound manner, with controversy still lingering among divergent interest groups and/or schools of thought. As the author sees it, formidable internal and external challenges threaten the country in this regard. We should maintain awareness of the risks from monopoly-driven mergers and acquisitions of foreign capital in a growing number of our industries.

  11. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  12. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  13. Laboratory Building.

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  14. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  15. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  16. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  17. Cognitive maps

    DEFF Research Database (Denmark)

    Minder, Bettina; Laursen, Linda Nhu; Lassen, Astrid Heidemann

    2014-01-01

    This paper identifies three different perspectives on the relationship between design and innovation and explains implication of these different world-views of the interrelations between innovation and design. The study is based on empirical data from a series of semi-structured expert interviews...... of the interrelation becomes increasingly important. This paper seeks to clarify this interrelation and discuss how design is used in innovation.......This paper identifies three different perspectives on the relationship between design and innovation and explains implication of these different world-views of the interrelations between innovation and design. The study is based on empirical data from a series of semi-structured expert interviews....... Conceptual clustering is used to analyse and order information according to concepts or variables from within the data. The cognitive maps identified are validated through the comments of some of the same experts. The study presents three cognitive maps and respective world-views explaining how the design...

  18. Nonquantum Cognition

    CERN Document Server

    Ghose, Partha

    2012-01-01

    The Hilbert space structure of classical field theory is proposed as a general theoretical framework to model human cognitive processes which do not often follow classical (Bayesian) probability principles. This leads to an extension of the circumplex model of affect and a Poincar\\'{e} sphere representation. A specific toy field theoretic model of the brain as a coherent structure in the presence of noise is also proposed that agrees qualitatively with Pavlovian fear conditioning studies.

  19. An Alternative View of Schizophrenic Cognition

    OpenAIRE

    Snyder, Douglas M.

    1991-01-01

    An alternative view to the traditionally held view that schizophrenia is characterised by severely disordered cognition is presented. It is possible that apparently self-contradictory expressions of schizophrenics are well-formed communicative expressions of highly ordered cognitive systems. Building on the premise that behavior is in general communicative, and using Godel’s Incompleteness Theorem from logic as a model, it is shown that the most characteristic symptoms of schizophrenia (namel...

  20. A cognitive management framework for spectrum selection

    OpenAIRE

    Bouali, Faouzi; Sallent Roig, José Oriol; Pérez Romero, Jordi; Agustí Comes, Ramon

    2013-01-01

    To increase cognitive radio (CR) operation efficiency, there has been an interest in enhancing the awareness level of spectrum utilization. In this context, this paper builds a new cognitive management functional architecture for spectrum selection (SS). It relies on a knowledge manager (KM) retaining a set of advanced statistics that track the suitability of spectral resources to support a set of heterogeneous applications under varying interference conditions. Based on this architecture, a ...

  1. An SLA based SaaS Security Level

    Directory of Open Access Journals (Sweden)

    Yongjing A. Li

    2013-07-01

    Full Text Available This paper proposes a data security protection strategy of the SaaS mode -the SLA based SaaS Security Level. At the same time, it gives concept model and implementation architecture of the security scheme which based on the SaaS Security Level. The SLA based SaaS Security Level takes the requirements of tenants to the data security as a starting point, and it mainly relates to data security of the data center, data security of the servers and data security of the clients. This Security Level can better meet diversified users needs than the traditional security model. According to the tenants desired service number and the protection degree of data information, they can dynamically select different levels of the security strategies. Then, according to the dynamic changes of SLA, the SaaS vendors can adjust data protection strategy of the user timely. For supporting our SaaS Security Level, we build SSM (SaaS Security Model test-bed. On the SSM test-bed, we have done some experiments, which confirmed our SaaS Security Level is feasible and easy to use.  

  2. International conference on a nuclear-weapon-free zone in central Asia, 15-16 September 1997 Tashkent, Uzbekistan. Building an integral part of the global nuclear security system

    International Nuclear Information System (INIS)

    This Conference is the first fruit of the joint effort by the Central Asian States to counter external threats and challenges. The decision to declare Central Asia a nuclear-weapon-free zone is a further manifestation of the Central Asian States' shared interest in ensuring security, stability and peace for all the inhabitants of the region and in creating the necessary -indeed, the essential- conditions for its sustainable development and prosperity

  3. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  4. An IOT Security Risk Autonomic Assessment Algorithm

    Directory of Open Access Journals (Sweden)

    Zhengchao Ma

    2013-02-01

    Full Text Available In terms of Internet of Things (IOT system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain.

  5. An immunity based network security risk estimation

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunity-based model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self,nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the self-tolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation,which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security.

  6. Accelerate China’s Social Security Legislation

    Institute of Scientific and Technical Information of China (English)

    王延中

    2008-01-01

    Since the financial crisis in Asia in 1997, China’s social security system has undergone continual reform and readjustment, and has proved to be an integral part of government efforts to perfect the socialist market economy as well as in building a socialist harmonious society. Although social security construction has achieved certain results, it has also left a lot of problems. With the rapid growth of China’s economy and revenue, people from all walks of life are putting ever-increasing demands on the social security system; therefore, the construction of a sound social security system suited to China’s current situation still remains an arduous task. In this article, the author have reviewed the 10 years development of China’s social security system, analyzed problems and challenges and proposed its suggestions.

  7. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  8. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  9. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? Search form Apples Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  10. Security barriers in the physical protection concept of nuclear facilities in Switzerland

    International Nuclear Information System (INIS)

    The presentation describes the structural security measures - security zones and barriers - used for the physical protection of nuclear facilities in Switzerland, especially nuclear power plants. Part 1 deals with the concept of security zones and barriers: arrangement and functions of security zones and barriers, requirements on the level of resistance of security barriers, allocation of buildings, systems and installations to security zones in nuclear facilities. Part 2 deals with examples concerning requirements, construction and inspection of the various security barriers, and describes the development of special components for security barriers

  11. Early Learning Left Out: Building an Early-Learning System to Secure America's Future. Federal, State and School District Investments by Child Age. 4th Edition. 2010-2012

    Science.gov (United States)

    Bruner, Charles

    2013-01-01

    As a society, are we investing enough in our youngest children? The BUILD Initiative's latest report, Early Learning Left Out, by CFPC director Charles Bruner, provides a clear answer that current investments fall far short. The report draws upon the most recent federal, state, and public school budget information--and what we know about effective…

  12. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  13. Security Testing: A Survey

    OpenAIRE

    Felderer, M.; Büchlein, M.; Johns, M; Brucker, A.D.; Breu, R.; Pretschner, A.

    2015-01-01

    Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual security testing techniques is of high value both for researchers to evaluate and refine the techniques and...

  14. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia;

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  15. Designing Dependable Service Oriented Web Services Security Architectures Solutions

    Directory of Open Access Journals (Sweden)

    M.Upendra Kumar

    2010-04-01

    Full Text Available System Security Architecture from a software engineering viewpoint imposes that strong security must be a guiding principle of the entire software development process. It describes a way to weave security into systems architecture, and it identifies common patterns of implementation found in most security products. The security and software engineering communities must find ways to develop software correctly in a timely and cost-effective fashion. There’s no substitute for working software security as deeply into the evelopment process as possible. System designers and developers must take a more proactive role in building secure software. The root of most security problems is software that fails in unexpected ways whenunder attack. The enforcement of security at the design phase canreduce the cost and effort associated with the introduction of security during implementation. At the architecture level a systemmust be coherent and present unified security architecture that takes into account security principles (such as the least privilege. In this paper we want to discuss about different facets of security as applicable to Service Oriented Architectures (SOA Security Architecture implementations. First we examine the securityrequirements and its solution mechanisms. In the context of WebServices, the predominant SOA implementation standard has a crucial role to play. The Web Services architecture is expected to play a prominent role in developing next generation distributed systems. Building dependable systems based on web services architecture is a major research issue being discussed. Finally, we provide a case study of Web Services Security Architecture, enhancing its security pertaining to Web 2.0 AJAX (Asynchronous JavaScript and XML and its Security encryption of data using MD5algorithm.

