WorldWideScience

Sample records for building secure cognitive

  1. Soft Computing - A step towards building Secure Cognitive WLAN

    CERN Document Server

    Lingareddy, S C; Babu, Dr Vinaya; Dhruve, Kashyap

    2010-01-01

    Wireless Networks rendering varied services has not only become the order of the day but the demand of a large pool of customers as well. Thus, security of wireless networks has become a very essential design criterion. This paper describes our research work focused towards creating secure cognitive wireless local area networks using soft computing approaches. The present dense Wireless Local Area Networks (WLAN) pose a huge threat to network integrity and are vulnerable to attacks. In this paper we propose a secure Cognitive Framework Architecture (CFA). The Cognitive Security Manager (CSM) is the heart of CFA. The CSM incorporates access control using Physical Architecture Description Layer (PADL) and analyzes the operational matrices of the terminals using multi layer neural networks, acting accordingly to identify authorized access and unauthorized usage patterns.

  2. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  3. Cognitive Study of Building Metaphor

    Institute of Scientific and Technical Information of China (English)

    牛惠君

    2015-01-01

    Metaphor is a universal phenomenon,the traditional metaphor studies it as a means of rhetoric,but metaphor of modern sees it as a cognitive phenomenon.In our life most of the everyday language is metaphor,our mind is also the metaphor.Meta-phor has become an indispensable tool for understanding the world.There are a lot of “building”metaphorical expressions in the life, construction is an important component of people’s lives. K?vecses (2002)discussed briefly some conceptual metaphors of the construction in English,Deignan (2001)make a compre-hensive study on building metaphors which underlie some metaphor expression of “building and construction”.Lan Chun (2003)only referred to “theory is building”,but the concept of “life,relationships”can be understood through building concept,these relative ab-stract concepts can be understood by clear concrete building concept.Hence the studies of building metaphors have not been systematic and comprehensive,people seldom study it.We plan to give a contrastive study of building metaphors.This will further deepen peo-ple’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  4. Building a strategic security organisation.

    Science.gov (United States)

    Howard, Mike

    2016-01-01

    In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size. PMID:27318284

  5. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists. PMID:26399948

  6. Cognitive hacking and intelligence and security informatics

    Science.gov (United States)

    Thompson, Paul

    2004-08-01

    This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.

  7. Building Secure Networked Systems with Code Attestation

    Science.gov (United States)

    Perrig, Adrian

    Attestation is a promising approach for building secure systems. The recent development of a Trusted Platform Module (TPM) by the Trusted Computing Group (TCG) that is starting to be deployed in common laptop and desktop platforms is fueling research in attestation mechanisms. In this talk, we will present approaches on how to build secure systems with advanced TPM architectures. In particular, we have designed an approach for fine-grained attestation that enables the design of efficient secure distributed systems, and other network protocols.We demonstrate this approach by designing a secure routing protocol.

  8. Research and Analysis on Cognitive Radio Network Security

    OpenAIRE

    Juebo Wu; Long Tang

    2012-01-01

    This paper firstly gives a detail analysis on the security problems faced in cognitive radio network, and introduces the basic issues about cognitive radio network. Then, according to the differences between cognitive radio network and existing wireless network, it analyses and discusses the dynamic spectrum access security and artificial intelligence. Finally, it draws a conclusion to security problems of cross layer design.

  9. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  10. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The...

  11. Human Capacity Building in Nuclear Security

    International Nuclear Information System (INIS)

    Nuclear security continuously calls for professionals, familiar with established approaches and challenged by innovations and state-of-the art developments in the associated technology and procedures. The constant loss of qualified personnel due to career development, retirement and administrative changes negatively affects a State’s readiness to carry out nuclear security tasks effectively. At the same time, technology and procedures are evolving at an increasing pace with the introduction of new equipment and techniques. Consequently, there is a rapidly growing need for highly qualified experts in nuclear security at the national level. It was estimated by the World Institute for Nuclear Security, WINS, [1] that worldwide several thousands of people would benefit from education and training in nuclear security. Many employers do not have such a route to realize demonstrable competence. As such, the associated capacity building is to be delivered by the academia, matching education in academic skills with basic knowledge in nuclear security and with the latest trends in associated fields such as nuclear physics, security sciences and (international) legislation

  12. Autopoiesis + extended cognition + nature = can buildings think?

    OpenAIRE

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and bio...

  13. Autopoiesis + extended cognition + nature = can buildings think?

    Science.gov (United States)

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and biocomputation. I trace computation and botanic simulations back to Alan Turing's little-known 1950s Morphogenetic drawings, reaction-diffusion algorithms, and pioneering artificial intelligence (AI) in order to establish bioarchitecture's generative point of origin. I ask provocatively, Can buildings think? as a question echoing Turing's own, "Can machines think?" PMID:26478784

  14. Security-aware cooperation in cognitive radio networks

    CERN Document Server

    Zhang, Ning

    2014-01-01

    This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into

  15. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  16. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  17. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured with a...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties of the...... permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible...

  18. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.

    Science.gov (United States)

    Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017

  19. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism

    Directory of Open Access Journals (Sweden)

    Dongmei Han

    2015-01-01

    Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.

  20. Cognitive Radio for Smart Grid with Security Considerations

    Directory of Open Access Journals (Sweden)

    Khaled Shuaib

    2016-04-01

    Full Text Available In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large.

  1. Management and Security for Grid, Cloud and Cognitive Networks

    Directory of Open Access Journals (Sweden)

    WESTPHALL, C. B

    2011-12-01

    Full Text Available This paper present a number of research initiatives related to innovative and cut-edge technologies for Cloud Computing. These are chiefly in the fields of (i environment security, (ii quality assurance, (iii service composition, and (iv system management. We present technologies for intrusion detection; a SLA perspective in security management; customer security concerns; a Cloud-based solution for eHealth; experimental assessment of routing for grid and cloud; simulator improvements to validate the green cloud computing approach, and; a framework to radio layer operation in cognitive networks.

  2. ROLE OF NET ZERO ENERGY BUILDING IN ENERGY SECURITY

    OpenAIRE

    Santosh D Jadhav

    2015-01-01

    Buildings have significant impact on energy use and the environment which in turn affects the development of country. Buildings are significant cause of climate change and energy security. In India , Buildings consumes more than 40% of country’s energy and responsible for almost 40% of greenhouse gas emissions. Many initiatives taken by Government of India to increase the efficiency of buildings such as Bachat Lamp Yojna, Use of Energy Efficient Lamps. Suc...

  3. Building Secure Systems using Mobile Agents

    OpenAIRE

    Shibli, Muhammad Awais

    2006-01-01

    The progress in the field of computer networks and Internet is increasing with tremendous volume in recent years. This raises important issue with regards to security. Several solutions emerged in the past which provide security at host or network level. These traditional solutions like antivirus, firewall, spy-ware, and authentication mechanisms provide security to some extends, but they still face the challenge of inherent system flaws, OS bugs and social engineering attacks. Recently, some...

  4. The Building Blocks of School Security.

    Science.gov (United States)

    Funck, Gary

    1999-01-01

    Few schools command the funding to shift from zero security to updated closed-circuit TV systems. Cost-effective school security identification cards, which provide a rapid means of identifying those belonging on campus, can be integrated with administrative systems to track attendance, age, subject studied, and other vital statistics. (MLH)

  5. Methodological Approach to Risk Assessment in Building Security

    OpenAIRE

    Adelsberger, Zdenko; Grubor, Gojko; Nađ, Ivan

    2014-01-01

    Building object (or asset) security has always been a burning subject in all systems and regimes since ancient times, and will always be. The reason for this lies solely in the fact that these objects have a high material, historical, cultural and other value. Therefore, the owners of such buildings, regardless of whether they are the public, civic or some other social institutions, organizations or individuals, have always paid, more or less, attention to the issue of security of such object...

  6. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  7. Cognitive Radio for Smart Grid: Theory, Algorithms, and Security

    Directory of Open Access Journals (Sweden)

    Raghuram Ranganathan

    2011-01-01

    Full Text Available Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is presented. A brief overview of the cognitive radio, IEEE 802.22 standard and smart grid, is provided. Experimental results obtained by using dimensionality reduction techniques such as principal component analysis (PCA, kernel PCA, and landmark maximum variance unfolding (LMVU on Wi-Fi signal measurements are presented in a spectrum sensing context. Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. From the power system point of view, a supervised learning method called support vector machine (SVM is used for the automated classification of power system disturbances. The impending problem of securing the smart grid is also addressed, in addition to the possibility of applying FPGA-based fuzzy logic intrusion detection for the smart grid.

  8. ENHANCING BUILDING SECURITY with RFID and ZIGBEE

    Directory of Open Access Journals (Sweden)

    Hemalatha.M

    2013-02-01

    Full Text Available ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by the smart node are transmitted to the base node through ZigBee. If the temperature exceeds or an overload occurs, a set of remote control instructions are executed in the PC. The base node instructs the smart node to cut off the power to the corresponding branch circuit. The entire operation can be monitored from a remote station. In this proposed system, RFID technique is added to provide a theft control mechanism. To prevent theft of valuables from an unauthorized person,RFID tags are used. RFID reader senses the RFID labels (master/slave tags continuously and sends the information to a PC through ZigBee protocol. The database is checked in PC with the received information. If there is any mismatch in the RFID tags, it is considered to be an illegal input and a warning message is generated at the PC. The database is checked for the owner of that particular item and a confirming message is send to that owner. To search for that item the owner can login WEB. The valuable will be stopped by the entrance guard.

  9. DESIGN AND IMPLEMENTATION OF A COMPUTER CONTROLLED BUILDING SECURITY SYSTEM

    OpenAIRE

    ÇOLAK, İlhami; IRMAK, Erdal

    2010-01-01

    ABSTRACTIn this study, a computer controlled building security system based on CANModul-592 microcontroller has been designed and implemented. The system includes fire alarm and intrusion detectors. The signals generated by detectors are transmitted to CANModul-592 that processes the signals and then sends to a computer via parallel port for controlling and visualization of the system. A program for monitoring and parallel port communication has been developed in Borland Delphi 4.0. The achie...

  10. Building Blocks for Cognitive Robots: Embodied Simulation and Schemata in a Cognitive Architecture

    OpenAIRE

    Hemion, Nikolas

    2013-01-01

    Building robots with the ability to perform general intelligent action is a primary goal of artificial intelligence research. The traditional approach is to study and model fragments of cognition separately, with the hope that it will somehow be possible to integrate the specialist solutions into a functioning whole. However, while individual specialist systems demonstrate proficiency in their respective niche, current integrated systems remain clumsy in their performance. Recent findings in ...

  11. New realities: Disarmament, peace-building and global security

    International Nuclear Information System (INIS)

    This publication contains excerpts from the conference on new realities: Disarmament, peace-building and global security organized by the Non-Governmental Organization Committee on Disarmament at the United Nations, 20-23 April, 1993, during the regular session of the Disarmament Commission which took place in New York in April-May, 1993. This conference focused on important and topical disarmament and peacemaking issues, and was an opportunity for delegates, non-governmental organization representatives, United Nations staff members and interested individuals to exchange information and discuss the issues in an informal and cordial atmosphere

  12. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  13. Cross-Pillar Security Regime Building in the European Union: Effects of the European Security Strategy of December 2003

    Directory of Open Access Journals (Sweden)

    Annegret Bendiek

    2006-09-01

    Full Text Available Using an empirically driven case study of the effects of the European Security Strategy of December 2003 this article assesses the trends and nature of European security regime building. In assessing EU security regime building it explores, first of all, a securitisation of the European agenda as a top-down approach – initialled by the European Council that extends the security zone on Europe’s periphery through the emergence of a multilateral order and the development of the foreign and security tool box. Secondly, this research suggests that the EU security regime building as a bottom-up process remains under construction within all three EU pillars by everyday policy-making. More important is the fact that the EU pursues a rigid strategy seeking to create the most total vision of a multidimensional security understanding in order to privilege the fight against terrorism at the regional and global level.

  14. How to build resilience to conflict: The role of food security

    OpenAIRE

    Breisinger, Clemens; Ecker, Olivier; Maystadt, Jean-François; Trinh Tan, Jean-François; Al-Riffai, Perrihan; Bouzar, Khalida; Sma, Abdelkarim; Abdelgadir, Mohamed

    2014-01-01

    This Food Policy Report explains why there is a need to place even higher priority on food security-related policies and programs in conflict-prone countries, and offers insights for policymakers regarding how to do so. To understand the relationship between conflict and food security, this report builds a new conceptual framework of food security and applies it to four case studies on Egypt, Somalia, Sudan, and Yemen. It argues that food security-related policies and programs build resilienc...

  15. Cognitive Radio for Smart Grid: Theory, Algorithms, and Security

    OpenAIRE

    Raghuram Ranganathan; Robert Qiu; Zhen Hu; Shujie Hou; Marbin Pazos-Revilla; Gang Zheng; Zhe Chen; Nan Guo

    2011-01-01

    Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs) that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is pres...

  16. Secured Distributed Cognitive MAC and Complexity Reduction in Channel Estimation for the Cross Layer based Cognitive Radio Networks

    CERN Document Server

    Shakhakarmi, Niraj

    2012-01-01

    Secured opportunistic Medium Access Control (MAC) and complexity reduction in channel estimation are proposed in the Cross layer design Cognitive Radio Networks deploying the secured dynamic channel allocation from the endorsed channel reservation. Channel Endorsement and Transmission policy is deployed to optimize the free channel selection as well as channel utilization to cognitive radio users. This strategy provide the secured and reliable link to secondary users as well as the collision free link to primary users between the physical and MAC layers which yields the better network performance. On the other hand, Complexity Reduction in Minimum Mean Square Errror (CR-MMSE) and Maximum Likelihood (CR-ML) algorithm on Decision Directed Channel Estimation (DDCE) is deployed significantly to achieve computational complexity as Least Square (LS) method. Rigorously, CR-MMSE in sample spaced channel impulse response (SS-CIR) is implemented by allowing the computationally inspired matrix inversion. Regarding CR-ML...

  17. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  18. Children and Security Sector Reform in Post-conflict Peace-building

    OpenAIRE

    David Nosworthy

    2010-01-01

    The restoration of justice and security is a priority of post-conflict peace-building, but children and youth - two groups especially affected by armed conflict - rarely receive consideration in this process. This paper considers how reform of the security sector can contribute to making security provision more relevant to the concerns of young people and more reflective of their needs and aspirations. Security sector reform and transitional justice have been recognized as central elements of...

  19. HUMAN SECURITYBUILDING THE POST-2015 DEVELOPMENT FRAMEWORK

    OpenAIRE

    Andreea IANCU

    2015-01-01

    This article approaches the post-2015 Millennium Development Goals agenda through the human security paradigm. It suggests that the human security paradigm represents “the missing link” from the development agenda. Therefore, this analysis explains the necessity for extending the development agenda by including the human security doctrine. The first part of the article discusses the relation between human security and development. The next section analyzes the values of the Millennium Declara...

  20. COGNITIVE AGENTS BASED SECURITY SCHEME TO HANDLE ROUTING LOOPS IN WIRELESS NETWORKS

    OpenAIRE

    Kumar, R.; G. Kousalya

    2014-01-01

    Routers in wireless networks are often prone to variety of attacks like a man in the middle, distributed denial of service, smurf, ping of death, routing loops, counting to infinity. Among all these attacks routing loop is the most common one and it have a harmful effect on network performance. In this study, we have proposed a novel cognitive agents based security scheme to handle routing loops in wireless networks. The proposed scheme uses Cognitive Agents (CAs) on every routers with Observ...

  1. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  2. Design Considerations for a Cognitive Radio Trust and Security Framework

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.;

    2012-01-01

    In cognitive radio (CR) systems communication is not restricted to pre-assigned channels, but is rather able to opportunistically detect and use appropriate portions of spectrum. Although much research effort has been put into this new technology, the technical focus has been mainly directed...

  3. Lessons Learned and the Prospects of ISCN's Nuclear Security Capacity Building Support

    International Nuclear Information System (INIS)

    Upon its establishment in accordance with Japan’s commitment statement at the 2010 Nuclear Security Summit in Washington DC, the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) was missioned to provide support to efforts to strengthen nuclear security regimes internationally and nationally. Although capacity building support for safeguards has proven to be useful in ISCN’s experience, some nuclear security-specific features need to be considered regarding its application to nuclear security. These features include the self-determining nature of nuclear security requirements, the importance of nuclear security culture for its performance, and the involvement of professionals from a variety of backgrounds. These features have added a new perspective to ISCN’s approach to its nuclear security capacity building support. The paper presents this approach and what lessons can be drawn for its advancement. It begins with a description of challenges to nuclear security capacity building support, introduces ISCN’s experience in addressing these challenges, and discusses how to apply lessons learned to advance our nuclear security capacity building support. (author)

  4. Building a cognitive map by assembling multiple path integration systems.

    Science.gov (United States)

    Wang, Ranxiao Frances

    2016-06-01

    Path integration and cognitive mapping are two of the most important mechanisms for navigation. Path integration is a primitive navigation system which computes a homing vector based on an animal's self-motion estimation, while cognitive map is an advanced spatial representation containing richer spatial information about the environment that is persistent and can be used to guide flexible navigation to multiple locations. Most theories of navigation conceptualize them as two distinctive, independent mechanisms, although the path integration system may provide useful information for the integration of cognitive maps. This paper demonstrates a fundamentally different scenario, where a cognitive map is constructed in three simple steps by assembling multiple path integrators and extending their basic features. The fact that a collection of path integration systems can be turned into a cognitive map suggests the possibility that cognitive maps may have evolved directly from the path integration system. PMID:26442503

  5. Building trust into light-handed regulations for cognitive radio

    OpenAIRE

    Woyach, Kristen Ann

    2013-01-01

    This thesis introduces an incentive-based trust model to let wireless spectrum regulation embrace diverse current and future means of implementing cognitive radio.Cognitive radio has emerged as a way to combat inefficient spectrum use by allowing independently designed networks to share the same frequency band. This philosophy has been embraced by the FCC, which has already allowed cognitive use in the TV bands, and plans to make spectrum sharing the norm in other bands as well. To enact spec...

  6. Building a Cognitive Radio: From Architecture Definition to Prototype Implementation

    OpenAIRE

    Le, Bin

    2007-01-01

    Cognitive radio (CR) technology introduces a revolutionary wireless communication mechanism in terminals and network segments, so that they are able to learn their environment and adapt intelligently to the most appropriate way of providing the service for the user's exact need. By supporting multi-band, mode-mode cognitive applications, the cognitive radio addresses an interactive way of managing the spectrum that harmonizes technology, market and regulation. This dissertation gives ...

  7. Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Directory of Open Access Journals (Sweden)

    Karan Khare

    2013-11-01

    Full Text Available Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such as voice analysis, signature verification, and keystrokedynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method notonly for user verification, but also for identification as well. The work presented in this model borrowsideas from the bioinformatics literature such as position specific scoring matrices (motifs and multiplesequence alignments to provide a novel approach to user verification and identification within the contextof a keystroke dynamics based user authentication system. Similarly Cognitive approach can be defined inmany ways of which one is association based Technique for authentication

  8. Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    OpenAIRE

    Karan Khare; Surbhi Rautji; Deepak Gaur

    2013-01-01

    Behaviouralbiometrics is a scientific study with the primary purpose of identifying the authenticity of auser based on the way they interact with an authentication mechanism. While Association based passwordauthentication is a cognitive model of authentication system.The work done shows the implementation of Keyboard Latency technique for Authentication,implementation of Association Based Password authentication and comparison among two. There areseveral forms of behavioural biometrics such a...

  9. Dual Antenna Selection in Secure Cognitive Radio Networks

    OpenAIRE

    Chen, G.; Gong, Y; Xiao, P; CHAMBERS, J.

    2016-01-01

    This paper investigates data transmission and physical layer secrecy in cognitive radio network. We propose to apply full duplex transmission and dual antenna selection at secondary destination node. With the full duplex transmission, the secondary destination node can simultaneously apply the receiving and jamming antenna selection to improve the secondary data transmission and primary secrecy performance respectively. This describes an attractive scheme in practice: unlike that in most e...

  10. Ensuring security for cognitive radio networks is the goal of CAREER research

    OpenAIRE

    Crumbley, Liz

    2008-01-01

    Improving the security of cognitive radio technology is the goal of Virginia Tech College of Engineering researcher Jung-Min Park, who has received a $430,000 National Science Foundation Faculty Early Career Development Program (CAREER) Award to support his research.

  11. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  12. A systemic and cognitive approach for IoT security

    OpenAIRE

    Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio

    2014-01-01

    Invited Paper International audience The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, tec...

  13. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  14. Integration of the security systems in the architectural design of nuclear and important buildings in Egypt

    International Nuclear Information System (INIS)

    The new and emerging threats to buildings and infrastructure which are faced by todays engineering design and facility management community in Egypt demand new approaches and solutions that are innovative and increasingly based on risk management principles. In the wake of the damage of Taba hotel in south Sinai (2004) and Sharm El-Sheik hotels in Egypt (July, 2005), there was a growing awareness of public vulnerability to terrorist attacks. This awareness leads to increase the expectations form and responsibilities of the architects, engineers and construction professionals This study reviews and assesses different types of threats to nuclear and important buildings. It identifies also the architectural design, vulnerability and risk management that can enhance security. It also introduces a new approach for integration of architectural design and security in nuclear and important buildings in Egypt. The results shows that escalating threats and risks to important buildings and infrastructures change the role of planners, architects, engineers and builders by increasing the focus on the importance of applying viable security principles to the building designs. Architects in Egypt can assume an important role in improving the life-safety features of important buildings by increasing and integrating new security principles and approaches to improve the security and performance of the buildings against man made disasters

  15. Capacity building support for nuclear nonproliferation and nuclear security. Challenges and prospects

    International Nuclear Information System (INIS)

    Capacity building support is critical for the enhancement of international nuclear nonproliferation and security regimes. In this regard the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) is promoting capacity building support internationally in the areas of nuclear nonproliferation and security. Similarly, the International Atomic Energy Agency (IAEA), the U.S. National Nuclear Security Administration (NNSA), and European Commission's Joint Research Centre (EC/JRC) are providing capacity building support for international partners in these fields. While this kind of capacity building support is accelerating, it is increasingly recognized that many challenges exist to achieve effective capacity building support, such as gaps between needs and support contents and possible redundancies in various support activities. As a result, the effectiveness of capacity building support is seriously questioned, and greater importance is now attached to the harmonization among support activities. With this situation in mind, this paper will introduce the concepts and approach of ISCN's capacity building support, discuss the challenges for this support to serve for enduring efforts toward the enhancement of nuclear nonproliferation and security and possible ways to overcome these challenges. (author)

  16. Cognitive Study of Building Metaphor建筑的隐喻认知研究

    Institute of Scientific and Technical Information of China (English)

    孔艳君

    2013-01-01

    Metaphor is a universal phenomenon. Tradition-ally metaphor is seen as as a means of rhetoric, but now it is seen as a cognitive phenomenon. In our life most of the everyday language is metaphor, our mind is also the metaphor. Metaphor has become an indispensable tool for understanding the world. There are a lot of“building”metaphorical expressions in life, as construction is an important component of people’s lives. But the studies of building metaphors have not been systematic and comprehensive. This thesis gives a contrastive study of building metaphors to deepen people’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  17. EASTPHALIA: BUILDING A SECURITY COMMUNITY IN EAST ASIA

    OpenAIRE

    Tyler, J.

    2013-01-01

    Globalization has had a significant on the dynamics of trade. Moreover, these effects have also brought with it negative externalities that exacerbate a country’s propensity towards conflict. Countries today face new threats to security that were not included in a traditional security matrix: piracy, smuggling, transnational criminal organizations, cyber-attacks, terrorism, and ethnic/religious movements. Moreover, there are natural threats such as epidemics, climate change, and natural disas...

  18. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  19. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  20. Crucial problems on security assessment of a building site adjacent to an excavated high slope

    Institute of Scientific and Technical Information of China (English)

    文海家; ZHANG; Jialan; 等

    2002-01-01

    The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope,which is frequently encountered in town construction in mountainous areas due to terrain limit.On the base of some typical engineering cases in Chongqing,several crucial problems on security assessment of building site adjacent to an excavated high slope,including the natural geological conditions and man-destroyed degree,engineering environment,potential failure pattern of the high slope,calculation parameters and analysis methods,are roundly discussed.It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned,and the security assessment is one of the fundamental data to insure the safety of the related construction,site and buildings.

