WorldWideScience

Sample records for building secure cognitive

  1. Soft Computing - A step towards building Secure Cognitive WLAN

    CERN Document Server

    Lingareddy, S C; Babu, Dr Vinaya; Dhruve, Kashyap

    2010-01-01

    Wireless Networks rendering varied services has not only become the order of the day but the demand of a large pool of customers as well. Thus, security of wireless networks has become a very essential design criterion. This paper describes our research work focused towards creating secure cognitive wireless local area networks using soft computing approaches. The present dense Wireless Local Area Networks (WLAN) pose a huge threat to network integrity and are vulnerable to attacks. In this paper we propose a secure Cognitive Framework Architecture (CFA). The Cognitive Security Manager (CSM) is the heart of CFA. The CSM incorporates access control using Physical Architecture Description Layer (PADL) and analyzes the operational matrices of the terminals using multi layer neural networks, acting accordingly to identify authorized access and unauthorized usage patterns.

  2. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  3. Cognitive Study of Building Metaphor

    Institute of Scientific and Technical Information of China (English)

    牛惠君

    2015-01-01

    Metaphor is a universal phenomenon,the traditional metaphor studies it as a means of rhetoric,but metaphor of modern sees it as a cognitive phenomenon.In our life most of the everyday language is metaphor,our mind is also the metaphor.Meta-phor has become an indispensable tool for understanding the world.There are a lot of “building”metaphorical expressions in the life, construction is an important component of people’s lives. K?vecses (2002)discussed briefly some conceptual metaphors of the construction in English,Deignan (2001)make a compre-hensive study on building metaphors which underlie some metaphor expression of “building and construction”.Lan Chun (2003)only referred to “theory is building”,but the concept of “life,relationships”can be understood through building concept,these relative ab-stract concepts can be understood by clear concrete building concept.Hence the studies of building metaphors have not been systematic and comprehensive,people seldom study it.We plan to give a contrastive study of building metaphors.This will further deepen peo-ple’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  4. Using Expert Systems To Build Cognitive Simulations.

    Science.gov (United States)

    Jonassen, David H.; Wang, Sherwood

    2003-01-01

    Cognitive simulations are runnable computer programs for modeling human cognitive activities. A case study is reported where expert systems were used as a formalism for modeling metacognitive processes in a seminar. Building cognitive simulations engages intensive introspection, ownership and meaning making in learners who build them. (Author/AEF)

  5. Security implications and governance of cognitive neuroscience.

    Science.gov (United States)

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  6. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  7. On Building Secure Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno

    This thesis presents the Guided System Development (GSD) framework, which aims at supporting the development of secure communication systems. A communication system is specified in a language similar to the Alice and Bob notation, a simple and intuitive language used to describe the global...... perspective of the communications between different principals. The notation used in the GSD framework extends that notation with constructs that allow the security requirements of the messages to be described. From that specification, the developer is guided through a semi-automatic translation that enables...... the verification and implementation of the system. The translation is semi-automatic because the developer has the option of choosing which implementation to use in order to achieve the specified security requirements. The implementation options are given by plugins defined in the framework. The framework...

  8. Cognitive hacking and intelligence and security informatics

    Science.gov (United States)

    Thompson, Paul

    2004-08-01

    This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.

  9. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...... through non-intrusive authentication of mobile users in a smart environment. The objective is to shift the current authentication paradigm from a single discrete event to a continuous session. This is accomplished by utilising the contextual awareness provided by the smart environment to track principals...... inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...

  10. Cognitive-Semiotic Mechanisms of Phraseme Building

    Directory of Open Access Journals (Sweden)

    Alefirenko Nikolay Fedorovich

    2015-12-01

    Full Text Available The article deals with the problems of idioms production and perception related to the foresign forms emergence of information accumulation and storage contained in the cognitive-based derivation of phraseme building. It is suggested that presign stage of the semiosis process and the phraseme understanding is a cognitive model that precedes not only the formation of the phraseme semantic structure, but its perception. Since the cognitive model of phrasemic semiosis is a diagram of discursive meaning embodiment and discourse itself is form of its indirectly derivative existence, there is a need to show how the cognitive-discursive mechanisms of phraseme building is associated with foresign forms of sense accumulation and storage.

  11. Security Dialogues: Building Better Relationships between Security and Business

    OpenAIRE

    Ashenden, D.; Lawrence, D.

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff. Published in IEEE Security and Privacy (2016) vol 14/3 pp 82-87 (http://doi.ieeecomputers...

  12. Autopoiesis + extended cognition + nature = can buildings think?

    Science.gov (United States)

    Dollens, Dennis

    2015-01-01

    To incorporate metabolic, bioremedial functions into the performance of buildings and to balance generative architecture's dominant focus on computational programming and digital fabrication, this text first discusses hybridizing Maturana and Varela's biological theory of autopoiesis with Andy Clark's hypothesis of extended cognition. Doing so establishes a procedural protocol to research biological domains from which design could source data/insight from biosemiotics, sensory plants, and biocomputation. I trace computation and botanic simulations back to Alan Turing's little-known 1950s Morphogenetic drawings, reaction-diffusion algorithms, and pioneering artificial intelligence (AI) in order to establish bioarchitecture's generative point of origin. I ask provocatively, Can buildings think? as a question echoing Turing's own, "Can machines think?" PMID:26478784

  13. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  14. Progress in building a cognitive vision system

    Science.gov (United States)

    Benjamin, D. Paul; Lyons, Damian; Yue, Hong

    2016-05-01

    We are building a cognitive vision system for mobile robots that works in a manner similar to the human vision system, using saccadic, vergence and pursuit movements to extract information from visual input. At each fixation, the system builds a 3D model of a small region, combining information about distance, shape, texture and motion to create a local dynamic spatial model. These local 3D models are composed to create an overall 3D model of the robot and its environment. This approach turns the computer vision problem into a search problem whose goal is the acquisition of sufficient spatial understanding for the robot to succeed at its tasks. The research hypothesis of this work is that the movements of the robot's cameras are only those that are necessary to build a sufficiently accurate world model for the robot's current goals. For example, if the goal is to navigate through a room, the model needs to contain any obstacles that would be encountered, giving their approximate positions and sizes. Other information does not need to be rendered into the virtual world, so this approach trades model accuracy for speed.

  15. Security-aware cooperation in cognitive radio networks

    CERN Document Server

    Zhang, Ning

    2014-01-01

    This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into

  16. Building Safe and Secure Systems with AADL

    Science.gov (United States)

    2015-02-15

    Deadlock/starvation Latency Resource Consumption Bandwidth CPU time Power consumption Data precision/ accuracy Temporal correctness Confidence Data...University Security Policy Verification Component integration and composition Partitions share the same level with their tasks Partitions contain objects at...the same security level Communication Policies Communication share the same level A shared device manages objects at the same level 21 AADL meeting

  17. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... of the permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible...

  18. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  19. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism

    Directory of Open Access Journals (Sweden)

    Dongmei Han

    2015-01-01

    Full Text Available With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people’s awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people’s awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people’s cognition of potential risks in online financial payment.

  20. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.

    Science.gov (United States)

    Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.

  1. Security-Control Systems and Automation in Contemporary Buildings

    Directory of Open Access Journals (Sweden)

    Saadet Aytıs

    1999-05-01

    Full Text Available As a result of the developing technology, major renovations related to the security control systems and to building automation applications on contemporary buildings have appeared. The main item of the control systems is the entry system with cards and passwords and this is applied almost in all the large contemporary buildings. The entry and exit to/from the carparking is getting to be as important as the entry and exit to/from the building. Thus, specific measures to stop the security system being already perforated in the parking are needed. Warning systems with a great range of different detectors against various dangers that run connected to the mainframe computers and that turn on the system in case of danger are taken into consideration. The fact of obtaining all comfort conditions desired in the contemporary high space buildings and functioning of the first-aid systems are fully realized by computers with the help of systems that are called “Building Automation System” (BAS. All inspection, energy saving and security controls are achieved through these systems. In the buildings where building automation systems are applied, trained personel is needed to keep the system running; and the training of the residents about the system gains more and more importance.

  2. Ground Truth in Building Human Security

    Science.gov (United States)

    2012-11-01

    2011, equipped with a laptop computer and a digital camera, I accompanied a team implementing the USAID-funded Title Registration and Microfinance ...security or collateral for a microfinance loan, typically $100 to $500 USD for six months, to buy a sewing machine, basket weaving material, or other...equipment and supplies for an in- home business.82 The Title Registration and Microfinance Project ad- dresses the dual challenges of conducting land

  3. Management and Security for Grid, Cloud and Cognitive Networks

    Directory of Open Access Journals (Sweden)

    WESTPHALL, C. B

    2011-12-01

    Full Text Available This paper present a number of research initiatives related to innovative and cut-edge technologies for Cloud Computing. These are chiefly in the fields of (i environment security, (ii quality assurance, (iii service composition, and (iv system management. We present technologies for intrusion detection; a SLA perspective in security management; customer security concerns; a Cloud-based solution for eHealth; experimental assessment of routing for grid and cloud; simulator improvements to validate the green cloud computing approach, and; a framework to radio layer operation in cognitive networks.

  4. Cognitive Radio for Smart Grid with Security Considerations

    Directory of Open Access Journals (Sweden)

    Khaled Shuaib

    2016-04-01

    Full Text Available In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large.

  5. ENHANCING BUILDING SECURITY with RFID and ZIGBEE

    Directory of Open Access Journals (Sweden)

    Hemalatha.M

    2013-02-01

    Full Text Available ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by the smart node are transmitted to the base node through ZigBee. If the temperature exceeds or an overload occurs, a set of remote control instructions are executed in the PC. The base node instructs the smart node to cut off the power to the corresponding branch circuit. The entire operation can be monitored from a remote station. In this proposed system, RFID technique is added to provide a theft control mechanism. To prevent theft of valuables from an unauthorized person,RFID tags are used. RFID reader senses the RFID labels (master/slave tags continuously and sends the information to a PC through ZigBee protocol. The database is checked in PC with the received information. If there is any mismatch in the RFID tags, it is considered to be an illegal input and a warning message is generated at the PC. The database is checked for the owner of that particular item and a confirming message is send to that owner. To search for that item the owner can login WEB. The valuable will be stopped by the entrance guard.

  6. Cognitive Radio for Smart Grid: Theory, Algorithms, and Security

    Directory of Open Access Journals (Sweden)

    Raghuram Ranganathan

    2011-01-01

    Full Text Available Recently, cognitive radio and smart grid are two areas which have received considerable research impetus. Cognitive radios are intelligent software defined radios (SDRs that efficiently utilize the unused regions of the spectrum, to achieve higher data rates. The smart grid is an automated electric power system that monitors and controls grid activities. In this paper, the novel concept of incorporating a cognitive radio network as the communications infrastructure for the smart grid is presented. A brief overview of the cognitive radio, IEEE 802.22 standard and smart grid, is provided. Experimental results obtained by using dimensionality reduction techniques such as principal component analysis (PCA, kernel PCA, and landmark maximum variance unfolding (LMVU on Wi-Fi signal measurements are presented in a spectrum sensing context. Furthermore, compressed sensing algorithms such as Bayesian compressed sensing and the compressed sensing Kalman filter is employed for recovering the sparse smart meter transmissions. From the power system point of view, a supervised learning method called support vector machine (SVM is used for the automated classification of power system disturbances. The impending problem of securing the smart grid is also addressed, in addition to the possibility of applying FPGA-based fuzzy logic intrusion detection for the smart grid.

  7. Security engineering a guide to building dependable distributed systems

    CERN Document Server

    Anderson, Ross

    2008-01-01

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

  8. Making Our Buildings Safer: Security Management and Equipment Issues.

    Science.gov (United States)

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  9. Applying Cognitive Control Modes to Identify Security Fatigue Hotspots

    OpenAIRE

    Parkin, S.; Krol, K.; Becker, I; Sasse, M. A.

    2016-01-01

    Security tasks can burden the individual, to the extent that security fatigue promotes habits that undermine security. Here we revisit a series of user-centred studies which focus on security mechanisms as part of regular routines, such as two-factor authentication. By examining routine security behaviours, these studies expose perceived contributors and consequences of security fatigue, and the strategies that a person may adopt when feeling overburdened by security. Behaviours and strategie...

  10. NMACA Approach Used to Build a Secure Message Authentication Code

    Science.gov (United States)

    Alosaimy, Raed; Alghathbar, Khaled; Hafez, Alaaeldin M.; Eldefrawy, Mohamed H.

    Secure storage systems should consider the integrity and authentication of long-term stored information. When information is transferred through communication channels, different types of digital information can be represented, such as documents, images, and database tables. The authenticity of such information must be verified, especially when it is transferred through communication channels. Authentication verification techniques are used to verify that the information in an archive is authentic and has not been intentionally or maliciously altered. In addition to detecting malicious attacks, verifying the integrity also identifies data corruption. The purpose of Message Authentication Code (MAC) is to authenticate messages, where MAC algorithms are keyed hash functions. In most cases, MAC techniques use iterated hash functions, and these techniques are called iterated MACs. Such techniques usually use a MAC key as an input to the compression function, and this key is involved in the compression function, f, at every stage. Modification detection codes (MDCs) are un-keyed hash functions, and are widely used by authentication techniques such as MD4, MD5, SHA-1, and RIPEMD-160. There have been new attacks on hash functions such as MD5 and SHA-1, which requires the introduction of more secure hash functions. In this paper, we introduce a new MAC methodology that uses an input MAC key in the compression function, to change the order of the message words and shifting operation in the compression function. The new methodology can be used in conjunction with a wide range of modification detection code techniques. Using the SHA-1 algorithm as a model, a new (SHA-1)-MAC algorithm is presented. The (SHA-1)-MAC algorithm uses the MAC key to build the hash functions by defining the order for accessing source words and defining the number of bit positions for circular left shifts.

  11. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  12. Private Military and Security Companies - Counterinsurgency and Nation Building Strategy

    Science.gov (United States)

    2013-04-25

    120. 37 James J. Carafano, 115. 38 James J. Carafano, 117. 39 Peter Aps, “As Iraq, Afghan wars end, private security firms adapt,” Reuters , October...Bibliography Aps, Peter. “As Iraq, Afghan wars end, private security firms adapt,” Reuters ...International Peace Research Institute, The private military services industry, Online. Thomson , Janice E. Mercenaries, Pirates, and

  13. Global water risks and national security: Building resilience (Invited)

    Science.gov (United States)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere

  14. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  15. Design Considerations for a Cognitive Radio Trust and Security Framework

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Ramjee; Tragos, Elias Z.

    2012-01-01

    towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the critical challenges with respect to reliability, robustness and security, which hinder operators from investing in this new technology. We propose a new conceptual framework for trust and security...... to be integrated with the performance architecture and protocols for CR networks (CRNs). Our target is increasing trustworthiness from users and operators perspective in support of their successful deployment....

  16. Crucial problems on security assessment of a building site adjacent to an excavated high slope

    Institute of Scientific and Technical Information of China (English)

    文海家; ZHANG; Jialan; 等

    2002-01-01

    The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope,which is frequently encountered in town construction in mountainous areas due to terrain limit.On the base of some typical engineering cases in Chongqing,several crucial problems on security assessment of building site adjacent to an excavated high slope,including the natural geological conditions and man-destroyed degree,engineering environment,potential failure pattern of the high slope,calculation parameters and analysis methods,are roundly discussed.It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned,and the security assessment is one of the fundamental data to insure the safety of the related construction,site and buildings.

  17. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2014-03-01

    Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.

  18. Building a cognitive map by assembling multiple path integration systems.

    Science.gov (United States)

    Wang, Ranxiao Frances

    2016-06-01

    Path integration and cognitive mapping are two of the most important mechanisms for navigation. Path integration is a primitive navigation system which computes a homing vector based on an animal's self-motion estimation, while cognitive map is an advanced spatial representation containing richer spatial information about the environment that is persistent and can be used to guide flexible navigation to multiple locations. Most theories of navigation conceptualize them as two distinctive, independent mechanisms, although the path integration system may provide useful information for the integration of cognitive maps. This paper demonstrates a fundamentally different scenario, where a cognitive map is constructed in three simple steps by assembling multiple path integrators and extending their basic features. The fact that a collection of path integration systems can be turned into a cognitive map suggests the possibility that cognitive maps may have evolved directly from the path integration system.