  16. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  17. Cognitive Systems

    DEFF Research Database (Denmark)

    for automatic extraction and organization of meaning, purpose, and intentions in interplay with the environment (machines, artifacts and users) beyond current systems with build-in semantic representations and ontologies—in particular in terms of the interaction with users (users-in-the-loop models) through...

  18. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  19. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  2. Educational Programme in Nuclear Security

    International Nuclear Information System (INIS)

    The potential of a malicious act involving nuclear or other radioactive material is a continuing worldwide threat. Available data indicate circumstances in which nuclear and other radioactive material are vulnerable to theft, are uncontrolled, or are in unauthorized circulation. States must establish sustainable security measures to prevent such acts and to protect society from nuclear terrorism. Appropriate training and education at all levels and in all relevant organizations and facilities can play a major role in this process. There is increased interest in nuclear applications. Many States have expressed interest in expanding or introducing nuclear power in their country as a result of their own assessment of their energy supply needs, because of climate change, and development requirements. The projected increase in the demand for nuclear energy will increase the number of nuclear reactors worldwide and, consequently, the amount of nuclear material in use. Possible malicious acts involving nuclear or other radioactive material are a real threat. These developments are mirrored by an increase in the use of nuclear techniques in non-power applications. As a result, the need for experts in the area of nuclear security has become of great importance, and both universities and students have shown an increasing interest in nuclear security specialities. In September 2005, the Board of Governors approved a Nuclear Security Plan covering the period 2006-2009. This emphasized, inter alia, the importance of human resource development to assist States in building capacity to establish and maintain appropriate nuclear security to prevent, detect and respond to malicious acts involving nuclear and other radioactive material. The Nuclear Security Plan envisages the development of guidance for an educational programme in nuclear security that could be used by all States. In pursuit of this goal, this publication has been developed to provide advice and assistance to

  3. The Tome of Secure Compilation: Fully Abstract Compilation to Protected Modules Architectures

    OpenAIRE

    Patrignani, Marco

    2015-01-01

    1 Summary The goal of this research project is to enhance the security of networked, embedded computing devices. A networked, embeddedcomputing device consists of a hardware part and a software part; both components play an essential role in the overall security of a device. The software builds on hardware low level security blocks to provide higher-level guarantees such as process isolation, secure communication, or even application-specific security guarantees such as non- repudiation of...

  4. Social cognition.

    Science.gov (United States)

    Sollberger, Marc; Rankin, Katherine P; Miller, Bruce L

    2010-08-01

    Social cognitive neuroscience is a novel field of interdisciplinary research that examines socio-emotional cognition and behavior by emphasizing the neural substrates of these processes. Insights from this biological perspective have established that socio-emotional processing does not happen in a sequential order but in a recursive and interlinked fashion; that individual brain regions are not associated with one, but multiple, distinct social functions; and that brain regions are organized into dynamically interacting networks. These factors explain why it is difficult to pinpoint the neural substrates of particular social deficits in patients with brain diseases. With that said, there are specific brain regions that are highly specialized for the perception, regulation, and modulation of emotion and behavior. This article will review key aspects of social processing beginning with their underlying neural substrates, including (1) perception of social signals, (2) social and emotional evaluation, and (3) behavioral response generation and selection. Case studies will be used to illustrate the real-life social deficits resulting from distinct patterns of neuroanatomic damage, highlighting the brain regions most critical for adequate social behavior. Continuum Lifelong Learning Neurol 2010;16(4):69-85. PMID:22810514

  5. Building Inclusion

    NARCIS (Netherlands)

    Jeanet Kullberg; Isik Kulu-Glasgow

    2009-01-01

    The social inclusion of immigrants and ethnic minorities is a central issue in many European countries. Governments face challenges in ensuring housing for immigrants, delivering public services, promoting neighbourhood coexistence and addressing residential segregation. The Building Inclusion proje

  6. Building Languages

    Science.gov (United States)

    ... family's native language) is taught as the child's second language through reading, writing, speech, and use of residual ... that parents can use to help their child learn language. There are many types of building blocks, and ...

  7. 军队医院网络安全风险与控制%Security Risk Analysis of Military Hospital Network Security and Practice on Security Operation

    Institute of Scientific and Technical Information of China (English)

    杨俊; 刘敏超

    2015-01-01

    Hospital network is a carrier of hospital information system. Building network security has the proper meaning of military hospital informatization. By analyzing the complexity and security risk of military hospital network, we summarized the network security operation scheme including physical isolation, physical security, access security, internet security, authorization and terminal security in practice.%医院网络是医院信息系统的载体,构建安全网络是军队医院信息化的题中之义。通过分析军队医院网络复杂性及其安全风险,总结我院构建网络隔离、物理安全、接入安全、互联安全、权限管理和终端安全的网络安全运维实践方案。

  8. Expertise development in sport: contributions under cognitive psychology perspective

    OpenAIRE

    Iglesias Gallego, Damián; García González, Luis; García Calvo, Tomás; León del Barco, Benito; Villar Álvarez, Fernando del

    2010-01-01

    The aim of this paper has been that of revising and updating research about expertise development in sport under the cognitive psychology approach. At first, the structure of sport action in open contexts is analysed, differentiating cognitive and execution components. Secondly, having as a reference frame Anderson’s cognitive theory, it is possible to remark the importance of the process of building knowledge as a forerunner variable of ability. Finally, the most relevant and consistent find...

  9. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  10. Air quality in quarters and system of personal security

    Directory of Open Access Journals (Sweden)

    L.L. Goshka

    2010-10-01

    Full Text Available In the article climatic systems are considered as systems of personal security. Roles of State, building proprietors, inhabitants in the formation of climate favorable for health are analysed. Regulated heat and air conditioning systems are considered particularly, because they can give personal security in temperature.

  11. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    .... Accordingly, this portion of the meeting will be closed to the public. (2) Global Supply Chain Security... Supply Chain Security Initiative. The Committee will receive an update and provide further guidance.... Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  12. Development of cognitive model for navigating on the web

    NARCIS (Netherlands)

    Juvina, I.

    2006-01-01

    The objective of this thesis is to build a cognitive model of human performance in Web-assisted tasks. The research is driven by the following questions: What are the most important factors in determining success in Web-assisted tasks? What cognitive mechanisms are involved in these factors? What

  13. The Rationality Debate: Application of Cognitive Psychology to Mathematics Education

    Science.gov (United States)

    Leron, Uri; Hazzan, Orit

    2006-01-01

    Research in mathematics education usually attempts to look into students' learning and other mental processes. It could therefore be expected to build on knowledge acquired within the academic discipline of cognitive psychology. Our aim in this paper is to show how some recent developments in cognitive psychology can help interpret empirical…

  14. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  15. Enhancement of Nuclear Security Measures: Egyptian Case

    International Nuclear Information System (INIS)

    Egypt benefited from the peaceful uses of nuclear energy since the second half of twentieth century and established several nuclear and radiation facilities, activities and practices such as research reactors, fuel fabrication facility, gamma irradiators, and utilization of radioactive sources in different applications. Consequently, Egypt’s concern is to enhance and improve the nuclear security systems in the above mentioned facilities, activities and practices as well as enhance the nuclear security regime on the national, regional and international levels. In this paper, several steps taken by Egypt in the field of nuclear security in its various aspects such as the legal and regulatory frameworks, physical protection of nuclear material and facilities, nuclear material accounting and security of radioactive sources will be presented. Egyptian human resources development strategy for the purpose of improving the efficiency, building, upgrading and strengthening the knowledge and skills of the personnel who are working in the nuclear and radiological fields as well as other activities that related to nuclear security will also be discussed. The Egyptian nuclear security strategy is under development taking in its consideration the present nuclear security measures and the future perspective to develop and improve the Egyptian nuclear security infrastructure. (author)

  16. SECURITY EDUCATION IN AFRICA: PATTERNS AND PROSPECTS

    Directory of Open Access Journals (Sweden)

    David Last

    2015-05-01

    Full Text Available This article is part of a larger study exploring global patterns of security education, in order to enhance the collaborative pursuit of security by the majority of the world’s countries. We draw on interviews at multinational training events, site visits and open sources. Here we describe general patterns of police, gendarme and military education in Africa, with particular attention to university-like institutions. This leads us to focus on mid-career military staff colleges as the most likely venues for building communities of educated professionals to enhance security. We identify states in each region with the greatest potential to play a leading role in the development of knowledge addressing new security challenges. South Africa, Nigeria and Kenya have obvious educational potential. Good governance and national policies are more important than size and wealth, and this suggests that smaller states like Senegal and Botswana could make important contributions. Mechanisms contributing to regional security communities include the African Peace and Security Architecture, career incentives, innovation, and regional training centres. Understanding the patterns of security education lays the groundwork to understand innovation, diffusion and the influence of the content of security of education.