  1. Building Bridges between Neuroscience, Cognition and Education with Predictive Modeling

    Science.gov (United States)

    Stringer, Steve; Tommerdahl, Jodi

    2015-01-01

    As the field of Mind, Brain, and Education seeks new ways to credibly bridge the gap between neuroscience, the cognitive sciences, and education, various connections are being developed and tested. This article presents a framework and offers examples of one approach, predictive modeling within a virtual educational system that can include…

  2. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  3. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network

    OpenAIRE

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts...

  4. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...... and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological...... contract in our sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a...

  5. Defensive JavaScript : Building and Verifying Secure Web Components

    OpenAIRE

    Bhargavan, Karthikeyan; Delignat-Lavaud, Antoine; Maffeis, Sergio

    2014-01-01

    Defensive JavaScript (DJS) is a typed subset of JavaScript that guarantees that the functional behavior of a program cannot be tampered with even if it is loaded by and executed within a malicious environment under the control of the attacker. As such, DJS is ideal for writing JavaScript security components, such as bookmarklets, single sign-on widgets, and cryptographic libraries, that may be loaded within untrusted web pages alongside unknown scripts from arbitrary third parties. We present...

  6. Human Security and Sustainable Peace Building in Nigeria: The Niger Delta Perspective

    OpenAIRE

    Enu, Donald Bette; Ugwu, Ude

    2011-01-01

    Across the globe, human security and peace building initiative have increasingly assumed prime policy priority necessary for good governance. In Nigeria, this reality has been more pronounced in successive regime failure to face adequately the recurrent Niger Delta challenges for at least the past three decades. This means that peace is neither built on a solid foundation nor has security been achieved. Using the Niger Delta region as a point of focus, the paper examined the interface between...

  7. Confidence- and security-building in North-East Asia. Working group I

    International Nuclear Information System (INIS)

    In the discussions in Working Group I there were two general preoccupations which prevailed throughout the consideration of questions relating to North-East Asian confidence and security building: how much could North-East Asia learn from the European experience in Confidence Building measures, and could any of the underlying factors- economic, political and social which has moved Europe towards military and security accommodation be seen to work also in the Asia-Pacific region. The problem of North Korea is underlined in view of non acceptance of the IAEA safeguards regime although it had entered into multilateral set of obligations with other signatories by assenting the Non-proliferation Treaty

  8. Memristive crypto primitive for building highly secure physical unclonable functions

    Science.gov (United States)

    Gao, Yansong; Ranasinghe, Damith C.; Al-Sarawi, Said F.; Kavehei, Omid; Abbott, Derek

    2015-08-01

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  9. Math Learning Model That Accommodates Cognitive Style to Build Problem-Solving Skills

    Science.gov (United States)

    Warli; Fadiana, Mu'jizatin

    2015-01-01

    The purpose of this research is to develop mathematical learning models that accommodate the cognitive styles reflective vs. impulsive students to build problem-solving skills, quality (valid, practical, and effective). To achieve the target would do research development (development research) and method development that consists of five stages,…

  10. Confidence- and security-building in South-East Asia. Working group II

    International Nuclear Information System (INIS)

    Discussion in the Working Group II focused on the following subjects: the establishment of a zone of peace, freedom and neutrality in South-East Asia; the establishment of a nuclear weapon-free zone in South-East Asia; the Cambodian conflict; regional co-operation; military security confidence-building measures

  11. Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    JIANG Limin; JIANG Du

    2007-01-01

    In retrospect of the architecture design of Exit- Entry Administration Building of Shanghai Municipal Public Security Bureau, this paper elaborates on the architect's pursuit of the symbol of the image, the fluidity of the space and the sequence of the function. It promotes a case which deals with the harmony of the architecture individuality and the urban space commonness in city center.

  12. Building the Academic Nuclear Security Programme at the University of Tennessee

    International Nuclear Information System (INIS)

    The University of Tennessee (UT) developed its first formal and coordinated efforts in nuclear security education in 2008-2009 with its graduate certificate program in nuclear security in the Department of Nuclear Engineering. Building on this work, in 2011 UT established the UT Institute for Nuclear Security (INS) as a collaborative center at the university to expand its curricular impact as well as foster research and partnerships with nearby major governmental facilities engaged in nuclear security work. Oak Ridge National Laboratory (ORNL), the Y-12 National Security Complex (Y-12), and Oak Ridge Associated Universities (ORAU) have joined with UT as charter members of the INS. The INS has successfully fostered the development of a near-comprehensive nuclear security curriculum within the Department of Nuclear Engineering and the implementation of a non-proliferation focus in the Department of Political Science. In addition to traditional academic offering, the INS is developing a professional development short-course series that facilitates post-graduate entry into the nuclear security field and continuing education. (author)

  13. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience. PMID:26642176

  14. Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

    Directory of Open Access Journals (Sweden)

    Shashi Ranjan

    2012-05-01

    Full Text Available India is striving to become a knowledge economy by the year 2020. In order to achieve this goal, there is a growing focus both at the government level as well as private sector level to leverage the expertise of the IT and ITES sector of the country which has become one of the main drivers of growth for the Indian Economy. This has lead to increasing investment in IT infrastructure. In this paper we review this trend and analyze the importance of Information Security Infrastructure for the country.We propose a comprehensive conceptual framework for building a robust, resilient and dependable Information Security Infrastructure which will help in establishing India as the secure and trusted hub of the future.

  15. Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model

    OpenAIRE

    Liu, Yuanwei; Wang, Lifeng; Zaidi, Syed Ali Raza; Elkashlan, Maged; Duong, Trung Q.

    2015-01-01

    In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power...

  16. Building a gateway with open source software for secure-DICOM communication over insecure networks

    Science.gov (United States)

    Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland

    2002-05-01

    For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.

  17. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. PMID:26421843

  18. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes’ forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes’ trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack. PMID:26421843

  19. A High End Building Automation and Online Video Surveillance Security System

    Directory of Open Access Journals (Sweden)

    Iyer Adith Nagarajan

    2015-02-01

    Full Text Available This paper deals with the design and implementation of a building automation and security system which facilitates a healthy, flexible, comfortable and a secure environment to the residents. The design incorporates a SIRC (Sony Infrared Remote Control protocol based infrared remote controller for the wireless operation and control of electrical appliances. Alternatively, the appliances are monitored and controlled via a laptop using a GUI (Graphical User Interface application built in C#. Apart from automation, this paper also focuses on indoor security. Multiple PIR (Pyroelectric Infrared sensors are placed within the area under surveillance to detect any intruder. A web camera used to record the video footage is mounted on the shaft of a servo motor to enable angular motion. Corresponding to which sensor has detected the motion; the ARM7 LPC2148 microcontroller provides appropriate PWM pulses to drive the servo motor, thus adjusting the position and orientation of the camera precisely. OpenCV libraries are used to record a video feed of 5 seconds at 30 frames per second (fps. Video frames are embedded with date and time stamp. The recorded video is compressed, saved to predefined directory (for backup and also uploaded to specific remote location over the internet using Google drive for instant access. The entire security system is automatic and does not need any human intervention.

  20. Building Fit-For-Purpose Land Administration Systems: Providing Secure Tenure for All

    DEFF Research Database (Denmark)

    Lemmen, Christiaan; Enemark, Stig; McLaren, Robin

    2016-01-01

    New solutions in land administration are required that can deliver security of tenure for all, are affordable and can be quickly developed and incrementally improved over time. The Fit-For-Purpose (FFP) approach to land administration has emerged to meet these simple, but challenging requirements......, classification and development of a typology in land rights on the basis of an assessment of existing legitimate rights at the country level. The result of this process can be published in a National Tenure Atlas.  ’Record’ means collecting data on evidence of land rights based on FFP approaches in land...... administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended.  ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased...

  1. Building secure wireless access point based on certificate authentication and firewall captive portal

    Science.gov (United States)

    Soewito, B.; Hirzi

    2014-03-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  2. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  3. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  4. 认知无线电网络安全综述%Security in cognitive radio networks

    Institute of Scientific and Technical Information of China (English)

    裴庆祺; 李红宁; 赵弘洋; 李男; 闵莹

    2013-01-01

      认知无线电网络通过认知用户对无线环境的感知,获得频谱空洞信息,在不干扰主用户的前提下,伺机接入空闲频谱,从而满足更多用户的频谱需求,提高频谱资源的利用率,然而,也带来了前所未有的安全挑战。依托认知环,从数据信道、控制信道和终端设备三方面介绍其安全性所面临的问题,以及现有的解决方案,最后给出认知无线电网络的安全建议。%Cognitive radio can obtain and access spectrum white holes without interfering primary users by sensing wire-less environment to meet with the more spectrum requirement of users and improve spectrum utilization. However, it also brings new secure challenges that different from traditional wireless networks. Relying cognition cycle, the security is-sues in cognitive radio networks are presented from data channel, control channel and terminal equipment, then the ex-isting defensive measures and propose the secure recommendations of cognitive radio networks are introduced.

  5. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  6. We can work it out: Group decision-making builds social identity and enhances the cognitive performance of care residents.

    Science.gov (United States)

    Haslam, Catherine; Alexander Haslam, S; Knight, Craig; Gleibs, Ilka; Ysseldyk, Renate; McCloskey, Lauren-Grace

    2014-02-01

    Group-based interventions have been argued to slow the cognitive decline of older people residing in care by building social identification and thereby increasing motivation and engagement. The present study explored the identity-cognition association further by investigating the impact of a group decision-making intervention on cognition. Thirty-six care home residents were assigned to one of three conditions: an Intervention in which they made decisions about lounge refurbishment as a group, a Comparison condition in which staff made these decisions, or a no-treatment Control. Cognitive function, social identification, home satisfaction, and lounge use were measured before and after the intervention. Participants in the Intervention condition showed significant increases on all measures, and greater improvement than participants in both Comparison and Control conditions. Consistent with social identity theorizing, these findings point to the role of group activity and social identification in promoting cognitive integrity and well-being among care residents. PMID:24387094

  7. The corporate brand and strategic direction: Senior business school managers’ cognitions of corporate brand building and management

    OpenAIRE

    Balmer, JMT; Wang, W-Y

    2016-01-01

    This revelatory study focuses on top Financial Times (FT) ranked British business school managers cognitions of corporate brand building and management. The study insinuates there is a prima facie bilateral link between corporate branding and strategic direction. Among this genus of business school, the data revealed corporate brand building entailed an on-going concern with strategic management, stakeholder management, corporate communications, service focus, leadership, and commitment. Thes...

  8. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    Energy Technology Data Exchange (ETDEWEB)

    Ntuen, Celestine (North Carolina Agricultural and Technical State University, Greensboro, NC); Winchester, Woodrow III (North Carolina Agricultural and Technical State University, Greensboro, NC)

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  9. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    Science.gov (United States)

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  10. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  11. Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle

    Directory of Open Access Journals (Sweden)

    Dr.Ghossoon M.Waleed Al-Saadoo

    2010-12-01

    Full Text Available Today, applications in mobile multi-agent systems require a high degree of confidence that running code inside the system will not be malicious. Also any malicious agents must be identified and contained. Since the inception of mobile agents, the intruder has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agents. Very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists to facilitate provisioning of the required security qualities of mobile agent software while extensively focusing on easing the software development burden.The aim is to build a distributed secure system using multi-agents by applying the principles of software engineering. The objectives of this paper is to introduce multi agent systems that enhance security rules through the access right to building a distributed secure system integrating with principles of software engineering system life cycle, as well as satisfy the security access right for both platform and agents to improve the three characteristics of agents adaptively, mobility and flexibility, which is the main problem that depending on the principles of software engineering life cycle. There are 3 characteristics that satisfied using agent; mobility, adaptively and flexibility. Adaptively (which is the capability to respond to other agencies and/or environment to some degree. Mobility (the ability to transport itself from one environment to another and Flexibility (can be defined to include the following properties; responsive, pro-active and social. This project based on the platform of PHP and MYSQL (Database which can be presented in a website. The implementation and test are applied in both Linux and Windows platforms, including Linux Red Hat 8, Linux Ubuntu 6.06 LTS and Microsoft Windows XP Professional. Since PHP

  12. Building bridges : a cognitive science approach to a human Dolphin dialog protocol

    OpenAIRE

    2002-01-01

    Cognitive science is the interdisciplinary study of cognition, mind and intelligence that has come out of the bridging between philosophy, psychology, artificial intelligence, neuroscience, linguistics, and anthropology. It has so far not been too concerned with cognition in an inter-species perspective. This thesis is looking at inter-species communication, or more specifically, human-dolphin communication, from a cognitive science perspective. Three aspects of language: a system, a...

  13. Building a highly available and intrusion tolerant database security and protection system ( DSPS)

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performane analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections ; and that proactive security is very useful and practical for large, critical applications.

  14. Intrusion detection and response model to enhance security in cognitive radio networks / Ifeoma Ugochi Ohaeri

    OpenAIRE

    Ohaeri, Ifeoma Ugochi

    2012-01-01

    With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. Cognitive radios (CRs) arise as a promising solution to the scarcity of spectrum. A basic operation of the CRs is spectrum sensing. Whenever a primary signal is detected, CRs have to vacate the specific spectrum band. Malicious users can mimic incumbent transmitters so as to enforce CRs to vacate the specific band. Cognitive radio networks (CRNs) a...

  15. Cognitive biases in energy decisions during the planning, design, and construction of commercial buildings in the United States. An analytical framework and research needs

    Energy Technology Data Exchange (ETDEWEB)

    Klotz, L. [Clemson University, 208 Lowry Hall, Clemson, SC 29634 (United States)

    2011-03-15

    Despite a national goal for every building to achieve net-zero energy by 2050 and despite exemplary projects proving the technical and economic feasibility of much better energy performance, commercial buildings in the USA today use more energy per square foot than they ever have. Decisions made during planning, design, and construction (delivery) of commercial buildings appear systematically irrational, not maximizing utility for designers, occupants, or society. In other fields, notably economics, improved understanding of cognitive biases like 'loss aversion' and 'anchoring' has helped to explain seemingly irrational decision making. Related work has examined these cognitive biases for energy decisions made in an occupied building. Less clear is the role these cognitive biases play in the high-impact, long-term energy decisions made during commercial building delivery. As an initial step towards addressing this gap in understanding, this paper outlines key energy decisions in commercial building delivery and shows how cognitive biases may impact these decisions. A suggested approach to study these biases, and to design policies that address them, is provided. By highlighting these potential cognitive biases, based on an understanding of the building delivery process, this paper aims to engage those with relevant expertise in the behavioral and social sciences to help address the decision making that is preventing progress towards improved energy performance in commercial buildings.

  16. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Karthik, Rajasekar [ORNL; Patlolla, Dilip Reddy [ORNL; Sorokine, Alexandre [ORNL; White, Devin A [ORNL; Myers, Aaron T [ORNL

    2014-01-01

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, it is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.

  17. Intelligent Voice-Based Door Access Control System Using Adaptive-Network-based Fuzzy Inference Systems (ANFIS for Building Security

    Directory of Open Access Journals (Sweden)

    Wahyudi

    2007-01-01

    Full Text Available Secure buildings are currently protected from unauthorized access by a variety of devices. Even though there are many kinds of devices to guarantee the system safety such as PIN pads, keys both conventional and electronic, identity cards, cryptographic and dual control procedures, the people voice can also be used. The ability to verify the identity of a speaker by analyzing speech, or speaker verification, is an attractive and relatively unobtrusive means of providing security for admission into an important or secured place. An individual’s voice cannot be stolen, lost, forgotten, guessed, or impersonated with accuracy. Due to these advantages, this paper describes design and prototyping a voice-based door access control system for building security. In the proposed system, the access may be authorized simply by means of an enrolled user speaking into a microphone attached to the system. The proposed system then will decide whether to accept or reject the user’s identity claim or possibly to report insufficient confidence and request additional input before making the decision. Furthermore, intelligent system approach is used to develop authorized person models based on theirs voice. Particularly Adaptive-Network-based Fuzzy Inference Systems is used in the proposed system to identify the authorized and unauthorized people. Experimental result confirms the effectiveness of the proposed intelligent voice-based door access control system based on the false acceptance rate and false rejection rate.

  18. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  19. Building Partnerships for Sustainable Land Management and Food Security in Cuba

    International Nuclear Information System (INIS)

    Full text: Soil erosion and the associated land degradation have long been recognized as major environmental concerns and a constraint to food security and sustainable development. The United Nations has highlighted soil degradation as one of the most significant challenges for sustainable food production in the 21st century (World Summit on Sustainable Development, 2002 Johannesburg, South Africa). The ARCAL (Regional Cooperative Agreement for the Advancement of Nuclear Science and Technology in Latin America and the Caribbean) Regional Strategy Profile identified the inefficient use of soil resources and the resulting permanent loss of productive agricultural land as major limitations to achieving food security in the Latin American and Caribbean region. Currently, about 300 million hectares of land have been affected by degradation. Indicators of the present soil conservation status and probable environmental consequences are essential for an assessment of national economic potential and evaluation of political and social consequences. Large-scale soil erosion assessments, for example in a watershed, cannot be based on direct conventional measurements because of methodological restrictions and excessively high temporal and spatial variability. This can be addressed through the use of fallout radionuclides (caesium-137, lead-210 and beryllium-7), which are widely distributed in the environment, adsorbed by soil particles and hence transported in the landscape in a similar way to soil particles. Therefore the monitoring of their redistribution provides an excellent fingerprint for soil redistribution by erosion or sedimentation. These radionuclide techniques also offer an advantage over the conventional methods, by being much less laborious and pinpointing the sources of soil loss. In 2009, a regional technical cooperation project (RLA/5/051 - ARCAL) was initiated for Latin America, with 15 countries (Argentina, Bolivia, Brazil, Chile, Cuba, El Salvador, Haiti

  20. Building

    OpenAIRE

    Seavy, Ryan

    2014-01-01

    Building for concrete is temporary. The building of wood and steel stands against the concrete to give form and then gives way, leaving a trace of its existence behind. Concrete is not a building material. One does not build with concrete. One builds for concrete.

  1. Nuclear security. IAEA: Working to build a global response to a global threat

    International Nuclear Information System (INIS)

    The IAEA helps to ensure that measures are taken to control and protect nuclear and radioactive materials from falling into the wrong hands. The IAEA delivers training, technical assistance, and equipment to States, and provides international guidance on improving nuclear security. IAEA nuclear security activities include: · Risk reduction (such as repatriating research reactor fuel and strengthening border monitoring) · International legal instruments and supporting their implementation · Internationally accepted guidance and benchmarks for nuclear security · Information exchange · Human Resource Development programmes · Research and development

  2. Disarmament, peace-building and global security: Objectives for the nineties

    International Nuclear Information System (INIS)

    The development of policies to block the further proliferation of nuclear weapons, as one of the major areas in which a united approach should be taken in the interests of collective security, is discussed

  3. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  4. Capacity Building on Food-Crop Farming to Improve Food Production and Food Security in Central Java, Indonesia

    Directory of Open Access Journals (Sweden)

    Waridin

    2013-03-01

    Full Text Available This paper describes the capacity of food-crop production for improving regional food security in Central Java, Indonesia. It is also identify crops which have high and prospective economic-values. The results of the study might help in formulating a proposed model to improve food crops production in supporting food security. The case study was conducted in districts which play the important roles on agriculture (rice production in Central Java, Indonesia. These are Klaten and Magelang districts. Data were collected from farmers and officers from agriculture-related institutions. The results show that Central Java Province has the capacity on food crop (rice production for securing food availability, distribution, and accessibility for people in the region. It has a moderate on food security for the products, and surplus of production have distributed to other regions within the country. However, other food crops still facing shortage of supply since lack of productions. It requires a commitment from government and stakeholders for improving capacity building on agricultural development.

  5. Building methodology, assessing the risks: the case of energy security in the Baltic States

    OpenAIRE

    Arūnas Molis

    2011-01-01

    The purpose of this article is not confined to analysis of risks to the Baltic States' energy security. The research aimed to develop methods for risk intensity assessment tools as well empirical examples. It encompasses an effort to tailor a system of damage and probability (i.e. risk intensity) assesment used by other authors to risk analysis. The analysis performed by using this methodology shows the existence of at least two major energy security risks of intolerable intensity for the Bal...

  6. Building a contingency menu: using capabilities-based planning for Homeland Defense and Homeland Security

    OpenAIRE

    Goss, Thomas J.

    2005-01-01

    Approved for public release, distribution is unlimited A capabilities-based approach to contingency planning offers important opportunities to strengthen both Homeland Defense and Homeland Security. The Department of Defense (DOD) and the Department of Homeland Security (DHS) have already begun moving beyond traditional threat-based and scenario-based planning methodologies toward a more capabilities-based approach, but require embracing this concept more in order to counter challenges in ...

  7. Building an Expert-System for Maritime Container Security Risk Management

    OpenAIRE

    Jaouad Boukachour; Charles-Henri Fredouet; Mame Bigué Gningue

    2011-01-01

    Until lately, transportation risk management has mostly dealt with natural or man-made accidental disasters. The September 11th tragedy has made transportation operators, as well as shippers and public authorities, aware of a new type of risk, man-made and intentional. Securing global transportation networks has become an important concern for governments, practitioners and academics. In the current time-based competition context, securing transportation operations should not be sought at the...

  8. Whole Building Design Objectives for Campus Safety and Security: A System Dynamics Approach

    Science.gov (United States)

    Oakes, Charles G.

    2010-01-01

    The May/June 2009 issue of "Facilities Manager" introduced APPA readers to the Whole Building Design Guide (WBDG)--today's most comprehensive Internet-based depository of resources contributing to a systems approach for everything of a building nature. The emphasis in that article was on Operations and Maintenance (O&M) issues and procedures. In…

  9. 烟草企业WLAN安全建设%Tobacco Enterprise WLAN Security Building

    Institute of Scientific and Technical Information of China (English)

    赖日君

    2012-01-01

    随着记本电脑、PDA、IPAD等移动终端的普及和移动办公需求的增加,无线网络在烟草行业卷烟物流、烟叶生产收购、移动办公等领域得到广泛应用与发展,无线网络的安全也势必成为烟草行业网络安全的一个重要部分,本文介绍无线局域网的概念和技术标准,分析目前烟草企业WLAN面临的安全威胁,介绍了目前WLAN可能使用的加密、认证、VPN、无线入侵检测、一体化安全防护等安全防范技术,重点阐述有线和无线安全一体化是烟草企业WLAN安全未来发展的必然趋势。%With the increased popularity of notebook computers,PDAs, iPad and other mobile terminals and mobile office needs,the wireless network in the tobacco industry,cigarette logistics,tobacco production and acquisition,mobile office,and other fields has been widely used and development of wireless network security is bound to become an important part of the tobacco industry of network security This article describes the conceptual and technical standard of the wireless LAN,analyze security threats facing tobacco companies WLAN WLAN may use encryption, authentication,VPN,wireless intrusion detection,integrated security and security technology,and focuses on wired and wireless security integration is the development trend of the tobacco enterprise WLAN security.

  10. Increasing security of supply: The search for stable models of financing for new nuclear build in the European Union

    International Nuclear Information System (INIS)

    Full text: This research assesses models for financing of new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are France, the United Kingdom, Finland and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania has emerged with the most secure and stable model for financing of new nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environment and competition legislation in the EU. Then the political and economic climate of the afore mentioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models of financing of new nuclear build is explored, contrasted and analysed. The research concludes that there are four main models for financing new nuclear projects in Europe. Each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for financing new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model is the most suitable and provides an example for any new nuclear build aspiring nations in the EU and beyond. (author)

  11. Hypothesis-Driven Story Building: Counteracting Human Cognitive Biases to Improve Medical Diagnosis Support

    Science.gov (United States)

    Zhu, Shizhuo

    2010-01-01

    Clinical decision-making is challenging mainly because of two factors: (1) patient conditions are often complicated with partial and changing information; (2) people have cognitive biases in their decision-making and information-seeking. Consequentially, misdiagnoses and ineffective use of resources may happen. To better support clinical…

  12. Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.