  19. Building Blocks of Fetal Cognition: Emotion and Language

    Science.gov (United States)

    Huotilainen, Minna

    2010-01-01

    Magnetoencephalography (MEG) can be effectively used to record fetal and neonatal cognitive abilities/functions by recording completely non-invasively the magnetic fields produced by the active neurons in the brain. During the last trimester and the first months of life, the cognitive capabilities related to emotion recognition and language…

  20. Building Psychological Contracts in Security-Risk Environments

    DEFF Research Database (Denmark)

    Ramirez, Jacobo; Madero, Sergio; Vélez-Zapata, Claudia

    2015-01-01

    and the impacts of narcoterrorism on firms were conducted with human resources (HR) personnel, line managers and subordinates at eight national and multinational corporations (MNCs) with subsidiaries in Colombia and Mexico. Our findings generally support the existence of a relational psychological contract in our...... sample. Duty-of-care strategies based on both HRM systems and the sensitivities of HR personnel and line managers to the narcoterrorism context, in combination with both explicit and implicit security policies, tend to be the sources of the content of psychological contracts. We propose a psychological......This paper examines the reciprocal obligations between employers and employees that are framed as psychological contracts in security-risk environments. A total of 30 interviews based on psychological contract frameworks, duty-of-care strategies in terms of human resource management (HRM) systems...

  1. A systemic and cognitive approach for IoT security

    OpenAIRE

    Riahi, Arbia; Natalizio, Enrico; Challal, Yacine; Mitton, Nathalie; Iera, Antonio

    2014-01-01

    Invited Paper; International audience; The Internet of Things (IoT) will enable objects to become active participants of everyday activities. Introducing objects into the control processes of complex systems makes IoT security very difficult to address. Indeed, the Internet of Things is a complex paradigm in which people interact with the technological ecosystem based on smart objects through complex processes. The interactions of these four IoT components, person, intelligent object, technol...

  2. Security and Privacy Challenges in Cognitive Wireless Sensor Networks

    OpenAIRE

    Sen, Jaydip

    2013-01-01

    Wireless sensor networks (WSNs) have attracted a lot of interest in the research community due to their potential applicability in a wide range of real-world practical applications. However, due to the distributed nature and their deployments in critical applications without human interventions and sensitivity and criticality of data communicated, these networks are vulnerable to numerous security and privacy threats that can adversely affect their performance. These issues become even more c...

  3. Cognitive Study of Building Metaphor建筑的隐喻认知研究

    Institute of Scientific and Technical Information of China (English)

    孔艳君

    2013-01-01

    Metaphor is a universal phenomenon. Tradition-ally metaphor is seen as as a means of rhetoric, but now it is seen as a cognitive phenomenon. In our life most of the everyday language is metaphor, our mind is also the metaphor. Metaphor has become an indispensable tool for understanding the world. There are a lot of“building”metaphorical expressions in life, as construction is an important component of people’s lives. But the studies of building metaphors have not been systematic and comprehensive. This thesis gives a contrastive study of building metaphors to deepen people’s understanding of building metaphors and enrich the cognitive studies of metaphor.

  4. Building an information security strategy for EHR: guidelines for assessing the current situation.

    Science.gov (United States)

    Mohammad, Yara; Stergioulas, Lampros

    2010-01-01

    This paper is looking at electronic health record (EHR) systems and their information security strategy. It focuses on the first step of building an information security strategy which is analysing the current situation of an EHR system. This research is based on different research methods applied to different EHR systems. In this paper we define eight elements that can be used as guidelines for how best to assess the current situation of any EHR system.

  5. Memristive crypto primitive for building highly secure physical unclonable functions.

    Science.gov (United States)

    Gao, Yansong; Ranasinghe, Damith C; Al-Sarawi, Said F; Kavehei, Omid; Abbott, Derek

    2015-08-04

    Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. The advantage is that PUFs have the potential to provide fundamentally higher security than traditional cryptographic methods by preventing the cloning of devices and the extraction of secret keys. Most PUF designs focus on exploiting process variations in Complementary Metal Oxide Semiconductor (CMOS) technology. In recent years, progress in nanoelectronic devices such as memristors has demonstrated the prevalence of process variations in scaling electronics down to the nano region. In this paper, we exploit the extremely large information density available in nanocrossbar architectures and the significant resistance variations of memristors to develop an on-chip memristive device based strong PUF (mrSPUF). Our novel architecture demonstrates desirable characteristics of PUFs, including uniqueness, reliability, and large number of challenge-response pairs (CRPs) and desirable characteristics of strong PUFs. More significantly, in contrast to most existing PUFs, our PUF can act as a reconfigurable PUF (rPUF) without additional hardware and is of benefit to applications needing revocation or update of secure key information.

  6. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  7. A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio

    Science.gov (United States)

    Nhan, Nguyen-Thanh; Koo, Insoo

    Distributed spectrum sensing provides an improvement for primary user detection but leads a new security threat into CR system. The spectrum sensing data falsification malicious users can decrease the cooperative sensing performance. In this paper, we propose a distributed scheme in which the presence and absence hypotheses distribution of primary signal is estimated based on past sensing received power data by robust statistics, and the data fusion are performed according to estimated parameters by Dempster-Shafer theory of evidence. Our scheme can achive a powerful capability of malicious user elimination due to the abnormality of the distribution of malicious users compared with that of other legitimate users. In addition, the performance of our data fusion scheme is enhanced by supplemented nodes’ reliability weight.

  8. Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base.

    Science.gov (United States)

    1992-06-01

    engineers in a specialized project shop. Although this approach initially sparked resistance, it promoted greater manufactura - bility by forcing...69, p. 760. 106 • Building Future Security video and animation at each employee workstation. Construction, however, remains primarily a hands- on

  9. Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    JIANG Limin; JIANG Du

    2007-01-01

    In retrospect of the architecture design of Exit- Entry Administration Building of Shanghai Municipal Public Security Bureau, this paper elaborates on the architect's pursuit of the symbol of the image, the fluidity of the space and the sequence of the function. It promotes a case which deals with the harmony of the architecture individuality and the urban space commonness in city center.

  10. Building Bridges between Neuroscience, Cognition and Education with Predictive Modeling

    Science.gov (United States)

    Stringer, Steve; Tommerdahl, Jodi

    2015-01-01

    As the field of Mind, Brain, and Education seeks new ways to credibly bridge the gap between neuroscience, the cognitive sciences, and education, various connections are being developed and tested. This article presents a framework and offers examples of one approach, predictive modeling within a virtual educational system that can include…

  11. Maritime Security and Capacity Building in The Gulf of Guinea: On comprehensiveness, gaps, and how maritime capacity building influences security priorities

    DEFF Research Database (Denmark)

    Jacobsen, Katja Lindskov

    2016-01-01

    It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon, involving a variety issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest, youth unemployment etc.) as well as a multiplicity of external...... for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as will be shown, important aspects of the problem remain largely unaddressed). What is more, we also need to appreciate that, even if these gaps represent a ‘failure’ to deliver a comprehensive...... response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance by influencing how certain aspects of this multifaceted problem are prioritized, whilst others...

  12. Designs for Collective Cognitive Responsibility in Knowledge-Building Communities

    Science.gov (United States)

    Zhang, Jianwei; Scardamalia, Marlene; Reeve, Richard; Messina, Richard

    2009-01-01

    This article reports a design experiment conducted over three successive school years, with the teacher's goal of having his Grade 4 students assume increasing levels of collective responsibility for advancing their knowledge of optics. Classroom practices conducive to sustained knowledge building were co-constructed by the teacher and students,…

  13. Math Learning Model That Accommodates Cognitive Style to Build Problem-Solving Skills

    Science.gov (United States)

    Warli; Fadiana, Mu'jizatin

    2015-01-01

    The purpose of this research is to develop mathematical learning models that accommodate the cognitive styles reflective vs. impulsive students to build problem-solving skills, quality (valid, practical, and effective). To achieve the target would do research development (development research) and method development that consists of five stages,…

  14. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    Science.gov (United States)

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  15. The Regionally-Oriented National Schools, an Innovative Tool for National and Regional Security Building

    Science.gov (United States)

    2012-04-04

    REQUIREMENTS FOR THE DEGREE OF MASTER OF MILITARY STUDIES AUTHOR: Chef de bataillon Tugdual Barbarin Armee de Terre , Troupes de Marine- France AY 11...national and regional security building Author: Chef de bataillon Tugdual Barbarin, Armée de Terre , Troupes de Marines (France) Thesis...assertion, people are rarely able to provide precise examples demonstrating this influence. At best, they evoke outdated clichés which do not reflect the

  16. Building secure wireless access point based on certificate authentication and firewall captive portal

    OpenAIRE

    Soewito B.; Hirzi

    2014-01-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall....

  17. Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

    Directory of Open Access Journals (Sweden)

    Shashi Ranjan

    2012-05-01

    Full Text Available India is striving to become a knowledge economy by the year 2020. In order to achieve this goal, there is a growing focus both at the government level as well as private sector level to leverage the expertise of the IT and ITES sector of the country which has become one of the main drivers of growth for the Indian Economy. This has lead to increasing investment in IT infrastructure. In this paper we review this trend and analyze the importance of Information Security Infrastructure for the country.We propose a comprehensive conceptual framework for building a robust, resilient and dependable Information Security Infrastructure which will help in establishing India as the secure and trusted hub of the future.

  18. Walk the Talk: Progress in Building a Supply Chain Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-31

    Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology, and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.

  19. Stress reactivity in 15-month-old infants: links with infant temperament, cognitive competence, and attachment security.

    Science.gov (United States)

    van Bakel, Hedwig J A; Riksen-Walraven, J Marianne

    2004-04-01

    In a sample of eighty-five 15-month-old infants, salivary cortisol was obtained prior to and following a potentially stressful episode in which the child was confronted with a stranger and with a frightening robot. Infant characteristics such as anger proneness, cognitive competence, and attachment security were expected to be related to cortisol reactivity during the stressful event. The results showed higher cortisol reactivity in more anger-prone infants and in infants with higher levels of cognitive development as assessed with the Bayley Scales of Infant Development (N. Bayley, 1969). Attachment security, assessed with the Attachment Q-Set (AQS; E. Waters, 1995), was found to moderate the relation between cognitive level and cortisol reactivity; the positive relation between cognitive development and cortisol response was found in only infants with low AQS security scores. The findings may have important implications for research in the development of self-regulation in humans as well as in studies with animals.

  20. A Primary User Authentication Scheme for Secure Cognitive TV Spectrum Sharing

    Directory of Open Access Journals (Sweden)

    Fatty Mustafa Salem

    2012-07-01

    Full Text Available Cognitive Radio is being intensively investigated by regulatory bodies as the enabling technology for opportunistic access to the TV white spaces. The successful deployment of Cognitive Radio Networks and the realization of their benefits depend on the assignment of essential security challenges to resist misuse of the systems. In this paper, we propose a primary user authentication scheme in the presence of attackers. Our system is based on the deployment of multiple stages of helper nodes, helper nodes in the first stage are fixed and close to primary user, while helper nodes in the next stages are placed within the primary users coverage area. Helper nodes are responsible for sensing the spectrum based on the received signal power detection scheme, and broadcasting the spectrum information to secondary users. Compared to prior work, our system can provide a stricter requirement for probability of false alarm and probability of missing.

  1. A High End Building Automation and Online Video Surveillance Security System

    Directory of Open Access Journals (Sweden)

    Iyer Adith Nagarajan

    2015-02-01

    Full Text Available This paper deals with the design and implementation of a building automation and security system which facilitates a healthy, flexible, comfortable and a secure environment to the residents. The design incorporates a SIRC (Sony Infrared Remote Control protocol based infrared remote controller for the wireless operation and control of electrical appliances. Alternatively, the appliances are monitored and controlled via a laptop using a GUI (Graphical User Interface application built in C#. Apart from automation, this paper also focuses on indoor security. Multiple PIR (Pyroelectric Infrared sensors are placed within the area under surveillance to detect any intruder. A web camera used to record the video footage is mounted on the shaft of a servo motor to enable angular motion. Corresponding to which sensor has detected the motion; the ARM7 LPC2148 microcontroller provides appropriate PWM pulses to drive the servo motor, thus adjusting the position and orientation of the camera precisely. OpenCV libraries are used to record a video feed of 5 seconds at 30 frames per second (fps. Video frames are embedded with date and time stamp. The recorded video is compressed, saved to predefined directory (for backup and also uploaded to specific remote location over the internet using Google drive for instant access. The entire security system is automatic and does not need any human intervention.

  2. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  3. Building Fit-For-Purpose Land Administration Systems: Providing Secure Tenure for All

    DEFF Research Database (Denmark)

    Lemmen, Christiaan; Enemark, Stig; McLaren, Robin

    2016-01-01

    administration following the FFP principles for building the spatial framework. The Social Tenure Domain Model (STDM) is recommended.  ‘Review (Conversion)’ means assessing the evidence of rights and any possible out-standing claims and when conditions are met, the security of the rights will be increased....... This paper discusses the building of the FFP approach at country level. Implementation is strongly related to the recognition of the continuum of land rights. Implementation of the FFP approach means to recognise, record and review land rights:  ’Recognise’ involves a procedure for recognition....... A complete overview is required of the tenure systems and land rights related to the areas affected. All formal and informal tenure categories and sub-categories should be identified and related to space. It is recommended that a National Tenure Atlas will be developed in order to get overview of the spatial...

  4. Cultures, Conditions, and Cognitive Closure: Breaking Intelligence Studies’ Dependence on Security Studies

    Directory of Open Access Journals (Sweden)

    Matthew Crosston

    2015-09-01

    Full Text Available This paper is about how the conceptualization of ‘culture’ in intelligence studies has taken on too powerful a role, one that has become too restrictive in its impact on thinking about other intelligence communities, especially non-Western ones. This restriction brings about unintentional cognitive closure that damages intelligence analysis. The argument leans heavily in many ways on the fine work of Desch and Johnston in the discipline of Security Studies, who cogently brought to light over fifteen years ago how ultra-popular cultural theories were best utilized as supplements to traditional realist approaches, but were not in fact capable of supplanting or replacing realist explanations entirely. The discipline of Intelligence Studies today needs a similar ‘intellectual intervention’ as it has almost unknowingly advanced in the post-Cold War era on the coattails of Security Studies but has largely failed to apply the same corrective measures. This effort may be best accomplished by going back to Snyder in the 1970s who warned that culture should be used as the explanation of last resort for Security Studies.

  5. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  6. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    Science.gov (United States)

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  7. Building the infrastructure: the effects of role identification behaviors on team cognition development and performance.

    Science.gov (United States)

    Pearsall, Matthew J; Ellis, Aleksander P J; Bell, Bradford S

    2010-01-01

    The primary purpose of this study was to extend theory and research regarding the emergence of mental models and transactive memory in teams. Utilizing Kozlowski, Gully, Nason, and Smith's (1999) model of team compilation, we examined the effect of role identification behaviors and posited that such behaviors represent the initial building blocks of team cognition during the role compilation phase of team development. We then hypothesized that team mental models and transactive memory would convey the effects of these behaviors onto team performance in the team compilation phase of development. Results from 60 teams working on a command-and-control simulation supported our hypotheses.

  8. A Case Study in Security Sector Reform: Learning from Security Sector Reform/Building in Afghanistan (October 2002-September 2003)

    Science.gov (United States)

    2009-11-01

    NATO Public Diplomacy Division, 2008. Rashid, Ahmed. Descent Into Chaos, New York, Viking, 2008. Sedra , Mark. “Confronting Afghanistan’s Security... Sedra , “Confronting Afghanistan’s Security Dilemma,” e conference, June 4-11, 2003, www.bicc.de/publications/ briefs/brief28/content.php, accessed April...Progress in Afghanistan, Bucharest Summit 2-4 April 2008, Brussels: NATO Public Diplomacy Division, 2008, www.nato.int; Sedra ; Thier, Afghanistan

  9. The corporate brand and strategic direction: Senior business school managers’ cognitions of corporate brand building and management

    OpenAIRE

    Balmer, JMT; Wang, W-Y

    2016-01-01

    This revelatory study focuses on top Financial Times (FT) ranked British business school managers cognitions of corporate brand building and management. The study insinuates there is a prima facie bilateral link between corporate branding and strategic direction. Among this genus of business school, the data revealed corporate brand building entailed an on-going concern with strategic management, stakeholder management, corporate communications, service focus, leadership, and commitment. Thes...

  10. Building a highly available and intrusion tolerant database security and protection system ( DSPS)

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performane analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections ; and that proactive security is very useful and practical for large, critical applications.