  17. Ubiquitous Health Monitoring Systems: Addressing Security Concerns

    Directory of Open Access Journals (Sweden)

    Mahmoud Elkhodr

    2011-01-01

    Full Text Available Problem statement: It is important to secure the transmission of patient’s EHR in remote health monitoring systems. Security is among the main issues that need to be realized for the adaption of this monitoring technology. The face of healthcare is changing as ubiquitous computing technologies are being incorporated into the existing infrastructure. We specify the requirements, needed security mechanism, outstanding issues and the future challenges as well as the open problems that need to be achieved. Approach: Although there were benefits to technology, approaches that offer reliable privacy and security features must be presented to users in order to make these systems socially accepted. Results: We investigated the privacy and security implications generated from the deployment of remote health monitoring technology. To achieve these security requirements, building on the strengths of Transport Layer Security (TLS protocol, a trust negotiation approach was proposed. The application of this approach results in significant improvements in overcoming security related concerns compared to the traditional identity-based only access control techniques. Conclusion: We believe these considerations will eventually contribute toward an efficient and practical deployment of remote monitoring systems.

  18. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  19. Implementing message systems in multilevel secure environments: Problems and approaches

    Science.gov (United States)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  20. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  1. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Security guide for subcontractors

    International Nuclear Information System (INIS)

    The objectives of security in the Department of Energy (DOE) contractor/subcontractor program are: (1) to ensure the protection of information which, if related, would endanger the common defense and security of the nation; and (2) to safeguard the plants and installations of the DOE and its contractors in order that research and production programs will not be interrupted. To achieve these objectives, security responsibilities have been divided into three interdependent categories: personnel security, physical security, and security education and quality audits. This guide presents instructions for implementing a security program at a contractor/subcontractor site

  3. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  4. COGNITIVE COMPETENCE COMPARED TO COGNITIVE INDEPENDENCE AND COGNITIVE ACTIVITY

    Directory of Open Access Journals (Sweden)

    Irina B. Shmigirilova

    2014-01-01

    Full Text Available The research is aimed at identifying the essence of the cognitive competence concept in comparison with the concepts of cognitive independence and activity.Methods: The methodology implies a theoretical analysis of psychopedagogical and methodological materials on the cognitive competence formation; generalized teaching experience; empirical methods of direct observations of educational process in the secondary school classrooms; interviews with school teachers and pupils.Results: The research outcomes reveal a semantic intersection between the cognitive competence, independence and activity, and their distinctive features. The paper emphasizes the importance of cognitive competence as an adaptive mechanism in situations of uncertainty and instability.Scientific novelty: The author clarifies the concept of cognitive competence regarding it as a multi-component and systematic characteristic of a personality.Practical significance: The research findings can be used by specialists in didactics developing the teaching techniques of cognitive competence formation for schoolchildren.

  5. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion. In contrast, a hybrid-secure protocol provides different security guarantees depending on the set of corrupted parties and the computational power...... of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t secure with agreement on abort (privacy and correctness only) for up to t secure...

  6. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  7. Network Security Scanner

    OpenAIRE

    G. MURALI; M.Pranavi; Y.Navateja; K. Bhargavi

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  8. Combining security risk assessment and security testing

    OpenAIRE

    Großmann, Jürgen; Seehusen, Fredrik

    2014-01-01

    Complex networked systems have become an integral part of our supply infrastructure. Mobile devices, home automation, smart grids and even vehicles are connected via the Internet and becoming accessible and thus vulnerable to hacker attacks. While the number of security incidents drastically increases, we are more than ever dependent on a secure and mature ICT infrastructure. One of the keys to maintain such a secure and dependable infrastructure are mature, systematic and capable proactive m...

  9. RETIREMENT: PREJUDICE AGAINST FUTURE COGNITIVE DECLINE

    Directory of Open Access Journals (Sweden)

    Pranathi

    2015-02-01

    Full Text Available BACKGROUND : Age related cognitive decline is well documented, but less is known about changes in the cognitiv e functioning after retirement. AIM: To evaluate whether retirement affects cognitive performance. OBJECTIVES: 1 . To compare cognitive performance in working and non - working retired individuals. 2. To assess the influence of active lifestyle, financial security and literacy on cognition of retiree. METHODS: The study included 50 retired non - workers as cases and 50 retired workers as controls in the age group of 60 - 65 yrs. Brief Test of Adult Cognition by Telephone (BTACT was conducted on all s ubjects. Results were statistically analyzed using ANOVA. RESULTS: In the retired population, working group performed better than the non - working group (p0.05. CONCLUSION: Retirement has a negative impact on cognitive function which could be alleviated by factors like literacy, financial sec urity and active life style. Increasing incidence of depression and dementia among the elderly highlights the importance of maintaining active mental health. Hence, this study emphasizes the factors preventing cognitive decline.

  10. Sequential motor skill: cognition, perception and action

    NARCIS (Netherlands)

    Ruitenberg, M.F.L.

    2013-01-01

    Discrete movement sequences are assumed to be the building blocks of more complex sequential actions that are present in our everyday behavior. The studies presented in this dissertation address the (neuro)cognitive underpinnings of such movement sequences, in particular in relationship to the role

  11. Play Can Be the Building Blocks of Learning.

    Science.gov (United States)

    Cartwright, Sally

    1988-01-01

    Discusses how unit building blocks can be used to enhance five major interrelated aspects of child learning, namely, physical, emotional, social, intellectual (cognitive), and intuitive development. Also presents six ways to encourage good block playing among children. (BB)

  12. Energy Supply Security of Turkey and Measuring: an Application on Turkey’s Energy Supply Security

    Directory of Open Access Journals (Sweden)

    Hasan Sencer PEKER

    2015-12-01

    Full Text Available In this study, in which building an energy supply security index model in order to measure the energy supply security of Turkey, first, the four sub-indexes that compose overall index and their weighting coefficients were designated. These sub-indexes are availability index, reliability index, economic index and environmental index. According to index results, Turkey has to direct its necessary investments to fields that secure the energy import, regulate the electricity power market and renewable technologies that diversify the sources and decrease import dependency.

  13. Some Opinions on the Relation between Security Economy and Economic Security

    Directory of Open Access Journals (Sweden)

    VALERIU IOAN-FRANC

    2010-12-01

    Full Text Available The paper basically deals with two important concepts: security economy and economic security. The former is a relatively new term implying the way of building an entire system of protection by measures and activities to prevent deliberate actions affecting the quality of life and goods, while the latter is a term understood only post factum, when the threats to the economic security of a state have had effect. Therefore, a macroeconomic equilibrium at the world level should be correlated with internal political, economic and social equilibrium in order to ensure long-term sustainable development of the economy.