    Science.gov (United States)

    Usman, Muhammad; Koo, Insoo

    2014-01-01

    Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations. PMID:25295288

  13. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 - Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or ''clean,'' building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, ''Final Status Survey Plan for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201'') was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one

  14. Nation-building e segurança internacional: Um debate em construção Nation-building and international security: A debate under construction

    Directory of Open Access Journals (Sweden)

    Aureo de Toledo Gomes

    2009-08-01

    Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.

  15. Linking adaptation science to action to build food secure Pacific Island communities

    OpenAIRE

    C. Cvitanovic; S. Crimp; Fleming, A; Bell, J.; Howden, M.; Hobday, A. J.; Taylor, M; R. Cunningham

    2016-01-01

    Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform ...

  16. Capacity Building In Information And Communication Management (ICM) Towards Food Security

    OpenAIRE

    Temu, Andrew; Msuya, Elibariki Emmanuel

    2004-01-01

    This paper addresses capacity strengthening needs in the area of ICM to support food security initiatives. It fully acknowledges that FS is a state of assuring physical availability and economic accessibility to enough food in terms of quantity (amount, distribution, calories), quality (safe, nutritious, balanced) and cultural acceptability for all people at all times for a healthy and active life. It starts by outlining how ICM can support strategies to ensure availability, access, acce...

  17. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room

  18. A race we can win. The world can - and must - build a stronger security framework

    International Nuclear Information System (INIS)

    Nuclear proliferation and terrorism represent the single most important threat to global security. Yet fundamental differences of opinion remain on how to deal with this ever growing menace to our survival. Should we opt for diplomacy or force? What are the relative merits of collective versus unilateral action? Is it more effective to pursue a policy of containment or one based on inclusiveness? These are not new questions, by any measure. But they have taken on renewed urgency as nations struggle, both regionally and globally, to cope with an extended array of conflicts, highly sophisticated forms of terrorism, and a growing threat of weapons of mass destruction. In a real sense, we are in a race against time - but it's a race we can win if we work together. The Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits - by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. The question is how do we best move ahead to achieve the security we seek

  19. Subak’s Capacity Building: A Little Effort Toward Food Security and Sustainable Development Goals

    OpenAIRE

    Nyoman Utari Vipriyanti; Cening Kardi

    2015-01-01

    Nowadays, there are strong demands on the organic farming.   Organic farming as a part of organic agriculture builds on the harmony of nature, through optimizing the use of biodiversity and natural intake of the recycling process of natural materials, in order to reach sustainability, healthy food production and energy saving. Effort to change the behavior of farmers who are accustomed to using inorganic material to organic farming was not easy. This study aimed to determine (1) the costs and...

  20. Building a Bridge between Mirror Neurons and Theory of Embodied Cognition

    Czech Academy of Sciences Publication Activity Database

    Wiedermann, Jiří

    Berlin: Springer, 2004 - (Van Emde Boa, P.; Pokorný, J.; Bieliková, M.; Štuller, J.), s. 361-372. (Lecture Notes in Computer Science. 2932). ISBN 3-540-20779-1. ISSN 0302-9743. [SOFSEM 2004. Conference on Current Trends in Theory and Practice of Computer Science /30./. Měřín (CZ), 24.01.2004-30.01.2004] R&D Projects: GA ČR GA201/02/1456 Institutional research plan: CEZ:AV0Z1030915 Keywords : embodied cognition * complete agents * mirror neurons * imitation learning * sensorimotor control Subject RIV: BA - General Mathematics

  1. Agile enterprise development framework utilizing services principles for building pervasive security

    Science.gov (United States)

    Farroha, Deborah; Farroha, Bassam

    2011-06-01

    We are in an environment of continuously changing mission requirements and therefore our Information Systems must adapt to accomplish new tasks, quicker, in a more proficient manner. Agility is the only way we will be able to keep up with this change. But there are subtleties that must be considered as we adopt various agile methods: secure, protect, control and authenticate are all elements needed to posture our Information Technology systems to counteract the real and perceived threats in today's environment. Many systems have been tasked to ingest process and analyze different data sets than they were originally designed for and they have to interact with multiple new systems that were unaccounted for at design time. Leveraging the tenets of security, we have devised a new framework that takes agility into a new realm where the product will built to work in a service-based environment but is developed using agile processes. Even though these two criteria promise to hone the development effort, they actually contradict each other in philosophy where Services require stable interfaces, while Agile focuses on being flexible and tolerate changes up to much later stages of development. This framework is focused on enabling a successful product development that capitalizes on both philosophies.

  2. Building momentum to minimize highly enriched uranium use, improve nuclear security and combat nuclear terrorism

    International Nuclear Information System (INIS)

    Full text: Much has been done to reduce the risk of nuclear terrorism under the auspices of international programs such as the G-8 Global Partnership, the Global Initiative to Combat Nuclear Terrorism, and the Global Threat Reduction Initiative. Despite the practical progress in removing the threat that terrorist groups could obtain the fissile material for an improvised nuclear device, however, much more work remains. In 1980, the 59 states participating in the International Nuclear Fuel Cycle Evaluation agreed that the civilian use of highly enriched uranium (HEU) should be minimized. Decades later, and despite dramatic new threats to world peace, the pledge to forego the use of HEU is not yet universal or legally binding. Nor have improvements to the physical security of this material been sufficient in many locations. This paper surveys the international measures that have been taken towards the formation of an international norm to minimize BEU risks through established mechanisms and suggests several additional approaches that may help to solidify support for practical measures and accelerate the process of civil HEU minimization and improved security globally. HEU reduction requires global cooperation: eliminating a small holding of HEU at a single facility or upgrading its security does not greatly reduce terrorist risks overall. Policymakers must be sure that their counterparts in other states arc engaged in similar efforts. A global HEU minimization norm would validate each nation's efforts, no matter how small, and provide a disincentive for inaction. Clearer standards for the security of this material and commitments to meet these standards would serve the same purpose. While each failure 10 act poses its own risks, it also erodes the usefulness of HEU elimination programs elsewhere and sends the wrong political message to the rest of the world. Moreover, it is technically impossible to minimize the largest REU holdings-those at fuel cycle facilities

  3. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces. PMID:24080620

  4. China and Northeast Asia’s Regional Security Architecture:The Six-Party Talks as a Case of Chinese Regime-building?

    OpenAIRE

    Pacheco Pardo, Ramon

    2012-01-01

    China, as host of the six-party talks first convened in August 2003, has been one of the major players in dealing with the North Korean nuclear crisis that began in October 2002. China’s role in the talks has helped to start shaping a stable regional security architecture in Northeast Asia. Beijing’s leadership in building a new security regime in the region suggests a change on Chinese perspectives regarding its role within the broader East Asia’s regional security architecture. After years ...

  5. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    CERN Document Server

    Gouider, Mohamed Salah; 10.5121/ijdms.2010.2207

    2010-01-01

    The amounts of data available to decision makers are increasingly important, given the network availability, low cost storage and diversity of applications. To maximize the potential of these data within the National Social Security Fund (NSSF) in Tunisia, we have built a data warehouse as a multidimensional database, cleaned, homogenized, historicized and consolidated. We used Oracle Warehouse Builder to extract, transform and load the source data into the Data Warehouse, by applying the KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledge extraction has been performed using the Oracle Discoverer tool. This allowed users to take maximum advantage of knowledge as a regular report or as ad hoc queries. We started by implementing the main topic for this public institution, accounting for the movements of insured persons. The great success that has followed the completion of this work has encouraged the NSSF to complete the achievement of other topics of interest within the NSSF. ...

  6. Building confidence and partnership through the safe and secure dismantlement of nuclear weapons

    International Nuclear Information System (INIS)

    The cold war is behind us now. It was with us a long time and we came to know it well. It was a dangerous time, but it had familiar contours and predictable reference points. Now, the topography of the bipolar confrontation is gone. We face great uncertainty and, yes, danger is still our companion. It is close at hand in the deadly relics of the cold war-the thousands of nuclear weapons that have been left behind like mines buried in a battlefield long after the guns have fallen silent. Our challenge is to construct a new and safer framework for our mutual relations beyond the cold war, based not on suspicion and fear, but on confidence and partnership. In doing so, it would be well to reflect on the enormous resources that were devoted to building weapons as compared to the relatively modest resources that will be needed to invest in peace. From that comparison should emerge a sense of proportion as to what we are called upon to do. We have choices. We can idly 'sleepwalk through history' and, once again, allow nuclear weapons to generate suspicion, competition, tension, and arms races reminiscent of the cold war. If we allow that to happen, we will have failed in our duty to posterity, and future generations will and should-judge us harshly. This would truly be the 'march of folly'. But if we seize the moment to build a solid foundation of confidence and partnership, we will surely be celebrated for our legacy of wisdom and peace. This is that moment. Let us now be wise

  7. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    Directory of Open Access Journals (Sweden)

    Mohamed Salah GOUIDER

    2010-05-01

    Full Text Available The amounts of data available to decision makers are increasingly important, given the networkavailability, low cost storage and diversity of applications. To maximize the potential of these data withinthe National Social Security Fund (NSSF in Tunisia, we have built a data warehouse as amultidimensional database, cleaned, homogenized, historicized and consolidated. We used OracleWarehouse Builder to extract, transform and load the source data into the Data Warehouse, by applyingthe KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledgeextraction has been performed using the Oracle Discoverer tool. This allowed users to take maximumadvantage of knowledge as a regular report or as ad hoc queries. We started by implementing the maintopic for this public institution, accounting for the movements of insured persons. The great success thathas followed the completion of this work has encouraged the NSSF to complete the achievement of othertopics of interest within the NSSF. We suggest in the near future to use Multidimensional Data Mining toextract hidden knowledge and that are not predictable by the OLAP.

  8. Subak’s Capacity Building: A Little Effort Toward Food Security and Sustainable Development Goals

    Directory of Open Access Journals (Sweden)

    Nyoman Utari Vipriyanti

    2015-02-01

    Full Text Available Nowadays, there are strong demands on the organic farming.   Organic farming as a part of organic agriculture builds on the harmony of nature, through optimizing the use of biodiversity and natural intake of the recycling process of natural materials, in order to reach sustainability, healthy food production and energy saving. Effort to change the behavior of farmers who are accustomed to using inorganic material to organic farming was not easy. This study aimed to determine (1 the costs and benefit of local varieties cultivation of paddy, Cicih Gondrong, with semi-organic pattern; and (2 the farmer perception toward Cicih Gondrong semi-organic pattern cultivation. This research used plot demonstration (demplots and survey methods. The results showed that semi-organic cultivation of paddy Cicih Gondrong, economically profitable. There are significant changes in the perception of farmers on the management of local varieties of rice before and after the demonstration carried out. Government role is needed to make organic farming program running well especially to provide assistance and infrastructure support.  

  9. The human capacity building support activities of the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security and the cooperation with the international or foreign organizations which handles human capacity building support

    International Nuclear Information System (INIS)

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency has started its human capacity building activities, domestically and internationally, for the government officials and employees of companies of emerging nuclear power countries mainly in Asia. In this paper, we will describe the activities of ISCN on capacity building for these countries and also I will briefly describe, focusing on nuclear security, the activities of IAEA, Sandia National Laboratory of United States, Russia and the development of human capacity building support activities of neighboring countries of China and Korea. By doing this, we will describe the relationship and cooperation of ISCN with these organizations and hope that this would help us for the future development with these organizations and ISCN. (author)

  10. Simulation of a dead reckoning embedded system security patrol robot for deployment inside structures and buildings

    Science.gov (United States)

    Tickle, Andrew J.; Meng, Yan; Smith, Jeremy S.

    2010-10-01

    Dead Reckoning (DR) is the process of estimating a robot's current position based upon a previously determined position, and advancing that position based upon known speed and direction over time. It is therefore a simple way for an autonomous mobile robot to navigation within a known environment such as a building where measurements have been taken and a predetermined route planned based upon which doors (or areas) the robot would have enough force to enter. Discussed here is the design of a DR navigation system in Altera's DSP Builder graphical design process. The wheel circumference to the step size of stepper motor used to drive the robot are related and so this ratio can be easily changed to easily accommodate changes to the physical design of a robot with minimal changes to the software. The robot calculates its position in relation to the DR map by means of the number of revolutions of the wheels via odometry, in this situation there is no assumed wheel slippage that would induce an accumulative error in the system overtime. The navigation works by using a series of counters, each corresponding to a measurement taken from the environment, and are controlled by a master counter to trigger the correct counter at the appropriate time given the position of robot in the DR map. Each counter has extra safeguards built into them on their enables and outputs to ensure they only count at the correct time and to avoid clashes within the system. The accuracy of the navigation is discussed after the virtual route is plotted in MATLAB as a visual record in addition to how feedback loops, identification of known objects (such as fire safety doors that it would navigate through), and visual object avoidance could later be added to augment the system. The advantages of such a system are that it has the potential to upload different DR maps so that the end robot for can be used in new environments easily.

  11. Build Security Mechanism for Serious Illness%构建重特大疾病保障机制

    Institute of Scientific and Technical Information of China (English)

    褚福灵

    2015-01-01

    The occurrence of serious illness is a misfortune of life, which will cause catastrophic medical expense of a family and impact social harmony. We should move forward the prevention pass of serious illness risks, and prevent the risks of serious illness from its occurrence. To reduce the risk of serious illness effectively, we should to do well in four aspects, i.e., disease preventing, medical costs reducing, income increasing and benets level improving, and build a comprehensive security mechanism for serious illness.%重特大疾病的发生是人生的不幸,将给家庭带来灾难性医疗支出,影响社会的和谐安宁.应当将防控重特大疾病风险的关口前移,从源头上化解重特大疾病风险,在"防病、减费、增收、提待"等四方面综合发力,构建重特大疾病的综合保障机制,确保重特大疾病风险得到有效化解.

  12. 环境心理学在建筑施工安全管理中的应用%Application of environmental psychology in building construction security management

    Institute of Scientific and Technical Information of China (English)

    陈志源; 陈桂芬

    2012-01-01

    This article describes the dialectical relation of connotation,environment,and performance of environmental psychology,discusses the application of environmental psychology in building construction security management,which has significant meaning for reducing building construction accidents.%阐述了环境心理学的内涵、环境与行为的辩证关系,探讨了环境心理学在建筑施工安全管理中的应用,对减少建筑施工安全事故的发生具有重要现实意义。

  13. Integrating - VPN and IDS - An approach to Networks Security

    Directory of Open Access Journals (Sweden)

    Prabha Rani

    2007-10-01

    Full Text Available The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points in mind we have chosen to integrate VPN and IDS to provide an efficient solution for security engineers.

  14. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  15. Teacher Language Awareness and Cognitive Linguistics (CL): Building a CL-Inspired Perspective on Teaching Lexis in EFL Student Teachers

    Science.gov (United States)

    Giebler, Ralf

    2012-01-01

    It has been suggested recently that it may be useful for language teaching practitioners to have some knowledge of cognitive linguistics. Cognitive linguistics (CL) provides tools that may help the language-teaching practitioner to gain insight into the semantic potential of words and communicate the meaning of lexical chunks in greater detail…

  16. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  17. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  18. Using fuzzy cognitive mapping to understand farmers' perception of sustainable agricultural practices for enhanced food security in Nepal

    OpenAIRE

    Halbrendt, Jacqueline; Gray, S.; Crow, S.; Shariq, L.; Tamang, Bishal B.

    2012-01-01

    With the world population having reached unprecedented levels, the need for improved food security and sustainable agricultural practices has become all the more pressing. This is especially relevant for subsistence farmers, such as those in the Mid-hill region of Nepal, who typically rely on crop yields for sustenance and have limited access to opportunities for income generation. Although promoting agricultural development in areas like the Mid-hill region has been a priority for NGOs and r...

  19. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  20. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  1. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  2. Building Global Peace, Conflict, and Security Curricula at Undergraduate Institutions: A Curriculum Development Guide for Colleges and Universities

    Science.gov (United States)

    Smith, David J.

    2007-01-01

    A central mission of the United States Institute of Peace (USIP) is the promotion of international conflict resolution education by assisting and supporting colleges and universities in their efforts at developing and offering programs, courses, and activities that focus on international peace, conflict, and security. Over the years, a number of…

  3. Sustainable Development--Education, Business and Management--Architecture and Building Construction--Agriculture and Food Security

    Science.gov (United States)

    Ghenai, Chaouki, Ed.

    2012-01-01

    Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…

  4. Increasing security of supply: the search for stable models of new nuclear build in the European Union

    International Nuclear Information System (INIS)

    Full text. This research assesses models for new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are the United Kingdom and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania and the United Kingdom have emerged with different models for new build nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environmental and competition legislation in the EU. Then the political and economic climate of the aforementioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models and the phases of new nuclear build are explored. The research concludes each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model cab stated to be more stable and provides an example for any new nuclear build aspiring nations in the EU and beyond.

  5. The Effect of Managerial Cognition on Firm Capability Building%管理认知对企业能力构建的影响

    Institute of Scientific and Technical Information of China (English)

    王涛; 张雁; 李姝

    2012-01-01

    能力构建的本质在于通过跨层次知识转移形成新的组织知识来对能力内在的知识集合进行替代、补充和增强,以构建出具有新功能企业能力的组织活动。管理认知是推动企业能力构建的关键因素,然而,企业是由不同层次主体构成的复杂组织体系,不同层次的管理认知也会存在明显的层次间分工和合作。通过引入能级的概念可以区别不同组织层次间知识活动的差异,不同层次的管理者在能力构建活动中会代表相应的高层次主体来与低层次主体进行互动,并以差异化管理认知对低层次知识进行再加工,并赋予相应的活化能使其发生活化反应,最终以能级跃迁的形式来完成知识在个体、团队和组织三个层次间的跨层次转移,从而完成能力构建。%The essence of firm capability building lies in that through cross-level knowledge transfer, organizational activities may produce new organizational knowledge to substitute, supplement and strengthen the inner knowledge set so as to build up firm capabilities with new functions. Managerial cognition is one of the critical factors that may promote firm capability building. However, firm is a complicated multi-level organizational system which consists of subjects of varied levels, and there always exists obvious division and cooperation among managerial cognitions of different levels. In the highly competitive market environment, capability building has been an effective approach to promote firm competitiveness which may form strategic assets through continuous evolution of resources. Therefore, it is of high importance to study the effect of managerial cognition on firm capability building, which may carry both theoretical and practical implications. On the one hand, focusing on the micro level of internal firm, the paper firstly introduces the concept of organizational energy level to show the differences of varied

  6. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report

    International Nuclear Information System (INIS)

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  7. Building Peace and/or Gender Equality. Changing Attitudes around Peace, Development and Security in International Cooperation in Rwanda.

    OpenAIRE

    Aguiari, Sabrina

    2014-01-01

    The times following international or civil conflicts but also violent revolutions often come with unequal share of the peace dividend for men and women. Delusions for women who gained freedom of movement and of roles during conflict but had to step back during reconstruction and peace have been recorded in all regions of the world. The emergence of peacebuilding as a modality for the international community to ensure peace and security has slowly incorporated gender sensitivity at the level o...

  8. [Nutritional challenges in the Brazilian Unified National Health System for building the interface between health and food and nutritional security].

    Science.gov (United States)

    Rigon, Silvia do Amaral; Schmidt, Suely Teresinha; Bógus, Cláudia Maria

    2016-01-01

    This article discusses the establishment of inter-sector action between health and food and nutritional security in Brazil from 2003 to 2010, when this issue was launched as a priority on the government's agenda. A qualitative study was developed according to constructivist epistemology, using key-informant interviews in the field's nationwide social oversight body. Advances and challenges in this process are addressed as analytical categories. The National Food and Nutrition Policy (PNAN) was mentioned as the link between the two fields, decentralized through a network with activity in the states and municipalities. However, the study found political, institutional, and operational obstacles to the effective implementation of the PNAN in the Brazilian Unified National Health System and consequently to a contribution to the advancement of Health and Food and Nutritional Security in the country. The predominance of the biomedical, curative, and high-complexity model was cited as the principal impediment, while health promotion policies like the PNAN were assigned secondary priority. PMID:27049315

  9. Preparation of a Competent Nuclear Security and Safety Workforce. The Role of Technical Safety Organisations in Building Up Integrated Knowledge and Skills

    International Nuclear Information System (INIS)

    The European Nuclear Safety Training and Tutoring Institute (ENSTTI), an initiative of the European Technical Safety Organizations Network-ETSON, provides a high quality training and tutoring programme addressed to professionals at Technical Safety Organizations (TSOs) and nuclear regulatory authorities (NRAs). Through this programme ENSTTI shares, inter alia, the operational experience gained by TSOs in dealing with the interfaces between nuclear security and nuclear safety with international experts. At present, ENSTTI is in the process of broadening its services by developing a comprehensive training programme tailored to the training needs of junior and senior professionals at TSOs and NRAs.This effort aims at building-up mutually recognized technical and regulatory competencies, foster global nuclear security and safety culture, increase workforce mobility and contribute to the lifelong learning efforts of the European Union. In order to give value to learning achieved in the training programme under development, ENSTTI will apply the European Credit System for Vocational Education and Training (ECVET) that is characterized by flexible procedures for validation, transfer and recognition of learning outcomes. This approach should also be of great value for trainees from other regions in the world. (author)

  10. Investigation report on team building of Tieling Municipal Public Security Bureau%铁岭市公安局队伍建设情况调研报告

    Institute of Scientific and Technical Information of China (English)

    李安君

    2011-01-01

    为了应对新形势下公安机关队伍建设面临的各种挑战,推动各项公安工作再上新台阶,铁岭市公安局深入基层,实地开展队伍建设调研,总结了铁岭市当前公安队伍中存在的主要问题及其产生原因,并提出了加强公安队伍建设的建议和对策。%In response to the challenges faced in the team building of public security organs under the new situation, and to promote all aspects of public work to a new level,Tieling Municipal Public Security Bureau went to grassroots level to carry out onsite research on teambuilding. The paper summed up the current exist major problems and the causes in police force in Tieling and made recommendations and response to strengthen the police contingent.

  11. Can fuel services supply be secured? Building trust in a multi-lateral approach to nuclear fuel cycles

    International Nuclear Information System (INIS)

    Global climate change and concerns about energy supply security fuelling the nuclear desires of an increasing number of states, there is growing interest within the nonproliferation community to promote the establishment of an international system for the provision of nuclear fuel cycle services that would be 'equitable and accessible to all users of nuclear energy' (Rauf, 2008) while reducing proliferation risks. Although the idea was already voiced on the cradle of civilian use of nuclear energy (Baruch, 1946), the IAEA director's 2003 call for a group of international experts to examine the issue (ElBaradei, 2003) triggered renewed interest that resulted in up to twelve different proposals for multilateral nuclear fuel cycle arrangements (Rauf, 2008; Simpson, 2008). Nonproliferation experts have examined the conditions under which equitable and accessible access to enrichment, reprocessing and spent fuel disposal services can be granted to all users (Rauf, 2008; Braun 2006; Pellaud and al 2005). They suggested putting together multilateral nuclear approaches (MNA) that could consist in the establishment of mechanisms to assure fuel cycle services, or the shared ownership by recipient and host countries of fuel services facilities through either the creation of new multilateral centers or the conversion of existing national facilities into multinational enterprises. While countries that possess nuclear fuel facilities would benefit from the increased global security and strengthened non-proliferation situation that would result from the establishment of these MNAs, they would also be baited into participating by possible attraction of foreign investments as well as the opportunity to export high value services (Rushkin, 2006). Yet, what incentives would there be for a recipient non-nuclear state to participate in an arrangement that would intrinsically strip it of its sovereign right to ensure its fuel supply security? In addition to the economic benefits of

  12. Climate change, energy security, and risk-debating nuclear new build in Finland, France and the UK

    International Nuclear Information System (INIS)

    Concerns about climate change and energy security have been major arguments used to justify the recent return of nuclear power as a serious electricity generation option in various parts of the world. This article examines the recent public discussion in Finland, France, and the UK - three countries currently in the process of constructing or planning new nuclear power stations. To place the public discussion on nuclear power within the relationship between policy discourses and contexts, the article addresses three interrelated themes: the justifications and discursive strategies employed by nuclear advocates and critics, the similarities and differences in debates between the three countries, and the interaction between the country-specific state orientations and the argumentation concerning nuclear power. Drawing from documentary analysis and semi-structured interviews, the article identifies and analyses key discursive strategies and their use in the context of the respective state orientations: 'technology-and-industry-know-best' in Finland, 'government-knows-best' in France, and 'markets-know-best' in the UK. The nuclear debates illustrate subtle ongoing transformations in these orientations, notably in the ways in which the relations between markets, the state, and civil society are portrayed in the nuclear debates. - Highlights: → Focus on argumentation on new nuclear power in Finland, France, and the UK. → Nuclear power is justified by climate change, energy security, and independence. → The credibility of discursive strategies varies across countries. → Country-specific state orientations shape the success of discursive strategies. → Discursive strategies contain normative claims about state-society relations.