  11. Building a highly available and intrusion tolerant database security and protection system (DSPS)

    Institute of Scientific and Technical Information of China (English)

    蔡亮; 杨小虎; 董金祥

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  12. The potential of using quantum theory to build models of cognition.

    Science.gov (United States)

    Wang, Zheng; Busemeyer, Jerome R; Atmanspacher, Harald; Pothos, Emmanuel M

    2013-10-01

    Quantum cognition research applies abstract, mathematical principles of quantum theory to inquiries in cognitive science. It differs fundamentally from alternative speculations about quantum brain processes. This topic presents new developments within this research program. In the introduction to this topic, we try to answer three questions: Why apply quantum concepts to human cognition? How is quantum cognitive modeling different from traditional cognitive modeling? What cognitive processes have been modeled using a quantum account? In addition, a brief introduction to quantum probability theory and a concrete example is provided to illustrate how a quantum cognitive model can be developed to explain paradoxical empirical findings in psychological literature.

  13. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    Karthik, Rajasekar [ORNL; Patlolla, Dilip Reddy [ORNL; Sorokine, Alexandre [ORNL; Myers, Aaron T [ORNL

    2014-01-01

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, it is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.

  14. Cognitive models applied to human effectiveness in national security environments (ergonomics of augmented cognition system design and application).

    Energy Technology Data Exchange (ETDEWEB)

    Ntuen, Celestine (North Carolina Agricultural and Technical State University, Greensboro, NC); Winchester, Woodrow III (North Carolina Agricultural and Technical State University, Greensboro, NC)

    2004-06-01

    In complex simulation systems where humans interact with computer-generated agents, information display and the interplay of virtual agents have become dominant media and modalities of interface design. This design strategy is reflected in augmented reality (AR), an environment where humans interact with computer-generated agents in real-time. AR systems can generate large amount of information, multiple solutions in less time, and perform far better in time-constrained problem solving. The capabilities of AR have been leveraged to augment cognition in human information processing. In this sort of augmented cognition (AC) work system, while technology has become the main source for information acquisition from the environment, the human sensory and memory capacities have failed to cope with the magnitude and scale of information they encounter. This situation generates opportunity for excessive cognitive workloads, a major factor in degraded human performance. From the human effectiveness point of view, research is needed to develop, model, and validate simulation tools that can measure the effectiveness of an AR technology used to support the amplification of human cognition. These tools will allow us to predict human performance for tasks executed under an AC tool construct. This paper presents an exploration of ergonomics issues relevant to AR and AC systems design. Additionally, proposed research to investigate those ergonomic issues is discussed.

  15. Security Sector Reform: A Case Study Approach to Transition and Capacity Building

    Science.gov (United States)

    2010-01-01

    Reintegra- tion (DDR)24 15 Figure 1. The Relationship between Security and Development. These activities are interconnected in ways that are not yet...histories, heritage, identities, and ethnicities. Therefore, its sustainable success is codependent on other aspects of a stability operation25 or other...type of intervention. For purposes of understanding the volatility of the security sector, it The Relationship between Security and Development Local

  16. Building Partner Capacity: Key Practices to Effectively Manage Department of Defense Efforts to Promote Security Cooperation

    Science.gov (United States)

    2013-02-14

    and poverty that impact the security and stability of the region. In recent years, in an effort to better support security and stability in the... Ecuador , Peru, and Venezuela. However, during our 2012 review, we found that the DOD Inspector General cited a number of reasons for not

  17. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  18. Capacity Building on Food-Crop Farming to Improve Food Production and Food Security in Central Java, Indonesia

    Directory of Open Access Journals (Sweden)

    Waridin

    2013-03-01

    Full Text Available This paper describes the capacity of food-crop production for improving regional food security in Central Java, Indonesia. It is also identify crops which have high and prospective economic-values. The results of the study might help in formulating a proposed model to improve food crops production in supporting food security. The case study was conducted in districts which play the important roles on agriculture (rice production in Central Java, Indonesia. These are Klaten and Magelang districts. Data were collected from farmers and officers from agriculture-related institutions. The results show that Central Java Province has the capacity on food crop (rice production for securing food availability, distribution, and accessibility for people in the region. It has a moderate on food security for the products, and surplus of production have distributed to other regions within the country. However, other food crops still facing shortage of supply since lack of productions. It requires a commitment from government and stakeholders for improving capacity building on agricultural development.

  19. Building a Rice Decision Support System to Support Global Food Security and Commodity Markets Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Rice is an important crop globally that influences food security and the Earth system. Rice is the predominant food staple in many regions with approximately 700...

  20. ASEAN 2030: Challenges of building a mature political and security community

    OpenAIRE

    Acharya, Amitav

    2013-01-01

    This paper examines the political and security challenges and prospects of the Association of Southeast Asian Nations (ASEAN) in the coming two decades. To simplify what is a hugely complex and wide-ranging set of issues, I divide the security challenges facing ASEAN into six broad categories. These include (1) the shifting balance of power in the Asia Pacific region, triggered mainly, if not exclusively, by the dramatic rise of the People's Republic of China (PRC); (2) the persistence of int...

  1. 烟草企业WLAN安全建设%Tobacco Enterprise WLAN Security Building

    Institute of Scientific and Technical Information of China (English)

    赖日君

    2012-01-01

    随着记本电脑、PDA、IPAD等移动终端的普及和移动办公需求的增加,无线网络在烟草行业卷烟物流、烟叶生产收购、移动办公等领域得到广泛应用与发展,无线网络的安全也势必成为烟草行业网络安全的一个重要部分,本文介绍无线局域网的概念和技术标准,分析目前烟草企业WLAN面临的安全威胁,介绍了目前WLAN可能使用的加密、认证、VPN、无线入侵检测、一体化安全防护等安全防范技术,重点阐述有线和无线安全一体化是烟草企业WLAN安全未来发展的必然趋势。%With the increased popularity of notebook computers,PDAs, iPad and other mobile terminals and mobile office needs,the wireless network in the tobacco industry,cigarette logistics,tobacco production and acquisition,mobile office,and other fields has been widely used and development of wireless network security is bound to become an important part of the tobacco industry of network security This article describes the conceptual and technical standard of the wireless LAN,analyze security threats facing tobacco companies WLAN WLAN may use encryption, authentication,VPN,wireless intrusion detection,integrated security and security technology,and focuses on wired and wireless security integration is the development trend of the tobacco enterprise WLAN security.

  2. Use of a participatory planning process as a way to build community food security.

    Science.gov (United States)

    McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer

    2002-07-01

    The purpose of this study was to determine the multiple meanings of community food security among stakeholders with diverse interests and to assess the degree to which these stakeholders could find common ground around community food security during a participatory planning process called a search conference. The conceptual framework of citizen politics guided all aspects of the research design. In-depth, qualitative interviews were conducted with 44 participants purposefully recruited to attend a 2 1/2 h-day search conference. Open-ended questionnaires were distributed to all participants during the search conference, and a document review was performed. Prior to the search conference, 4 community food secruity groups emerged: anti-hunger advocates (n=12), agricultural visionaries (n=12), food traditionalists (n=10), and agricultural entrepreneurs (n=8). Participants were able to find common ground around 6 community food security action agendas: distribution of surplus food, education, family and community values, food processing and marketing, legislative initiatives and action, and new agriculture. Other salient community food security issues emerged, but they were not included on any of the action agendas. Formal training in facilitation, negotiation, conflict resolution, and how to influence the public policy-making process will enable dietetics professionals to effectively collaborate with community-based groups that have a stake in food security issues.

  3. To Build the Sino-Japanese Security Cooperation Featuring Strategically Mutual Benefit

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    In the past forty years, even with frictions and conflicts, friendship and cooperation remain the main theme in the development of Sino-Japanese relations, which has been especially reflected in the economic domain with significant increase of economic interdependence between the two countries. Nevertheless, no one can deny the fact that the Sino-Japanese security cooperation has far lagged behind their economic cooperation. Therefore, enhancing the cooperation in security area has become a major issue that the Chinese and the Japanese governments have to face up to.

  4. Nation-building e segurança internacional: Um debate em construção Nation-building and international security: A debate under construction

    Directory of Open Access Journals (Sweden)

    Aureo de Toledo Gomes

    2009-08-01

    Full Text Available Este artigo almeja analisar as operações de nation-building, que, desde os atentados terroristas de 11 de setembro de 2001, são consideradas uma das maneiras para se lidar com as novas ameaças de segurança internacional, principalmente os ditos Estados Falidos. Assim sendo, revisaremos a bibliografia sobre o tema, procurando identificar as origens destas operações, assim como as definições utilizadas pelos principais autores e os problemas que elas possam apresentar.This article aims to analyze nation-building operations, which have been considered, since September 11, 2001 terrorist attacks, one of the ways to cope with the new threats to international security, mainly the so-called Failed States. Therefore, we will review the bibliography published, trying to identity not only the origins of such operations but also the definitions used by the main authors and the problems that they might present.

  5. Formal Verification of a Secure Model for Building E-Learning Systems

    Directory of Open Access Journals (Sweden)

    Farhan M Al Obisat

    2016-06-01

    Full Text Available Internet is considered as common medium for E-learning to connect several parties with each other (instructors and students as they are supposed to be far away from each other. Both wired and wireless networks are used in this learning environment to facilitate mobile access to educational systems. This learning environment requires a secure connection and data exchange. An E-learning model was implemented and evaluated by conducting student’s experiments. Before the approach is deployed in the real world a formal verification for the model is completed which shows that unreachability case does not exist. The model in this paper which is concentrated on the security of e-content has successfully validated the model using SPIN Model Checker where no errors were found.

  6. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room

  7. Agile enterprise development framework utilizing services principles for building pervasive security

    Science.gov (United States)

    Farroha, Deborah; Farroha, Bassam

    2011-06-01

    We are in an environment of continuously changing mission requirements and therefore our Information Systems must adapt to accomplish new tasks, quicker, in a more proficient manner. Agility is the only way we will be able to keep up with this change. But there are subtleties that must be considered as we adopt various agile methods: secure, protect, control and authenticate are all elements needed to posture our Information Technology systems to counteract the real and perceived threats in today's environment. Many systems have been tasked to ingest process and analyze different data sets than they were originally designed for and they have to interact with multiple new systems that were unaccounted for at design time. Leveraging the tenets of security, we have devised a new framework that takes agility into a new realm where the product will built to work in a service-based environment but is developed using agile processes. Even though these two criteria promise to hone the development effort, they actually contradict each other in philosophy where Services require stable interfaces, while Agile focuses on being flexible and tolerate changes up to much later stages of development. This framework is focused on enabling a successful product development that capitalizes on both philosophies.

  8. Linking adaptation science to action to build food secure Pacific Island communities

    Directory of Open Access Journals (Sweden)

    C. Cvitanovic

    2016-01-01

    Full Text Available Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform their decision-making processes. However, effective engagement of Pacific Island communities in climate adaption remains variable and is an ongoing and significant challenge. Here, we use a qualitative research approach to identify the impediments to engaging Pacific Island communities in the adaptations needed to safeguard food security. The main barriers include cultural differences between western science and cultural knowledge, a lack of trust among local communities and external scientists, inappropriate governance structures, and a lack of political and technical support. We identify the importance of adaptation science, local social networks, key actors (i.e., influential and trusted individuals, and relevant forms of knowledge exchange as being critical to overcoming these barriers. We also identify the importance of co-ordination with existing on-ground activities to effectively leverage, as opposed to duplicating, capacity.

  9. The politics of African energy development: Ethiopia's hydro-agricultural state-building strategy and clashing paradigms of water security.

    Science.gov (United States)

    Verhoeven, Harry

    2013-11-13

    As key economic, ecological and demographic trends converge to reshape Africa and its relationship with the outside world, a new politics is emerging in the twenty-first century around the water-food-energy nexus, which is central to the continent's relevance in the global economy. On the one hand, Malthusian anxieties are proliferating; pessimists link population growth and growing water scarcity to state failure and 'water wars'. On the other hand, entrepreneurs, sovereign wealth funds and speculators consider Africa's potential in water resources, energy production and food output as one of the last great untapped opportunities for the global economy: Africa is on the brink of an agro-industrial transformation. This article examines how African actors are not merely responding to economic and environmental changes but also thinking politically about water, food and energy security. Many of them are seizing the new opportunities to redefine their national politics, their relationship with local communities and their ties with external players, regionally and globally. Ethiopia's project of hydro-agricultural state-building helps to identify the most important fault lines of this new politics at the national, local and international level. The politics of water security and energy development simultaneously puts African states and their populations on the defensive, as they grapple with huge challenges, but also provides them with unique opportunities to take advantage of a more favourable global configuration of forces.

  10. Goodness-of-fit based secure cooperative spectrum sensing for cognitive radio network.

    Science.gov (United States)

    Vu-Van, Hiep; Koo, Insoo

    2014-01-01

    Cognitive radio (CR) is a promising technology for improving usage of frequency band. Cognitive radio users (CUs) are allowed to use the bands without interference in operation of licensed users. Reliable sensing information about status of licensed band is a prerequirement for CR network. Cooperative spectrum sensing (CSS) is able to offer an improved sensing reliability compared to individual sensing. However, the sensing performance of CSS can be destroyed due to the appearance of some malicious users. In this paper, we propose a goodness-of-fit (GOF) based cooperative spectrum sensing scheme to detect the dissimilarity between sensing information of normal CUs and that of malicious users, and reject their harmful effect to CSS. The empirical CDF will be used in GOF test to determine the measured distance between distributions of observation sample set according to each hypothesis of licensed user signal. Further, the DS theory is used to combine results of multi-GOF tests. The simulation results demonstrate that the proposed scheme can protect the sensing process against the attack from malicious users.

  11. Building a Data Warehouse for National Social Security Fund of the Republic of Tunisia

    CERN Document Server

    Gouider, Mohamed Salah; 10.5121/ijdms.2010.2207

    2010-01-01

    The amounts of data available to decision makers are increasingly important, given the network availability, low cost storage and diversity of applications. To maximize the potential of these data within the National Social Security Fund (NSSF) in Tunisia, we have built a data warehouse as a multidimensional database, cleaned, homogenized, historicized and consolidated. We used Oracle Warehouse Builder to extract, transform and load the source data into the Data Warehouse, by applying the KDD process. We have implemented the Data Warehouse as an Oracle OLAP. The knowledge extraction has been performed using the Oracle Discoverer tool. This allowed users to take maximum advantage of knowledge as a regular report or as ad hoc queries. We started by implementing the main topic for this public institution, accounting for the movements of insured persons. The great success that has followed the completion of this work has encouraged the NSSF to complete the achievement of other topics of interest within the NSSF. ...

  12. Using Cognitive Coaching to Build School Leadership Capacity: A Case Study in Alberta

    Science.gov (United States)

    Rogers, W. Todd; Hauserman, Cal P.; Skytt, Jacqueline

    2016-01-01

    The impact of Cognitive Coaching? included as part of the Leader2Leader (L2L) Leadership Pilot Program for beginning principals in Alberta, Canada, was evaluated in the present study. Fifteen qualified principals (coaches) and 23 new principals completed the L2L Pilot Program that took place over 18 months. Questionnaires for coaches and new…

  13. Navigation experience and mental representations of the environment: do pilots build better cognitive maps?

    Science.gov (United States)

    Sutton, Jennifer E; Buset, Melanie; Keller, Mikayla

    2014-01-01

    A number of careers involve tasks that place demands on spatial cognition, but it is still unclear how and whether skills acquired in such applied experiences transfer to other spatial tasks. The current study investigated the association between pilot training and the ability to form a mental survey representation, or cognitive map, of a novel, ground-based, virtual environment. Undergraduate students who were engaged in general aviation pilot training and controls matched to the pilots on gender and video game usage freely explored a virtual town. Subsequently, participants performed a direction estimation task that tested the accuracy of their cognitive map representation of the town. In addition, participants completed the Object Perspective Test and rated their spatial abilities. Pilots were significantly more accurate than controls at estimating directions but did not differ from controls on the Object Perspective Test. Locations in the town were visited at a similar rate by the two groups, indicating that controls' relatively lower accuracy was not due to failure to fully explore the town. Pilots' superior performance is likely due to better online cognitive processing during exploration, suggesting the spatial updating they engage in during flight transfers to a non-aviation context.

  14. Therapist Strategies for Building Involvement in Cognitive-Behavioral Therapy for Adolescent Depression

    Science.gov (United States)

    Jungbluth, Nathaniel J.; Shirk, Stephen R.