  14. Cognitive and artificial representations in handwriting recognition

    Science.gov (United States)

    Lenaghan, Andrew P.; Malyan, Ron

    1996-03-01

    Both cognitive processes and artificial recognition systems may be characterized by the forms of representation they build and manipulate. This paper looks at how handwriting is represented in current recognition systems and the psychological evidence for its representation in the cognitive processes responsible for reading. Empirical psychological work on feature extraction in early visual processing is surveyed to show that a sound psychological basis for feature extraction exists and to describe the features this approach leads to. The first stage of the development of an architecture for a handwriting recognition system which has been strongly influenced by the psychological evidence for the cognitive processes and representations used in early visual processing, is reported. This architecture builds a number of parallel low level feature maps from raw data. These feature maps are thresholded and a region labeling algorithm is used to generate sets of features. Fuzzy logic is used to quantify the uncertainty in the presence of individual features.

  15. Based on combination of L2TP and IPSec VPN security technology research

    Directory of Open Access Journals (Sweden)

    Ya-qin Fan

    2012-01-01

    Full Text Available This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  16. Representations in Dynamical Embodied Agents: Re-Analyzing a Minimally Cognitive Model Agent

    Science.gov (United States)

    Mirolli, Marco

    2012-01-01

    Understanding the role of "representations" in cognitive science is a fundamental problem facing the emerging framework of embodied, situated, dynamical cognition. To make progress, I follow the approach proposed by an influential representational skeptic, Randall Beer: building artificial agents capable of minimally cognitive behaviors and…

  17. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  18. Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

    Directory of Open Access Journals (Sweden)

    G.K. Pradhan

    2010-07-01

    Full Text Available To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for governmentdepartments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of confidential and top secret information amongst security personnels and government departments within the national boundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and government intelligence departments to avoid threatening activities. The experimental results demonstrate the effectiveness of theproposed information sharing approach.

  19. Educational Programme in Nuclear Security (Chinese Version)

    International Nuclear Information System (INIS)

    Higher education plays an essential role in nuclear security capacity building. It ensures the availability of experts able to provide the necessary competencies for the effective national nuclear security oversight of nuclear and other radioactive material and to establish and maintain an appropriate nuclear regime in a State. This guide provides both the theoretical knowledge and the practical skills necessary to meet the requirements described in the international framework for nuclear security. Emphasis is placed on the implementation of these requirements and recommendations in States. On the basis of this guide, each university should be able to develop its own academic programme tailored to suit the State's educational needs in the area of nuclear security and to meet national requirements.

  20. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  1. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    The main question that guides this paper is how governments are focusing (and must focus) on competence building (education and training) when designing and implementing innovation policies. With this approach, the paper aims at filling the gap between the existing literature on competences...... on the one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...... and public agencies in different countries and different times have actually approached the issue of building, maintaining and using competences in their innovation systems; it examines what are the critical and most important issues at stake from the point of view of innovation policy, looking particularly...

  2. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    ‘The procurement of construction work is complex, and a successful outcome frequently elusive’. With this opening phrase of the book, the authors take on the challenging job of explaining the complexity of building procurement. Even though building procurement systems are, and will remain, complex...... despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which...... evolves from a simple establishment of a contractual relationship to a central and strategic part of construction. The authors relate to cultural, ethical and social and behavioural sciences as the fundamental basis for analysis and understanding of the complexity and dynamics of the procurement system...

  3. Low-Cost Security Measures for School Facilities

    Science.gov (United States)

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  4. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  5. Conceptions of cognition for cognitive engineering

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2011-01-01

    Cognitive processes, cognitive psychology tells us, unfold in our heads. In contrast, several approaches in cognitive engineering argue for a shift of unit of analysis from what is going on in the heads of operators to the workings of whole socio-technical systems. This shift is sometimes presented...... is of this framing of an expanded unit of analysis in a cognitive vocabulary. I focus on possible consequences for how cognitive engineering practitioners think about function allocation in system design, and on what the relative benefits and costs are of having a common framework and vocabulary for talking about...

  6. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  7. Building Bridges

    DEFF Research Database (Denmark)

    The report Building Bridges adresses the questions why, how and for whom academic audience research has public value, from the different points of view of the four working groups in the COST Action IS0906 Transforming Audiences, Transforming Societies – “New Media Genres, Media Literacy and Trust...... in the Media”, “Audience Interactivity and Participation”, “The Role of Media and ICT Use for Evolving Social Relationships” and “Audience Transformations and Social Integration”. Building Bridges is the result of an ongoing dialogue between the Action and non-academic stakeholders in the field of audience...

  8. Subjective cognitive complaints and amyloid burden in cognitively normal older individuals

    Science.gov (United States)

    Amariglio, Rebecca E.; Becker, J. Alex; Carmasin, Jeremy; Wadsworth, Lauren P.; Lorius, Natacha; Sullivan, Caroline; Maye, Jacqueline E.; Gidicsin, Christopher; Pepin, Lesley C.; Sperling, Reisa A.; Johnson, Keith A.; Rentz, Dorene M.

    2012-01-01

    Accumulating evidence suggests that subjective cognitive complaints (SCC) may indicate subtle cognitive decline characteristic of individuals with preclinical Alzheimer’s disease (AD). In this study, we sought to build upon previous studies by associating SCC and amyloid-β deposition using Positron Emission Tomography with Pittsburg Compound B (PiB-PET) in cognitively normal older individuals. One-hundred thirty one subjects (mean age 73.5 ± 6) were administered three subjective cognitive questionnaires and a brief neuropsychological battery. A relationship between a subjective memory complaints composite score and cortical PiB binding was found to be significant, even after controlling for depressive symptoms. By contrast, there were no significant relationships between objective cognitive measures of memory and executive functions and cortical PiB binding. Our study suggests that SCC may be an early indicator of AD pathology detectable prior to significant objective impairment. PMID:22940426

  9. Spectrum Security Situational Awareness for Routing in Cognitive Radio Networks%认知网络中一种基于频谱安全态势感知的路由方案

    Institute of Scientific and Technical Information of China (English)

    李方伟; 刘帆; 朱江; 聂益芳

    2014-01-01

    This paper concerns the construction of accurate spectral situation map, which can help to a-chieve frequency resource reuse. The traditional methods of constructing spectrum space situation map do not take the influence of malicious users( MUs) into consideration,but the scheme proposed in this paper makes use of Kriging interpolation to estimate the interference situation over a finite geographical area,and identifies malicious user by location detection method, then constructs a more accurate and more secure spectrum situation map. Finally,the spectrum situation map is applied in the end-to-end route protocols. Simulation results demonstrate that the proposed scheme can construct a complete spectrum situation map and the average error is only 0 . 106 dBm;it can accurately identify malicious users and the detection rate is higher than 80%;it can reduce the routing hops and increase the available spectrum space in the process of routing based on spectrum situation map after identifying MUs.%从构建准确的频谱态势图,实现频率资源充分利用的角度出发,针对目前在构建频谱态势图时没有考虑恶意用户( Malicious User,MU)存在的情况,结合克里金( Kriging)插值法估计空域内频谱干扰态势,通过地理位置检测方案识别MU,从而构建更准确、更安全的频谱态势图,并将其用于端到端的路由协议中。仿真结果表明,该方案能构建完整的频谱态势图,平均误差仅为0.106 dBm,能准确识别恶意用户,识别率高于80%;并且通过识别MU,在基于频谱态势图的路由过程中,可以减少路由跳数,增加可用频谱空间。

  10. Role Taking and Knowledge Building in a Blended University Course

    Science.gov (United States)

    Cesareni, Donatella; Cacciamani, Stefano; Fujita, Nobuko

    2016-01-01

    Role taking is an established approach for promoting social cognition. Playing a specific role within a group could lead students to exercise collective cognitive responsibility for collaborative knowledge building. Two studies explored the relationship of role taking to participation in a blended university course. Students participated in the…

  11. ICT security management

    OpenAIRE

    Schreurs, Jeanne; Moreau, Rachel

    2008-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  12. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  13. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  14. Relevance theory: pragmatics and cognition.