  13. Europe: Future security agenda

    International Nuclear Information System (INIS)

    The security in Europe is not a condition but a process. At different stages of that process the priorities and political significance of various factors determining the security of individual states, and Europe as w whole, are changing. While thinking of future, the importance of searching for new means of confidence building, disarmament, co-ordination and cooperation among various security structures increases

  14. Autonomous Security Patrol System

    OpenAIRE

    Erramouspe, Jake

    2010-01-01

    This project provides an efficient and cost-effective solution to building security and active monitoring. The security is monitored and controlled by autonomous patrol robots. Any indication of a security breach will result in an immediate alarm and activation of the robot group to subdue and tranquilize the intruder.

  15. International workshop on transparency technology for nonproliferation cooperation in the Asia Pacific. Applications of remote monitoring and secure communications for regional confidence building

    International Nuclear Information System (INIS)

    The Japan Atomic Energy Agency (JAEA) sponsored an international workshop 20-22 February 2008 on 'Transparency Technology for Nonproliferation Cooperation in the Asia Pacific - Applications of Remote Monitoring and Secure Communications for Regional Confidence Building.' The Workshop focused on identifying appropriate roles and functions for Transparency in addressing nonproliferation concerns associated with the use of nuclear energy, particularly in the East Asia region. Participants from several East Asia countries included representatives from nuclear energy research institutions, Ministries, facility operators, and non-governmental organizations. Regional participation from countries currently developing their nuclear energy infrastructure was also encouraged. Several promising students from the University of Tokyo and the Tokyo Institute of Technology, representing the next generation of nuclear energy experts, also participated in the meeting and added significant value and fresh viewpoints. The participants agreed that transparency has many roles and definitions, and that its usefulness ranges for verification and compliance with the Nonproliferation Treaty (NPT) to building trust and confidence in the activities of the state and other regional nuclear energy stakeholders. In addition, they identified a need for further education among the professional community, public, operators, and regulators as a key factor in transparency effectiveness. Also, the education and cultivation of the next generation of nuclear energy experts was identified as crucial to the long-term success and acceptance of nuclear energy development. And finally, that the development, selection, and implementation of technology that is appropriate to the goals and participants of a transparency effort are unique to each situation and are key to the successful acceptance of cooperative transparency and regional confidence building. At the conclusion of the Workshop it was importantly

  16. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    International Nuclear Information System (INIS)

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  17. Building a Community-Academic Partnership: Implementing a Community-Based Trial of Telephone Cognitive Behavioral Therapy for Rural Latinos

    Directory of Open Access Journals (Sweden)

    Eugene Aisenberg

    2012-01-01

    Full Text Available Concerns about the appropriate use of EBP with ethnic minority clients and the ability of community agencies to implement and sustain EBP persist and emphasize the need for community-academic research partnerships that can be used to develop, adapt, and test culturally responsive EBP in community settings. In this paper, we describe the processes of developing a community-academic partnership that implemented and pilot tested an evidence-based telephone cognitive behavioral therapy program. Originally demonstrated to be effective for urban, middle-income, English-speaking primary care patients with major depression, the program was adapted and pilot tested for use with rural, uninsured, low-income, Latino (primarily Spanish-speaking primary care patients with major depressive disorder in a primary care site in a community health center in rural Eastern Washington. The values of community-based participatory research and community-partnered participatory research informed each phase of this randomized clinical trial and the development of a community-academic partnership. Information regarding this partnership may guide future community practice, research, implementation, and workforce development efforts to address mental health disparities by implementing culturally tailored EBP in underserved communities.

  18. Cognitive Sensor Networks

    Science.gov (United States)

    Henderson, Thomas C.

    Our overall goal is to develop a cognitive architecture which will allow autonomous and robust operation of sensor-actuator networks. To achieve this, the perception, concept formation, action cycle will be informed by domain theories of signal analysis, physical phenomena, and behavior. Example scenarios include cognitive vehicles and buildings in which the system understands itself and the activities in and around it by means of distributed video and other sensors. This includes discovery of the cognitive system's own sensing and actuation capabilities.

  19. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  20. Information security fundamentals

    CERN Document Server

    Blackley, John A; Peltier, Justin

    2004-01-01

    Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes

  1. Technology's Role in Security.

    Science.gov (United States)

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  2. Fragile States : Securing Development

    OpenAIRE

    Zoellick, R.

    2008-01-01

    Fragile states are the toughest development challenge of our era. But we ignore them at our peril: about one billion people live in fragile states, including a disproportionate number of the world's extreme poor, and they account for most of today's wars. These situations require a different framework of building security, legitimacy, governance, and the economy. Only by securing development - bringing security and development together to smooth the transition from conflict to peace and then ...

  3. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  4. Comparison of Adaptive Information Security Approaches

    OpenAIRE

    Antti Evesti; Eila Ovaska

    2013-01-01

    Dynamically changing environments and threat landscapes require adaptive information security. Adaptive information security makes it possible to change and modify security mechanisms at runtime. Hence, all security decisions are not enforced at design-time. This paper builds a framework to compare security adaptation approaches. The framework contains three viewpoints, that is, adaptation, security, and lifecycle. Furthermore, the paper describes five security adaptation approaches and compa...

  5. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  6. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...

  7. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  8. Alternative security

    International Nuclear Information System (INIS)

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  9. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  10. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  11. Security Psychology as Social Systemic Phenomenon

    OpenAIRE

    Yuri P. Zinchenko

    2011-01-01

    Security psychology is considered through social systemic search for reciprocal contiguity and mutual completion of existing advances of psychology and conceptual security understanding. The ability of systemic vision of security and its cognitive and practical specifics are demonstrated. The possibility to investigate safety psychology as social theoretical construct is suggested. Multi-aspect approach to security is substantiated. Methodological challenges of psychological security are disc...

  12. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  13. Study on Commercial Building Fire Safety and Security Evacuation Design%商业建筑防火与安全疏散设计研究

    Institute of Scientific and Technical Information of China (English)

    毛应

    2014-01-01

    Since the reform and opening up, commercial buil-ding presents the trend of building body is more and more high, the body becomes more and more huge, and the structure be-comes more complex. Such a crowded place, building firepro-ofing and timely evacuation after dangerous has become one of the important issues builders should consider.%改革开放以来,商业建筑呈现楼体越来越高耸、身躯越来越庞大、结构越来越复杂的趋势。如此人员密集的场所,建筑的防火与发生危险后能否及时安全疏散便必然成为需要建设者重要考虑的问题之一。

  14. Wi-Fi security

    OpenAIRE

    Vlach, Lukáš

    2011-01-01

    The thesis is focused on the problem of wireless networking and its security. The thesis is divided into two main parts, both parts builds on the bachelor thesis and some of its chapters are further extended and complemented by the issue. The theoretical part deals with the standards of IEEE organization and security policy of Wi-Fi networks with a focus on the distribution of wireless networks and its security. The practical part is focused on the survey of the Wi-Fi safety in selected...

  15. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  16. Cloud Computing Security

    OpenAIRE

    Ngongang, Guy

    2011-01-01

    This project aimed to show how possible it is to use a network intrusion detection system in the cloud. The security in the cloud is a concern nowadays and security professionals are still finding means to make cloud computing more secure. First of all the installation of the ESX4.0, vCenter Server and vCenter lab manager in server hardware was successful in building the platform. This allowed the creation and deployment of many virtual servers. Those servers have operating systems and a...

  17. Regional Radiological Security Zones: A New Approach to Better Secure Radioactive Sources

    International Nuclear Information System (INIS)

    Radioactive sources are present in nearly every country around the globe, including in public buildings that are not adequately secured. Many government officials and experts agree that a terrorist group acquiring and using radiological material to make a “dirty bomb” is a major threat to global security. The International Atomic Energy Agency and Nuclear Security Summit process have recognized the importance of radioactive source security as part of a broad nuclear security agenda, and encouraged countries to pursue domestic security improvements. However, the existing mechanisms should be supplemented with Radiological Security Zones (RSZ) that would harmonize protection, ensure common training, and build confidence in effective implementation. (author)

  18. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  19. In Defense Of Ecological Security

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    China is building Tibet as an ecological buffer to secure climate systems and maintain environmental stability scientific evidence shows the Tibet Plateau, the main body of the Qinghai-Tibet Plateau, is the"starter" and "regulating area" of

  20. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  1. 股票及期货术语中的“仓”隐喻%The "Store" Metaphor and its Cognitive Analysis in the Terms of Securities and Future

    Institute of Scientific and Technical Information of China (English)

    吴恩锋

    2011-01-01

    Based on The Dictionary of Modern Economics and the economic article title corpus composed of 62307 article titles from three main domestic economic newspapers--21 Century Business Herald, China Business, The Economic Observer Newspaper, this paper treated the "store" metaphors in the terms of securities and future with linguistic analysis and cognitive analysis, and tried to give definitions to the terms not concluded in the dictionary.%基于《现代经济词典》和由国内三大经济类报纸《21世纪经济报道》、《中国经营报》、《经济观察报》中62307条文章标题所构成的经济报道标题语料库,文章对股票及期货术语中的“仓”隐喻进行了语义分析和认知分析,并对辞典中未收录的“仓”隐喻术语进行了尝试性的定义。

  2. Building a Community

    Science.gov (United States)

    Cookson, Peter W., Jr.

    2004-01-01

    When children are securely attached and feel safe within a group, they are free to use their cognitive capacities in ways that are unimaginable. While there is no secret formula for creating genuine learning environments, the author of this paper offers a few ideas for fostering a positive and caring learning environment in the classroom.

  3. Energy audit and energy security

    OpenAIRE

    Beata Agnieszka Kulessa

    2013-01-01

    In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency ...

  4. Financial security

    NARCIS (Netherlands)

    M. de Goede

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  5. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  6. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  7. Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    Malottki, Christian von

    2012-07-27

    The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.

  8. ENERGY SECURITY – A PART OF THE ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Maria-Floriana POPESCU

    2014-11-01

    Full Text Available Energy is in the centre of the economic development of each country, setting into motion and fuelling factories, government buildings and offices, schools and hospitals, heating homes and keeping perishable foods cold. Its importance explains its complexity. Energy is source of wealth and competition, base for the political controversies and technological investments, and also the core of the epochal challenges of our global environment. Energy is essential for a sustainable development. Security of supplyis a priority for many countries. In this context, there are more ways through it can be achieved: effective management of the demand, diversification of energy sources and the locations of supply, or even using military presence. Energy security can best be defined as the overlap between economic security, national security and the environmental security. This paper will present the economic component of the energy security concept, its purpose being to analyse the concept of energy security in the world.

  9. Does Retirement Affect Cognitive Functioning?

    OpenAIRE

    Bonsang, E.D.M.; S. Adam; S Perelman

    2010-01-01

    This paper analyzes the effect of retirement on cognitive functioning using two large scale surveys. On the one hand the HRS, a longitudinal survey among individuals aged 50+ living in the United States, allows us to control for individual heterogeneity and endogeneity of the retirement decision by using the eligibility age for Social Security as an instrument. On the other hand, a comparable international European survey, SHARE, allows us to identify the causal effect of retirement on cognit...

  10. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  11. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  12. Security Expertise

    DEFF Research Database (Denmark)

    This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think...

  13. Cognitive Changes

    Science.gov (United States)

    ... for Cognitive Problems? Page reviewed by Dr. Joash Lazarus, NPF Movement Disorders Fellow, Department of Neurology at ... What Are the Alternative Treatments for Cognitive Problems? Anxiety Hallucinations/Delusions Speech and Swallowing Problems Vision Changes ...

  14. Cognitive Engineering

    OpenAIRE

    Wilson, Kyle M.; Helton, William S; Wiggins, Mark W.

    2013-01-01

    Cognitive engineering is the application of cognitive psychology and related disciplines to the design and operation of human–machine systems. Cognitive engineering combines both detailed and close study of the human worker in the actual work context and the study of the worker in more controlled environments. Cognitive engineering combines multiple methods and perspectives to achieve the goal of improved system performance. Given the origins of experimental psychology itself in issues regard...

  15. Cognitive psychology

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, J.R.

    1984-05-01

    The author considers the following areas of cognitive psychology: architectural principles of the human mind; knowledge representation; spreading activation; control of cognition; memory; learning; language; and prediction. He tries to provide pointers to the field at large learning the view of his book the architecture of cognition (Anderson 1983) for those who require a more detailed treatment. 76 references.

  16. Asia’s New Security and China

    Institute of Scientific and Technical Information of China (English)

    Xia; Liping

    2014-01-01

    <正>Since the end of the cold war,China puts forward a series of new national security ideas with Chinese characteristics such as the"new security concept"and the goal of"building a harmonious world".In May 2014 at the Fourth Summit of Conference on Interaction and Confidence Building Measures in Asia(CICA Summit)held in Shanghai,Chinese President Xi Jinping explicitly put forward the Asian new security concept featured by"common,

  17. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  18. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  19. Securities lending

    OpenAIRE

    Paul C. Lipson; Sabel, Bradley K.; Frank M. Keane

    2012-01-01

    This paper, originally released in August 1989 as part of a Federal Reserve Bank of New York series on the U.S. securities markets, examines loans of Treasury and agency securities in the domestic market. It highlights some important institutional characteristics of securities loan transactions, in particular the common use of agents to arrange the terms of the loans. While we note that this characteristic sets securities lending apart from most repurchase agreement (repo) transactions, which...

  20. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  1. : Cognitive complaints and cognitive decline.

    OpenAIRE

    Dufouil, Carole; Fuhrer, Rebecca; Alpérovitch, Annick

    2005-01-01

    OBJECTIVES: To explore whether more cognitive complaints are associated with previous or future cognitive decline. DESIGN: Longitudinal; epidemiology vascular aging study. SETTING: Community in Nantes, France. PARTICIPANTS: Seven hundred thirty-three subjects, aged 59 to 71. MEASUREMENTS: Subjective cognitive complaints were recorded at 4-year follow-up examination in a prospective study of people aged 59 to 71 at study entry. Participants' cognitive performances were assessed repeatedly at e...

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  3. Cognitive distance

    Science.gov (United States)

    Shu, Hong; Edwards, Geoffrey; Qi, Cuihong

    2001-09-01

    In geographic space, it is well known that spatial behaviors of humans are directly driven by their spatial cognition, rather than by the physical or geometrical reality. The cognitive distance in spatial cognition is fundamental in intelligent pattern recognition. More precisely, the cognitive distance can be used to measure the similarities (or relevance) of cognized geographic objects. In the past work, the physical or Euclidean distances are used very often. In practice, many inconsistencies are found between the cognitive distance and the physical distance. Usually the physical distance is overestimated or underestimated in the process of human spatial behaviors and pattern recognition. These inconsistencies are termed distance distortions. The aim of this paper is to illustrate the conceptions of cognitive distance and distance distortion. And if the cognitive distance is argued to be two-dimensional, it exists in heterogeneous space and the property of quasi-metric is shown. If the cognitive distance is multi-dimensional, it exists in homogeneous space and the property of metric is shown. We argue that distance distortions arise from the transformation of homogeneous to heterogeneous space and from the transformation of the two-dimensional cognitive distance to the multi-dimensional cognitive distance. In some sense, the physical distance is an instance of cognitive distance.

  4. Plataforma smart building

    OpenAIRE

    Cidrera Lopez, Alain

    2013-01-01

    The overall project is a system (hardware + software) that allows monitoring and control in a building / office different security systems, energy, communications, home automation, PKI's overall business that will increase all the efficiency of the building and the business and ensure the continuity of it. My participation in this Project will mainly focus on the development of hardware components, monitoring and control system (home automation, energy, safety control elements ...) and softwa...

  5. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  6. INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES: a cognitive-discoursive analysis of systematic metaphor emersion in opinion article genre

    Directory of Open Access Journals (Sweden)

    Ana Cristina Pelosi

    2016-03-01

    Full Text Available The article presents partial results of a research which is aimed at verifying how figurative language, specifically metaphoric and metonymic language, present in different textual genres such as the literary and the journalistic genres, contributes to the emergence and negotiation of meaning. The theoretic and methodological basis of the research comes from Conceptual Metaphor Theory, originally proposed by Lakoff and Johnson (1980 and expanded in the 90’s by theoreticians such as Grady (1997, and from Metaphor-Led Discourse Analysis (CAMERON ET AL, 2009; CAMERON; MASLEN, 2010. Research implementation involves two stages. An analysis of four exemplars of the genres under investigation according to Metaphor-Led Discourse Analysis and a second analysis, still to be carried out, of the talk of three focus groups composed by students of a state school in Santa Maria, RS, after the reading of the different genres. The preliminary analysis presented of the opinion article selected for this study reveals the presence of image-kinesthetic schemas and metaphoric/metonymic vehicles which structure the language present in the analyzed genre and contribute to the emergence of the systematic metaphor INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES.

  7. Building brains for bodies

    Science.gov (United States)

    Brooks, Rodney Allen; Stein, Lynn Andrea

    1994-01-01

    We describe a project to capitalize on newly available levels of computational resources in order to understand human cognition. We will build an integrated physical system including vision, sound input and output, and dextrous manipulation, all controlled by a continuously operating large scale parallel MIMD computer. The resulting system will learn to 'think' by building on its bodily experiences to accomplish progressively more abstract tasks. Past experience suggests that in attempting to build such an integrated system we will have to fundamentally change the way artificial intelligence, cognitive science, linguistics, and philosophy think about the organization of intelligence. We expect to be able to better reconcile the theories that will be developed with current work in neuroscience.

  8. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  9. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  10. Cognitive Assessment System (CAS): Psychometric studies with Portuguese children.

    OpenAIRE

    Rosário, A.; Candeias, A.A.; Roazzi, A.

    2013-01-01

    The Cognitive Assessment System (CAS) is a new measure of cognitive abilities based on the Planning, Attention, Simultaneous and Successive (PASS) Theory. This theory is derived from research in neuropsychological and cognitive Psychology with particular emphasis on the work of Luria (1973). According to Naglieri (1999) and Naglieri and Das (1997), the PASS cognitive processes are the basic building blocks of human intellectual functioning. Planning processes provide cognitive control, utiliz...

  11. Can Cognitive Explanations Be Eliminated?

    Science.gov (United States)

    Hakkarainen, Kai

    The purpose of article is to analyze the arguments of Bruno Latour and Steve Woolgar aimed at eliminating `superfluous' cognitive explanations from discussion of scientific activity. They proposed to a ten-year moratorium on cognitive explanations of scientific activity and promised to reassess explanation in terms of cognition after this period of time if some aspects of scientific inquiry would not be accounted by sociological explanations. Intensive laboratory studies of scientific practice indicated that scientific thinking is not based on mental processes alone but relies on external tools and instruments. On the basis of these kinds of observations, they rejected all cognitive explanations of scientific inquiry. By building on sociocultural theories of cognition, the present study makes the case that the use of conceptual tools significantly transforms cognitive processes. It is concluded that the failure to appreciate cognitive explanations reflects a far toon arrow and non-social concept of cognition: Even after the ten-year moratorium there appears to be many good reasons to reassess the proposal of eliminating cognitive explanations altogether.

  12. Security and Architectural Patterns for Securing the Cloud Architecture

    Directory of Open Access Journals (Sweden)

    Golajapu Venu Madhava Rao

    2015-09-01

    Full Text Available Operating a cloud securely and efficiently entails a great deal of advanceplanning. A data center and redundant internet connection is required at the beginning to connect to cloud. This can constitute the technology portion of an information security and some network devices that safely and securely serve the communication. National Institute of Standards and Technology states that the process of uniquely assigning the information resources to an information system will define the security boundary for that system. A massive amount of gear that is racked and cabled following defined patterns is enabled inside this boundary. Need for the infrastructure that is used to manage the cloud and its resources as it operates the cloud. Each component like server, network and storagerequires some degree of configuration. While designing or planning a complex systemit is important to look ahead the process and procedures required for operation of the system. Small cloud systems can be build without much of planning. But any Cloud system substantially bigger size needs significant planning and design. If we fail to plan it leads to higher cost due to inefficiency in design and process. In this paper we study on the architectural components that can be used to build a cloud with security as a priority. This can be achieved by identifying requirements for secured cloud architecture along with key patterns and architectural elements. This paper first discusses on security patterns and an architectural element required and also focuses on several different cloud architectures and secure cloud operation strategies.

  13. Effects of Shanghai Citizens' Cognition of Leisure Sports Exercise on Building up a City of Health%上海市民休闲体育锻炼认知对构建健康城市的影响

    Institute of Scientific and Technical Information of China (English)

    顾红; 陈爱菊

    2012-01-01

    Based on the analysis of the relevant researches at home and abroad and by the methods of literature study,questionnaire and statistics,the article focuses on the different-background Shanghai citizens' attitude toward leisure sports exercise and the difference of experience.A further study has also been made on the cognition of building up a city of health with leisure sports exercise as well as the attitude toward exercise and exercise experience.%在分析国内、外相关研究的基础上,通过文献资料、问卷调查和数理统计等研究方法,对不同背景特征的上海市居民在休闲体育锻炼的态度和体验差异进行分析。在此基础上,进一步就以休闲体育锻炼建构健康城市为基础的认同感及运动态度和运动体验的相关性进行了研究。

  14. Spectrum Sharing Security and Attacks in CRNs: a Review

    Directory of Open Access Journals (Sweden)

    Wajdi Alhakami

    2014-01-01

    Full Text Available Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

  15. Extending Eurasia Security Cooperation

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    After 14 years of development, the Shanghai Cooperation Organization (SCO) , has set its sights on goals for the next de-cade at the 15th meeting of the Council of SCO Heads of State that was held in Ufa, the capital of Russia's Bashkortostan Republic, on July 9-10. The SCO, established in Shanghai in 2001, is committed to building fdendly neighbor rela- tions and maintaining security and stability in the Central Asian region through multilateral cooperation.

  16. Space Telecommunications Radio System STRS Cognitive Radio

    Science.gov (United States)

    Briones, Janette C.; Handler, Louis M.

    2013-01-01

    Radios today are evolving from awareness toward cognition. A software defined radio (SDR) provides the most capability for integrating autonomic decision making ability and allows the incremental evolution toward a cognitive radio. This cognitive radio technology will impact NASA space communications in areas such as spectrum utilization, interoperability, network operations, and radio resource management over a wide range of operating conditions. NASAs cognitive radio will build upon the infrastructure being developed by Space Telecommunication Radio System (STRS) SDR technology. This paper explores the feasibility of inserting cognitive capabilities in the NASA STRS architecture and the interfaces between the cognitive engine and the STRS radio. The STRS architecture defines methods that can inform the cognitive engine about the radio environment so that the cognitive engine can learn autonomously from experience, and take appropriate actions to adapt the radio operating characteristics and optimize performance.

  17. Cognitive reasoning a formal approach

    CERN Document Server

    Anshakov, Oleg M

    2010-01-01

    Dealing with uncertainty, moving from ignorance to knowledge, is the focus of cognitive processes. Understanding these processes and modelling, designing, and building artificial cognitive systems have long been challenging research problems. This book describes the theory and methodology of a new, scientifically well-founded general approach, and its realization in the form of intelligent systems applicable in disciplines ranging from social sciences, such as cognitive science and sociology, through natural sciences, such as life sciences and chemistry, to applied sciences, such as medicine,

  18. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This book consists of essays covering issues in visual cognition presenting experimental techniques from cognitive psychology, methods of modeling cognitive processes on computers from artificial intelligence, and methods of studying brain organization from neuropsychology. Topics considered include: parts of recognition; visual routines; upward direction; mental rotation, and discrimination of left and right turns in maps; individual differences in mental imagery, computational analysis and the neurological basis of mental imagery: componental analysis.