    2009-01-01

    This study examined predictive relations between 9 therapist behaviors and client involvement in manual-guided, cognitive-behavioral therapy for adolescent depression. Analyses included 42 adolescents who met criteria for a depressive disorder (major depressive disorder, dysthymic disorder, or adjustment disorder with depressed mood) and who were…

  15. Physical layer security of underlay cognitive radio using maximal ratio combining

    Institute of Scientific and Technical Information of China (English)

    Hui ZHAO; Dan-yang WANG; Chao-qing TANG; Ya-ping LIU; Gao-feng PAN; Ting-ting LI; Yun-fei CHEN

    2016-01-01

    We investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks over Rayleigh fading channels. In a single-input multiple-output wiretap system, we consider a secondary user (SU-TX) that transmits confidential messages to another secondary user (SU-RX) equipped with M (M ≥ 1) antennas where the MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eaves-dropper equipped with N (N ≥ 1) antennas adopts the MRC scheme to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to guarantee the service quality of the primary user without spectrum sensing. We derive the closed-form expressions for an exact and asymptotic secrecy outage probability.

  16. Re-imagining motor imagery: building bridges between cognitive neuroscience and sport psychology.

    Science.gov (United States)

    Moran, Aidan; Guillot, Aymeric; Macintyre, Tadhg; Collet, Christian

    2012-05-01

    One of the most remarkable capacities of the mind is its ability to simulate sensations, actions, and other types of experience. A mental simulation process that has attracted recent attention from cognitive neuroscientists and sport psychologists is motor imagery or the mental rehearsal of actions without engaging in the actual physical movements involved. Research on motor imagery is important in psychology because it provides an empirical window on consciousness and movement planning, rectifies a relative neglect of non-visual types of mental imagery, and has practical implications for skill learning and skilled performance in special populations (e.g., athletes, surgeons). Unfortunately, contemporary research on motor imagery is hampered by a variety of semantic, conceptual, and methodological issues that prevent cross-fertilization of ideas between cognitive neuroscience and sport psychology. In this paper, we review these issues, suggest how they can be resolved, and sketch some potentially fruitful new directions for inter-disciplinary research in motor imagery.

  17. Going with the Grain of Cognition: Applying Insights from Psychology to Build Support for Childhood Vaccination

    Science.gov (United States)

    Rossen, Isabel; Hurlstone, Mark J.; Lawrence, Carmen

    2016-01-01

    Childhood vaccination is widely considered to be one of the most successful public health interventions. Yet, the effective delivery of vaccination depends upon public willingness to vaccinate. Recently, many countries have faced problems with vaccine hesitancy, where a growing number of parents perceive vaccination to be unsafe or unnecessary, leading some to delay or refuse vaccines for their children. Effective intervention strategies for countering this problem are currently sorely lacking, however. Here, we propose that this may be because existing strategies are grounded more in intuition than insights from psychology. Consequently, such strategies are sometimes at variance with basic psychological principles and assumptions. By going against the grain of cognition, such strategies potentially run the risk of undermining persuasive efforts to reduce vaccine hesitancy. We demonstrate this by drawing on key insights from cognitive and social psychology to show how various known features of human psychology can lead many intuitively appealing intervention strategies to backfire, yielding unintended and undesirable repercussions. We conclude with a summary of potential avenues of investigation that may be more effective in addressing vaccine hesitancy. Our key message is that intervention strategies must be crafted that go with the grain of cognition by incorporating key insights from the psychological sciences.

  18. Going with the Grain of Cognition: Applying Insights from Psychology to Build Support for Childhood Vaccination.

    Science.gov (United States)

    Rossen, Isabel; Hurlstone, Mark J; Lawrence, Carmen

    2016-01-01

    Childhood vaccination is widely considered to be one of the most successful public health interventions. Yet, the effective delivery of vaccination depends upon public willingness to vaccinate. Recently, many countries have faced problems with vaccine hesitancy, where a growing number of parents perceive vaccination to be unsafe or unnecessary, leading some to delay or refuse vaccines for their children. Effective intervention strategies for countering this problem are currently sorely lacking, however. Here, we propose that this may be because existing strategies are grounded more in intuition than insights from psychology. Consequently, such strategies are sometimes at variance with basic psychological principles and assumptions. By going against the grain of cognition, such strategies potentially run the risk of undermining persuasive efforts to reduce vaccine hesitancy. We demonstrate this by drawing on key insights from cognitive and social psychology to show how various known features of human psychology can lead many intuitively appealing intervention strategies to backfire, yielding unintended and undesirable repercussions. We conclude with a summary of potential avenues of investigation that may be more effective in addressing vaccine hesitancy. Our key message is that intervention strategies must be crafted that go with the grain of cognition by incorporating key insights from the psychological sciences.

  19. Going with the Grain of Cognition: Applying insights from psychology to build support for childhood vaccination.

    Directory of Open Access Journals (Sweden)

    Isabel Rossen

    2016-09-01

    Full Text Available Childhood vaccination is widely considered to be one of the most successful public health interventions. Yet, the effective delivery of vaccination depends upon public willingness to vaccinate. Recently, many countries have faced problems with vaccine hesitancy, where a growing number of parents perceive vaccination to be unsafe or unnecessary, leading some to delay or refuse vaccines for their children. Effective intervention strategies for countering this problem are currently sorely lacking, however. Here, we propose that this may be because existing strategies are grounded more in intuition than insights from psychology. Consequently, such strategies are sometimes at variance with basic psychological principles and assumptions. By going against the grain of cognition, such strategies potentially run the risk of undermining persuasive efforts to reduce vaccine hesitancy. We demonstrate this by drawing on key insights from cognitive and social psychology to show how various known features of human psychology can lead many intuitively appealing intervention strategies to backfire, yielding unintended and undesirable repercussions. We conclude with a summary of potential avenues of investigation that may be more effective in addressing vaccine hesitancy. Our key message is that intervention strategies must be crafted that go with the grain of cognition by incorporating key insights from the psychological sciences.

  20. Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.

    Science.gov (United States)

    Usman, Muhammad; Koo, Insoo

    2014-01-01

    Both reliable detection of the primary signal in a noisy and fading environment and nullifying the effect of unauthorized users are important tasks in cognitive radio networks. To address these issues, we consider a cooperative spectrum sensing approach where each user is assigned nonuniform reliability based on the sensing performance. Users with poor channel or faulty sensor are assigned low reliability. The nonuniform reliabilities serve as identification tags and are used to isolate users with malicious behavior. We consider a link layer attack similar to the Byzantine attack, which falsifies the spectrum sensing data. Three different strategies are presented in this paper to ignore unreliable and malicious users in the network. Considering only reliable users for global decision improves sensing time and decreases collisions in the control channel. The fusion center uses the degree of reliability as a weighting factor to determine the global decision in scheme I. Schemes II and III consider the unreliability of users, which makes the computations even simpler. The proposed schemes reduce the number of sensing reports and increase the inference accuracy. The advantages of our proposed schemes over conventional cooperative spectrum sensing and the Chair-Varshney optimum rule are demonstrated through simulations.

  1. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  2. Social cognition: empirical contribution. The developmental building blocks of psychopathic traits: revisiting the role of theory of mind.

    Science.gov (United States)

    Sharp, Carla; Vanwoerden, Salome

    2014-02-01

    In the context of personality disorder development, theories of typical and atypical development both emphasize social cognition as an important building block for personality development. Prior claims of intact theory of mind (ToM) abilities in psychopathic individuals have relied upon a narrow conception of ToM as equivalent to "cognitive empathy." In this article, the authors make use of a broader conception of ToM comprising top-down and bottom-up processing, as well as the fractionation of ToM in terms of reduced or excessive ToM function, to examine relationships between ToM and psychopathic traits. A total of 342 adolescents (ages 12-17; Mage 15.39; SD = 1.45; 61.5% females) completed the Movie Assessment for Social Cognition (Dziobek, Fleck, Kalbe, et al., 2006) and the Child Eyes Test (Baron-Cohen, Wheelwright, Hill, Raste, & Plumb, 2001) in addition to three measures of psychopathic traits. Results demonstrated unique relations between the affective components of psychopathy (callous-unemotional traits [CU traits]) and impairment in both top-down and bottom-up ToM. In addition, excessive ToM related to affective components of psychopathy, while reduced or no ToM related to behavioral components of psychopathy. In mediational analyses, bottom-up ToM was shown to be necessary for top-town ToM in its relation with CU traits. Taken together, these results from the study lend support to revisiting the link between ToM and psychopathy.

  3. Understanding of the Security Cooperation under the CICA Framework from the Evolving Security Concept

    Institute of Scientific and Technical Information of China (English)

    Qiang Xiaoyun

    2016-01-01

    The complex characteristics and the grim situation of the Asian security in the new period puts construction of a new security structure in Asia on the agenda,and the existing CICA composed of most Asian countries can provide useful help for the Asian security structure construction.The CICA plays a unique role in promoting peace and cooperation in Asia,and in promoting mutual understanding and trust among its member states.Facing the common and comprehensive security challenges in the Asian region,the CICA security concept is also constantly developing and improving.A new Asian security concept advocated by China has become the core content of the CICA security concept,which carries far-reaching significance for pushing Asian countries to boost mutual trust and cooperation,and jointly build a secure and stable environment in the region.Respecting and caring of the security concerns of all Member States,and promoting security and mutual trust through dialogue and cooperation are the CICA main consideration for carrying out security cooperation.The Security cooperation under the future CICA framework should,on the basis of the new security concept,overcome a dilemma for lack of a community of cognition identity,a community of interests,a community of responsibility and a community of shared destiny,actively implement the measures for mutual trust,strengthen mechanisms construction,and make contributions for establishment of a new security structure in Asia.

  4. Build Security Mechanism for Serious Illness%构建重特大疾病保障机制

    Institute of Scientific and Technical Information of China (English)

    褚福灵

    2015-01-01

    The occurrence of serious illness is a misfortune of life, which will cause catastrophic medical expense of a family and impact social harmony. We should move forward the prevention pass of serious illness risks, and prevent the risks of serious illness from its occurrence. To reduce the risk of serious illness effectively, we should to do well in four aspects, i.e., disease preventing, medical costs reducing, income increasing and benets level improving, and build a comprehensive security mechanism for serious illness.%重特大疾病的发生是人生的不幸,将给家庭带来灾难性医疗支出,影响社会的和谐安宁.应当将防控重特大疾病风险的关口前移,从源头上化解重特大疾病风险,在"防病、减费、增收、提待"等四方面综合发力,构建重特大疾病的综合保障机制,确保重特大疾病风险得到有效化解.

  5. Building a clinically relevant cognitive task: case study of the AX paradigm.

    Science.gov (United States)

    MacDonald, Angus W

    2008-07-01

    Tasks developed for basic cognitive neuroscience are often ill suited for experimental psychopathology. The development of the expectancy variant of AX continuous performance task to test theories about context processing in schizophrenia is used as an illustration of how this has been done in one research program. Four design principles are recommended: tasks should (1) have a foundation in existing literature and therefore stay as close as possible to an existing task; (2) be simple, which is frequently accomplished by paring down a task to evaluate the function of interest; (3) probe a mechanism of interest, with conditions that selectively manipulate this mechanism; and (4) have the potential to distinguish a specific deficit on the mechanism of interest from a generalized impairment. Data from a number of studies support several aspects of context-processing theory; however unpredicted results have also been reported. The development of the expectancy AX paradigm continues, and future developments that may enhance its usefulness are also described.

  6. Combining cognitive engineering and information fusion architectures to build effective joint systems

    Science.gov (United States)

    Sliva, Amy L.; Gorman, Joe; Voshell, Martin; Tittle, James; Bowman, Christopher

    2016-05-01

    The Dual Node Decision Wheels (DNDW) architecture concept was previously described as a novel approach toward integrating analytic and decision-making processes in joint human/automation systems in highly complex sociotechnical settings. In this paper, we extend the DNDW construct with a description of components in this framework, combining structures of the Dual Node Network (DNN) for Information Fusion and Resource Management with extensions on Rasmussen's Decision Ladder (DL) to provide guidance on constructing information systems that better serve decision-making support requirements. The DNN takes a component-centered approach to system design, decomposing each asset in terms of data inputs and outputs according to their roles and interactions in a fusion network. However, to ensure relevancy to and organizational fitment within command and control (C2) processes, principles from cognitive systems engineering emphasize that system design must take a human-centered systems view, integrating information needs and decision making requirements to drive the architecture design and capabilities of network assets. In the current work, we present an approach for structuring and assessing DNDW systems that uses a unique hybrid DNN top-down system design with a human-centered process design, combining DNN node decomposition with artifacts from cognitive analysis (i.e., system abstraction decomposition models, decision ladders) to provide work domain and task-level insights at different levels in an example intelligence, surveillance, and reconnaissance (ISR) system setting. This DNDW structure will ensure not only that the information fusion technologies and processes are structured effectively, but that the resulting information products will align with the requirements of human decision makers and be adaptable to different work settings .

  7. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  8. Integrating - VPN and IDS - An approach to Networks Security

    Directory of Open Access Journals (Sweden)

    Prabha Rani

    2007-10-01

    Full Text Available The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points in mind we have chosen to integrate VPN and IDS to provide an efficient solution for security engineers.

  9. Modelling Public Security Operations: Analysis of the Effect of Key Social, Cognitive, and Informational Factors with Security System Relationship Configurations for Goal Achievement

    Science.gov (United States)

    2012-12-01

    abstracts in both official languages unless the text is bilingual .) More so than engineered systems, human factors, and specifically having humans-in...response to a harbour fire; the second , [3], presented social, cognitive, and informational models that could be used to extend the initial simulator...Override Sharing Events The second chart type shows the total number of sharing events that take place in the system. These come in two flavours: the

  10. Secure Cooperative Spectrum Sensing via a Novel User-Classification Scheme in Cognitive Radios for Future Communication Technologies

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2015-05-01

    Full Text Available Future communication networks would be required to deliver data on a far greater scale than is known to us today, thus mandating the maximal utilization of the available radio spectrum using cognitive radios. In this paper, we have proposed a novel cooperative spectrum sensing approach for cognitive radios. In cooperative spectrum sensing, the fusion center relies on reports of the cognitive users to make a global decision. The global decision is obtained by assigning weights to the reports received from cognitive users. Computation of such weights requires prior information of the probability of detection and the probability of false alarms, which are not readily available in real scenarios. Further, the cognitive users are divided into reliable and unreliable categories based on their weighted energy by using some empirical threshold. In this paper, we propose a method to classify the cognitive users into reliable, neutral and unreliable categories without using any pre-defined or empirically-obtained threshold. Moreover, the computation of weights does not require the detection, or false alarm probabilities, or an estimate of these probabilities. Reliable cognitive users are assigned the highest weights; neutral cognitive users are assigned medium weights (less than the reliable and higher than the unreliable cognitive users’ weights; and unreliable users are assigned the least weights. We show the performance improvement of our proposed method through simulations by comparing it with the conventional cooperative spectrum sensing scheme through different metrics, like receiver operating characteristic (ROC curve and mean square error. For clarity, we also show the effect of malicious users on detection probability and false alarm probability individually through simulations.

  11. 高校图书馆网络安全建设%Building of University Library's Network Security

    Institute of Scientific and Technical Information of China (English)

    崔爱军

    2009-01-01

    This paper analyzes the importance of the library' s network security, Giving Suggestions to the design goals and design principles of library' s network security, the paper detail introduces from five respects such as safety of the physical layer security, network layer security, construction of computer system security, UPS power system protection, security management system and management system, put forward a reasonable safety strategy.%本文分析了图书馆网络安全的重要性,提出了图书馆网络安全设计目标和设计原则,并从物理层安全性,网络层的安全性、计算机系统安全建设、UPS电源保障系统建设、安全管理体制与管理制度建设五个方面进行详细介绍,并提出了合理的安全策略.

  12. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  13. Sustainable Development--Education, Business and Management--Architecture and Building Construction--Agriculture and Food Security

    Science.gov (United States)

    Ghenai, Chaouki, Ed.