    Science.gov (United States)

    Wearing, Catherine J

    2015-01-01

    Relevance Theory is a cognitively oriented theory of pragmatics, i.e., a theory of language use. It builds on the seminal work of H.P. Grice(1) to develop a pragmatic theory which is at once philosophically sensitive and empirically plausible (in both psychological and evolutionary terms). This entry reviews the central commitments and chief contributions of Relevance Theory, including its Gricean commitment to the centrality of intention-reading and inference in communication; the cognitively grounded notion of relevance which provides the mechanism for explaining pragmatic interpretation as an intention-driven, inferential process; and several key applications of the theory (lexical pragmatics, metaphor and irony, procedural meaning). Relevance Theory is an important contribution to our understanding of the pragmatics of communication.

  15. Cultural Security: The Notion, Resources and the Instruments of Implimentation

    Directory of Open Access Journals (Sweden)

    A. Yu. Goloborod’ko

    2015-01-01

    Full Text Available The paper deals with the description of some components for cognitive- methodological construct considered in the context of state culture policy tools as factor of strengthening of cultural security in the system of national security of the modern Russia. The construct presents the possibilities to accumulate through state cultural policytools a powerful protecting potential of culture in Russia in social formation and strengthening of the state viability. 

  16. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  17. Quantum Oblivious Transfer: a secure practical implementation

    Science.gov (United States)

    Nagy, Marius; Nagy, Naya

    2016-09-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  18. Building Bridges

    DEFF Research Database (Denmark)

    The report Building Bridges adresses the questions why, how and for whom academic audience research has public value, from the different points of view of the four working groups in the COST Action IS0906 Transforming Audiences, Transforming Societies – “New Media Genres, Media Literacy and Trust...

  19. Sustainable Buildings

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.; Elle, Morten

    The scientific community agrees that: all countries must drastically and rapidly reduce their CO2 emissions and that energy efficient houses play a decisive role in this. The general attitude at the workshop on Sustainable Buildings was that we face large and serious climate change problems...

  20. Research on Model of Ontology_based Management of Vegetable Quality Security

    OpenAIRE

    Zhao Qingcong; Zhao Qingling

    2015-01-01

    To resolve the problem of Vegetable Quality Security data description, in the guidance of ontology based knowledge management theory, we put forward a Knowledge description method on Vegetable Quality Security and build the management of Vegetable Quality Security ontology model. In order to help computer comprehend the ontology model and the semantic reasoning of domain concept acquisition, these ontology models are formalized Voronoi diagram.

  1. X.509 Authentication Services to Enhance the Data Security in Cloud Computing

    OpenAIRE

    Surbhi Chauhan; Kamal Kant; Arjun Singh

    2012-01-01

    This paper represents a method to build a Cloud Security by giving concept of X.509 authentication services. We are discussing theory of cloud computing, feature of cloud computing and cloud security .We proposed a X.509 format to enhances data security in cloud (Public). Cloud computing is a new computational paradigm that offers an innovative business model for organization.

  2. 移动计算安全性%Mobile Computing Security

    Institute of Scientific and Technical Information of China (English)

    胡健; 刘锦德

    2000-01-01

    In the first,security issues in open system that supports mobile computing are discussed in detail,and then the fundamental principle for building a security system in the environment of mobile computing is given.According to the principle,security issues and policies related to mobile code programming language and mobile agent system are further discussed.

  3. A Cognitive Approach to Network Monitoring in Heterogeneous Environments

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    of information (QoI). QoI means QoS while all the requirements for dependability, security, privacy and trust are satisfied at the highest possible level. This work proposes and describes an approach to network monitoring in a heterogeneous communication environment based on use of cognitive techniques...... is an improved network performance in terms of maximized throughput and faster accessibility to services, minimized transport delay, improved network coverage and simplified security management. This is achieved by introducing an intelligent functionality that entails the use of cognitive learning algorithms...... for efficient resource allocation, provisioning of network resources or for detection of security violations into the traditional network monitoring approach. The paper describes the cognitive monitoring architecture, the required physical and logical entities, and their functionalities. Further, the paper...

  4. Policy Paper 26: The Middle East Arms Control and Regional Security Talks: Progress, Problems, and Prospects

    OpenAIRE

    Jentleson, Bruce

    1996-01-01

    The record of the Arms Control and Regional Security (ACRS) Working Group thus far is a mixed one. On the one hand, the very creation of a multilateral process for arms control and regional security in a region where no comparable process ever before existed is in itself a significant achievement. A working agenda then was defined, and by late 1994 a series of initial multilateral agreements had been negotiated for confidence-building measures (CBMs), confidence-and-security-building measures...

  5. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  6. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  7. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  8. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  9. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  10. User-oriented and cognitive models of information retrieval

    DEFF Research Database (Denmark)

    Järvelin, Kalervo; Ingwersen, Peter

    2010-01-01

    The domain of user-oriented and cognitive IR is first discussed, followed by a discussion on the dimensions and types of models one may build for the domain.  The focus of the present entry is on the models of user-oriented and cognitive IR, not on their empirical applications. Several models...... with different emphases on user-oriented and cognitive IR are presented - ranging from overall approaches and relevance models to procedural models, cognitive models, and task-based models. The present entry does not discuss empirical findings based on the models....

  11. Social Security Fund Ready to Enter International Market

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Vice-Chairman of the Board of the National Social Security Fund Council. Feng Jianshen. revealed recently that. from now on. China plans to use five years or even a longer thne to make the total social security fund assets reach RMB 1 tillion and build the National Social Security Fund Council into a world first-rate old-age pension administrative agency.Feng emphasized that after three years' operation, social security fund has entered into a crucial period. The key lies in innovation, which, first of ...

  12. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  13. QUAIL: A Quantitative Security Analyzer for Imperative Code

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Wasowski, Andrzej; Traonouez, Louis-Marie;

    2013-01-01

    Quantitative security analysis evaluates and compares how effectively a system protects its secret data. We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information. QUAIL builds a Markov Chain model...... the safety of randomized protocols depending on secret data, allowing to verify a security protocol’s effectiveness. We experiment with a few examples and show that QUAIL’s security analysis is more accurate and revealing than results of other tools...

  14. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security. PMID:22948103

  15. Secrets and lies digital security in a networked world

    CERN Document Server

    Schneier, Bruce

    2000-01-01

    Bestselling author Bruce Schneier offers his expert guidance on achieving security on a networkInternationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to

  16. SECURE REMOTE CLIENT AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    K.Pradeep,

    2010-10-01

    Full Text Available This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  17. SECURE REMOTE CLIENT AUTHENTICATION

    OpenAIRE

    K.Pradeep,; R.Usha Rani; E.Ravi Kumar; K.Nikhila,; Vijay Sankar

    2010-01-01

    This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  18. Social Security Financial Crises

    OpenAIRE

    Rodrigo Cerda

    2003-01-01

    This paper explores the causes of the social security financial crises. We indicate that the financial crisis might be endogenous to the social security system. The main idea is that the PAYG social security system might affect fertility and human capital's decisions and therefore, may negatively impact the aggregated growth rate of the economy. These effects lead to an endogenous erosion of the financial basis of the PAYG social security program so that, as a consequence, the PAYG system is ...

  19. East Asia's Security System

    OpenAIRE

    Hojzáková, Věra

    2012-01-01

    The aim of the master thesis is to characterize and evaluate the current security system in East Asia, to show the security strategies of the system actors and the existing friction points, and to assess the future development of the security system in place. For this purpose the author first defines the East Asia's security system using the conceptual tools of three international relations theories, namely neo-realism, neo-liberalism, and constructivism. In the following section, the securit...