  19. Cognitive Economics

    OpenAIRE

    Kimball, Miles S.

    2015-01-01

    Cognitive Economics is the economics of what is in people’s minds. It is a vibrant area of research (much of it within Behavioral Economics, Labor Economics and the Economics of Education) that brings into play novel types of data—especially novel types of survey data. Such data highlight the importance of heterogeneity across individuals and highlight thorny issues for Welfare Economics. A key theme of Cognitive Economics is finite cognition (often misleadingly called “bounded rationality”),...

  20. Actively Promote Food Security Innovation to Build a Hospital Catering Services%积极推进伙食保障创新构建医院特色饮食服务

    Institute of Scientific and Technical Information of China (English)

    陈珵

    2015-01-01

    近年来,医院后勤保障坚持把“吃出营养、吃出健康、吃出战斗力”作为根本去想,努力构建适应保障需求的“高效”饮食机制,全面总结出一套科学办伙食的方法措施,伙食管理明显增强,伙食质量有效提升,为增强部队凝聚力、提高战斗力,促进部队全面建设发挥了重要作用。%in recent years, the hospital logistics guarantee adhere to "eat nutrition, eat healthy, eat a fighting force" as the fundamental to, and strive to build a meet the security needs of the "efficient" diet mechanisms, summarizes a set of office of the methods and measures of food science, food management markedly strong, food quality effectively enhance, to en-hance cohesion force and improving the battle effectiveness, promote the all round construction of the armed forces play an important role.

  1. Security studies

    International Nuclear Information System (INIS)

    The so called 'Security Studies' constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control nuclear material (NM) against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of nuclear material. The paper presents the context of security studies carried out in France. (author)

  2. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  3. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from...

  4. Building the quantum network

    International Nuclear Information System (INIS)

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  5. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report; Transition et securite energetiques: quels codes volontaires? Efficacite energetique: dialogue AIE, CEI et ISO. Les mesures de securite, solidarite et efficacite de la commission europeenne. Securiser l'approvisionnement en gaz naturel et favoriser la cogeneration. Des batiments moins gourmands en energie: refonte de la directive sur la performance energetique. Efficacite energetique dans les batiments: GDF Suez au rapport (volontaire)

    Energy Technology Data Exchange (ETDEWEB)

    Tourneur, J.C

    2009-10-15

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  8. Security Solutions Lecture Presented by NSA Technical Director Neal Ziring

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    Neal Ziring, Technical Director in the Information Assurance Directorate at the National Security Agency (NSA), provided a lecture titled “Building Robust Security Solutions Using Layering and Independence,” Jan. 17.

  9. Computer Security at Nuclear Facilities

    International Nuclear Information System (INIS)

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  10. Individuality in nest building: do southern masked weaver (Ploceus velatus) males vary in their nest-building behaviour?

    Science.gov (United States)

    Walsh, Patrick T; Hansell, Mike; Borello, Wendy D; Healy, Susan D

    2011-09-01

    We currently have little understanding of how birds know what nest to build and what little we do know has been gained largely from investigations of the completed structures (morphology of finished nests) or of material selection. Here we looked at the behaviours performed by male Southern Masked weaverbirds when building their nests. During the two earliest phases of construction individual males varied in the direction in which they carried and inserted grass into their developing nest, the speed at which they completed phases of nest construction and in the frequency with which they dropped grass during weaving. Behaviours performed during the initial attachment phase, when grass is being secured to a bare branch, were not repeatable within males, whereas during the subsequent "ring" phase behaviours tended to be repeatable. Some males were biased as to which side of the nest they inserted grass blades and strongly lateralized individuals completed phases of nest-building more quickly. The lack of repeatability of most nest-building behaviours and the changes in those behaviours as males build more nests seems most readily explained by increasing dexterity. Further work is required to confirm any role for cognition in these experience-dependent changes. PMID:21736928

  11. SMS Security in Mobile Devices: A Survey

    Directory of Open Access Journals (Sweden)

    Muhammad Waseem Khan

    2013-09-01

    Full Text Available The Short Message Service (SMS is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasnít achieved secure transmission of plaintext between different mobile phone devices. SMS doesnít have its own build-in mechanism to secure the transmitted data because security isnít considered as a priority application for mobile devices. Many SMS security schemes have been proposed by the researchers. This survey presents the existing schemes used to secure SMS message communication. State of the art SMS security solutions for mobile devices is presented from the period 2006-2013. Literature research of those security schemes is conducted and presented in this survey. The effect of each security scheme on mobile deviceís performance is also observed. Finally, a general summary of all security schemes with their limitations is presented.

  12. High Security Laboratory - Network Telescope

    OpenAIRE

    Beck, Frédéric; Festor, Olivier; State, Radu

    2008-01-01

    While attacks are widespread, network data related to them is rarely available to academies for investigation. In this context, the MADYNES team, which develops research activities on security management, decided to build an infrastructure capable of collecting the necessary data to enable analysis and modeling of malicious systems from a network point of view. This infrastructure is now part of the LORIA High Security Laboratory.

  13. Cognitive maps

    DEFF Research Database (Denmark)

    Minder, Bettina; Laursen, Linda Nhu; Lassen, Astrid Heidemann

    2014-01-01

    . Conceptual clustering is used to analyse and order information according to concepts or variables from within the data. The cognitive maps identified are validated through the comments of some of the same experts. The study presents three cognitive maps and respective world-views explaining how the design...

  14. Explaining cognitive behaviour : a neurocomputational perspective

    OpenAIRE

    Rossi, Francesca Micol

    2014-01-01

    While the search for models and explanations of cognitive phenomena is a growing area of research, there is no consensus on what counts as a good explanation in cognitive science. This Ph.D. thesis offers a philosophical exploration of the different frameworks adopted to explain cognitive behaviour. It then builds on this systematic exploration to offer a new understanding of the explanatory standards employed in the construction and justification of models and modelling fra...

  15. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This collection of research papers on visual cognition first appeared as a special issue of Cognition: International Journal of Cognitive Science. The study of visual cognition has seen enormous progress in the past decade, bringing important advances in our understanding of shape perception, visual imagery, and mental maps. Many of these discoveries are the result of converging investigations in different areas, such as cognitive and perceptual psychology, artificial intelligence, and neuropsychology. This volume is intended to highlight a sample of work at the cutting edge of this research area for the benefit of students and researchers in a variety of disciplines. The tutorial introduction that begins the volume is designed to help the nonspecialist reader bridge the gap between the contemporary research reported here and earlier textbook introductions or literature reviews.

  16. Cognitive remission

    DEFF Research Database (Denmark)

    Bortolato, Beatrice; Miskowiak, Kamilla W; Köhler, Cristiano A;

    2016-01-01

    BACKGROUND: Cognitive dysfunction in major depressive disorder (MDD) encompasses several domains, including but not limited to executive function, verbal memory, and attention. Furthermore, cognitive dysfunction is a frequent residual manifestation in depression and may persist during the remitted...... phase. Cognitive deficits may also impede functional recovery, including workforce performance, in patients with MDD. The overarching aims of this opinion article are to critically evaluate the effects of available antidepressants as well as novel therapeutic targets on neurocognitive dysfunction in MDD......, galantamine, scopolamine, N-acetylcysteine, curcumin, statins, and coenzyme Q10. The management of cognitive dysfunction remains an unmet need in the treatment of MDD. However, it is hoped that the development of novel therapeutic targets will contribute to 'cognitive remission', which may aid functional...

  17. Security management

    International Nuclear Information System (INIS)

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP)

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  20. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  1. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  2. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  3. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  4. COGNITION AND INTELLIGENT ENTREPRENEURSHIP

    Directory of Open Access Journals (Sweden)

    Meo Colombo Carlotta

    2012-07-01

    Full Text Available The aim of the paper is to study how it’s possible to enhance the cognitive enterprise model by the theory of autopoietic systems. I propose a model that considers the organization as a closed system in which all cognitive activity is necessary to develop coherent operations needed to adapt the firm to environmental perturbations. The central issue of the work consists in the presentation and description of the “chain thinking-action” as a cognitive basis that builds models from which derive the actions that characterize the transformation of a business enterprise in order to maintain the viability over time. A \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"winning\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" entrepreneurial thinking is able to give a direction (objectives-strategy always aimed at improving the organization’s vital parameters. The role of entrepreneurship and management, therefore, is to create the conditions to encourage a continuous development of cognitive models in organizations, in order to maintain the conditions of survival and to lead the company in a situation of evolution and improvement.

  5. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  6. Network Security

    CERN Document Server

    Huang, Scott; Du, Ding-Zhu

    2010-01-01

    This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose res

  7. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  8. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  9. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  10. Carrying Out Overseas Energy Cooperation, and Building China's Oil Supply Security System%开展海外能源合作,确保中国石油供应

    Institute of Scientific and Technical Information of China (English)

    钱学文; 李焕民

    2009-01-01

    China's rapid growth in oil demand has become a world-wide consensus. Due to the lack of domestic resources, the best choice for China is active in overseas energy cooperation to ensure oil supply. Considering a variety of factors, the Middle East oil-producing countries should be the primary choice for China's cooperation in the region. Energy cooperation abroad with a number of major oil-producing countries or the oil-exporting countries is necessary to attach importance to raising the safety factor of energy transport. With a positive and friendly attitude, China should cooperate with neighboring countries to build Asia's oil supply security system.%中国的石油需求增长迅速已成为世界性共识.在国内资源条件不理想的情况下,中国的最佳选择是,积极开展海外能源合作,以确保石油供应.各种因素表明,中东产油国应是中国的首选合作方.在开展海外能源合作,与一些主要的石油生产国或石油输出国互动时,既要重视提高海外能源运输的安全系数,也应以积极、友善的姿态,与周边邻国合作,构建亚洲石油供应保障体系.

  11. Cognitive Neuropsychology

    DEFF Research Database (Denmark)

    Starrfelt, Randi

    2012-01-01

    are disproportionally impaired in one task or domain compared to another. In many cases data for normal performance has not been referred to or reported. This has resulted in several theories of cognitive functioning in different domains such as language, visual perception, and memory, specifying a number of different...... in patients’ test performance can inform theories of (normal) cognitive function. In four talks, this symposium will present and discuss methods for investigating impairment patterns in neuropsychological patients: 1) a talk on basic assumptions and statistical methods in single case methodology; 2) a talk......Traditionally, studies in cognitive neuropsychology have reported single cases or small groups of patients with seemingly selective impairments of specific cognitive processes or modules. Many studies, particularly older ones, have used simple and coarse tasks to show that patients...

  12. Social cognition.

    Science.gov (United States)

    Patin, Alexandra; Hurlemann, René

    2015-01-01

    Social cognition is a major problem underlying deficiencies in interpersonal relationships in several psychiatric populations. And yet there is currently no gold standard for pharmacological treatment of psychiatric illness that directly targets these social cognitive areas. This chapter serves to illustrate some of the most innovative attempts at pharmacological modulation of social cognition in psychiatric illnesses including schizophrenia, borderline personality disorder, autism spectrum disorders, antisocial personality disorder and psychopathy, social anxiety disorder, and posttraumatic stress disorder. Pharmacological modulation includes studies administering oxytocin, ecstasy (MDMA), modafinil, methylphenidate, and D-cycloserine. Furthermore, some background on social cognition research in healthy individuals, which could be helpful in developing future treatments, is provided as well as the potential for each drug as a long-term treatment option. PMID:25977087

  13. Cognitive Systems

    DEFF Research Database (Denmark)

    The tutorial will discuss the definition of cognitive systems as the possibilities to extend the current systems engineering paradigm in order to perceive, learn, reason and interact robustly in open-ended changing environments. I will also address cognitive systems in a historical perspective and...... its relation and potential over current artificial intelligence architectures. Machine learning models that learn from data and previous knowledge will play an increasingly important role in all levels of cognition as large real world digital environments (such as the Internet) usually are too complex...... to be modeled within a limited set of predefined specifications. There will inevitably be a need for robust decisions and behaviors in novel situations that include handling of conflicts and ambiguities based on the capability and knowledge of the artificial cognitive system. Further, there is a need...

  14. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  15. Cognitive Systems

    OpenAIRE

    Larsen, Jan

    2008-01-01

    The tutorial will discuss the definition of cognitive systems as the possibilities to extend the current systems engineering paradigm in order to perceive, learn, reason and interact robustly in open-ended changing environments. I will also address cognitive systems in a historical perspective and its relation and potential over current artificial intelligence architectures. Machine learning models that learn from data and previous knowledge will play an increasingly important role in all lev...

  16. Social cognition

    OpenAIRE

    Frith, Chris D.

    2008-01-01

    Social cognition concerns the various psychological processes that enable individuals to take advantage of being part of a social group. Of major importance to social cognition are the various social signals that enable us to learn about the world. Such signals include facial expressions, such as fear and disgust, which warn us of danger, and eye gaze direction, which indicate where interesting things can be found. Such signals are particularly important in infant development. Social referenc...

  17. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  18. Privatising Security

    OpenAIRE

    Irina Mindova-Docheva

    2016-01-01

    The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research shou...

  19. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  20. Food security

    OpenAIRE

    Dorina Ardelean

    2011-01-01

    The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks); redistribution of food availability within the country or out through internationa...

  1. Strengthening Global Approaches to Nuclear Security

    OpenAIRE

    Bunn, Matthew G.

    2013-01-01

    Despite substantial progress in improving nuclear security in recent years, there is more to be done. The threats of nuclear theft and terrorism remain very real. This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exch...

  2. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  3. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  4. Security and Security Complex: Operational Concepts

    Directory of Open Access Journals (Sweden)

    Luis Tomé

    2010-01-01

    Full Text Available Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive security, common security, cooperative security, collective security, and security community, continues to be very lively. Starting from these debates, and in the light of the current international situation, we propose operational concepts of security and of security complex.

  5. Sound Security,Safe Beijing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ With the approach of the long a waited event,Chinese authorities have geared up to intensify security preparations.In line with the"people-oriented"and"athletes-centered"ideas,Beijing will spare no efforts to provide quality services and to build a safe and cornfort able environment that will satisfy all the Games' participants.

  6. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  7. The importance of trust in computer security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2014-01-01

    fail. In particular, we identify areas where the “hard” security properties are based on trust in the different agents in the system and certain external agents who enforce the legislative and contractual frameworks. Trust is generally considered a “soft” security property, so building a “hard...

  8. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  9. Spaces of Global Security: Beyond Methodological Nationalism

    OpenAIRE

    Adamson , Fiona B.

    2016-01-01

    The changing political and social meanings of space under conditions of advanced globalization point to the need to analyze security – or the deployment and management of violence -- as a socio-spatial practice. This article draws attention to the “methodological nationalist” bias that has traditionally characterized mainstream security studies, and discusses its effect on how security issues are studied and conceptualized. Building on insights from political geography and sociology, the art...

  10. A German Perspective on Security Research

    Science.gov (United States)

    Thoma, Klaus; Hiller, Daniel; Leismann, Tobias; Drees, Birgit

    Prior to 2007, there was no coherent federal approach to conceptualise and fund security research in Germany. This changed with the initiation of the national program for civil security research, managed by the German Ministry for Education and Research (BMBF). Over the course of only four years a continuous build-up of national capacities on civil security was established to better protect German citizens, commodities and infrastructures against terrorism, organised crime and the effects of man-made and natural disasters.

  11. Strengthening nuclear security

    International Nuclear Information System (INIS)

    The international situation after the end of the Cold-War has been quite unstable, due to the occurrence of frequent regional conflicts and domestic wars based on ethnic, religious or racial reasons. Further, threats to the would peace and security by non-state actors, like international terrorist groups, have been recognized after 9.11 terrorist attacks to the World Trade Center buildings and to the Pentagon. Utilization of nuclear energy, which encompasses both peaceful uses and military ones, required an establishment of regulatory system, by which risks associated with the development of nuclear energy can be controlled. Accordingly, nuclear safety control system, and then non-proliferation control system has been developed, both in the international level and notional level. In recognition of the present unstable international situations, it is required to establish, maintain and strengthen a system which control nuclear security aspect, in addition to the present systems. (author)

  12. Information Security

    International Nuclear Information System (INIS)

    As nuclear materials and technologies spread, the global community needs to be ever more vigilant to prevent their acquisition by those that have no legitimate reason to access or use them. International efforts to strengthen nuclear security measures gained momentum when, in 2009, President Obama announced his intention to convene for the first time an international Nuclear Security Summit. Held in Washington in 2010, the Summit was attended by 47 Heads of State who collectively committed to securing all vulnerable nuclear material within four years. Two years later, 53 Heads of State came together at a second Summit in Seoul and agreed a set of concrete actions to deliver on this ambition. The Summit process has functioned not only as a catalyst to move nuclear security up States’ political consciousness, but also as a platform for broadening their perspective on this agenda. Specifically, the last three years have seen the international community increasingly recognise the fundamental need for nuclear security regimes to protect not only nuclear material and physical assets from non-state actors, but also the information needed to obtain and use these goods for nefarious purposes

  13. Human cognition

    International Nuclear Information System (INIS)

    The study of human cognition encompasses the study of all mental phenomena, from the receipt and interpretation of sensory information to the final control of the motor system in the performance of action. The cognitive scientist examines all intermediary processes, including thought, decision making, and memory and including the effects of motivation, states of arousal and stress, the study of language, and the effects of social factors. The field therefore ranges over an enormous territory, covering all that is known or that should be known about human behavior. It is not possible to summarize the current state of knowledge about cognition with any great confidence that we know the correct answer about any aspect of the work. Nontheless, models provide good characterizations of certain aspects of the data and situations. Even if these models should prove to be incorrect, they do provide good approximate descriptions of people's behavior in some situations, and these approximations will still apply even when the underlying theories have changed. A quick description is provided of models within a number of areas of human cognition and skill and some general theoretical frameworks with which to view human cognition. The frameworks are qualitative descriptions that provide a way to view the development of more detailed, quantitative models and, most important, a way of thinking about human performance and skill

  14. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  15. Based on combination of L2TP and IPSec VPN security technology research

    OpenAIRE

    Ya-qin Fan; Chi Li; Chao Sun

    2012-01-01

    This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  16. Does Retirement Affect Cognitive Functioning?

    OpenAIRE

    Bonsang, Eric; Adam, Stéphane; Perelman, Sergio

    2010-01-01

    This paper analyzes the effect of retirement on cognitive functioning using two large scale surveys. On the one hand the HRS, a longitudinal survey among individuals aged 50+ living in the United States, allows us to control for individual heterogeneity and endogeneity of the retirement decision by using the eligibility age for Social Security as an instrument. On the other hand, a comparable international European survey, SHARE, allows us to identify the causal effect of retir...

  17. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  18. Towards cognitive cities advances in cognitive computing and its application to the governance of large urban systems

    CERN Document Server

    Finger, Matthias

    2016-01-01

    This book introduces the readers to the new concept of cognitive cities. It demonstrates why cities need to become cognitive and why therefore a concept of cognitive city is needed. It highlights the main building blocks of cognitive cities and illustrates the concept by various cases. Following a concise introductory chapter the book features nine chapters illustrating various aspects and dimensions of cognitive cities. The logic of its structure proceeds from more general considerations to more specific illustrations. All chapters offer a comprehensive view of the different research endeavours about cognitive cities and will help pave the way for this new and innovative approach to governing cities in the future. .

  19. Cognitive Radio Application for Smart Grid

    OpenAIRE

    Vasudev Dehalwar; Mohan Kolhe; Sunita Kolhe

    2012-01-01

    The communication infrastructure between energy generation, transmission, distribution and utilization will require multi-way communications, interoperability between the advanced and existing system, and end-to-end reliable and secure communications with low-latencies. Revolutionary communication architecture is required for effective operation and control of smart grid, and cognitive radio based communication architecture can provide a unique solution. By leveraging cognitive radio technolo...

  20. Cognitive fitness.

    Science.gov (United States)

    Gilkey, Roderick; Kilts, Clint

    2007-11-01

    Recent neuroscientific research shows that the health of your brain isn't, as experts once thought, just the product of childhood experiences and genetics; it reflects your adult choices and experiences as well. Professors Gilkey and Kilts of Emory University's medical and business schools explain how you can strengthen your brain's anatomy, neural networks, and cognitive abilities, and prevent functions such as memory from deteriorating as you age. The brain's alertness is the result of what the authors call cognitive fitness -a state of optimized ability to reason, remember, learn, plan, and adapt. Certain attitudes, lifestyle choices, and exercises enhance cognitive fitness. Mental workouts are the key. Brain-imaging studies indicate that acquiring expertise in areas as diverse as playing a cello, juggling, speaking a foreign language, and driving a taxicab expands your neural systems and makes them more communicative. In other words, you can alter the physical makeup of your brain by learning new skills. The more cognitively fit you are, the better equipped you are to make decisions, solve problems, and deal with stress and change. Cognitive fitness will help you be more open to new ideas and alternative perspectives. It will give you the capacity to change your behavior and realize your goals. You can delay senescence for years and even enjoy a second career. Drawing from the rapidly expanding body of neuroscience research as well as from well-established research in psychology and other mental health fields, the authors have identified four steps you can take to become cognitively fit: understand how experience makes the brain grow, work hard at play, search for patterns, and seek novelty and innovation. Together these steps capture some of the key opportunities for maintaining an engaged, creative brain. PMID:18159786

  1. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  2. Energy security

    International Nuclear Information System (INIS)

    In the case of Cuba, energy security goes beyond the typical security framework of energy supply to encompass the economic blockade which affects Cuba's access to some markets for its traditional products and obstructs international credit options. Recent problems concerning security of national energy supply include: - Shortages of foreign exchange necessary for the purchase of fuel and spare parts, for new investments and for the implementation of programmes supporting the rational use of energy. - High dependence on imported energy, including oil and petroleum products. -Use of domestic crude oil, with energy performance slightly below that of the imported fuels it replaces, especially fuel oil. The main negative aspect is the high sulphur content, which has adverse operational and environmental effects. - Interruptions in energy services resulting from hurricanes and tropical storms, and from breakdowns and accidents related to the transport of fuels, especially coastal transport. The strategies employed to improve Cuba's energy security situation are based on: - Increased economic competitiveness; - Fuel conservation and rational use of energy; - Efficient exploration and use of oil and natural gas; - Development of renewable energy sources; - Legal and institutional support of activities in the energy sector; - Active involvement in the international arena focused on regional integration efforts and international forums related to technological, energy and environmental issues, and on strengthening bilateral alliances aimed at creating the necessary environment for trade, technological transfer and foreign investment for guaranteeing national energy supply

  3. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  4. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  5. Moral Cognition

    NARCIS (Netherlands)

    Schleim, Stephan; Clausen, Jens; Levy, Neil

    2015-01-01

    Research on moral cognition is a growing and heavily multidisciplinary field. This section contains chapters addressing foundational psychological, neuroscientific, and philosophical issues of research on moral decision-making. Further- more, beyond summarizing the state of the art of their respecti

  6. Security Systems Consideration: A Total Security Approach

    Science.gov (United States)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  7. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  8. Emotional Skills-Building Curriculum

    Science.gov (United States)

    Pickover, Sheri

    2010-01-01

    Current anger management programs use a cognitive behavior perspective; however, research also links anger control to developmental deficits such as attachment insecurity and emotional regulation. This article previews the Emotional Skills-Building Curriculum (ESBC), a 13-week treatment program designed to treat individuals who are referred for…

  9. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  10. Blue Water and the Consequences of Alternative Food Security Policies in the Middle East and North Africa for Water Security

    OpenAIRE

    Larson, Donald F.

    2013-01-01

    In the Middle East and North Africa, food security and water security are tightly entwined. In particular, choices about the extent to which food security policies rely on trade rather than domestically produced staples have stark consequences for the region's limited water resources. This paper builds on previous modeling results comparing the cost and benefits of policies to protect cons...

  11. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  12. Potential of Cognitive Computing and Cognitive Systems

    Science.gov (United States)

    Noor, Ahmed K.