    2012-01-01

    Securing the future of the human race will require an improved understanding of the environment as well as of technological solutions, mindsets and behaviors in line with modes of development that the ecosphere of our planet can support. Some experts see the only solution in a global deflation of the currently unsustainable exploitation of…

  14. U.S.-India Security Burden-Sharing? The Potential for Coordinated Capacity-Building in the Indian Ocean

    Science.gov (United States)

    2013-04-01

    investment, food security, fisheries development, tourism , transportation, information technology, new and renewable energy, communications and... Tourism Studies. Three other developments project which the Indian external affairs minister referred to in his July visit included “establishment...three priorities for his regional portfolio: the first was to support international efforts in Afghanistan, and the third was to develop more durable

  15. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    Science.gov (United States)

    2015-05-21

    partner with or leverage the commitment of assets by conventional forces to achieve the desired state of BPC?” Because the focus of this monograph...remarkable first, for its cognitive recognition that this phase 0 campaign was about warfare, and second, for its application of UW against a non...Afghanistan “wars,” but demonstrated significant resolve in a phase 0 conflict. One of the best outcomes of this effort is the intangible result

  16. [Nutritional challenges in the Brazilian Unified National Health System for building the interface between health and food and nutritional security].

    Science.gov (United States)

    Rigon, Silvia do Amaral; Schmidt, Suely Teresinha; Bógus, Cláudia Maria

    2016-03-01

    This article discusses the establishment of inter-sector action between health and food and nutritional security in Brazil from 2003 to 2010, when this issue was launched as a priority on the government's agenda. A qualitative study was developed according to constructivist epistemology, using key-informant interviews in the field's nationwide social oversight body. Advances and challenges in this process are addressed as analytical categories. The National Food and Nutrition Policy (PNAN) was mentioned as the link between the two fields, decentralized through a network with activity in the states and municipalities. However, the study found political, institutional, and operational obstacles to the effective implementation of the PNAN in the Brazilian Unified National Health System and consequently to a contribution to the advancement of Health and Food and Nutritional Security in the country. The predominance of the biomedical, curative, and high-complexity model was cited as the principal impediment, while health promotion policies like the PNAN were assigned secondary priority.

  17. Building Global Partnerships: Cooperative Maritime Security Operations as the Most Effective Fire of 21st Century Warfare

    Science.gov (United States)

    2008-10-31

    described in a speech by the Malaysian Minister of Defense Dato Abd Razak, “PACOM has mobile training teams that could assist us in acquiring a number of...Training, and Procedures (TTPs) and Standard Operating Procedures (SOPs). 20 Dato ’ Sri Mohd Najib Tun Haji Abd Razak. “Enhancing Maritime...Seapower, Washington DC, 2007. Dato ’ Sri Mohd Najib Tun Haji Abd Razak. “Enhancing Maritime Security Cooperation,” Military Technology 29, Iss. 12

  18. Environmental Assessment for Construction of Security Forces Facility/Demolition of Existing Building 528 MacDill AFB, Florida

    Science.gov (United States)

    2005-08-01

    Gennarro and Tish Maddy MacDill Air Force Base Environmental Restoration Program 7621 Hillsborough Loop Dr. MacDill AFB, FL 33621-5207 Bryan...MacDill Air Force Base Maddy, Tish Lead-based Paint and Asbestos Records, Building 528. Verbal correspondence, February 1, 2005. Naval

  19. 认知计算在网络安全态势感知中的应用研究%Research on the application of cognitive computing in network security situation awareness

    Institute of Scientific and Technical Information of China (English)

    肖晓飞; 贾颖

    2014-01-01

    This paper summarizes the cognitive computing research literature of foreign scholars and domestic scholars, analyses the research hot spot in the field of cognitive computing, summarizes the situation of its application in network security situation awareness, and constructs the network security situation based on multi-ring MACDE cognitive model.%文章总结了认知计算领域国外学者和国内学者的研究文献,对认知计算的热点研究领域做了分析,对其在网络安全态势感知中的应用情况进行了回顾和总结,并构建了基于多MACDE环的网络安全态势认知计算模型。

  20. 构筑坚固的政府网站安全防护体系%Building a Strong Security Protection System for Government Websites

    Institute of Scientific and Technical Information of China (English)

    赵莹

    2015-01-01

    剖析了我国政府网站的安全现状和存在问题,从技术角度详细论述了加强政府网站安全防护的8项措施,主要包括:统一的用户身份验证、数据访问的权限控制、信息追溯管理、数据库并发控制、“三层架构”建设模式、网站目录权限最小化、部署网站防护体系、定期备份和日志检查。最后重点指出只有多项安全策略综合应用、共同构筑坚固的政府网站安全防护体系,才能有效抵御日益猖獗且形式多样的黑客攻击,维护政府部门的良好形象。%This paper analyzes the security situation and existing problems of government websites in China,and thor-oughly discusses eight measures of strengthening the security protection of the websites,including unified authentication of users,access control of data,message retrospect management,database concurrency control,“three-layer structure”construction mode,minimization of website directory permissions,deployment of website protection system,regular backups and log check. In the end,it points out that only through a comprehensive application of multiple security strategies and jointly building a strong government website protection system,can government websites effectively resist the increas-ingly rampant hacker attacks and maintain a good image of government departments.

  1. The Effect of Managerial Cognition on Firm Capability Building%管理认知对企业能力构建的影响

    Institute of Scientific and Technical Information of China (English)

    王涛; 张雁; 李姝

    2012-01-01

    能力构建的本质在于通过跨层次知识转移形成新的组织知识来对能力内在的知识集合进行替代、补充和增强,以构建出具有新功能企业能力的组织活动。管理认知是推动企业能力构建的关键因素,然而,企业是由不同层次主体构成的复杂组织体系,不同层次的管理认知也会存在明显的层次间分工和合作。通过引入能级的概念可以区别不同组织层次间知识活动的差异,不同层次的管理者在能力构建活动中会代表相应的高层次主体来与低层次主体进行互动,并以差异化管理认知对低层次知识进行再加工,并赋予相应的活化能使其发生活化反应,最终以能级跃迁的形式来完成知识在个体、团队和组织三个层次间的跨层次转移,从而完成能力构建。%The essence of firm capability building lies in that through cross-level knowledge transfer, organizational activities may produce new organizational knowledge to substitute, supplement and strengthen the inner knowledge set so as to build up firm capabilities with new functions. Managerial cognition is one of the critical factors that may promote firm capability building. However, firm is a complicated multi-level organizational system which consists of subjects of varied levels, and there always exists obvious division and cooperation among managerial cognitions of different levels. In the highly competitive market environment, capability building has been an effective approach to promote firm competitiveness which may form strategic assets through continuous evolution of resources. Therefore, it is of high importance to study the effect of managerial cognition on firm capability building, which may carry both theoretical and practical implications. On the one hand, focusing on the micro level of internal firm, the paper firstly introduces the concept of organizational energy level to show the differences of varied

  2. State Capitol Buildings

    Data.gov (United States)

    Department of Homeland Security — This shapefile will display the locations of the fifty state capitol buildings as well as the territorial capitol buildings for the US Virgin Islands, Guam, Northern...

  3. Cognitive Robotics, Embodied Cognition and Human-Robot Interaction

    Science.gov (United States)

    2010-11-03

    Cognitive Robotics , Embodied Cognition and Human-Robot Interaction Greg Trafton, Ph.D Naval Research Laboratory Wednesday, November 3, 2010 Report...2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Cognitive Robotics , Embodied Cognition and Human-Robot Interaction 5a. CONTRACT...that cognition is for action (embodied cognition) • We are building embodied models for cognitive robotics and human-robot interaction • Online

  4. Inter-organisational knowledge transfer: building and sustaining the sources of innovation in nuclear safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Staude, Fabio, E-mail: fstaude@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN-RJ), Rio de Janeiro, RJ (Brazil); Ramirez, Matias, E-mail: matias.ramirez@sussex.ac.uk [University of Sussex (SPRU/US), Brighton (United Kingdom). Science and Technology Policy Research

    2013-07-01

    The current complexity of innovation processes has led to an understanding that the models of innovation have changed from linear model to a model characterised by multiple interactions and complex networks. Within this more multifaceted environment, has emerged a new set of actors, generally termed as intermediaries, performing a variety of tasks in the innovation process. The innovation literature has recognised various important supporting activities performed by intermediaries, by linking and facilitating the movement of information and knowledge between actors within an innovation system, in order to fill information gaps. Complementary, we make the assumption that the intermediary can assume a more central role in the innovation process, performing activities beyond to filling information gaps, since they intervene to create, prioritise, and articulate meaning to practices. Under this argument, this paper explores how intermediaries work in making innovation happen in the Brazilian nuclear safety and security area, demonstrating the influence of intermediary organisations in improving nuclear regulatory activities. We make sense of these processes by analyzing intermediary roles in the recent regulatory activities improvements, specifically those related to the practices involving radiation sources in medicine. Thus, through an empirical case study, this paper examines the issue of intermediation in a wide sense, including strategic activities preformed by intermediaries, associated with accessing, diffusing, coordinating and enabling knowledge activities. (author)

  5. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union

    Directory of Open Access Journals (Sweden)

    James C Bartholomew

    2015-11-01

    Full Text Available Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world scientific capacity has not kept pace with the need, and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to solve the issues. The Republics Georgia, formerly part of the Soviet Union provides a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world’s great epidemics began. The U.S. Cooperative Threat Reduction (CTR Program together with the Georgian government, have worked diligently to improve the capabilities in this region to guard against the potential future risk from especially dangerous pathogens. This effort culminated in the construction of a modern containment laboratory, the Richard G. Lugar Center for Public Health Research in Tbilisi to house both especially dangerous pathogens as well as the research to be conducted on these agents. The need now is to utilize and sustain the investment made by CTR by establishing strong public and animal health science programs tailored to the needs of the region and the goals for which this investment was made. Here we provide the analysis and recommendations of an international panel of expert scientists to provide advice to the stakeholders on the scientific path for the future. The emphasis is on an implementation strategy for decision makers and

  6. 高校物联网建设与安全策略%Building and security strategy of university IoT

    Institute of Scientific and Technical Information of China (English)

    魏滢; 沙锋

    2014-01-01

    讨论物联网的组网过程和核心技术的基础上,着重分析了RFID、传感器、智能终端、校园云等物联网核心技术在高等学校信息化平台的综合应用,并针对校园中物联网所面临的安全隐患,从感知识别层、网络构建层、管理服务层、综合应用层探讨了各层应采用的安全策略。%The IoT technology, a fusion of computer, communication, microelectronics and automation, is one of the research hotspots in present international academia and industry. The comprehensive application of IoT core technologies such as RFID, sensors, smart terminals and school cloud in university informatization platform are analyzed on basis of discussing the IoT networking process and core technologies. The security strategies which should be used in each layer are discussed from the point of perceptual recognition layer, network building layer, service management layer and comprehensive application layer in view of the potential safety problems faced by campus IoT.

  7. Considerations On Security of Building The Backup Center For Disaster Recovery In The Insurance Company%保险公司灾备中心安全性建设思考

    Institute of Scientific and Technical Information of China (English)

    胡琼

    2012-01-01

    This article introduces the standard of government for insurance company and describes three patterns of building backup center for disaster recovery in the insurance company and how to choose them.Subsequently summarizes the general requirements and security regulations、organization structure and staffs、physical security、security technology and security management in security design.At last,analyzes the security problems for building backup center for disaster recovery in insurance company.%文章从政府对保险公司灾备系统建设的规范入手,介绍了保险公司灾备中心的建设的三种模式特点和适合哪些公司选择,针对自建模式下的安全性设计的总体要求和安全规范、组织和人员、物理安全、安全技术、安全管理等几个方面进行了总结,最后对灾备中心自建模式和外包模式建设中碰到典型安全性问题进行了分析。

  8. Building a Community-Academic Partnership: Implementing a Community-Based Trial of Telephone Cognitive Behavioral Therapy for Rural Latinos

    Directory of Open Access Journals (Sweden)

    Eugene Aisenberg

    2012-01-01

    Full Text Available Concerns about the appropriate use of EBP with ethnic minority clients and the ability of community agencies to implement and sustain EBP persist and emphasize the need for community-academic research partnerships that can be used to develop, adapt, and test culturally responsive EBP in community settings. In this paper, we describe the processes of developing a community-academic partnership that implemented and pilot tested an evidence-based telephone cognitive behavioral therapy program. Originally demonstrated to be effective for urban, middle-income, English-speaking primary care patients with major depression, the program was adapted and pilot tested for use with rural, uninsured, low-income, Latino (primarily Spanish-speaking primary care patients with major depressive disorder in a primary care site in a community health center in rural Eastern Washington. The values of community-based participatory research and community-partnered participatory research informed each phase of this randomized clinical trial and the development of a community-academic partnership. Information regarding this partnership may guide future community practice, research, implementation, and workforce development efforts to address mental health disparities by implementing culturally tailored EBP in underserved communities.

  9. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  10. Team Building of Regional Security Section in Coal Mining Enterprises%浅谈煤矿企业的地区保卫科班组建设

    Institute of Scientific and Technical Information of China (English)

    席志干; 陈进

    2011-01-01

    The team is the basic production unit of enterprise, is the ultimate goal and starting point of all work. The situation of team is directly related to the vitality of enterprises. Team-building is not a new topic, but to promote the better development of enterprises, we need to strengthen teambuilding, to maximize the team's direction, motivation and cohesion role. and fully reflect the role of team workers, such as making progress, selfconsciously learning and improving from each other. This paper makes discussion based on the team-building of regional security section in coal mining enterprises, whose purpose is to improve the business skills, service standards, working attitude and other aspects of workers in companies, thus improving working quality of team and team staff more significantly.%班组是企业的基本生产单元,是一切工作的落脚点和出发点,班组情况的好坏直接关系到企业的活力.班组建设并不是一个新话题,但是为了促进企业的更好发展,必须加强班组建设,从而充分发挥班组的导向、激励和凝聚作用,充分体现班组职工的奋发向上、自觉自主的相互学习、相互提高的作用.本文通过煤矿企业的地区保卫科班组建设,谈谈一些认识,目的是使企业的班组和班组职工在业务技能、服务规范、工作态度等方面都有改善,从而促进企业的班组和班组职工工作素质水平有更大幅度地提高.

  11. Information security fundamentals

    CERN Document Server

    Blackley, John A; Peltier, Justin

    2004-01-01

    Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply thes

  12. 认知无线网络动态频谱感知决策安全协议框架研究%Research on security protocol framework of dynamic spectrum sensing in cognitive radio networks

    Institute of Scientific and Technical Information of China (English)

    高刃; 伍爵博; 唐龙

    2013-01-01

    对认知网络频谱感知安全研究现状进行了分析,提出了一个频谱感知决策安全协议框架.对认知无线网络模型中相关组件、符号进行了定义,并对其结构和安全性进行了详细描述.通过与相关方案比较,结果表明该协议框架能够用来抵御频谱感知所面临的潜在威胁,使之进行正确的频谱决策.%This paper analyzed the state of the art in spectrum sensing security of cognitive radio networks,and presented a security protocol framework of spectrum sensing.It gave the related definitions for cognitive radio network model and analyzed its structure and security.This paper carried out comparisons with other solutions.The results show that the proposed framework can be used to ward off the potential threat on spectnun sensing in order to make correct decision.

  13. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  14. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  15. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  16. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  17. 论我国耕地资源安全保障体系的构建%Discussion on Safety System Building of Cultivated Land Resource Security in China

    Institute of Scientific and Technical Information of China (English)

    朱红波

    2012-01-01

    构建完善的耕地资源安全保障体系,对于提升我国耕地资源安全程度具有非常重要的现实意义.从耕地资源安全的内涵入手,对我国耕地资源安全保障体系的构建进行探讨.结果表明,我国耕地资源安全保障体系包括保障内容、保障目标、保障主体、保障模式和保障支撑体系5个部分.全面认识耕地资源安全的内涵、处理好经济发展与耕地保护的关系,以及变革对地方政府政绩考核方式是构建耕地资源安全保障体系的前提和基础.%It is of important and realistic significance to build a perfect safety system of cultivated land resource security, which will help raise the degree of cultivated land resource security in our country. This paper discusses the formation of the safety system of China's cultivated land resource security starting from the connotation of cultivated land resource security. The result indicates that the safety system of cultivated land resource security comprises safety content, safety object, safety subjects, safety mode and safety support system. It is the premise and foundation for the construction of cultivated land resource security to fully understand the connotation of cultivated land safety, handle the relation between economic development and cultivated land protection and renovate the way of examining the achievements of local government.