  20. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  1. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  2. Network Security with Cryptography

    OpenAIRE

    Prof. Mukund R. Joshi; Renuka Avinash Karkade

    2015-01-01

    Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Netw...

  3. Security system signal supervision

    International Nuclear Information System (INIS)

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  4. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  5. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  6. Developing Secure Cloud Applications

    OpenAIRE

    Rak, Massimiliano; Ficco, Massimo; Battista, Ermanno; Casola, Valentina; Mazzocca, Nicola

    2014-01-01

    Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter. Customer could not monitor and evaluate the security mechanisms enforced by service provider. Service Level Agreements mainly focus on performance related terms and no guarantees are ...

  7. Security Policy Enforcement

    OpenAIRE

    Irvine, Cynthia E.

    2005-01-01

    Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enfo...

  8. Web Application Security Testing

    OpenAIRE

    Bukovský, Ondřej

    2012-01-01

    The purpose of this bachelor's thesis is to present the topic of web applications security. The purpose of the first, theoretical part of this work is to introduce and describe fundamentals like web security or penetration testing. OWASP (Open Web Application Security Project) and their ten most critical web applications security risks are presented in the rest of the first part. Second, practical part describes tested web application and defines purpose and scope of penetration tests. Then t...

  9. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  10. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  11. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, P.H.; Veldhuis, R.N.J.

    2009-01-01

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  12. Quantum secure circuit evaluation

    Institute of Scientific and Technical Information of China (English)

    CHEN Huanhuan; LI Bin; ZHUANG Zhenquan

    2004-01-01

    In order to solve the problem of classical secure circuit evaluation, this paper proposes a quantum approach. In this approach, the method of inserting redundant entangled particles and quantum signature has been employed to strengthen the security of the system. Theoretical analysis shows that our solution is secure against classical and quantum attacks.

  13. Secure Disk Mixed System

    Directory of Open Access Journals (Sweden)

    Myongchol Ri

    2013-01-01

    Full Text Available We propose a disk encryption method, called Secure Disk Mixed System (SDMS in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system.

  14. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  15. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  16. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  17. Indicators for energy security

    NARCIS (Netherlands)

    Kruyt, B.; van Vuuren, D.P.; de Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability,

  18. Music cognition and the cognitive sciences.

    Science.gov (United States)

    Pearce, Marcus; Rohrmeier, Martin

    2012-10-01

    Why should music be of interest to cognitive scientists, and what role does it play in human cognition? We review three factors that make music an important topic for cognitive scientific research. First, music is a universal human trait fulfilling crucial roles in everyday life. Second, music has an important part to play in ontogenetic development and human evolution. Third, appreciating and producing music simultaneously engage many complex perceptual, cognitive, and emotional processes, rendering music an ideal object for studying the mind. We propose an integrated status for music cognition in the Cognitive Sciences and conclude by reviewing challenges and big questions in the field and the way in which these reflect recent developments. PMID:23060125

  19. Los Alamos CCS (Center for Computer Security) formal computer security model

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  20. Building Letters

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Cabinet是种十分吸引人却很简单的衬线字体,是由一名匿名字体设计师专门为Building Letters最新的资金筹集活动所设计的。这个Building Letters包中包含一个CDROM,有32种字体,以及一本专门设计的杂志和两张由Eboy和Emigre所设计的海报。字体光盘样例是由世界顶级的字体设计师们设计的.

  1. Ideology, motivated reasoning, and cognitive reflection

    Directory of Open Access Journals (Sweden)

    Dan M. Kahan

    2013-07-01

    Full Text Available Decision scientists have identified various plausible sources of ideological polarization over climate change, gun violence, national security, and like issues that turn on empirical evidence. This paper describes a study of three of them: the predominance of heuristic-driven information processing by members of the public; ideologically motivated reasoning; and the cognitive-style correlates of political conservativism. The study generated both observational and experimental data inconsistent with the hypothesis that political conservatism is distinctively associated with either unreflective thinking or motivated reasoning. Conservatives did no better or worse than liberals on the Cognitive Reflection Test (Frederick, 2005, an objective measure of information-processing dispositions associated with cognitive biases. In addition, the study found that ideologically motivated reasoning is not a consequence of over-reliance on heuristic or intuitive forms of reasoning generally. On the contrary, subjects who scored highest in cognitive reflection were the most likely to display ideologically motivated cognition. These findings corroborated an alternative hypothesis, which identifies ideologically motivated cognition as a form of information processing that promotes individuals' interests in forming and maintaining beliefs that signify their loyalty to important affinity groups. The paper discusses the practical significance of these findings, including the need to develop science communication strategies that shield policy-relevant facts from the influences that turn them into divisive symbols of political identity.

  2. Model Building

    OpenAIRE

    Frampton, Paul H.

    1997-01-01

    In this talk I begin with some general discussion of model building in particle theory, emphasizing the need for motivation and testability. Three illustrative examples are then described. The first is the Left-Right model which provides an explanation for the chirality of quarks and leptons. The second is the 331-model which offers a first step to understanding the three generations of quarks and leptons. Third and last is the SU(15) model which can accommodate the light leptoquarks possibly...

  3. Building economics

    DEFF Research Database (Denmark)

    Pedersen, D.O.(red.)

    Publikationen er på engelsk. Den omfatter alle indlæg på det fjerde internationale symposium om byggeøkonomi, der blev arrangeret af SBI for det internationale byggeforskningsråd CIB. De fem bind omhandler: Methods of Economic Evaluation, Design Optimization, Ressource Utilization, The Building...... Market og Economics and Technological Forecasting in Construction. Et indledende bind bringer statusrapporter for de fem forskningsområder, og det sidste bind sammenfatter debatten på symposiet....

  4. A cognitive model's view of animal cognition

    OpenAIRE

    Sidney D'MELLO, Stan FRANKLIN

    2011-01-01

    Although it is a relatively new field of study, the animal cognition literature is quite extensive and difficult to synthesize. This paper explores the contributions a comprehensive, computational, cognitive model can make toward organizing and assimilating this literature, as well as toward identifying important concepts and their interrelations. Using the LIDA model as an example, a framework is described within which to integrate the diverse research in animal cognition. Such a framework c...

  5. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    F. Habashi

    2000-06-22

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from most of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR

  6. Wide Area Security Region Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  7. A cognitive model's view of animal cognition

    Directory of Open Access Journals (Sweden)

    Sidney D'MELLO, Stan FRANKLIN

    2011-08-01

    Full Text Available Although it is a relatively new field of study, the animal cognition literature is quite extensive and difficult to synthesize. This paper explores the contributions a comprehensive, computational, cognitive model can make toward organizing and assimilating this literature, as well as toward identifying important concepts and their interrelations. Using the LIDA model as an example, a framework is described within which to integrate the diverse research in animal cognition. Such a framework can provide both an ontology of concepts and their relations, and a working model of an animal’s cognitive processes that can compliment active empirical research. In addition to helping to account for a broad range of cognitive processes, such a model can help to comparatively assess the cognitive capabilities of different animal species. After deriving an ontology for animal cognition from the LIDA model, we apply it to develop the beginnings of a database that maps the cognitive facilities of a variety of animal species. We conclude by discussing future avenues of research, particularly the use of computational models of animal cognition as valuable tools for hypotheses generation and testing [Current Zoology 57 (4: 499–513, 2011].

  8. Secure Transportation Management

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2014-01-01

    The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.

  11. Poland's gas security

    OpenAIRE

    Rosicki, Remigiusz

    2015-01-01

    The subject matter analyzed in the text is Poland’s energy security as illustrated with the security of gas supply (gas supply security). The text analyzes a selection of problems concerned with gas security and so the focus is on: (1) a description of gas supply contracts, and (2) an assessment of gas supply security with regard to the technical import capabilities of the transmission infrastructure. In both cases two time-frames were applied: (1) 2006–2010, (2) the period after 2010 with a ...