    2014-11-01

    Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The cognitive assistants engage, individually or collectively, with humans through a combination of adaptive multimodal interfaces, and advanced visualization and navigation techniques. The realization of future cognitive environments requires the development of a cognitive innovation ecosystem for the engineering workforce. The continuously expanding major components of the ecosystem include integrated knowledge discovery and exploitation facilities (incorporating predictive and prescriptive big data analytics); novel cognitive modeling and visual simulation facilities; cognitive multimodal interfaces; and cognitive mobile and wearable devices. The ecosystem will provide timely, engaging, personalized / collaborative, learning and effective decision making. It will stimulate creativity and innovation, and prepare the participants to work in future cognitive enterprises and develop new cognitive products of increasing complexity. http://www.aee.odu.edu/cognitivecomp

  13. Reactor building

    International Nuclear Information System (INIS)

    The whole reactor building is accommodated in a shaft and is sealed level with the earth's surface by a building ceiling, which provides protection against penetration due to external effects. The building ceiling is supported on walls of the reactor building, which line the shaft and transfer the vertical components of forces to the foundations. The thickness of the walls is designed to withstand horizontal pressure waves in the floor. The building ceiling has an opening above the reactor, which must be closed by cover plates. Operating equipment for the reactor can be situated above the building ceiling. (orig./HP)

  14. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  15. International security and arms control

    International Nuclear Information System (INIS)

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  16. Nuclear security

    International Nuclear Information System (INIS)

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  17. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally. Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent.......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...... and real defence of the country’s neutrality let alone a capability to support possible League of Nations action, should such need arise. The anti-militarist ideology of one party, led to regarding the armed services as harmful to designs for developing civic society and a waste of resources generally...

  18. Energy Supply Security of Turkey and Measuring: an Application on Turkey’s Energy Supply Security

    OpenAIRE

    Hasan Sencer PEKER

    2015-01-01

    In this study, in which building an energy supply security index model in order to measure the energy supply security of Turkey, first, the four sub-indexes that compose overall index and their weighting coefficients were designated. These sub-indexes are availability index, reliability index, economic index and environmental index. According to index results, Turkey has to direct its necessary investments to fields that secure the energy import, regulate the electricity power market and rene...

  19. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. Password Security

    OpenAIRE

    Danuvasin Charoen

    2014-01-01

    This study investigates users’ behavior in password utilization. Good password practices are critical to the security of any information system. End users often use weak passwords that are short, simple, and based on personal and meaningful information that can be easily guessed. A survey was conducted among executive MBA students who hold managerial positions. The results of the survey indicate that users practice insecure behaviors in the utilization of passwords. The results support the li...

  1. Watermarking security

    OpenAIRE

    Furon, Teddy

    2016-01-01

    International audience This chapter deals with applications where watermarking is a security primitive included in a larger system protecting the value of multimedia content. In this context, there might exist dishonest users, in the sequel so-called attackers, willing to read/overwrite hidden messages or simply to remove the watermark signal.The goal of this section is to play the role of the attacker. We analyze means to deduce information about the watermarking technique that will later...

  2. Network Security

    OpenAIRE

    Sunil Kumar

    2012-01-01

    The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack or harm due to...

  3. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  4. Solar building

    OpenAIRE

    Zhang, Luxin

    2014-01-01

    In my thesis I describe the utilization of solar energy and solar energy with building integration. In introduction it is also mentioned how the solar building works, trying to make more people understand and accept the solar building. The thesis introduces different types of solar heat collectors. I compared the difference two operation modes of solar water heating system and created examples of solar water system selection. I also introduced other solar building applications. It is conv...

  5. Security studies

    International Nuclear Information System (INIS)

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  6. Building 2000

    International Nuclear Information System (INIS)

    This is the first volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this first rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In a second volume, a similar series of studies is presented for the building categories: office buildings, public buildings and hotels and holiday complexes. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (15 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues

  7. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security CSS for FAQ Transportation Security Administration Search When I fly can I bring ... to know if you could bring through the security checkpoint. Main menu Administrator Travel Security Screening Special ...

  8. An Alternative View of Schizophrenic Cognition

    OpenAIRE

    Snyder, Douglas M.

    1991-01-01

    An alternative view to the traditionally held view that schizophrenia is characterised by severely disordered cognition is presented. It is possible that apparently self-contradictory expressions of schizophrenics are well-formed communicative expressions of highly ordered cognitive systems. Building on the premise that behavior is in general communicative, and using Godel’s Incompleteness Theorem from logic as a model, it is shown that the most characteristic symptoms of schizophrenia (namel...

  9. A cognitive management framework for spectrum selection

    OpenAIRE

    Bouali, Faouzi; Sallent Roig, José Oriol; Pérez Romero, Jordi; Agustí Comes, Ramon

    2013-01-01

    To increase cognitive radio (CR) operation efficiency, there has been an interest in enhancing the awareness level of spectrum utilization. In this context, this paper builds a new cognitive management functional architecture for spectrum selection (SS). It relies on a knowledge manager (KM) retaining a set of advanced statistics that track the suitability of spectral resources to support a set of heterogeneous applications under varying interference conditions. Based on this architecture, a ...

  10. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  11. MODEL-BASED SECURITY ENGINEERING OF SOA SYSTEM USING SECURITY INTENT DSL

    Directory of Open Access Journals (Sweden)

    Muhammad Qaiser Saleem

    2011-01-01

    Full Text Available Currently most of the enterprises are using SOA and web services technologies to build their web information system. They are using MDA principles for design and development of WIS and using UML as a modelling language for business process modelling. Along with the increased connectivity in SOA environment, security risks rise exponentially. Security is not defined during the early phases of development and left onto developer. Properly configuring security requirements in SOA applications is quite difficult for developers because they are not security experts. Furthermore SOA security is cross-domain and all required information are not available at downstream phases. Furthermore, business process expert; who is the actual stakeholder of the business process model is unable to specify security objectives due to lake of security modelling elements in a general purpose modelling languages like UML. As a result, business process expert either ignore the security intents in their model or indicate them in textual way. A security intents DSL is presented as a UML profile where security intents can be modelled as stereotypes on UML modelling elements during the business process modelling. Aim is to facilitate the business process expert in modelling the security requirements along the business process modelling. This security annotated business process model will facilitate the architectural team in specifying the concrete security implementation. As a proof of work we apply our approach to a typical on-line flight booking system business process.

  12. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings. PMID:24781874

  13. Methodology for security development of an electronic prescription system.

    OpenAIRE

    Niinimäki, J.; M.; Savolainen; Forsström, J. J.

    1998-01-01

    Data security is an essential requirement in all health care applications. Developers of medical information systems should utilize the existing security development and evaluation methods to foresee as many of the technical and human factors that may endanger data security as possible and apply appropriate precautions. Modern smart card technology facilitates the building of robust security framework for interorganizational shared care systems. In this article, we describe the way we utilize...

  14. Multidimensional Household Food Security Measurement in Rural Zambia

    OpenAIRE

    Wineman, Ayala

    2014-01-01

    Food security is recognized as a multifaceted condition of complex causality that is related to, yet distinct from, poverty and hunger. Given its broad definition, it is no surprise that food security eludes precise measurement. This study considers there to be three components of household food security (quantity, quality, and stability), and attempts to address the "concept-to-measurement" gap in food security by building an index that spans these three dimensions. A panel data set is used ...

  15. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  16. Human Security

    OpenAIRE

    Mary Kaldor

    2012-01-01

    The essay poses the question whether the so-called Arab spring offers the potential to complete the 1989 revolutions. It first discusses what was hoped to be achieved in 1989, and it then argues that the post-1989 arrangements failed to prevent new security challenges from emerging. The Islamist threat came to play the role that the Communist threat had played to the West or the Western threat had played to the East. The essay then turns to the question on what needs to happen if current even...

  17. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  18. The social nature of primate cognition

    Science.gov (United States)

    Barrett, Louise; Henzi, Peter

    2005-01-01

    The hypothesis that the enlarged brain size of the primates was selected for by social, rather than purely ecological, factors has been strongly influential in studies of primate cognition and behaviour over the past two decades. However, the Machiavellian intelligence hypothesis, also known as the social brain hypothesis, tends to emphasize certain traits and behaviours, like exploitation and deception, at the expense of others, such as tolerance and behavioural coordination, and therefore presents only one view of how social life may shape cognition. This review outlines work from other relevant disciplines, including evolutionary economics, cognitive science and neurophysiology, to illustrate how these can be used to build a more general theoretical framework, incorporating notions of embodied and distributed cognition, in which to situate questions concerning the evolution of primate social cognition. PMID:16191591

  19. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  20. Infrastructural Map for Information Security

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi,

    2011-02-01

    Full Text Available The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.

  1. Water, international peace and security

    OpenAIRE

    Tignino, Mara

    2010-01-01

    Water scarcity, accelerated by climate change, affects water availability and may threaten peace and security. This role of water, as a contributing factor for triggering wars, sheds light on the significance of the protection of water during armed conflict. Keeping water out of war not only contributes to preserving an indispensable natural resource for life but also serves as a tool for the hostile parties to start negotiations,building trust and peace.

  2. Food Security Through Earth Observation

    OpenAIRE

    Justice, C.; Bingfang, W.; Kosuth, P.

    2011-01-01

    In June 2011, agricultural ministers from the world’s leading economies agreed to the G-20 “Action Plan on Food Price Volatility and Agriculture,” which launched the "Global Agricultural Geo-Monitoring Initiative" (GEO-GLAM), to improve global monitoring of agricultural production and food security using Earth observation, led by the Group on Earth Observations (GEO). This GEO-GLAM initiative will build on the current GEO Agricultural Monitoring Task, providing enhancements ...

  3. Building 2000

    International Nuclear Information System (INIS)

    This is the second volume of Building 2000, a pilot project of the Commission's R and D-programme 'Solar Energy Applications to Buildings' with the purpose of encouraging the adoption of solar architecture in large buildings. In this second rich illustrated volume the results of the design studies illustrating passive solar architecture in buildings in the European Community are presented in particular for the building categories as mentioned in the subtitle. In the first volume, a similar series of studies is presented for the building categories: schools, laboratories and universities, and sports and educational centres. Several Design Support Workshops were organized during the Building 2000 programme during which Building 2000 design teams could directly exchange ideas with the various design advice experts represented at these workshops. In the second part of the Building 2000 final report a summary of a selection of many reports is presented (11 papers), as produced by Design Support experts. Most of the design support activities resulted in changes of the various designs, as have been reported by the design teams in the brochures presented in the first part of this book. It is to be expected that design aids and simulation tools for passive solar options, daylighting concepts, comfort criteria etc., will be utilized more frequently in the future. This will result in a better exchange of information between the actual design practitioners and the European R and D community. This technology transfer will result in buildings with a higher quality with respect to energy and environmental issues

  4. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  5. 试论政府在食品质量安全体系建设中的作用%Role of the Government in the Building of Food Quality and Security System

    Institute of Scientific and Technical Information of China (English)

    陈瑛

    2011-01-01

    当前,我国食品安全仍处于风险高发期和矛盾凸显期。由于现代社会的生产经营者仍然是“经济人”,其主要特征是追求经济利益最大化。因此,要保证食品安全,除了生产经营者加强自律外,政府还要发挥应有的他律作用,帮助业主转变生产经营方式,实行诚信经营,同时要逐步完善食品安全法律法规,并严格执法,实施“零度容忍”。而为了充分发挥政府在食品质量安全体系建设中的作用,必须使食品安全工作制度化、常态化。%At present, China's food security is still in the high risk and the prominent contradictions period. To ensure food security, in addition to production operators to strengthen self - discipline, the government should play its due role to help owners transform production and management and to gradually improve the food security laws and regulations, and strict law enforcement. In order to play a full role for the government in food quality and security system, food security must be institutionalized and normalized.

  6. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  7. China's Economic Security at Stake

    Institute of Scientific and Technical Information of China (English)

    Jiang Yong

    2007-01-01

    National economic security refers to the freedom of a sovereign state from any internal or external threats, either actual or perceived, to its economic interests. The notion varies in meaning from one country to another, due to their differences in security environment, cognition and defense capabilities. It took quite a long time for China to form its own definition in an overall, profound manner, with controversy still lingering among divergent interest groups and/or schools of thought. As the author sees it, formidable internal and external challenges threaten the country in this regard. We should maintain awareness of the risks from monopoly-driven mergers and acquisitions of foreign capital in a growing number of our industries.

  8. Laboratory Building.

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  9. Computer Security at Nuclear Facilities (French Edition)

    International Nuclear Information System (INIS)

    The possibility that nuclear or other radioactive material could be used for malicious purposes cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear or other radioactive material is used or transported. Through its Nuclear Security Programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises Nuclear Security Fundamentals, which include objectives and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security, specifically: to provide for the security of nuclear and other radioactive material and associated facilities and activities; to ensure the security of such material in use, storage or in transport; to combat illicit trafficking and the inadvertent movement of such material; and to be prepared to respond to a nuclear security event. This publication is in the Technical Guidance

  10. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  11. SECURITY CHALLENGESASA FACTOR AFFECTINGTHE SECURITY OFMANET: ATTACKS, AND SECURITY SOLUTIONS

    OpenAIRE

    Dr.Nabeel Zanoon; Dr.Nashat Albdour; Dr.Hatem S. A. Hamatta; RashaMoh'd Al-Tarawneh

    2015-01-01

    The Ad Hoc mobile network (MANET) is a wireless network with properties which may constitute challenges and weaknesses before the security progress in MANET network. It causes weakness in security, which leads to increased attacks on MANET. In this paper the challenges and attacks likely to threaten MANET will be investigated. As a corollary, security solutions will be discussed, the relationship between them will be concluded and architectural security solutions in MANET will beproposed.

  12. Planning security for supply security

    International Nuclear Information System (INIS)

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.)

  13. Mathematical Approach to Security Risk Assessment

    OpenAIRE

    Robert Vrabel; Marcel Abas; Pavol Tanuska; Pavel Vazan; Michal Kebisek; Michal Elias; Zuzana Sutova; Dusan Pavliak

    2015-01-01

    The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk assessment tool that may assist security consultants at assessing the security risks in their protected systems/plants, nuclear power plants and stores of hazardous substances: explosive atmospheres and flammable and combustible gases and liquids, and so forth, and at building an appropriate risk mitigation policy. The probability of a penetration into the protected objects is estimated by com...

  14. Expertise development in sport: contributions under cognitive psychology perspective

    OpenAIRE

    Iglesias Gallego, Damián; García González, Luis; García Calvo, Tomás; León del Barco, Benito; Villar Álvarez, Fernando del

    2010-01-01

    The aim of this paper has been that of revising and updating research about expertise development in sport under the cognitive psychology approach. At first, the structure of sport action in open contexts is analysed, differentiating cognitive and execution components. Secondly, having as a reference frame Anderson’s cognitive theory, it is possible to remark the importance of the process of building knowledge as a forerunner variable of ability. Finally, the most relevant and consistent find...

  15. COGNITIVE COMPETENCE COMPARED TO COGNITIVE INDEPENDENCE AND COGNITIVE ACTIVITY

    Directory of Open Access Journals (Sweden)

    Irina B. Shmigirilova

    2014-01-01

    Full Text Available The research is aimed at identifying the essence of the cognitive competence concept in comparison with the concepts of cognitive independence and activity.Methods: The methodology implies a theoretical analysis of psychopedagogical and methodological materials on the cognitive competence formation; generalized teaching experience; empirical methods of direct observations of educational process in the secondary school classrooms; interviews with school teachers and pupils.Results: The research outcomes reveal a semantic intersection between the cognitive competence, independence and activity, and their distinctive features. The paper emphasizes the importance of cognitive competence as an adaptive mechanism in situations of uncertainty and instability.Scientific novelty: The author clarifies the concept of cognitive competence regarding it as a multi-component and systematic characteristic of a personality.Practical significance: The research findings can be used by specialists in didactics developing the teaching techniques of cognitive competence formation for schoolchildren.

  16. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  17. User-oriented and cognitive models of information retrieval

    DEFF Research Database (Denmark)

    Järvelin, Kalervo; Ingwersen, Peter

    2010-01-01

    The domain of user-oriented and cognitive IR is first discussed, followed by a discussion on the dimensions and types of models one may build for the domain.  The focus of the present entry is on the models of user-oriented and cognitive IR, not on their empirical applications. Several models wit...

  18. The Rationality Debate: Application of Cognitive Psychology to Mathematics Education

    Science.gov (United States)

    Leron, Uri; Hazzan, Orit

    2006-01-01

    Research in mathematics education usually attempts to look into students' learning and other mental processes. It could therefore be expected to build on knowledge acquired within the academic discipline of cognitive psychology. Our aim in this paper is to show how some recent developments in cognitive psychology can help interpret empirical…

  19. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  20. Strengthening Global Approaches to Nuclear Security

    International Nuclear Information System (INIS)

    Despite substantial progress in improving nuclear security in recent years, there is more to be done. The threats of nuclear theft and terrorism remain very real. This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level. (author)

  1. Fuzzy Cognitive Maps and Neutrosophic Cognitive Maps

    OpenAIRE

    Vasantha, Kandasamy; Smarandache, Florentin

    2003-01-01

    In this book we study the concepts of Fuzzy Cognitive Maps (FCMs) and their Neutrosophic analogue, the Neutrosophic Cognitive Maps (NCMs).Fuzzy Cognitive Maps are fuzzy structures that strongly resemble neural networks, and they have powerful and far-reaching consequences as a mathematical tool for modeling complex systems. Neutrosophic Cognitive Maps are generalizations of FCMs, and their unique feature is the ability to handle indeterminacy in relations between two concepts thereby bringing...

  2. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  3. The Mystery of Cognitive Structure and How We Can Detect It: Tracking the Development of Cognitive Structures over Time

    Science.gov (United States)

    Ifenthaler, Dirk; Masduki, Iskandaria; Seel, Norbert M.

    2011-01-01

    Many research studies have clearly demonstrated the importance of cognitive structures as the building blocks of meaningful learning and retention of instructional materials. Identifying the learners' cognitive structures will help instructors to organize materials, identify knowledge gaps, and relate new materials to existing slots or anchors…

  4. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  5. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  6. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  7. International conference on a nuclear-weapon-free zone in central Asia, 15-16 September 1997 Tashkent, Uzbekistan. Building an integral part of the global nuclear security system

    International Nuclear Information System (INIS)

    This Conference is the first fruit of the joint effort by the Central Asian States to counter external threats and challenges. The decision to declare Central Asia a nuclear-weapon-free zone is a further manifestation of the Central Asian States' shared interest in ensuring security, stability and peace for all the inhabitants of the region and in creating the necessary -indeed, the essential- conditions for its sustainable development and prosperity

  8. Early Learning Left Out: Building an Early-Learning System to Secure America's Future. Federal, State and School District Investments by Child Age. 4th Edition. 2010-2012

    Science.gov (United States)

    Bruner, Charles

    2013-01-01

    As a society, are we investing enough in our youngest children? The BUILD Initiative's latest report, Early Learning Left Out, by CFPC director Charles Bruner, provides a clear answer that current investments fall far short. The report draws upon the most recent federal, state, and public school budget information--and what we know about effective…

  9. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  10. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (French Edition)

    International Nuclear Information System (INIS)

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  11. RETIREMENT: PREJUDICE AGAINST FUTURE COGNITIVE DECLINE

    Directory of Open Access Journals (Sweden)

    Pranathi

    2015-02-01

    Full Text Available BACKGROUND : Age related cognitive decline is well documented, but less is known about changes in the cognitiv e functioning after retirement. AIM: To evaluate whether retirement affects cognitive performance. OBJECTIVES: 1 . To compare cognitive performance in working and non - working retired individuals. 2. To assess the influence of active lifestyle, financial security and literacy on cognition of retiree. METHODS: The study included 50 retired non - workers as cases and 50 retired workers as controls in the age group of 60 - 65 yrs. Brief Test of Adult Cognition by Telephone (BTACT was conducted on all s ubjects. Results were statistically analyzed using ANOVA. RESULTS: In the retired population, working group performed better than the non - working group (p0.05. CONCLUSION: Retirement has a negative impact on cognitive function which could be alleviated by factors like literacy, financial sec urity and active life style. Increasing incidence of depression and dementia among the elderly highlights the importance of maintaining active mental health. Hence, this study emphasizes the factors preventing cognitive decline.

  12. Accelerate China’s Social Security Legislation

    Institute of Scientific and Technical Information of China (English)

    王延中

    2008-01-01

    Since the financial crisis in Asia in 1997, China’s social security system has undergone continual reform and readjustment, and has proved to be an integral part of government efforts to perfect the socialist market economy as well as in building a socialist harmonious society. Although social security construction has achieved certain results, it has also left a lot of problems. With the rapid growth of China’s economy and revenue, people from all walks of life are putting ever-increasing demands on the social security system; therefore, the construction of a sound social security system suited to China’s current situation still remains an arduous task. In this article, the author have reviewed the 10 years development of China’s social security system, analyzed problems and challenges and proposed its suggestions.

  13. An IOT Security Risk Autonomic Assessment Algorithm

    Directory of Open Access Journals (Sweden)

    Zhengchao Ma

    2013-02-01

    Full Text Available In terms of Internet of Things (IOT system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain.

  14. Cognitive and artificial representations in handwriting recognition

    Science.gov (United States)

    Lenaghan, Andrew P.; Malyan, Ron

    1996-03-01

    Both cognitive processes and artificial recognition systems may be characterized by the forms of representation they build and manipulate. This paper looks at how handwriting is represented in current recognition systems and the psychological evidence for its representation in the cognitive processes responsible for reading. Empirical psychological work on feature extraction in early visual processing is surveyed to show that a sound psychological basis for feature extraction exists and to describe the features this approach leads to. The first stage of the development of an architecture for a handwriting recognition system which has been strongly influenced by the psychological evidence for the cognitive processes and representations used in early visual processing, is reported. This architecture builds a number of parallel low level feature maps from raw data. These feature maps are thresholded and a region labeling algorithm is used to generate sets of features. Fuzzy logic is used to quantify the uncertainty in the presence of individual features.

  15. Security barriers in the physical protection concept of nuclear facilities in Switzerland

    International Nuclear Information System (INIS)

    The presentation describes the structural security measures - security zones and barriers - used for the physical protection of nuclear facilities in Switzerland, especially nuclear power plants. Part 1 deals with the concept of security zones and barriers: arrangement and functions of security zones and barriers, requirements on the level of resistance of security barriers, allocation of buildings, systems and installations to security zones in nuclear facilities. Part 2 deals with examples concerning requirements, construction and inspection of the various security barriers, and describes the development of special components for security barriers

  16. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  17. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  18. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  19. Designing Dependable Service Oriented Web Services Security Architectures Solutions

    Directory of Open Access Journals (Sweden)

    M.Upendra Kumar

    2010-04-01

    Full Text Available System Security Architecture from a software engineering viewpoint imposes that strong security must be a guiding principle of the entire software development process. It describes a way to weave security into systems architecture, and it identifies common patterns of implementation found in most security products. The security and software engineering communities must find ways to develop software correctly in a timely and cost-effective fashion. There’s no substitute for working software security as deeply into the evelopment process as possible. System designers and developers must take a more proactive role in building secure software. The root of most security problems is software that fails in unexpected ways whenunder attack. The enforcement of security at the design phase canreduce the cost and effort associated with the introduction of security during implementation. At the architecture level a systemmust be coherent and present unified security architecture that takes into account security principles (such as the least privilege. In this paper we want to discuss about different facets of security as applicable to Service Oriented Architectures (SOA Security Architecture implementations. First we examine the securityrequirements and its solution mechanisms. In the context of WebServices, the predominant SOA implementation standard has a crucial role to play. The Web Services architecture is expected to play a prominent role in developing next generation distributed systems. Building dependable systems based on web services architecture is a major research issue being discussed. Finally, we provide a case study of Web Services Security Architecture, enhancing its security pertaining to Web 2.0 AJAX (Asynchronous JavaScript and XML and its Security encryption of data using MD5algorithm.

  20. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia;

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. Security Testing: A Survey

    OpenAIRE

    Felderer, M.; Büchlein, M.; Johns, M; Brucker, A.D.; Breu, R.; Pretschner, A.

    2015-01-01

    Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual security testing techniques is of high value both for researchers to evaluate and refine the techniques and...