  18. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  19. ICT Enhanced Buildings Potentials

    DEFF Research Database (Denmark)

    Christiansson, Per

    2007-01-01

    The paper describes and gives example on how Information and Communication, ICT, can and will enhance and support the building functional systems defined from client and end-user needs and requirements. The building systems may be derived from functional requirements on buildings such as usability...... and security on highest level with sub-systems definitions on lever levels. Building functional sub-systems may be defined for user comfort, indoor-climate, evacuation, space configuration, aesthetics, O&M etc. These building systems are supported by Information and Communication Technology, ICT, and building...... component systems that are accessed and integrated in the real world of building use in different contexts. The ICT systems may be physically or virtually embedded in the building. Already in 1982 AT&T established the 'intelligent buildings', IB, concept due to marketing reasons and the Informart building...

  20. 基于ARM和ZigBee技术的楼宇安防系统的设计%The Design of Building Security System Based on ARM and ZigBee Technology

    Institute of Scientific and Technical Information of China (English)

    李正明; 于海峰; 吴波

    2012-01-01

    在分析国内外智能楼宇现状及不足的基础上,本文设计了一种基于ARM和ZigBee技术的楼宇安防系统。给出系统结构及工作原理,着重阐述主要硬件及软件的设计。该系统以嵌入式操作系统为核心,采用ZigBee无线通信技术实现信号传输,GPRS通信技术实现系统远程监控。测试结果表明该系统运行稳定、可靠性高、报警迅速、误报率低。将该系统应用于智能楼宇中,能够提高智能楼宇的自动化水平,有助于智能楼宇未来的发展,具有实际应用价值。%With the analysis of the current research on Intelligent Building Management System, this paper puts forward a building security system based on ARM and ZigBee technology and explains the structure and operating principle, especially the design of hardware and software. With embedded operating system as core, the building security system realized signal transmission through ZigBee wireless communication technology and remote control through GPRS communication technology. The test result showed that the system runs stably and is of high reliability, fast alarm response and low false alarm rate. The system will be applied in intelligent building to improve the automatic level and help it's develop in future, which has practical value.

  1. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  2. 建筑施工阶段动态识别安全风险的指标体系构建%Construction of Index System for Identifying Security Risks Dynamically in the Building Construction Phase

    Institute of Scientific and Technical Information of China (English)

    昝彦国; 侯学良

    2016-01-01

    In the building construction phase,dynamic identification to find security risks is more consistent with the objective law of security risk. So referning research results of the construction projects morbid appearances spectrum,extracts indicators affecting security status,and uses the sequence relations act,the only reference comparison and judgment method and an important analysis method to determine the index weights. On this basis, takes the subentry engineering as a research units to construct the corresponding index system,and thus dynamically identifies the security risk of the whole construction phase,ensures scientific and accuracyidentification of security risk in the construction phase.%建筑工程施工阶段,动态识别安全风险更加符合安全风险发生的客观规律。借鉴建筑工程项目病态表象谱的研究成果,提取影响安全状态的指标,并运用序关系法、唯一参照物比较判断法和重要度分析法确定指标权重。在此基础之上,以分项工程为研究单位构建相应的指标体系,进而对整个施工阶段的安全风险进行动态识别,以保证施工阶段中安全风险识别的科学性和准确性。

  3. Social cognition in schizophrenia.

    Science.gov (United States)

    Green, Michael F; Leitman, David I

    2008-07-01

    Social cognition in schizophrenia is a rapidly emerging area of study. Because the number and diversity of studies in this area have increased, efforts have been made to better define terms and provide organizing frameworks. A key challenge confronting the study of social cognition in schizophrenia is building bridges between clinical scientists and social neuroscientists. The articles in this theme summarize data-based studies that have attempted to build or strengthen such bridges to better understand the neural bases of social cognitive impairment in schizophrenia.

  4. 后危机时代县域经济运行安全系统构建思路与对策%Ideas of Building Security System of County Economic Operation in Post-crisis Ara and the Countermeasures

    Institute of Scientific and Technical Information of China (English)

    胡杰

    2011-01-01

    This article analyzes the meaning and characteristics of the safe operation of county economy from the problems of county economic in crisis, and describes the idea of building security systems of county economic operation from strengthening government regulation, improving macroeconomic regulation and control mechanisms, enhancing executive power, building security system of industry, persisting in implementing brand economic strategy and other aspects.%本文从危机时期县域经济出现的问题着手,分析了县域经济运行安全的涵义和特点,并从强化政府规制、改善宏观调控机制,增强执行力、构建产业安全体系、坚持在对外开放中实施品牌经济战略等方面阐述了县域经济运行安全系统构建的思路.

  5. Controlling the intelligent building

    Energy Technology Data Exchange (ETDEWEB)

    LeBlanc, R.J.

    1985-08-01

    Companies will be able to locate in intelligent buildings that offer access to a variety of sophisticated communications equipment, at the heart of which are building controls that ensure a comfortable and safe working environment for the occupants. Future buildings will include advanced telephones or workstations with built-in building control sensors for temperature, light level, and security. Advanced telecommunication systems may have telephone cabinets with built-in control functions which eliminate the need for discrete control systems. The owners and tenants will both enjoy benefits if the controls are carefully selected and designed so that they integrate into a single building package.

  6. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  7. Pattern and security requirements engineering-based establishment of security standards

    CERN Document Server

    Beckers, Kristian

    2015-01-01

    Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standard

  8. Security basics for computer architects

    CERN Document Server

    Lee, Ruby B

    2013-01-01

    Design for security is an essential aspect of the design of future computers. However, security is not well understood by the computer architecture community. Many important security aspects have evolved over the last several decades in the cryptography, operating systems, and networking communities. This book attempts to introduce the computer architecture student, researcher, or practitioner to the basic concepts of security and threat-based design. Past work in different security communities can inform our thinking and provide a rich set of technologies for building architectural support fo

  9. Jointly Building a More Secure Asia through the Power of People——Some Highlight of Commemoration of the International Day of Peace 2014

    Institute of Scientific and Technical Information of China (English)

    Lin; Yongfeng

    2014-01-01

    <正>To observe the International Day of Peace 2014,in accordance with its theme set by the United Nations,i.e.,"Right of Peoples to Peace",the CPAPD together with the UN System in China and the Shanxi Provincial People’s Government jointly held the Commemoration of the International Day of Peace2014,with the theme of"A more secure Asia aspired by people"in Xi’an City,west China during 23-24September 2014.Chinese CPC and state leaders,

  10. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  11. Getting More Out of FID and SFA: A Strategy for More Effective Foreign Internal Defense and Security Force Assistance As a Way to Build Partnership Capacity

    Science.gov (United States)

    2015-04-13

    high.” The second criterion is governance indicators of the partner nation at the start of the FID/SFA endeavor. This is an absolute value from...Africa and for tourists to visit Mali for the annual Festival in the Desert, a music festival that featured native Tuareg and other African music ...predicted that the relative likelihood of success of building partner capacity in Mali was low. While these calculations are not absolute and

  12. Consideration of the energetic quality of buildings during specificaton of adequacy limits for the cost of housing and heating in line with the social security statute book; Die Beruecksichtigung der energetischen Gebaeudequalitaet bei der Festlegung von Angemessenheitsgrenzen fuer die Kosten der Unterkunft und Heizung nach dem Sozialgesetzbuch

    Energy Technology Data Exchange (ETDEWEB)

    Malottki, Christian von

    2012-07-27

    The author of the contribution reports on the consideration of the energy quality of buildings during the specification of adequacy limits for the cost of housing and heating in line with the social security statute book. Subsequently to the description of the legal and technical energy starting situation, the methods used to describe the energy quality of buildings, the methods of survey of pricing differences as well as the possibilities of application of an energetically differentiated suitability level are described.

  13. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  14. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. 物联网技术与智能建筑公共安全系统%The Internet of Things Technology and Public Security System for Intelligent Building

    Institute of Scientific and Technical Information of China (English)

    张永刚; 王斌

    2012-01-01

    The article introduces the composition, function and key elements of the public security system for intelligent building, introduces the networking system and related technologies from the angle of intelligent building, and then gives out two kinds of typical application: personnel positioning and multi-modal abnormal perception, expounds the basic principle and application scenes of personnel location, describes application object and key technology of multi-modal abnormal perception.%本文介绍了智能建筑公共安全系统的组成、功能及关键要素;从智能建筑的角度,介绍了物联网系统及相关技术,进而给出了两种典型的应用:人员定位和多模态异常感知:阐述了人员定位的基本原理和应用场景,描述了多模态异常感知的应用对象和关键技术。

  17. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  18. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  19. Active Authentication Using Covert Cognitive Interrogation Games

    Science.gov (United States)

    2013-06-01

    cognitive fingerprint detection methods and could be used to help increase the overall accuracy of a system of combined biometric modalities. The technical...Authentication, Game Theory, Cognitive fingerprint detection 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES...contextual analysis or explicit communicative behavior. This approach complements many other cognitive fingerprint detection methods and could be

  20. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  1. Asia’s New Security and China

    Institute of Scientific and Technical Information of China (English)

    Xia; Liping

    2014-01-01

    <正>Since the end of the cold war,China puts forward a series of new national security ideas with Chinese characteristics such as the"new security concept"and the goal of"building a harmonious world".In May 2014 at the Fourth Summit of Conference on Interaction and Confidence Building Measures in Asia(CICA Summit)held in Shanghai,Chinese President Xi Jinping explicitly put forward the Asian new security concept featured by"common,

  2. Episodic memories as building blocks of identity processing styles and life domains satisfaction: Examining need satisfaction and need for cognitive closure in memories.

    Science.gov (United States)

    Bouizegarene, Nabil; Philippe, Frederick L

    2016-01-01

    The interconnection between identity and memory is widely accepted, but the processes underlying this association remain unclear. The present study examined how specific experiential components of self-defining memories relate to identity processing styles. We also investigated whether those relationships occurred in a domain-specific manner. Participants (n = 583) completed the Identity Style Inventory-3, which we adapted to measure identity in the school and friend domains, as well as scales assessing their friend and school satisfaction. They then described a memory related to each of these domains and rated the level of need satisfaction and need for cognitive closure characterising each memory. Results from structural equation modeling revealed that need satisfaction in the school-related memory was positively associated with an informational identity style at school and with satisfaction at school, whereas need satisfaction in the friend-related memory was positively associated with an informational identity style in both the school and friend domain, and with satisfaction with friends. In addition, need for cognitive closure in both the friend- and school-related memory was associated with normative friend and school identity processing styles. These findings reveal that specific experiential components of self-defining memories are associated with certain identity processing styles. Furthermore, this relationship appears to be mostly domain-specific.

  3. 股票及期货术语中的“仓”隐喻%The "Store" Metaphor and its Cognitive Analysis in the Terms of Securities and Future

    Institute of Scientific and Technical Information of China (English)

    吴恩锋

    2011-01-01

    Based on The Dictionary of Modern Economics and the economic article title corpus composed of 62307 article titles from three main domestic economic newspapers--21 Century Business Herald, China Business, The Economic Observer Newspaper, this paper treated the "store" metaphors in the terms of securities and future with linguistic analysis and cognitive analysis, and tried to give definitions to the terms not concluded in the dictionary.%基于《现代经济词典》和由国内三大经济类报纸《21世纪经济报道》、《中国经营报》、《经济观察报》中62307条文章标题所构成的经济报道标题语料库,文章对股票及期货术语中的“仓”隐喻进行了语义分析和认知分析,并对辞典中未收录的“仓”隐喻术语进行了尝试性的定义。

  4. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  5. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  6. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  7. Measuring the foundation of Homeland Security

    OpenAIRE

    Matthew, David A.

    2007-01-01

    CHDS State/Local This thesis provides a self-assessment tool to compel discussion concerning Homeland Security teamwork. Building on the research of others who have focused on collaboration and teamwork as essential for Homeland Security, it is proclaimed that teamwork is the foundation on which Homeland Security capabilities must be built. The purpose of this thesis is to define the components of teamwork amongst the local multidiscipline organizations with a common Homeland Security ...

  8. Mechanisms for Robust Cognition

    Science.gov (United States)

    Walsh, Matthew M.; Gluck, Kevin A.

    2015-01-01

    To function well in an unpredictable environment using unreliable components, a system must have a high degree of robustness. Robustness is fundamental to biological systems and is an objective in the design of engineered systems such as airplane engines and buildings. Cognitive systems, like biological and engineered systems, exist within…

  9. Usable security history, themes, and challenges

    CERN Document Server

    Garfinkel, Simson

    2014-01-01

    There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer Security, more colloquially known as ``usable security.'' Although usability and security were once thought to be inherently antagonistic, today there is wide consensus that systems that are not usable will inevitably suffer security failures when they are deployed into the real world. Only by simultaneously addressing both usability and security concerns will we be able to build systems that are truly secure. This book presents the historical context of the work to dat

  10. Actively Promote Food Security Innovation to Build a Hospital Catering Services%积极推进伙食保障创新构建医院特色饮食服务

    Institute of Scientific and Technical Information of China (English)

    陈珵

    2015-01-01

    近年来,医院后勤保障坚持把“吃出营养、吃出健康、吃出战斗力”作为根本去想,努力构建适应保障需求的“高效”饮食机制,全面总结出一套科学办伙食的方法措施,伙食管理明显增强,伙食质量有效提升,为增强部队凝聚力、提高战斗力,促进部队全面建设发挥了重要作用。%in recent years, the hospital logistics guarantee adhere to "eat nutrition, eat healthy, eat a fighting force" as the fundamental to, and strive to build a meet the security needs of the "efficient" diet mechanisms, summarizes a set of office of the methods and measures of food science, food management markedly strong, food quality effectively enhance, to en-hance cohesion force and improving the battle effectiveness, promote the all round construction of the armed forces play an important role.

  11. Extending Eurasia Security Cooperation

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    After 14 years of development, the Shanghai Cooperation Organization (SCO) , has set its sights on goals for the next de-cade at the 15th meeting of the Council of SCO Heads of State that was held in Ufa, the capital of Russia's Bashkortostan Republic, on July 9-10. The SCO, established in Shanghai in 2001, is committed to building fdendly neighbor rela- tions and maintaining security and stability in the Central Asian region through multilateral cooperation.

  12. SMS Security in Mobile Devices: A Survey

    Directory of Open Access Journals (Sweden)

    Muhammad Waseem Khan

    2013-09-01

    Full Text Available The Short Message Service (SMS is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasnít achieved secure transmission of plaintext between different mobile phone devices. SMS doesnít have its own build-in mechanism to secure the transmitted data because security isnít considered as a priority application for mobile devices. Many SMS security schemes have been proposed by the researchers. This survey presents the existing schemes used to secure SMS message communication. State of the art SMS security solutions for mobile devices is presented from the period 2006-2013. Literature research of those security schemes is conducted and presented in this survey. The effect of each security scheme on mobile deviceís performance is also observed. Finally, a general summary of all security schemes with their limitations is presented.

  13. Grounded cognition.

    Science.gov (United States)

    Barsalou, Lawrence W

    2008-01-01

    Grounded cognition rejects traditional views that cognition is computation on amodal symbols in a modular system, independent of the brain's modal systems for perception, action, and introspection. Instead, grounded cognition proposes that modal simulations, bodily states, and situated action underlie cognition. Accumulating behavioral and neural evidence supporting this view is reviewed from research on perception, memory, knowledge, language, thought, social cognition, and development. Theories of grounded cognition are also reviewed, as are origins of the area and common misperceptions of it. Theoretical, empirical, and methodological issues are raised whose future treatment is likely to affect the growth and impact of grounded cognition.

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  16. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  17. INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES: a cognitive-discoursive analysis of systematic metaphor emersion in opinion article genre

    Directory of Open Access Journals (Sweden)

    Ana Cristina Pelosi

    2016-03-01

    Full Text Available The article presents partial results of a research which is aimed at verifying how figurative language, specifically metaphoric and metonymic language, present in different textual genres such as the literary and the journalistic genres, contributes to the emergence and negotiation of meaning. The theoretic and methodological basis of the research comes from Conceptual Metaphor Theory, originally proposed by Lakoff and Johnson (1980 and expanded in the 90’s by theoreticians such as Grady (1997, and from Metaphor-Led Discourse Analysis (CAMERON ET AL, 2009; CAMERON; MASLEN, 2010. Research implementation involves two stages. An analysis of four exemplars of the genres under investigation according to Metaphor-Led Discourse Analysis and a second analysis, still to be carried out, of the talk of three focus groups composed by students of a state school in Santa Maria, RS, after the reading of the different genres. The preliminary analysis presented of the opinion article selected for this study reveals the presence of image-kinesthetic schemas and metaphoric/metonymic vehicles which structure the language present in the analyzed genre and contribute to the emergence of the systematic metaphor INTOLERANT ATTITUDES BUILD WALLS AND BLOCK THE CONSTRUCTION OF BRIDGES.