  12. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  13. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  14. Network Security Using Firewalls

    Directory of Open Access Journals (Sweden)

    Radu Lucaciu

    2008-05-01

    Full Text Available As networks increase in size and complexity, security products are growing in sophistication and security threats are becoming more ingenious. The usage of security solutions has become inevitable for all modern organisations. There is no perfect security, but the idea is to make a network so hard to access, that it doesn’t worth trying. One of the crucial components that contribute to this security are firewalls. It is important to prevent undesired data before it ever gets into the target system. This is the job of firewalls and the article covers this topic.

  15. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  16. Security Policies for Securing Cloud Databases

    Directory of Open Access Journals (Sweden)

    Ingrid A. Buckley

    2014-07-01

    Full Text Available Databases are an important and almost mandatory means for storing information for later use. Databases require effective security to protect the information stored within them. In particular access control measures are especially important for cloud databases, because they can be accessed from anywhere in the world at any time via the Internet. The internet has provided a plethora of advantages by increasing accessibility to various services, education, information and communication. The internet also presents challenges and disadvantages, which include securing services, information and communication. Naturally, the internet is being used for good but also to carry out malicious attacks on cloud databases. In this paper we discuss approaches and techniques to protect cloud databases, including security policies which can realized as security patterns.

  17. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  18. Towards robust experimental design for user studies in security and privacy

    OpenAIRE

    Krol, K.; Spring, J. M.; Parkin, S.; Sasse, M. A.

    2016-01-01

    Background: Human beings are an integral part of computer security, whether we actively participate or simply build the systems. Despite this importance, understanding users and their interaction with security is a blind spot for most security practitioners and designers. / Aim: Define principles for conducting experiments into usable security and privacy, to improve study robustness and usefulness. / Data: The authors’ experiences conducting several research projects com...

  19. Organisation of personal security in foreign operations : Cases: Export companies from Capital Region

    OpenAIRE

    Hookana, Risto

    2016-01-01

    The purpose of this thesis is to study what Finnish companies are doing in order to safeguard the personal security of their employees in foreign operations. The studied companies are examined in three different themes: what are the current issues and trends regarding personal security in foreign operations, how companies feel about using external security services in foreign operations and what aspects in companies build the personal security in foreign operations. This thesis was ...

  20. Building a global information assurance program

    CERN Document Server

    Curts, Raymond J

    2002-01-01

    INTRODUCTION TO INFORMATION ASSURANCE (IA)AuthenticationConfidentialityNon-repudiationBASIC CONCEPTSAttributesInformation AttributesPure Information AttributesAttributes Influenced by the SystemSystem AttributesSecurity AttributesInformation System Support Planning PrinciplesThe Bottom Line, RevisitedInformation Assurance (IA)Commercial CapabilitiesSecurityNetwork ViewsRisk ManagementCognitive HierarchyTypes of LogicSummaryRISK, THREAT AND VULNERABILITYOVERVIEW OF SYSTEMS ENGINEERINGA Systems Engineering Case StudyCase Study BackgroundThe MissionThe GoalAn Approach Toward A SolutionCase Tools:

  1. Envisioning Cognitive Robots for Future Space Exploration

    Science.gov (United States)

    Huntsberger, Terry; Stoica, Adrian

    2010-01-01

    Cognitive robots in the context of space exploration are envisioned with advanced capabilities of model building, continuous planning/re-planning, self-diagnosis, as well as the ability to exhibit a level of 'understanding' of new situations. An overview of some JPL components (e.g. CASPER, CAMPOUT) and a description of the architecture CARACaS (Control Architecture for Robotic Agent Command and Sensing) that combines these in the context of a cognitive robotic system operating in a various scenarios are presented. Finally, two examples of typical scenarios of a multi-robot construction mission and a human-robot mission, involving direct collaboration with humans is given.

  2. Learning Tools and Applications for Cognitive Improvement

    Directory of Open Access Journals (Sweden)

    Athanasios Drigas

    2014-06-01

    Full Text Available Learning technologies are an indispensable tool for students’ cognitive improvement and assessment. ICTs in coordination with a concrete pedagogical framework may provide students and teachers flexible, engaging, cost-effective and above all, personalized learning experiences, which focus on the adoption of the 21st century cognitive skills into the actual learning process. Such higher order thinking skills (HOTS entail critical thinking, problem solving, independent inquiry, creativity, communication, collaboration, digital literacy. Therefore, technologically-supported educational environments aim at self-regulated and inquisitive, constructivist, knowledge building rather than knowledge accumulation.

  3. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  4. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Energy Technology Data Exchange (ETDEWEB)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  5. Building Technologies Program Vision, Mission, and Goals

    Energy Technology Data Exchange (ETDEWEB)

    None

    2011-12-15

    The Vision, Mission, and Goals of the Building Technologies Program (BTP) focus on short term energy efficiency outcomes such as improved economic environment, enhanced comfort, and affordability that collectively benefit our nation. Long-term goals focus on helping secure our nation's energy independence.

  6. Cognitions about Cognitions: The Theory of Metacognition

    Science.gov (United States)

    PP, Noushad

    2008-01-01

    This paper proposes a theoretical review of the term "metacognition". It was introduced by John Flavell in the early 1970s based on the term "metamemory" previously conceived by the same scholar (Flavell 1971). Flavell (1979) viewed metacognition as learners' knowledge of their own cognition, defining it as "knowledge and cognition about cognitive…

  7. Human Security Agendas

    Institute of Scientific and Technical Information of China (English)

    Alan Hunter

    2012-01-01

    Ⅰ.IntroductionThe need for governments and international organisations to gain a better understanding of "security" is ever more urgent.For example in the conflict in Libya in early 2011,many security dilemmas were visible:the protection of Libyan civilians,the security of the regime,whether and how the UN or NATO should intervene,whether Europe would be threatened with a massive refugee flow,how to protect or evacuate foreign citizens (including Chinese),how to secure food and medical supplies in the midst of armed conflict.Such events may be termed "complex emergencies" which often raise legal, military and humanitarian issues simultaneously.International law and practice do not provide clear guidelines on such situations,and responses can be random,contingent on a variety of factors.Traditional concepts of security,for example protection of national borders,are certainly still relevant and legally enforceable,but more sophisticated concepts are needed to respond to security dilemmas in today's globalised world.Human security as a concept was first developed within the UN system in the 1990s,and set out,for example,in Human Security Now [1] The first section of this paper tracks the development of Human Security discourse,and also examines the broadening of the "security"concept in recent years.The second section reports on institutions with a specific interest in Human Security,for example within the UN system and in universities.The third section acknowledges some critiques of the Human Security paradigm.The last section reports on new directions that may enrich the Human Security agenda.

  8. Ethical principles and guidelines for the development of cognitive systems.

    Energy Technology Data Exchange (ETDEWEB)

    Shaneyfelt, Wendy

    2006-05-01

    As cognitive systems technologies emerge, so too do the ethical issues surrounding their development and use. To develop cognitive systems technologies responsibly, Sandia National Laboratories is establishing a framework to proactively address both real and potential ethical issues. This report contains the principles and guidelines developers can use to guide them as they are confronted with ethical issues related to developing cognitive systems technologies as they apply to U.S. national security. A process to apply these principles offers a practical way to transfer these principles from paper to a working strategy. Case studies are presented to reflect upon potential scenarios and to consider resolution strategies.

  9. Cognitive training for dementia

    OpenAIRE

    Konta, Brigitte; Frank, Wilhelm

    2005-01-01

    The aim of the HTA report is to evaluate the effectiveness of cognitive training methods to treat cognitive disorders of dementia and other diseases with cognitive deficits. For this purpose, a systematic literature search was carried out first based on the DIMDI superbase retrieval. The identified publications were judged and selected by two independent, methodically competent experts. 33 publications were included in the report. Based on the studies for a normal cognitive development in old...

  10. Networks and network analysis for defence and security - a book review

    OpenAIRE

    Ferreira, Manuel Alberto M.