  3. Conceptions of cognition for cognitive engineering

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2011-01-01

    Cognitive processes, cognitive psychology tells us, unfold in our heads. In contrast, several approaches in cognitive engineering argue for a shift of unit of analysis from what is going on in the heads of operators to the workings of whole socio-technical systems. This shift is sometimes presented...... is of this framing of an expanded unit of analysis in a cognitive vocabulary. I focus on possible consequences for how cognitive engineering practitioners think about function allocation in system design, and on what the relative benefits and costs are of having a common framework and vocabulary for talking about...... both human and technical system components. I argue for what I call an *expansive but deflated conception of cognition*, primarily on pragmatic grounds. In addition, I claim that the important lesson of the “boundaries of cognition” debate in cognitive science is the negative claim...

  4. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    ‘The procurement of construction work is complex, and a successful outcome frequently elusive’. With this opening phrase of the book, the authors take on the challenging job of explaining the complexity of building procurement. Even though building procurement systems are, and will remain, complex...... despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which......, which gives the book a challenging contribution to the existing body of knowledge....

  5. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  6. Relevance theory: pragmatics and cognition.

    Science.gov (United States)

    Wearing, Catherine J

    2015-01-01

    Relevance Theory is a cognitively oriented theory of pragmatics, i.e., a theory of language use. It builds on the seminal work of H.P. Grice(1) to develop a pragmatic theory which is at once philosophically sensitive and empirically plausible (in both psychological and evolutionary terms). This entry reviews the central commitments and chief contributions of Relevance Theory, including its Gricean commitment to the centrality of intention-reading and inference in communication; the cognitively grounded notion of relevance which provides the mechanism for explaining pragmatic interpretation as an intention-driven, inferential process; and several key applications of the theory (lexical pragmatics, metaphor and irony, procedural meaning). Relevance Theory is an important contribution to our understanding of the pragmatics of communication. PMID:26263065

  7. Reactor building

    International Nuclear Information System (INIS)

    The present invention concerns a structure of ABWR-type reactor buildings, which can increase the capacity of a spent fuel storage area at a low cost and improved earthquake proofness. In the reactor building, the floor of a spent fuel pool is made flat, and a depth of the pool water satisfying requirement for shielding is ensured. In addition, a depth of pool water is also maintained for a equipment provisionally storing pool for storing spent fuels, and a capacity for a spent fuel storage area is increased by utilizing surplus space of the equipment provisionally storing pool. Since the flattened floor of the spent fuel pool is flushed with the floor of the equipment provisionally storing pool, transfer of horizontal loads applied to the building upon occurrence of earthquakes is made smooth, to improve earthquake proofness of the building. (T.M.)

  8. Building Languages

    Science.gov (United States)

    ... family's native language) is taught as the child's second language through reading, writing, speech, and use of residual ... that parents can use to help their child learn language. There are many types of building blocks, and ...

  9. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  10. Towards Information Security Metrics Framework for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Muhammad Imran Tariq

    2012-10-01

    Full Text Available Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard issue to get maximum benefits from Information security metrics in cloud computing. The aim of this paper is to discuss security issues of cloud computing, and propose basic building blocks of information security metrics framework for cloud computing. This framework helps cloud users to create information security metrics, analyze cloud threats, processing on cloud threats to mitigate them and threat assessment

  11. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  13. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  14. Educational Programme in Nuclear Security

    International Nuclear Information System (INIS)

    The potential of a malicious act involving nuclear or other radioactive material is a continuing worldwide threat. Available data indicate circumstances in which nuclear and other radioactive material are vulnerable to theft, are uncontrolled, or are in unauthorized circulation. States must establish sustainable security measures to prevent such acts and to protect society from nuclear terrorism. Appropriate training and education at all levels and in all relevant organizations and facilities can play a major role in this process. There is increased interest in nuclear applications. Many States have expressed interest in expanding or introducing nuclear power in their country as a result of their own assessment of their energy supply needs, because of climate change, and development requirements. The projected increase in the demand for nuclear energy will increase the number of nuclear reactors worldwide and, consequently, the amount of nuclear material in use. Possible malicious acts involving nuclear or other radioactive material are a real threat. These developments are mirrored by an increase in the use of nuclear techniques in non-power applications. As a result, the need for experts in the area of nuclear security has become of great importance, and both universities and students have shown an increasing interest in nuclear security specialities. In September 2005, the Board of Governors approved a Nuclear Security Plan covering the period 2006-2009. This emphasized, inter alia, the importance of human resource development to assist States in building capacity to establish and maintain appropriate nuclear security to prevent, detect and respond to malicious acts involving nuclear and other radioactive material. The Nuclear Security Plan envisages the development of guidance for an educational programme in nuclear security that could be used by all States. In pursuit of this goal, this publication has been developed to provide advice and assistance to

  15. The Tome of Secure Compilation: Fully Abstract Compilation to Protected Modules Architectures

    OpenAIRE

    Patrignani, Marco

    2015-01-01

    1 Summary The goal of this research project is to enhance the security of networked, embedded computing devices. A networked, embeddedcomputing device consists of a hardware part and a software part; both components play an essential role in the overall security of a device. The software builds on hardware low level security blocks to provide higher-level guarantees such as process isolation, secure communication, or even application-specific security guarantees such as non- repudiation of...

  16. Electronic security - risk mitigation in financial transactions : public policy issues

    OpenAIRE

    Glaessner, Thomas; Kellermann, Tom; McNevin, Valerie

    2002-01-01

    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic envir...

  17. Air quality in quarters and system of personal security

    Directory of Open Access Journals (Sweden)

    L.L. Goshka

    2010-10-01

    Full Text Available In the article climatic systems are considered as systems of personal security. Roles of State, building proprietors, inhabitants in the formation of climate favorable for health are analysed. Regulated heat and air conditioning systems are considered particularly, because they can give personal security in temperature.

  18. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative.... Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West Building Ground...

  19. QUAIL: A Quantitative Security Analyzer for Imperative Code

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Wasowski, Andrzej; Traonouez, Louis-Marie; Legay, Axel

    Quantitative security analysis evaluates and compares how effectively a system protects its secret data. We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information. QUAIL builds a Markov Chain model ...

  20. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  1. The economics of energy security

    International Nuclear Information System (INIS)

    The results of research on energy security that has been conducted over the past 20 years are brought together and expanded. Chapter 2 lays out basic conceptual arguments regarding the economic externalities and the military premium, as well as the general problem of identifying a market failure. Chapter 3 provides a brief history of the oil price shocks of the 1970s and reviews the empirical evidence on the energy security externalities laid out in Chapter 2. Chapter 4 builds on the material in Chapter 3 to critique published estimates of the overall premium associated with oil imports or oil consumption. Chapter 5 examines how the oil market has changed in the twenty years since the first oil shock of the 1970s and assesses the effect of these changes on price behavior and market efficiency. Chapters 6 and 7 focus on two sectors in which the energy security debate is being carried out through concrete policy measures: the choice of electricity generation technology and the market for transportation fuels. In Chapter 8, we summarize our assessments of potential energy security externalities and examine their implications for a variety of policy measures at the national and subnational levels. 7 figs., 11 tabs., 200 refs

  2. Role Taking and Knowledge Building in a Blended University Course

    Science.gov (United States)

    Cesareni, Donatella; Cacciamani, Stefano; Fujita, Nobuko

    2016-01-01

    Role taking is an established approach for promoting social cognition. Playing a specific role within a group could lead students to exercise collective cognitive responsibility for collaborative knowledge building. Two studies explored the relationship of role taking to participation in a blended university course. Students participated in the…

  3. The Challenges of Supporting Effective Security and Justice Development Programming

    OpenAIRE

    Nicole Ball; Luc van de Goor

    2013-01-01

    Early 2010, the DAC International Network on Conflict and Fragility (INCAF) Task Team on Peacebuilding, Statebuilding and Security commissioned an analysis of the critical impediments to effective donor engagement in the area of security and justice development in conflict-affected and fragile environments. This analysis seeks to inform a change agenda to help make donor support to justice and security more effective. It is intended to serve as the base of a larger piece of work, and builds o...

  4. ASEAN's Fledgling Debt Securities Markets: More tasks Ahead

    OpenAIRE

    Lamberte, Mario B.

    2002-01-01

    ASEAN economies have long recognized the importance of developing a deep and broad domestic debt securities market to complement the banking system in efficiently mobilizing and allocating financial resources. However, it was only in the early 1990s that they started to make bold steps to build a vibrant domestic debt securities market. The East Asian financial crisis has further strengthened their resolve to accelerate the development of their domestic debt security markets and reduce relian...

  5. Life Expectancy, Human Capital, Social Security and Growth

    OpenAIRE

    Echevarría Olave, Cruz Ángel; Iza Padilla, María Amaya

    2005-01-01

    We analyze the effects of changes in the mortality rate upon life expectancy, education, retirement age, human capital and growth in the presence of social security. We build a vintage growth, overlapping generations model in which individuals choose the time length of education and retirement age, and where unfunded social security pensions depend on workers'past contributions. Social security has a positive effect on education, but pension benefits favor reductions in retirement age. The ne...

  6. UNIX secure server : a free, secure, and functional server example

    OpenAIRE

    Sastre, Hugo

    2016-01-01

    The purpose of this thesis work was to introduce UNIX server as a personal server but also as a start point for investigation and developing at a professional level. The objective of this thesis was to build a secure server providing not only a FTP server but also an HTTP server and a cloud system for remote backups. OpenBSD was used as the operating system. OpenBSD is a UNIX-like operating system made by hackers for hackers. The difference with other systems that might partially provid...

  7. A DOCTORAL PROGRAM WITH SPECIALIZATION IN INFORMATION SECURITY A High Assurance Constructive Security Approach

    OpenAIRE

    Irvine, Cynthia E.; Levin, Timothy E.

    2003-01-01

    A doctoral program in computer science with a specialization in information security is described. The focus of the program is constructive security. Key elements of the program are the strong computer science core upon which it builds, coursework on the theory and principles of information assurance, and a unifying research project. The doctoral candidate is a member of the project team, whose research contributes to the goals of the project and to fundamental advancements in high assurance ...

  8. SECURITY EDUCATION IN AFRICA: PATTERNS AND PROSPECTS

    Directory of Open Access Journals (Sweden)

    David Last

    2015-05-01

    Full Text Available This article is part of a larger study exploring global patterns of security education, in order to enhance the collaborative pursuit of security by the majority of the world’s countries. We draw on interviews at multinational training events, site visits and open sources. Here we describe general patterns of police, gendarme and military education in Africa, with particular attention to university-like institutions. This leads us to focus on mid-career military staff colleges as the most likely venues for building communities of educated professionals to enhance security. We identify states in each region with the greatest potential to play a leading role in the development of knowledge addressing new security challenges. South Africa, Nigeria and Kenya have obvious educational potential. Good governance and national policies are more important than size and wealth, and this suggests that smaller states like Senegal and Botswana could make important contributions. Mechanisms contributing to regional security communities include the African Peace and Security Architecture, career incentives, innovation, and regional training centres. Understanding the patterns of security education lays the groundwork to understand innovation, diffusion and the influence of the content of security of education.

  9. Ubiquitous Health Monitoring Systems: Addressing Security Concerns

    Directory of Open Access Journals (Sweden)

    Mahmoud Elkhodr

    2011-01-01

    Full Text Available Problem statement: It is important to secure the transmission of patient’s EHR in remote health monitoring systems. Security is among the main issues that need to be realized for the adaption of this monitoring technology. The face of healthcare is changing as ubiquitous computing technologies are being incorporated into the existing infrastructure. We specify the requirements, needed security mechanism, outstanding issues and the future challenges as well as the open problems that need to be achieved. Approach: Although there were benefits to technology, approaches that offer reliable privacy and security features must be presented to users in order to make these systems socially accepted. Results: We investigated the privacy and security implications generated from the deployment of remote health monitoring technology. To achieve these security requirements, building on the strengths of Transport Layer Security (TLS protocol, a trust negotiation approach was proposed. The application of this approach results in significant improvements in overcoming security related concerns compared to the traditional identity-based only access control techniques. Conclusion: We believe these considerations will eventually contribute toward an efficient and practical deployment of remote monitoring systems.

  10. Enhancement of Nuclear Security Measures: Egyptian Case

    International Nuclear Information System (INIS)

    Egypt benefited from the peaceful uses of nuclear energy since the second half of twentieth century and established several nuclear and radiation facilities, activities and practices such as research reactors, fuel fabrication facility, gamma irradiators, and utilization of radioactive sources in different applications. Consequently, Egypt’s concern is to enhance and improve the nuclear security systems in the above mentioned facilities, activities and practices as well as enhance the nuclear security regime on the national, regional and international levels. In this paper, several steps taken by Egypt in the field of nuclear security in its various aspects such as the legal and regulatory frameworks, physical protection of nuclear material and facilities, nuclear material accounting and security of radioactive sources will be presented. Egyptian human resources development strategy for the purpose of improving the efficiency, building, upgrading and strengthening the knowledge and skills of the personnel who are working in the nuclear and radiological fields as well as other activities that related to nuclear security will also be discussed. The Egyptian nuclear security strategy is under development taking in its consideration the present nuclear security measures and the future perspective to develop and improve the Egyptian nuclear security infrastructure. (author)

  11. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  12. Music cognition and the cognitive sciences.

    Science.gov (United States)

    Pearce, Marcus; Rohrmeier, Martin

    2012-10-01

    Why should music be of interest to cognitive scientists, and what role does it play in human cognition? We review three factors that make music an important topic for cognitive scientific research. First, music is a universal human trait fulfilling crucial roles in everyday life. Second, music has an important part to play in ontogenetic development and human evolution. Third, appreciating and producing music simultaneously engage many complex perceptual, cognitive, and emotional processes, rendering music an ideal object for studying the mind. We propose an integrated status for music cognition in the Cognitive Sciences and conclude by reviewing challenges and big questions in the field and the way in which these reflect recent developments. PMID:23060125

  13. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  14. Security culture in Germany

    International Nuclear Information System (INIS)

    The standing of the terms 'security' and 'culture' will be discussed. A brief overview about states and operators responsibilities linked to security culture will be given, and a definition of the term 'security culture' will be explained. The security culture in German nuclear facilities will be briefly discussed

  15. Networking and Security Measures

    OpenAIRE

    Vaibhav Gupta; Sumit Goswami; Ashok Kumar; Mohinder Singh

    2004-01-01

    By writing this paper a small effort has been put to understand the growing network needs and its security. Various types of network threats and security services are discussed. This will help in designing a secure and robust network infrastructure by discussing management security policies and risk analysis.

  16. Secure Improved Multi Group-LEACH

    Directory of Open Access Journals (Sweden)

    Mr. Santosh.Irappa.Shirol#1 , Mr. Ashok Kumar. N #2 , Mr. Kalmesh.M.Waderhatt

    2013-06-01

    Full Text Available Wireless sensor networks are ad hoc networks mainly consist of small sensor nodes with limited energy resources, and are rapidly emerging as a technology for large-scale, low cost, automated sensing and monitoring of different environments of interest. Cluster-based communication has been proposed for these networks for various reasons such as scalability and energy efficiency. In this paper, we investigate the problem of adding security to cluster based communication protocols for homogeneous wireless sensor networks consisting of sensor nodes with severely limited resources, and propose a security solution for Improved MG-LEACH, a protocol where clusters are formed dynamically and periodically. Our solution uses building blocks from SPINS, a suite of highly optimized security building blocks that rely solely on symmetric-key methods; is lightweight and preserves the core of the original Improved MG-LEACH.

  17. Secure Symmetrical Multilevel Diversity Coding

    CERN Document Server

    Balasubramanian, Anantharaman; Li, Shuo; Liu, Tie; Miller, Scott L

    2012-01-01

    Symmetrical Multilevel Diversity Coding (SMDC) is a network compression problem introduced by Roche (1992) and Yeung (1995). In this setting, a simple separate coding strategy known as superposition coding was shown to be optimal in terms of achieving the minimum sum rate (Roche, Yeung, and Hau, 1997) and the entire admissible rate region (Yeung and Zhang, 1999) of the problem. This paper considers a natural generalization of SMDC to the secure communication setting with an additional eavesdropper. It is required that all sources need to be kept perfectly secret from the eavesdropper as long as the number of encoder outputs available at the eavesdropper is no more than a given threshold. First, the problem of encoding individual sources is studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, ...

  18. RFID security

    OpenAIRE

    Καλυβιώτη, Αριστέλα

    2008-01-01

    Αντικείμενο αυτής της διπλωματικής εργασίας είναι το RFID Security. Στο κεφάλαιο 1 παρουσιάζεται η ιστορική αναδρομή και οι εφαρμογές του RFID. Στο κεφάλαιο 2 αναλύεται περισσότερο η αρχιτεκτονική του RFID και κάποια χαρακτηριστικά του γνωρίσματα καθώς και τα πρότυπα που το περιβάλλουν. Στο κεφάλαιο 3 περιγράφονται οι στόχοι και οι ιδιότητες της ασφάλειας. Στο κεφάλαιο 4 παρουσιάζονται οι βασικοί τύποι επίθεσης , οι τύποι σύμφωνα με τον αντικειμενικό σκοπό τους και αναλύονται περισσότερο οι α...

  19. A cognitive model's view of animal cognition

    OpenAIRE

    Sidney D'MELLO, Stan FRANKLIN

    2011-01-01

    Although it is a relatively new field of study, the animal cognition literature is quite extensive and difficult to synthesize. This paper explores the contributions a comprehensive, computational, cognitive model can make toward organizing and assimilating this literature, as well as toward identifying important concepts and their interrelations. Using the LIDA model as an example, a framework is described within which to integrate the diverse research in animal cognition. Such a framework c...

  20. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  3. Security guide for subcontractors

    International Nuclear Information System (INIS)

    The objectives of security in the Department of Energy (DOE) contractor/subcontractor program are: (1) to ensure the protection of information which, if related, would endanger the common defense and security of the nation; and (2) to safeguard the plants and installations of the DOE and its contractors in order that research and production programs will not be interrupted. To achieve these objectives, security responsibilities have been divided into three interdependent categories: personnel security, physical security, and security education and quality audits. This guide presents instructions for implementing a security program at a contractor/subcontractor site

  4. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  5. Ideology, motivated reasoning, and cognitive reflection

    Directory of Open Access Journals (Sweden)

    Dan M. Kahan

    2013-07-01

    Full Text Available Decision scientists have identified various plausible sources of ideological polarization over climate change, gun violence, national security, and like issues that turn on empirical evidence. This paper describes a study of three of them: the predominance of heuristic-driven information processing by members of the public; ideologically motivated reasoning; and the cognitive-style correlates of political conservativism. The study generated both observational and experimental data inconsistent with the hypothesis that political conservatism is distinctively associated with either unreflective thinking or motivated reasoning. Conservatives did no better or worse than liberals on the Cognitive Reflection Test (Frederick, 2005, an objective measure of information-processing dispositions associated with cognitive biases. In addition, the study found that ideologically motivated reasoning is not a consequence of over-reliance on heuristic or intuitive forms of reasoning generally. On the contrary, subjects who scored highest in cognitive reflection were the most likely to display ideologically motivated cognition. These findings corroborated an alternative hypothesis, which identifies ideologically motivated cognition as a form of information processing that promotes individuals' interests in forming and maintaining beliefs that signify their loyalty to important affinity groups. The paper discusses the practical significance of these findings, including the need to develop science communication strategies that shield policy-relevant facts from the influences that turn them into divisive symbols of political identity.

  6. A cognitive model's view of animal cognition

    Directory of Open Access Journals (Sweden)

    Sidney D'MELLO, Stan FRANKLIN

    2011-08-01

    Full Text Available Although it is a relatively new field of study, the animal cognition literature is quite extensive and difficult to synthesize. This paper explores the contributions a comprehensive, computational, cognitive model can make toward organizing and assimilating this literature, as well as toward identifying important concepts and their interrelations. Using the LIDA model as an example, a framework is described within which to integrate the diverse research in animal cognition. Such a framework can provide both an ontology of concepts and their relations, and a working model of an animal’s cognitive processes that can compliment active empirical research. In addition to helping to account for a broad range of cognitive processes, such a model can help to comparatively assess the cognitive capabilities of different animal species. After deriving an ontology for animal cognition from the LIDA model, we apply it to develop the beginnings of a database that maps the cognitive facilities of a variety of animal species. We conclude by discussing future avenues of research, particularly the use of computational models of animal cognition as valuable tools for hypotheses generation and testing [Current Zoology 57 (4: 499–513, 2011].

  7. Security policies of India, Brazil and South Africa: Regional security contexts as constraints for a common agenda

    OpenAIRE

    Flemes, Daniel; Costa Vaz, Alcides

    2011-01-01

    In the course of the last decade, the IBSA states (India, Brazil, South Africa) have increased their weight in the shifting global order, particularly in economic affairs. Can the same be said about the IBSA states' position in the international security hierarchy? After locating the IBSA coalition in the shifting world order, we analyze its member states' willingness and capacity to coordinate their security policies and build a common global security agenda. In addition, we explore the stat...

  8. Securing By Design

    OpenAIRE

    Weber, Cynthia; Lacy, Mark

    2011-01-01

    This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward 'securing by design' and the policy agendas it produces of 'designing out insecurity' and 'designing in protection' because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce...

  9. Network Security Scanner

    OpenAIRE

    G. MURALI; M.Pranavi; Y.Navateja; K. Bhargavi

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  10. Generalized Software Security Framework

    OpenAIRE

    Smriti Jain; Maya Ingle

    2011-01-01

    Security of information has become a major concern in today's digitized world. As a result, effective techniques to secure information are required. The most effective way is to incorporate security in the development process itself thereby resulting into secured product. In this paper, we propose a framework that enables security to be included in the software development process. The framework consists of three layers namely; control layer, aspect layer and development layer. The control la...

  11. WORKSTATION SECURITY ENSURANCE

    OpenAIRE

    Hudoklin, Alenka; Stadler, Alenka

    1998-01-01

    A methodology for the ensured security of a workstation connected in a computer network with in an organization is presented. A technique for the determination of the required security level for a workstation's tangible and intangible components is described. A set of security measures for each security level of the workstation's tangible and intangible components is selected. The methodology is applied to workstations in the computer network of a Slovenian state agency. The required security...

  12. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    ‘The procurement of construction work is complex, and a successful outcome frequently elusive’. With this opening phrase of the book, the authors take on the challenging job of explaining the complexity of building procurement. Even though building procurement systems are, and will remain, complex...... despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which...... evolves from a simple establishment of a contractual relationship to a central and strategic part of construction. The authors relate to cultural, ethical and social and behavioural sciences as the fundamental basis for analysis and understanding of the complexity and dynamics of the procurement system...

  13. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    The main question that guides this paper is how governments are focusing (and must focus) on competence building (education and training) when designing and implementing innovation policies. With this approach, the paper aims at filling the gap between the existing literature on competences on the...... one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...... and public agencies in different countries and different times have actually approached the issue of building, maintaining and using competences in their innovation systems; it examines what are the critical and most important issues at stake from the point of view of innovation policy, looking...

  14. Building Bridges

    DEFF Research Database (Denmark)

    The report Building Bridges adresses the questions why, how and for whom academic audience research has public value, from the different points of view of the four working groups in the COST Action IS0906 Transforming Audiences, Transforming Societies – “New Media Genres, Media Literacy and Trust...... in the Media”, “Audience Interactivity and Participation”, “The Role of Media and ICT Use for Evolving Social Relationships” and “Audience Transformations and Social Integration”. Building Bridges is the result of an ongoing dialogue between the Action and non-academic stakeholders in the field of audience...

  15. Combining security risk assessment and security testing

    OpenAIRE

    Großmann, Jürgen; Seehusen, Fredrik

    2014-01-01

    Complex networked systems have become an integral part of our supply infrastructure. Mobile devices, home automation, smart grids and even vehicles are connected via the Internet and becoming accessible and thus vulnerable to hacker attacks. While the number of security incidents drastically increases, we are more than ever dependent on a secure and mature ICT infrastructure. One of the keys to maintain such a secure and dependable infrastructure are mature, systematic and capable proactive m...

  16. NETWORK SECURITY: AN APPROACH TOWARDS SECURE COMPUTING

    OpenAIRE

    Rahul Pareek

    2011-01-01

    The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against malicious attack, a number of software tools have been currently developed. Intrusion Detection System has recently become a heated research topic due to its capability of detecting and preventing the attacks from malicious network users. A pattern matching IDS for network security has been proposed in this paper. Many network security applications...