  18. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    11Hans J. Morgenthau , Politics Among Nations: The Struggle for Power and Peace, 7th ed. (New York: McGraw-Hill, 2006), 284. 6 the force is necessary...President Karzai’s reluctance to 403Trench, 8-11. 404Hans J. Morgenthau , Politics Among Nations: The...India and the Development of Frontier Warfare. Houndmills: Palgrave, 1998. Morgenthau , Hans J. Politics Among Nations: The Struggle for Power and

  19. Building Materials

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ Building Materials Sub-council of CCPIT is the other sub-council in construction field. CCPIT Building Materials Sub-council (CCPITBM), as well as CCOIC Build-ing Materials Chamber of Commerce, is au-thorized by CCPIT and state administration of building materials industry in 1992. CCPITBM is a sub-organization of CCPIT and CCOIC.

  20. 中国互联网+社会保障信息系统构建--基于大数据挖掘视角%Building of an Internet+Social Security Informatization System in China-From Perspective of Big Data Minning

    Institute of Scientific and Technical Information of China (English)

    郜凯英; 杨宜勇

    2016-01-01

    Every sector experiences changes caused by the huge data resources in the Age of Big Data,and the social security sector is no exception.In recent years,China’s social security system expands constantly,contributors increase rapidly,and more and more people are concerned about the management ability and service level of the relevant institutions.Using big data related technology to accelerate internet+social security informatization system building is of great significance for improving the efficiency of social security management,service quality and reduction of social costs. Based on the construction of a three -level index system for social security informatization building,AHP method is adopted in this paper to analyze the current situation and existing problems of social security informatization building in China,and suggestions on using mass data,cloud computing and other techniques for building the internet+social security informatization system are put forward.%大数据时代的到来促使各个领域都开始因庞大的数据资源而发生变革,社会保障领域也不例外。近些年中国社会保障制度不断扩面,参保人数激增,使得越来越多的人开始关注相关机构的管理能力及服务水平。如何利用大数据相关技术推进互联网+社会保障信息系统建设对于提升社保管理效率、服务质量和节约社会成本都是十分有意义的。本文在构建社会保障信息化建设三级指标体系的基础上采用AHP分析法分析了目前中国社会保障信息化建设现状与存在的问题,进而提出在社会保障制度广覆盖的今天应如何利用海量数据和云计算等技术构建中国互联网+社会保障信息系统。

  1. Spectrum Sharing Security and Attacks in CRNs: a Review

    Directory of Open Access Journals (Sweden)

    Wajdi Alhakami

    2014-01-01

    Full Text Available Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundamental approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR-specific security mechanisms are presented with some open research issues and challenges.

  2. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  3. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  4. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  5. Mobile device security for dummies

    CERN Document Server

    Campagna, Rich; Krishnan, Ashwin

    2011-01-01

    The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate informati

  6. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  7. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  8. Effects of Shanghai Citizens' Cognition of Leisure Sports Exercise on Building up a City of Health%上海市民休闲体育锻炼认知对构建健康城市的影响

    Institute of Scientific and Technical Information of China (English)

    顾红; 陈爱菊

    2012-01-01

    Based on the analysis of the relevant researches at home and abroad and by the methods of literature study,questionnaire and statistics,the article focuses on the different-background Shanghai citizens' attitude toward leisure sports exercise and the difference of experience.A further study has also been made on the cognition of building up a city of health with leisure sports exercise as well as the attitude toward exercise and exercise experience.%在分析国内、外相关研究的基础上,通过文献资料、问卷调查和数理统计等研究方法,对不同背景特征的上海市居民在休闲体育锻炼的态度和体验差异进行分析。在此基础上,进一步就以休闲体育锻炼建构健康城市为基础的认同感及运动态度和运动体验的相关性进行了研究。

  9. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  10. Building Information Security Awareness at Wilmington University

    Science.gov (United States)

    Hufe, Mark J.

    2014-01-01

    This executive position paper proposes recommendations for reducing the risk of a data breach at Wilmington University. A data breach could result in identity theft of students, faculty and staff, which is costly to the individual affected and costly to the University. The University has a legal and ethical obligation to provide safeguards against…

  11. Building Security in the Persian Gulf

    Science.gov (United States)

    2010-01-01

    of imperialism, neocolonialism , paternalism, or, simply, a prophylactic approach against some unspecified future danger, but one that could have...going so far as to see imperialist or neocolonial motives, there has been support in some quarters for developing modern forms of mandate or...color- ation for many regional observers as a neocolonial power, an image further reinforced by the U.S. invasion of Iraq in 2003, which looked, to

  12. NATIONAL PREPAREDNESS: Technologies to Secure Federal Buildings

    Science.gov (United States)

    2007-11-02

    the reader. The hand geometry market is dominated by Recognition Systems, Inc. The finger geometry market is led by BioMet Partners. Hand geometry...plaster, cement , or brick, depending on the range. It has no openings that can jam or be tampered with. Card and reader orientation is not critical...monitor. (This is similar to a medical diagnostic x-ray system that differentiates between bone and organs.) Based on the images displayed on the

  13. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  14. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  15. Security of earthquake disaster reduction system

    Institute of Scientific and Technical Information of China (English)

    JIN Bo; TAO Xia-xin; WEN Rui-zhi; DAI Zhi-yong

    2005-01-01

    No matter whether a system is operated manually or automatically controlled by computer, the system' s vulnerability always exists. Earthquake Disaster Reduction System (EDRS) belongs to the category of information system. According to the features of security for EDRS, the steps and the methods on how to build the EDRS security were analyzed. The EDRS security features, security strategies and security measures were also given through a distributed EDRS skeleton that has been applied. Because there was still no appointed and authoritative agency or organization to certify and test EDRS security in China, a national information technology security certification center was introduced and suggested for the certification of the EDRS security. Finally,several discussions and tendencies for the EDRS development were presented.

  16. Vedr.: Military capacity building

    DEFF Research Database (Denmark)

    Larsen, Josefine Kühnel; Struwe, Lars Bangert

    2013-01-01

    Kühnel Larsen and researcher Lars Bangert Struwe of CMS had organized a seminar in collaboration with Royal Danish Defense Colleg and the East African Security Governance Network. The seminar focused on some of the risks involved in Military capacity building and how these risks are dealt with from......Military capacity building has increasingly become an integral part of Danish defence. Military capacity is a new way of thinking Danish defence and poses a new set of challenges and opportunities for the Danish military and the Political leadership. On the 12th of december, PhD. Candidate Josefine...

  17. Robotics Challenge: Cognitive Robot for General Missions

    Science.gov (United States)

    2015-01-01

    ROBOTICS CHALLENGE: COGNITIVE ROBOT FOR GENERAL MISSIONS UNIVERSITY OF KANSAS JANUARY 2015 FINAL TECHNICAL REPORT... University of Kansas 2120 Learned Hall 1530 W. 15th Street Lawrence, KS 66045 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING...controls. 15. SUBJECT TERMS Autonomy , Supervised Autonomy , Robotics, Cognitive Architecture 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  18. Robust Multimodal Cognitive Load Measurement II

    Science.gov (United States)

    2015-06-24

    and GSR values. 15. SUBJECT TERMS Behavioural Science, Cognitive Psychology 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...findings support our case. Experiment : We use data from a larger multitier experiment that was designed to study effects of cognitive load on... experiment was conducted through a simulated computer-based platform to screen applicants for a human resource department. Every subject interacted

  19. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  20. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  1. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  2. Cognitive ecology.

    Science.gov (United States)

    Hutchins, Edwin

    2010-10-01

    Cognitive ecology is the study of cognitive phenomena in context. In particular, it points to the web of mutual dependence among the elements of a cognitive ecosystem. At least three fields were taking a deeply ecological approach to cognition 30 years ago: Gibson's ecological psychology, Bateson's ecology of mind, and Soviet cultural-historical activity theory. The ideas developed in those projects have now found a place in modern views of embodied, situated, distributed cognition. As cognitive theory continues to shift from units of analysis defined by inherent properties of the elements to units defined in terms of dynamic patterns of correlation across elements, the study of cognitive ecosystems will become an increasingly important part of cognitive science.

  3. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  4. Non Security – Premise of Cybercrime

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2012-04-01

    Full Text Available It is presented the concept of cyber crime. There are detailed the vulnerabilities of IT applications. There are listed the types of Internet fraud. There are analyzed the predisposing factors of cyber crime. There are identified the deficiencies of the security systems. It is build a model for information security management.

  5. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  6. Sound Security,Safe Beijing

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ With the approach of the long a waited event,Chinese authorities have geared up to intensify security preparations.In line with the"people-oriented"and"athletes-centered"ideas,Beijing will spare no efforts to provide quality services and to build a safe and cornfort able environment that will satisfy all the Games' participants.

  7. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  10. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  11. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  12. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  13. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio

    2012-01-01

    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  14. Protocols for Wireless Sensor Networks and Its Security

    Directory of Open Access Journals (Sweden)

    Dr. Adil Jamil Zaru

    2016-12-01

    Full Text Available This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network.

  15. Introduction to network security

    CERN Document Server

    Jacobson, Douglas

    2008-01-01

    … Students can easily understand how things work thanks to the different figures/definitions … students can see the different steps taken to build a secure environment and avoid most of the usual mistakes. … A website (http://www.dougj.net/textbook) is provided to support the book, where the reader can find additional content, like instructor materials, slides to support the book, on-line tutorials, help to start the programming parts. It is not mandatory at all to understand the book, but it is a really nice addition. … the book is really well written, and easily understandable without lackin

  16. Building Automation Using Wired Communication.

    Directory of Open Access Journals (Sweden)

    Ms. Supriya Gund*,

    2014-04-01

    Full Text Available In this paper, we present the design and implementation of a building automation system where communication technology LAN has been used. This paper mainly focuses on the controlling of home appliances remotely and providing security when the user is away from the place. This system provides ideal solution to the problems faced by home owners in daily life. This system provides security against intrusion as well as automates various home appliances using LAN. To demonstrate the feasibility and effectiveness of the proposed system, the device such as fire sensor, gas sensor, panic switch, intruder switch along with the smartcard have been developed and evaluated with the building automation system. These techniques are successfully merged in a single building automation system. This system offers a complete, low cost powerful and user friendly way of real-time monitoring and remote control of a building.

  17. Cognitive reasoning a formal approach

    CERN Document Server

    Anshakov, Oleg M

    2010-01-01

    Dealing with uncertainty, moving from ignorance to knowledge, is the focus of cognitive processes. Understanding these processes and modelling, designing, and building artificial cognitive systems have long been challenging research problems. This book describes the theory and methodology of a new, scientifically well-founded general approach, and its realization in the form of intelligent systems applicable in disciplines ranging from social sciences, such as cognitive science and sociology, through natural sciences, such as life sciences and chemistry, to applied sciences, such as medicine,

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. Space Telecommunications Radio System STRS Cognitive Radio

    Science.gov (United States)

    Briones, Janette C.; Handler, Louis M.

    2013-01-01

    Radios today are evolving from awareness toward cognition. A software defined radio (SDR) provides the most capability for integrating autonomic decision making ability and allows the incremental evolution toward a cognitive radio. This cognitive radio technology will impact NASA space communications in areas such as spectrum utilization, interoperability, network operations, and radio resource management over a wide range of operating conditions. NASAs cognitive radio will build upon the infrastructure being developed by Space Telecommunication Radio System (STRS) SDR technology. This paper explores the feasibility of inserting cognitive capabilities in the NASA STRS architecture and the interfaces between the cognitive engine and the STRS radio. The STRS architecture defines methods that can inform the cognitive engine about the radio environment so that the cognitive engine can learn autonomously from experience, and take appropriate actions to adapt the radio operating characteristics and optimize performance.

  20. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  1. Water Resources Security and Its Countermeasure Suggestions in Building Silk Road Economic Belt%丝绸之路经济带建设中的水资源安全问题及对策

    Institute of Scientific and Technical Information of China (English)

    郭利丹; 周海炜; 夏自强; 黄峰; 鄢波

    2015-01-01

    The strategy of Silk Road Economic Belt brings about both opportunities of social-economic development and regional cooperation for countries along this belt, and many potential constraints and challenges. Water resources safety is one of strategic and prospective issues in promoting the economic belt construction, which should be paid high attention to. In this study, some key regions involved in the economic belt, including Northwest China, Central Asia and West Asia, were selected as the cases. And in-depth analyses of water resources security problems, including water distribution, water demand and environmental conditions, and transboundary water disputes and cooperation practices of these tranboundary basins had been conducted. To solve these water problems in the construction process of economic belt, and on the basis of experiences and lessons learned from transboundary river management in Central Asia and West Asia regions, countermeasure suggestions have been proposed from the perspective of strategic layout for Chinese government and policy-making sectors. The territorial scope linked to the Silk Road Economic Belt extends far beyond the scope of a specific tranboundary river basin, and so countries along the belt are facing with more complex and multiple constraints of water security problem. China should develop a strategic framework of water resources to coordinate development with neighboring countries in Central Asia, which should be followed with a propose to build water cooperation corridor in the economic belt along the Silk Road, in order to improve transboundary water cooperation mechanism to strengthen regional cooperation in water resources. Besides, the support system of the water resources security should be improved by focusing on strengthening critical technology research and information monitoring of regional co-development of water resources and protection.%“丝绸之路经济带”的战略构想既为沿线国家带来了经济社

  2. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  3. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  4. Information security governance simplified from the boardroom to the keyboard

    CERN Document Server

    Fitzgerald, Todd

    2011-01-01

    Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security d

  5. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  6. Solar building

    OpenAIRE

    Zhang, Luxin

    2014-01-01

    In my thesis I describe the utilization of solar energy and solar energy with building integration. In introduction it is also mentioned how the solar building works, trying to make more people understand and accept the solar building. The thesis introduces different types of solar heat collectors. I compared the difference two operation modes of solar water heating system and created examples of solar water system selection. I also introduced other solar building applications. It is conv...

  7. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This book consists of essays covering issues in visual cognition presenting experimental techniques from cognitive psychology, methods of modeling cognitive processes on computers from artificial intelligence, and methods of studying brain organization from neuropsychology. Topics considered include: parts of recognition; visual routines; upward direction; mental rotation, and discrimination of left and right turns in maps; individual differences in mental imagery, computational analysis and the neurological basis of mental imagery: componental analysis.

  8. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  9. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in this

  10. Secured transactions

    NARCIS (Netherlands)

    Beale, H.

    2008-01-01

    In this paper I describe the work that is currently under way, within the Network of Excellence charged with creating a draft Common Frame of Reference, to draft rules on security over moveable assets. After a brief introduction, I deal with two broad questions: (1) the general aims and scope of the

  11. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  12. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  13. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no state

  14. A Secure Architecture for Voting Electronically (SAVE)

    Science.gov (United States)

    Goler, Jonathan A.; Selker, Edwin J.

    Electronic voting has the potential to be the most reliable, secure and trustworthy form of voting implemented. Digital technology, complete with error correction, robust storage and cryptographic security offers the possibility to record, transmit, store and tabulate votes far more reliably than paper. While current implementations of electronic voting have been susceptible to various failures, electronic voting itself is not fundamentally flawed. The Secure Architecture for Voting Electronically (SAVE) is one proposed architecture for mitigating security and trust issues with the voting process. In addition, the architecture enables academics, small companies and organizations to easily and cheaply build their own modules conforming to the standard.

  15. AFMS Flight Path: Building Future Leaders

    Science.gov (United States)

    2009-02-12

    Better Leaders: Developing Air Force Squadron Leadership for the Next Century. National Security Program Discussion Paper Series 03-001. Cambridge, Mass...Building Better Leaders: Developing Air Force Squadron Leadership for the Next Century. National Security Program Discussion Paper Series 03‐001

  16. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  17. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  18. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Visual cognition

    Energy Technology Data Exchange (ETDEWEB)

    Pinker, S.

    1985-01-01

    This collection of research papers on visual cognition first appeared as a special issue of Cognition: International Journal of Cognitive Science. The study of visual cognition has seen enormous progress in the past decade, bringing important advances in our understanding of shape perception, visual imagery, and mental maps. Many of these discoveries are the result of converging investigations in different areas, such as cognitive and perceptual psychology, artificial intelligence, and neuropsychology. This volume is intended to highlight a sample of work at the cutting edge of this research area for the benefit of students and researchers in a variety of disciplines. The tutorial introduction that begins the volume is designed to help the nonspecialist reader bridge the gap between the contemporary research reported here and earlier textbook introductions or literature reviews.