    2014-01-01

    It is intended in this work to review the book"Networks and Network Analysis for Defence and Security", 978-3-319-04146-9 published in Springer Series “Lecture Notes in Social Networks”. In this book the following areas are covered: Defence and security risk analysis; Criminal intelligence; Cyber crime;Cognitive analysis; Counter-terrorism and Social Network Analysis; Transnational Crime; Critical infrastructure analysis; Support to defence and security intelligence, emphasizing the idea that...

  11. Affective Scaffolds, Expressive Arts, and Cognition

    Science.gov (United States)

    Maiese, Michelle

    2016-01-01

    Some theorists have argued that elements of the surrounding world play a crucial role in sustaining and amplifying both cognition and emotion. Such insights raise an interesting question about the relationship between cognitive and affective scaffolding: in addition to enabling the realization of specific affective states, can an affective niche also enable the realization of certain cognitive capacities? In order to gain a better understanding of this relationship between affective niches and cognition, I will examine the use of expressive arts in the context of psychotherapy and peacebuilding. In these settings, environmental resources and interpersonal scaffolds not only evoke emotion and encourage the adoption of particular bodily affective styles, but also support the development of capacities for self-awareness and interpersonal understanding. These affective scaffolds play a crucial role in therapy and peacebuilding, in fact, insofar as they facilitate the development of self-knowledge, enhance capacities associated with social cognition, and build positive rapport and trust among participants. I will argue that this is because affectivity is linked to the way that subjects frame and attend to their surroundings. Insofar as the regulation and modification of emotion goes hand in hand with opening up new interpretive frames and establishing new habits of mind, the creation of an affective niche can contribute significantly to various modes of cognition. PMID:27014164

  12. Crew goal setting for security control

    OpenAIRE

    Wetter, Olive Emil; Hofer, Franziska; Jonas, Klaus

    2013-01-01

    This study investigated the effectiveness, efficiency, and robustness of simple goal setting in airport security control. As outcome, crew performance in terms of productivity (Experiment 1, field setting) was studied. Furthermore, the moderating role of negative and positive priming due to a previous task on the impact of goals (Experiment 2, laboratory setting) was analyzed. This research builds a bridge from goal setting theory to practice and prepares the grounds for its application in se...

  13. Security in the web services framework

    OpenAIRE

    Li, Chen; Pahl, Claus

    2003-01-01

    The Web Services Framework provides techniques to enable the application-to-application use of the Web. It has the potential of becoming the core of a new Web-based middleware platform, providing interoperability between computational services using Web- and Internet-technologies. Security is of course of major importance in this context. We introduce here extensions to two major building blocks of the Web Services Framework – the Web Services Description Language WSDL and the Universal De...

  14. Security Testing of WebSockets

    OpenAIRE

    Kuosmanen, Harri

    2016-01-01

    The current state of WebSocket is not an exception when it comes to security issues in traditional web applications. There are vulnerabilities that commonly exist in WebSocket implementations that any attacker could potentially exploit. In order to build a protection to avoid these vulnerabilities it needs to be understood what the vulnerabilities are and how they are discovered, how can they be exploited, and how can they be defended against. Many of the commonly known web applicatio...

  15. Enhancing Security and Usability Features of NFC

    OpenAIRE

    Beygo, Ömer Kerem; Eraslan, Cihan

    2009-01-01

    Near Field Communication (NFC) is a short range wireless communication protocol which is primarily intended to be used on mobile phones. Building upon existing infrastructure of RFID, NFC brings simplicity for connection of mobile devices, service initiation, mobile payment and ticketing. However, NFC still remains as a field that number of researches done are limited. The aim of this paper was to provide solutions for the problems of NFC that cause security risks and hurt user experience. To...

  16. Cyberspace Forensics Readiness and Security Awareness Model

    Directory of Open Access Journals (Sweden)

    Aadil Al-Mahrouqi

    2015-06-01

    Full Text Available The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs. However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1 Forensics Readiness, 2 Active Forensics, and 3 Forensics Awareness.

  17. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  18. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled Protection against nuclear terrorism: Protection of radioactive sources. In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  19. The Tractable Cognition thesis

    NARCIS (Netherlands)

    Rooij, I.J.E.I. van

    2008-01-01

    The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the Tractable Cognition thesis: Human cognitive capacities are constrained by computational tractability. This thesis, if true, serves cognitive psychology by constra

  20. The Tractable Cognition Thesis

    Science.gov (United States)

    van Rooij, Iris

    2008-01-01

    The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the "Tractable Cognition thesis": Human cognitive capacities are constrained by computational tractability. This thesis, if true, serves cognitive psychology by constraining the space of computational-level theories…

  1. Interactive Team Cognition

    Science.gov (United States)

    Cooke, Nancy J.; Gorman, Jamie C.; Myers, Christopher W.; Duran, Jasmine L.

    2013-01-01

    Cognition in work teams has been predominantly understood and explained in terms of shared cognition with a focus on the similarity of static knowledge structures across individual team members. Inspired by the current zeitgeist in cognitive science, as well as by empirical data and pragmatic concerns, we offer an alternative theory of team…

  2. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  3. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  4. Anatomy of a Security Operations Center

    Science.gov (United States)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  5. Security through Play

    OpenAIRE

    Gondree, Mark; Peterson, Zachary N. J.; Denning, Tamara

    2013-01-01

    Precollege classrooms have neither the support nor the room to explore computer security topics. At best, students are the targets of in-school safety campaigns, absorbing rules and best practices that only hint at the rich landscape of security problems. How to expose young students to cybersecurity outside the classroom!to computer security technology, concepts, and careers!is a challenge. Unfortunately, popular media might give more visibility to cybe...

  6. Security consideration for virtualization

    OpenAIRE

    Gebhardt, Carl

    2008-01-01

    Virtualization is not a new technology, but has recently experienced a resurgence of interest among industry and research. New products and technologies are emerging quickly, and are being deployed with little considerations to security concerns. It is vital to understand that virtualization does not improve security by default. Hence, any aspect of virtualization needs to undergo constant security analysis and audit. Virtualization is a changeable and very dynamic field wit...

  7. ITIL® and information security

    International Nuclear Information System (INIS)

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  8. Information Security Training & Awareness

    OpenAIRE

    Hogervorst, Monique

    2009-01-01

    Information security standards, best practices and literature all identify the need for Training & Awareness, the theory is clear. The surveys studied show that in the real world the situation is different: the focus of businesses is still on technical information security controls aimed at the external attacker. And although threats and vulnerabilities point out that personnel security becomes more important, the attitude of managers and employees does not reflect tha...

  9. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  10. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  11. Secure shell session resumption

    OpenAIRE

    Kuryla, S. V.

    2009-01-01

    The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. However, using modern cryptography techniques might be computationally expensive, especially for low-end devices such as wireless access points and DSL routers. Here I present an implementation of a session resumption mechanism that has been proposed earlier to improve the performance of SSI I.

  12. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  13. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  14. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  15. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  16. Beyond grid security

    International Nuclear Information System (INIS)

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  17. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2004-01-01

    For more than a decade, the Information Security Management Handbook has served as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination and as a reference for information security practitioners. Now thoroughly revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a comprehensive understanding of all the items in it. This is a valuable book, both for preparing for the CISSP exam and as a complete, up-to

  19. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  20. Idle School Buildings in Rural Areas: Will they Be Useful?

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Taking the case of Enshi City,we survey the supply of public services in rural areas from education,health,culture and social security; reveal the relationship between the use of idle school buildings in rural areas and the improvement of public services in rural areas. On the basis of expounding the status quo of idle school buildings and public services in rural areas of Enshi City,the following recommendations are put forward: using the idle school buildings to develop rural public education; using the idle school buildings to develop rural public health and medical services; using the idle school buildings to develop public cultural undertakings in rural areas; using the idle school buildings to develop social security undertakings in rural areas.