  17. Energy Supply Security of Turkey and Measuring: an Application on Turkey’s Energy Supply Security

    Directory of Open Access Journals (Sweden)

    Hasan Sencer PEKER

    2015-12-01

    Full Text Available In this study, in which building an energy supply security index model in order to measure the energy supply security of Turkey, first, the four sub-indexes that compose overall index and their weighting coefficients were designated. These sub-indexes are availability index, reliability index, economic index and environmental index. According to index results, Turkey has to direct its necessary investments to fields that secure the energy import, regulate the electricity power market and renewable technologies that diversify the sources and decrease import dependency.

  18. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  19. Cultural Security: The Notion, Resources and the Instruments of Implimentation

    Directory of Open Access Journals (Sweden)

    A. Yu. Goloborod’ko

    2015-01-01

    Full Text Available The paper deals with the description of some components for cognitive- methodological construct considered in the context of state culture policy tools as factor of strengthening of cultural security in the system of national security of the modern Russia. The construct presents the possibilities to accumulate through state cultural policytools a powerful protecting potential of culture in Russia in social formation and strengthening of the state viability. 

  20. ARCHITECTURES AND ALGORITHMS FOR COGNITIVE NETWORKS ENABLED BY QUALITATIVE MODELS

    DEFF Research Database (Denmark)

    Balamuralidhar, P.

    2013-01-01

    traditional limitations and potentially achieving better performance. The vision is that, networks should be able to monitor themselves, reason upon changes in self and environment, act towards the achievement of specific goals and learn from experience. The concept of a Cognitive Engine (CE) supporting...... cognitive functions, as part of network elements, enabling above said autonomic capabilities is gathering attention. Awareness of the self and the world is an important aspect of the cognitive engine to be autonomic. This is achieved through embedding their models in the engine, but the complexity and...... cognitive engine that incorporates a context space based information structure to its knowledge model. I propose a set of guiding principles behind a cognitive system to be autonomic and use them with additional requirements to build a detailed architecture for the cognitive engine. I define a context space...

  1. Educational Programme in Nuclear Security (Chinese Version)

    International Nuclear Information System (INIS)

    Higher education plays an essential role in nuclear security capacity building. It ensures the availability of experts able to provide the necessary competencies for the effective national nuclear security oversight of nuclear and other radioactive material and to establish and maintain an appropriate nuclear regime in a State. This guide provides both the theoretical knowledge and the practical skills necessary to meet the requirements described in the international framework for nuclear security. Emphasis is placed on the implementation of these requirements and recommendations in States. On the basis of this guide, each university should be able to develop its own academic programme tailored to suit the State's educational needs in the area of nuclear security and to meet national requirements.

  2. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  3. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  4. Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

    Directory of Open Access Journals (Sweden)

    G.K. Pradhan

    2010-07-01

    Full Text Available To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for governmentdepartments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of confidential and top secret information amongst security personnels and government departments within the national boundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and government intelligence departments to avoid threatening activities. The experimental results demonstrate the effectiveness of theproposed information sharing approach.

  5. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  6. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    parameter ρ < n/2, we obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t < n/2, and computationally secure with agreement on abort (privacy and correctness only) for up to t < n -ρ. Our......Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion. In contrast, a hybrid-secure protocol provides different security guarantees depending on the set of corrupted parties and the computational power...... of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness...

  7. Sustainable Buildings

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.; Elle, Morten

    The scientific community agrees that: all countries must drastically and rapidly reduce their CO2 emissions and that energy efficient houses play a decisive role in this. The general attitude at the workshop on Sustainable Buildings was that we face large and serious climate change problems that...

  8. Cognitions about Cognitions: The Theory of Metacognition

    Science.gov (United States)

    PP, Noushad

    2008-01-01

    This paper proposes a theoretical review of the term "metacognition". It was introduced by John Flavell in the early 1970s based on the term "metamemory" previously conceived by the same scholar (Flavell 1971). Flavell (1979) viewed metacognition as learners' knowledge of their own cognition, defining it as "knowledge and cognition about cognitive…

  9. Evaluation, Energy Optimization, and Spectrum Analysis of an Artificial Noise Technique to Improve CWSN Security

    OpenAIRE

    Javier Blesa; Alvaro Araujo; Elena Romero; Octavio Nieto-Taladriz

    2013-01-01

    This paper presents the security evaluation, energy consumption optimization, and spectrum scarcity analysis of artificial noise techniques to increase physical-layer security in Cognitive Wireless Sensor Networks (CWSNs). These techniques introduce noise into the spectrum in order to hide real information. Nevertheless, they directly affect two important parameters in Cognitive Wireless Sensor Networks (CWSNs), energy consumption and spectrum utilization. Both are affected because the number...

  10. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  11. Mild Cognitive Impairment

    Science.gov (United States)

    ... Research Portfolio (IADRP) AMP-AD Detecting Cognitive Impairment Database ... Mild cognitive impairment (MCI) is a condition in which people have more memory or other thinking problems than normal for their ...

  12. Cognitive training for dementia

    OpenAIRE

    Konta, Brigitte; Frank, Wilhelm

    2005-01-01

    The aim of the HTA report is to evaluate the effectiveness of cognitive training methods to treat cognitive disorders of dementia and other diseases with cognitive deficits. For this purpose, a systematic literature search was carried out first based on the DIMDI superbase retrieval. The identified publications were judged and selected by two independent, methodically competent experts. 33 publications were included in the report. Based on the studies for a normal cognitive development in old...

  13. Comparative cognition for conservationists

    OpenAIRE

    Greggor, Alison L.; Clayton, Nicola S.; Phalan, Ben; Thornton, Alex

    2014-01-01

    Every animal occupies a unique cognitive world based on its sensory capacities, and attentional and learning biases. Behaviour results from the interaction of this cognitive world with the environment. As humans alter environments, cognitive processes ranging from perceptual processes to learned behaviour govern animals’ reactions. By harnessing animals’ perceptual biases and applying insights from cognitive theory, we can purposefully alter cues to reduce maladaptive responses and shape beha...

  14. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  15. ICT security management

    OpenAIRE

    Schreurs, Jeanne; Moreau, Rachel

    2008-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  16. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  17. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  18. Affective Scaffolds, Expressive Arts, and Cognition

    Science.gov (United States)

    Maiese, Michelle

    2016-01-01

    Some theorists have argued that elements of the surrounding world play a crucial role in sustaining and amplifying both cognition and emotion. Such insights raise an interesting question about the relationship between cognitive and affective scaffolding: in addition to enabling the realization of specific affective states, can an affective niche also enable the realization of certain cognitive capacities? In order to gain a better understanding of this relationship between affective niches and cognition, I will examine the use of expressive arts in the context of psychotherapy and peacebuilding. In these settings, environmental resources and interpersonal scaffolds not only evoke emotion and encourage the adoption of particular bodily affective styles, but also support the development of capacities for self-awareness and interpersonal understanding. These affective scaffolds play a crucial role in therapy and peacebuilding, in fact, insofar as they facilitate the development of self-knowledge, enhance capacities associated with social cognition, and build positive rapport and trust among participants. I will argue that this is because affectivity is linked to the way that subjects frame and attend to their surroundings. Insofar as the regulation and modification of emotion goes hand in hand with opening up new interpretive frames and establishing new habits of mind, the creation of an affective niche can contribute significantly to various modes of cognition. PMID:27014164

  19. Interactive Team Cognition

    Science.gov (United States)

    Cooke, Nancy J.; Gorman, Jamie C.; Myers, Christopher W.; Duran, Jasmine L.

    2013-01-01

    Cognition in work teams has been predominantly understood and explained in terms of shared cognition with a focus on the similarity of static knowledge structures across individual team members. Inspired by the current zeitgeist in cognitive science, as well as by empirical data and pragmatic concerns, we offer an alternative theory of team…

  20. The Tractable Cognition thesis

    NARCIS (Netherlands)

    Rooij, I.J.E.I. van

    2008-01-01

    The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the Tractable Cognition thesis: Human cognitive capacities are constrained by computational tractability. This thesis, if true, serves cognitive psychology by constra

  1. Handbook of Spatial Cognition

    Science.gov (United States)

    Waller, David, Ed.; Nadel, Lynn, Ed.

    2012-01-01

    Spatial cognition is a branch of cognitive psychology that studies how people acquire and use knowledge about their environment to determine where they are, how to obtain resources, and how to find their way home. Researchers from a wide range of disciplines, including neuroscience, cognition, and sociology, have discovered a great deal about how…

  2. The Tractable Cognition Thesis

    Science.gov (United States)

    van Rooij, Iris

    2008-01-01

    The recognition that human minds/brains are finite systems with limited resources for computation has led some researchers to advance the "Tractable Cognition thesis": Human cognitive capacities are constrained by computational tractability. This thesis, if true, serves cognitive psychology by constraining the space of computational-level theories…

  3. Research on Model of Ontology_based Management of Vegetable Quality Security

    OpenAIRE

    Zhao Qingcong; Zhao Qingling

    2015-01-01

    To resolve the problem of Vegetable Quality Security data description, in the guidance of ontology based knowledge management theory, we put forward a Knowledge description method on Vegetable Quality Security and build the management of Vegetable Quality Security ontology model. In order to help computer comprehend the ontology model and the semantic reasoning of domain concept acquisition, these ontology models are formalized Voronoi diagram.

  4. RESEARCH OF OPEN SYSTEMS INTERCONNECTION MODEL IN TERMS OF INFORMATION SECURITY

    OpenAIRE

    Корнієнко, Б.; Національний авіаційний університет

    2013-01-01

    In this article the OSI model in terms of information security classification of vulnerabilities and security measures at the level of model OSI. In order to build a comprehensive information security systems for information and communication systems and networks offer a model to extend the seven- nine levels — through eight levels — level politician and ninth — level users.

  5. Development of a Landscape Vulnerability Assessment Model in a Heightened Security Environment

    OpenAIRE

    Sena, Christine G.

    2003-01-01

    Do current landscape security practices provide sufficient protection to support building sustainability in the event of a terrorist attack? By exploring the relative effectiveness of current landscape security practices and methodologies, this thesis proposes to provide the landscape architect with sufficient background to define security objectives; participate in vulnerability assessments and design functional solutions while maintaining an open, aesthetically pleasing environment. This r...

  6. X.509 Authentication Services to Enhance the Data Security in Cloud Computing

    OpenAIRE

    Surbhi Chauhan; Kamal Kant; Arjun Singh

    2012-01-01

    This paper represents a method to build a Cloud Security by giving concept of X.509 authentication services. We are discussing theory of cloud computing, feature of cloud computing and cloud security .We proposed a X.509 format to enhances data security in cloud (Public). Cloud computing is a new computational paradigm that offers an innovative business model for organization.

  7. 移动计算安全性%Mobile Computing Security

    Institute of Scientific and Technical Information of China (English)

    胡健; 刘锦德

    2000-01-01

    In the first,security issues in open system that supports mobile computing are discussed in detail,and then the fundamental principle for building a security system in the environment of mobile computing is given.According to the principle,security issues and policies related to mobile code programming language and mobile agent system are further discussed.

  8. Learning Locked down: Evaluating the Treatment of Students' Rights in High Security School Environments

    Science.gov (United States)

    Bracy, Nicole L.

    2009-01-01

    Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…

  9. Ethical principles and guidelines for the development of cognitive systems.

    Energy Technology Data Exchange (ETDEWEB)

    Shaneyfelt, Wendy

    2006-05-01

    As cognitive systems technologies emerge, so too do the ethical issues surrounding their development and use. To develop cognitive systems technologies responsibly, Sandia National Laboratories is establishing a framework to proactively address both real and potential ethical issues. This report contains the principles and guidelines developers can use to guide them as they are confronted with ethical issues related to developing cognitive systems technologies as they apply to U.S. national security. A process to apply these principles offers a practical way to transfer these principles from paper to a working strategy. Case studies are presented to reflect upon potential scenarios and to consider resolution strategies.

  10. SecureD: A Secure Dual Core Embedded Processor

    OpenAIRE

    Ragel, Roshan G.; Ambrose, Jude A.; Parameswaran, Sri

    2015-01-01

    Security of embedded computing systems is becoming of paramount concern as these devices become more ubiquitous, contain personal information and are increasingly used for financial transactions. Security attacks targeting embedded systems illegally gain access to the information in these devices or destroy information. The two most common types of attacks embedded systems encounter are code-injection and power analysis attacks. In the past, a number of countermeasures, both hardware- and sof...

  11. Assessing International Peace Efforts in Palestinian-Israeli Affairs. A Human Security Perspective

    OpenAIRE

    Aoun, Elena

    2009-01-01

    Peace-building between Palestinians and Israelis has failed so far because of dis-synergetic international efforts as focus has shifted away from the political issues laying at the heart of the conflict to "security issues". Building conceptually on "human security" approaches, this article will contend that no sustainable peace is possible if political "root causes" are not addressed and if "security" is only attached to Israelis.

  12. Policy Paper 26: The Middle East Arms Control and Regional Security Talks: Progress, Problems, and Prospects

    OpenAIRE

    Jentleson, Bruce

    1996-01-01

    The record of the Arms Control and Regional Security (ACRS) Working Group thus far is a mixed one. On the one hand, the very creation of a multilateral process for arms control and regional security in a region where no comparable process ever before existed is in itself a significant achievement. A working agenda then was defined, and by late 1994 a series of initial multilateral agreements had been negotiated for confidence-building measures (CBMs), confidence-and-security-building measures...

  13. Administrative building

    OpenAIRE

    Vokatá, Kateřina

    2015-01-01

    The task of my master´s thesis was to work up a project and a check of a bearing steel construction the multi-storey office building with a garage in Brno. The building is composed of five storey office section and two storey of garage. Ground dimension of administrative part is 38,8m x 35m with distance of pillars 7m,6m and 6,4m. The structural height of floor is 3,5m.Garage is designed with dimensions 36m x 24,8m with structural height of floor 3,5m. Distance of pillars is 5,6m, 6,4m and 7,...

  14. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  15. Department of Homeland Security

    Science.gov (United States)

    ... Main Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... Forms Combating Human Trafficking Taking Action on Immigration Homeland Security Jobs Visa Waiver Program Immigration Case Status Science & ...

  16. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  17. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  18. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  19. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  20. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  1. Building economics

    DEFF Research Database (Denmark)

    Pedersen, D.O.(red.)

    Publikationen er på engelsk. Den omfatter alle indlæg på det fjerde internationale symposium om byggeøkonomi, der blev arrangeret af SBI for det internationale byggeforskningsråd CIB. De fem bind omhandler: Methods of Economic Evaluation, Design Optimization, Ressource Utilization, The Building...... Market og Economics and Technological Forecasting in Construction. Et indledende bind bringer statusrapporter for de fem forskningsområder, og det sidste bind sammenfatter debatten på symposiet....

  2. Model Building

    OpenAIRE

    Frampton, Paul H.

    1997-01-01

    In this talk I begin with some general discussion of model building in particle theory, emphasizing the need for motivation and testability. Three illustrative examples are then described. The first is the Left-Right model which provides an explanation for the chirality of quarks and leptons. The second is the 331-model which offers a first step to understanding the three generations of quarks and leptons. Third and last is the SU(15) model which can accommodate the light leptoquarks possibly...

  3. Building Inclusion

    OpenAIRE

    Jeanet Kullberg; Isik Kulu-Glasgow

    2009-01-01

    The social inclusion of immigrants and ethnic minorities is a central issue in many European countries. Governments face challenges in ensuring housing for immigrants, delivering public services, promoting neighbourhood coexistence and addressing residential segregation. The Building Inclusion project, sponsored by the European Commission, enables EU member states to exchange experiences relating to the social inclusion of vulnerable groups. Its special focus is on housing access and housing ...

  4. Documentary and Cognitive Theory

    DEFF Research Database (Denmark)

    Bondebjerg, Ib

    2014-01-01

    This article deals with the benefits of using cognitive theory in documentary film studies. The article outlines general aspects of cognitive theory in humanities and social science, however the main focus is on the role of narrative, visual style and emotional dimensions of different types of...... documentaries. Dealing with cognitive theories of film and media and with memory studies, the article analyses how a cognitive approach to documentaries can increase our under-standing of how documentaries influence us on a cognitive and emotional level and contribute to the forming of our social and cultural...

  5. Secrets and lies digital security in a networked world

    CERN Document Server

    Schneier, Bruce

    2000-01-01

    Bestselling author Bruce Schneier offers his expert guidance on achieving security on a networkInternationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to

  6. Social Security Fund Ready to Enter International Market

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Vice-Chairman of the Board of the National Social Security Fund Council. Feng Jianshen. revealed recently that. from now on. China plans to use five years or even a longer thne to make the total social security fund assets reach RMB 1 tillion and build the National Social Security Fund Council into a world first-rate old-age pension administrative agency.Feng emphasized that after three years' operation, social security fund has entered into a crucial period. The key lies in innovation, which, first of ...

  7. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  8. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from most of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR

  9. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    F. Habashi

    2000-06-22

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from most of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR

  10. Social Security Financial Crises

    OpenAIRE

    Rodrigo Cerda

    2003-01-01

    This paper explores the causes of the social security financial crises. We indicate that the financial crisis might be endogenous to the social security system. The main idea is that the PAYG social security system might affect fertility and human capital's decisions and therefore, may negatively impact the aggregated growth rate of the economy. These effects lead to an endogenous erosion of the financial basis of the PAYG social security program so that, as a consequence, the PAYG system is ...

  11. When security becomes green

    International Nuclear Information System (INIS)

    Environmental security is a relatively recent concept which gives rise to intense debate at the heart of the theory of international relations. What is the referent object of environmental security? To what extent can the scarcity of a natural resource be the cause of a 'green' war? Is climate change a threat to national security? This article tackles these questions through a review of the literature on the theoretical work dealing with environmental security in the field of international relations. (author)

  12. East Asia's Security System

    OpenAIRE

    Hojzáková, Věra

    2012-01-01

    The aim of the master thesis is to characterize and evaluate the current security system in East Asia, to show the security strategies of the system actors and the existing friction points, and to assess the future development of the security system in place. For this purpose the author first defines the East Asia's security system using the conceptual tools of three international relations theories, namely neo-realism, neo-liberalism, and constructivism. In the following section, the securit...

  13. Security system signal supervision

    Energy Technology Data Exchange (ETDEWEB)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  14. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  15. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  16. Security system signal supervision

    International Nuclear Information System (INIS)

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  17. Developing Secure Cloud Applications

    OpenAIRE

    Rak, Massimiliano; Ficco, Massimo; Battista, Ermanno; Casola, Valentina; Mazzocca, Nicola

    2014-01-01

    Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter. Customer could not monitor and evaluate the security mechanisms enforced by service provider. Service Level Agreements mainly focus on performance related terms and no guarantees are ...

  18. Security Policy Enforcement

    OpenAIRE

    Irvine, Cynthia E.

    2005-01-01

    Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enfo...

  19. Web Application Security Testing

    OpenAIRE

    Bukovský, Ondřej

    2012-01-01

    The purpose of this bachelor's thesis is to present the topic of web applications security. The purpose of the first, theoretical part of this work is to introduce and describe fundamentals like web security or penetration testing. OWASP (Open Web Application Security Project) and their ten most critical web applications security risks are presented in the rest of the first part. Second, practical part describes tested web application and defines purpose and scope of penetration tests. Then t...

  20. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  1. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  2. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  3. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  4. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  5. Advanced Linux Security

    Directory of Open Access Journals (Sweden)

    Ranjit Nimbalkar

    2013-01-01

    Full Text Available Using mandatory access control greatly increases the secu-rity of an operating system. SELinux, which is an implemen-tation of Linux Security Modules (LSM, implements several measures to prevent unauthorized system usage. The se-curity architecture used is named Flask, and provides a clean separation of security policy and enforcement. This paper is an overview of the Flask architecture and the implementation in Linux.

  6. Network Security with Cryptography

    OpenAIRE

    Prof. Mukund R. Joshi; Renuka Avinash Karkade

    2015-01-01

    Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Netw...

  7. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  8. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  9. SECURE REMOTE CLIENT AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    K.Pradeep,

    2010-10-01

    Full Text Available This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  10. SECURE REMOTE CLIENT AUTHENTICATION

    OpenAIRE

    K.Pradeep,; R.Usha Rani; E.Ravi Kumar; K.Nikhila,; Vijay Sankar

    2010-01-01

    This paper discusses an application of Secure Remote Client Authentication. It presents a Smart Cards and Digitally certification from third party vendors, Smart cards are based on algorithm to provide secure Remote client Authentication. These schemes vary significantly.In relation to today’s security challenges, which includephishing, man-in-the-middle attacks and malicious software. Secure Remote Client authentication plays a key role.

  11. Measuring Network Security

    OpenAIRE

    Serrelis, Emmanouil; Alexandris, Nikolaos

    2010-01-01

    The question that was analyzed in this chapter is whether and how the principles of the security measurement methodologies can be applied so that the objective measurement of security of business services can be achieved. The motives that support this question are focused in the justification of expenses and investments that are related with to security. Thus, although the management of security is closely related to technical and organisational

  12. [Normal aging and cognition].

    Science.gov (United States)

    Ska, Bernadette; Joanette, Yves

    2006-03-01

    It is now well documented that normal aging modifies the cognitive functioning and most observations suggest that cognition evolves in the direction of deterioration. The more frequently impaired functions are memory, attention and visual-spatial abilities. On the other hand, some abilities seem to increase, such as vocabulary. Considering the aging effect on cognition, questions remain regarding directionality, universality and reversibility. A great variability in aged related impacts is observed among subjects and among cognitive domains. Some individuals evolved more rapidly than others. Some cognitive functions are more affected by aging than others. General and specific factors are hypothesized to explain the aged related cognitive decline. Among them, educational level, health, cognitive style, life style, personality, are likely to modulate the aged related cognitive evolution by influencing attentional resources and cerebral plasticity. Cognitive resources are essential to develop adaptative strategies. During the life span, resources are activated and increased by learning and training. Considering the role of cognitive resources, successful aging is dependent on several conditions : absence of disease leading to a loss of autonomy, maintenance of cognitive and physical activities, and active and social engaged lifestyle. PMID:16527210

  13. Cognitive Behavioural Therapy & Training

    DEFF Research Database (Denmark)

    Spaten, Ole Michael; Hansen, Tia G. B.; Gulbrandsen, Knut Arild;

    coaching module in the graduate curriculum for students of psychology is a rewarding introduction to cognitive behavioural approaches, since it allows combination of traditional lectures with “action-reflection-learning” workshops, during which students train cognitive behavioural techniques in their own......Coaching is an expanding area of professional work, and recent years have brought forward the notion of cognitive coaching (Costa, 2006; Oestrich, 2005) which adapts theory and techniques from cognitive therapy to serve self-enhancement in non-clinical populations. We suggest that a cognitive...... repertoire. The skills needed for cognitive coaching reflect all therapeutic techniques but at a less advanced psychotherapeutic level, and still prepare for future clinical work and development. In the poster, we summarise a cognitive coaching course syllabus as well as results from data collected to...

  14. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  15. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  16. Secure Disk Mixed System

    Directory of Open Access Journals (Sweden)

    Myongchol Ri

    2013-01-01

    Full Text Available We propose a disk encryption method, called Secure Disk Mixed System (SDMS in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system.

  17. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  18. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, P.H.; Veldhuis, R.N.J.

    2009-01-01

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  19. On chaos synchronization and secure communication.

    Science.gov (United States)

    Kinzel, W; Englert, A; Kanter, I

    2010-01-28

    Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems. PMID:20008407

  20. Key elements of a nuclear security culture enhancement program

    International Nuclear Information System (INIS)

    an effective manner; Educational and training programs to reinforce the importance of each individual's role in supporting nuclear security; Promotional activities to remind employees of their responsibility to contribute to nuclear security effectiveness. Building on the success of safety programs and nuclear security culture enhancement programs in the U.S. and Russia, a country can develop its own comprehensive program taking into consideration the key elements defined within this paper. Conducting a baseline assessment will assist organizations with establishing the current level of nuclear security culture. The results of the baseline assessment can help guide an organization determine what type of nuclear security culture enhancement program is required to affect the necessary change. Periodic assessment of the nuclear security culture program will assist organizations with focusing their efforts to enhance nuclear security and allow them to modify the key elements of their nuclear security culture enhancement program over time to increase effectiveness. (author)