  1. 云计算关键技术之云安全问题认知研究%Research on the cognition of cloud security issues-one of the key technology of cloud computing

    Institute of Scientific and Technical Information of China (English)

    龚强

    2014-01-01

    云计算面临的最大挑战是安全问题。云计算应用的无边界性、流动性等特点,较之传统的IT模式有很大差异。在云计算环境下,服务方式发生变化,安全的责任主体也发生了根本改变。作为云计算服务提供商,需要建立安全的云计算平台,为云安全服务提供保障;同时,服务一定是开放的、安全的,要保护云用户敏感信息的安全。整合桌面安全管理技术是行之有效的。云安全应用研究主要是从云计算平台系统安全和网络安全设备、安全基础设施的“云化”突破。%The security issue is the biggest challenge for cloud computing .There is a great difference between the characteristics of cloud computing applications including unboundedness and liquidity etc . and the traditional IT model .In the cloud computing environment , service method has changed ,the main responsibility for safety has also undergone a fundamental change .As cloud computing service providers , they need to establish safe cloud computing platform and provide guarantee for cloud security service ;meanwhile , the service must be open and safe to protect the security of cloud users ’ sensitive information.Integrating desktop security management technology is effective .This paper can make breakthrough from the system security of cloud computing platform and the “cloud” of network security equipment and security infrastructure .

  2. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  3. Homeland security in the USA: past, present, and future.

    Science.gov (United States)

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  4. Image Security

    Science.gov (United States)

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  5. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  6. Security of supply

    OpenAIRE

    2007-01-01

    Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. Ramsay discusses security of energy supplies in a global market; Hasan M. Qabazard outlines OPEC’s abiding commitment to energy security.

  7. Cognitive Performance and Cognitive Style.

    Science.gov (United States)

    International Journal of Behavioral Development, 1985

    1985-01-01

    Investigates (1) the relationships between cognitive performance and cognitive styles and predictive possibilities and (2) performance differences by sex, school, grade, and income in 92 Indian adolescents. Assessment measures included Liquid Conservation, Islands, Goat-Lion, Hanoi-Tower, Rabbits (Piagetian); Block Design (WISC-R); Paper Cutting…

  8. Laboratory Building.

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  9. Laboratory Building

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, Joshua M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    This report is an analysis of the means of egress and life safety requirements for the laboratory building. The building is located at Sandia National Laboratories (SNL) in Albuquerque, NM. The report includes a prescriptive-based analysis as well as a performance-based analysis. Following the analysis are appendices which contain maps of the laboratory building used throughout the analysis. The top of all the maps is assumed to be north.

  10. Challenges in Mathematical Cognition

    Directory of Open Access Journals (Sweden)

    Lara Alcock

    2016-04-01

    Full Text Available This paper reports on a collaborative exercise designed to generate a coherent agenda for research on mathematical cognition. Following an established method, the exercise brought together 16 mathematical cognition researchers from across the fields of mathematics education, psychology and neuroscience. These participants engaged in a process in which they generated an initial list of research questions with the potential to significantly advance understanding of mathematical cognition, winnowed this list to a smaller set of priority questions, and refined the eventual questions to meet criteria related to clarity, specificity and practicability. The resulting list comprises 26 questions divided into six broad topic areas: elucidating the nature of mathematical thinking, mapping predictors and processes of competence development, charting developmental trajectories and their interactions, fostering conceptual understanding and procedural skill, designing effective interventions, and developing valid and reliable measures. In presenting these questions in this paper, we intend to support greater coherence in both investigation and reporting, to build a stronger base of information for consideration by policymakers, and to encourage researchers to take a consilient approach to addressing important challenges in mathematical cognition.

  11. COGNITION AND INTELLIGENT ENTREPRENEURSHIP

    Directory of Open Access Journals (Sweden)

    Meo Colombo Carlotta

    2012-07-01

    Full Text Available The aim of the paper is to study how it’s possible to enhance the cognitive enterprise model by the theory of autopoietic systems. I propose a model that considers the organization as a closed system in which all cognitive activity is necessary to develop coherent operations needed to adapt the firm to environmental perturbations. The central issue of the work consists in the presentation and description of the “chain thinking-action” as a cognitive basis that builds models from which derive the actions that characterize the transformation of a business enterprise in order to maintain the viability over time. A \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\"winning\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\" entrepreneurial thinking is able to give a direction (objectives-strategy always aimed at improving the organization’s vital parameters. The role of entrepreneurship and management, therefore, is to create the conditions to encourage a continuous development of cognitive models in organizations, in order to maintain the conditions of survival and to lead the company in a situation of evolution and improvement.

  12. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...

  13. Cognitive Neuropsychology

    DEFF Research Database (Denmark)

    Starrfelt, Randi

    2012-01-01

    Traditionally, studies in cognitive neuropsychology have reported single cases or small groups of patients with seemingly selective impairments of specific cognitive processes or modules. Many studies, particularly older ones, have used simple and coarse tasks to show that patients are disproport......Traditionally, studies in cognitive neuropsychology have reported single cases or small groups of patients with seemingly selective impairments of specific cognitive processes or modules. Many studies, particularly older ones, have used simple and coarse tasks to show that patients...... for cognitive neuropsychology are opened up. The questions addressed in this symposium is whether the questions posed by cognitive neuropsychology are still relevant, and whether new methods can spark a new interest in the field, or if the time has passed when the observation of single and double dissociations...... in patients’ test performance can inform theories of (normal) cognitive function. In four talks, this symposium will present and discuss methods for investigating impairment patterns in neuropsychological patients: 1) a talk on basic assumptions and statistical methods in single case methodology; 2) a talk...

  14. Cognitive anthropology is a cognitive science.

    Science.gov (United States)

    Boster, James S

    2012-07-01

    Cognitive anthropology contributes to cognitive science as a complement to cognitive psychology. The chief threat to its survival has not been rejection by other cognitive scientists but by other cultural anthropologists. It will remain a part of cognitive science as long as cognitive anthropologists research, teach, and publish.

  15. Embodying cognition

    DEFF Research Database (Denmark)

    Martiny, Kristian Møller Moltke; Aggerholm, Kenneth

    2016-01-01

    During the last decades, research on cognition has undergone a reformation, which is necessary to take into account when evaluating the cognitive and behavioural aspects of therapy. This reformation is due to the research programme called Embodied Cognition (EC). Although EC may have become...... and CBT that could contribute to the development of theory and practice for both of them. We present a case-study of an EC-based model of intervention for working with self-control in cerebral palsy.We centre the results of the study and its discussion on how we should understand and work with self...

  16. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  17. Smart Buildings: An Introduction to the Library of the Future.

    Science.gov (United States)

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  18. 全面深化公安改革背景下加强警辅队伍建设和整合的探索--以上海市公安局嘉定分局为例%Discussion on the Building and Potency of Public-Security Managerial Assistants--Take for Example of Jiading Branch of Shanghai Public Security Bureau

    Institute of Scientific and Technical Information of China (English)

    姚方盛

    2015-01-01

    As the capable helper, the public-security managerial assistant has given great assistance to the public security organ in the public-security managerial process. At present, the public-security managerial assistants have become the new emerging forces to safeguard the public order. In the new situation, the public security organ should play a big role in the public order management and make the best possible use of public-security managerial assistants.%警辅队伍是指由《人民警察法》等法律法规规定的,政府认可并出资保障,由公安机关直接领导、管理的安全防范组织或在公安机关协助处理外部警务活动的组织。目前,警辅队伍已成为维护社会治安不可或缺的力量。在新的形势下,我们要进一步发挥警辅队伍的工作效能,激发其潜在活力,实现警力的无增长改善。

  19. Building Languages

    Science.gov (United States)

    ... Training Manually Coded English (MCE) Natural Gestures Speech Speech Reading (Lip Reading) Even though American Sign Language (ASL) is not a building block, it is sometimes used together with one or more building blocks. Close Information For... Media Policy Makers File Formats Help: How do I view ...

  20. Cognitive Changes

    Science.gov (United States)

    ... decline tend to occur in parallel as the disease progresses. Significant cognitive impairment in PD is often associated with: Caregiver distress Worse day-to-day function Diminished quality of life Poorer treatment outcomes Greater medical costs due to ...

  1. Spatial cognition

    Science.gov (United States)

    Kaiser, Mary Kister; Remington, Roger

    1988-01-01

    Spatial cognition is the ability to reason about geometric relationships in the real (or a metaphorical) world based on one or more internal representations of those relationships. The study of spatial cognition is concerned with the representation of spatial knowledge, and our ability to manipulate these representations to solve spatial problems. Spatial cognition is utilized most critically when direct perceptual cues are absent or impoverished. Examples are provided of how human spatial cognitive abilities impact on three areas of space station operator performance: orientation, path planning, and data base management. A videotape provides demonstrations of relevant phenomena (e.g., the importance of orientation for recognition of complex, configural forms). The presentation is represented by abstract and overhead visuals only.

  2. Cognitive Systems

    DEFF Research Database (Denmark)

    user models and user interaction models. Research in cognitive information processing is inherently multi-disciplinary and involves natural science and technical disciplines, e.g., control, automation, and robot research, physics and computer science, as well as humanities such as social sciences......The tutorial will discuss the definition of cognitive systems as the possibilities to extend the current systems engineering paradigm in order to perceive, learn, reason and interact robustly in open-ended changing environments. I will also address cognitive systems in a historical perspective...... and its relation and potential over current artificial intelligence architectures. Machine learning models that learn from data and previous knowledge will play an increasingly important role in all levels of cognition as large real world digital environments (such as the Internet) usually are too complex...

  3. 试论政府在食品质量安全体系建设中的作用%Role of the Government in the Building of Food Quality and Security System

    Institute of Scientific and Technical Information of China (English)

    陈瑛

    2011-01-01

    当前,我国食品安全仍处于风险高发期和矛盾凸显期。由于现代社会的生产经营者仍然是“经济人”,其主要特征是追求经济利益最大化。因此,要保证食品安全,除了生产经营者加强自律外,政府还要发挥应有的他律作用,帮助业主转变生产经营方式,实行诚信经营,同时要逐步完善食品安全法律法规,并严格执法,实施“零度容忍”。而为了充分发挥政府在食品质量安全体系建设中的作用,必须使食品安全工作制度化、常态化。%At present, China's food security is still in the high risk and the prominent contradictions period. To ensure food security, in addition to production operators to strengthen self - discipline, the government should play its due role to help owners transform production and management and to gradually improve the food security laws and regulations, and strict law enforcement. In order to play a full role for the government in food quality and security system, food security must be institutionalized and normalized.

  4. Information Security

    OpenAIRE

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W. Ph.

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  5. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  6. Cognitive Robotics

    OpenAIRE

    Levesque, Hector J.; Lakemeyer, Gerhard

    2010-01-01

    This chapter is dedicated to the memory of Ray Reiter. It is also an overview of cognitive robotics, as we understand it to have been envisaged by him.1 Of course, nobody can control the use of a term or the direction of research. We apologize in advance to those who feel that other approaches to cognitive robotics and related problems are inadequately represented here.

  7. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  8. The relationship between attachment and cognitive development

    Directory of Open Access Journals (Sweden)

    Tošić Milica

    2013-01-01

    Full Text Available Emotional and cognitive development of personality have mostly been explored independently in the history of psychology. However, in the last decades, there have been more and more frequent arguments in favour of the idea that the emotional relationship between the mother and the child in early childhood, through forming a secure or insecure attachment style, is to a certain extent linked to the cognitive development. For example, securely attached children, compared to the insecurely attached, have more frequent and longer episodes of symbolic play and are more advanced in the domain of language in early childhood. Securely attached children are also more efficient and persistent in solving problems. Before starting school, securely attached children understand better the feelings and beliefs of others, as well as the fact that these determine people’s behaviour, thus having an opportunity to understand and predict this behaviour better. In this paper, we will attempt to point out some of the mechanisms that are assumed to be mediators between the emotional and cognitive development. Namely, since it enables a more independent exploration of the surroundings, more quality social relations among children, higher self-esteem, better focus and more developed communicative skills, secure attachment might potentially be linked to the cognitive development. [Projekat Ministarstva nauke Republike Srbije, br. 179002

  9. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  10. Offloading Cognition onto Cognitive Technology

    CERN Document Server

    Dror, Itiel

    2008-01-01

    "Cognizing" (i.e., thinking, understanding, knowing, and having the capacity to do what cognizers can do) is a mental state. Systems without mental states, such as cognitive technology, can sometimes also do some of what cognizers can do, but that does not make them cognizers. Cognitive technology allows cognizers to offload some of the functions they would otherwise have had to execute with their own brains and bodies alone; it also extends cognizers' performance powers beyond those of brains and bodies alone. Language itself is a form of cognitive technology that allows cognizers to offload some of their brain functions onto the brains of other cognizers. Language also extends cognizers' individual and joint performance powers, distributing the load through interactive and collaborative cognition. Reading, writing, print, telecommunications and computing further extend cognizers' capacities. And now the web, with its distributed network of cognizers, digital databases and sofware agents, has become the Cogn...

  11. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  12. Towards cognitive cities advances in cognitive computing and its application to the governance of large urban systems

    CERN Document Server

    Finger, Matthias

    2016-01-01

    This book introduces the readers to the new concept of cognitive cities. It demonstrates why cities need to become cognitive and why therefore a concept of cognitive city is needed. It highlights the main building blocks of cognitive cities and illustrates the concept by various cases. Following a concise introductory chapter the book features nine chapters illustrating various aspects and dimensions of cognitive cities. The logic of its structure proceeds from more general considerations to more specific illustrations. All chapters offer a comprehensive view of the different research endeavours about cognitive cities and will help pave the way for this new and innovative approach to governing cities in the future. .

  13. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  16. Building Inclusion

    NARCIS (Netherlands)

    Jeanet Kullberg; Isik Kulu-Glasgow

    2009-01-01

    The social inclusion of immigrants and ethnic minorities is a central issue in many European countries. Governments face challenges in ensuring housing for immigrants, delivering public services, promoting neighbourhood coexistence and addressing residential segregation. The Building Inclusion proje

  17. An SLA based SaaS Security Level

    Directory of Open Access Journals (Sweden)

    Yongjing A. Li

    2013-07-01

    Full Text Available This paper proposes a data security protection strategy of the SaaS mode -the SLA based SaaS Security Level. At the same time, it gives concept model and implementation architecture of the security scheme which based on the SaaS Security Level. The SLA based SaaS Security Level takes the requirements of tenants to the data security as a starting point, and it mainly relates to data security of the data center, data security of the servers and data security of the clients. This Security Level can better meet diversified users needs than the traditional security model. According to the tenants desired service number and the protection degree of data information, they can dynamically select different levels of the security strategies. Then, according to the dynamic changes of SLA, the SaaS vendors can adjust data protection strategy of the user timely. For supporting our SaaS Security Level, we build SSM (SaaS Security Model test-bed. On the SSM test-bed, we have done some experiments, which confirmed our SaaS Security Level is feasible and easy to use.  

  18. Sustainable Buildings

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.; Elle, Morten

    The scientific community agrees that: all countries must drastically and rapidly reduce their CO2 emissions and that energy efficient houses play a decisive role in this. The general attitude at the workshop on Sustainable Buildings was that we face large and serious climate change problems...... that need urgent action. The built environment is an obvious area to put effort into because of the large and cost-effective energy saving potential and potential for Renewable Energy-based supply systems for buildings....

  19. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  1. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  2. China's Economic Security at Stake

    Institute of Scientific and Technical Information of China (English)

    Jiang Yong

    2007-01-01

    National economic security refers to the freedom of a sovereign state from any internal or external threats, either actual or perceived, to its economic interests. The notion varies in meaning from one country to another, due to their differences in security environment, cognition and defense capabilities. It took quite a long time for China to form its own definition in an overall, profound manner, with controversy still lingering among divergent interest groups and/or schools of thought. As the author sees it, formidable internal and external challenges threaten the country in this regard. We should maintain awareness of the risks from monopoly-driven mergers and acquisitions of foreign capital in a growing number of our industries.

  3. Cognitive linguistics.

    Science.gov (United States)

    Evans, Vyvyan

    2012-03-01

    Cognitive linguistics is one of the fastest growing and influential perspectives on the nature of language, the mind, and their relationship with sociophysical (embodied) experience. It is a broad theoretical and methodological enterprise, rather than a single, closely articulated theory. Its primary commitments are outlined. These are the Cognitive Commitment-a commitment to providing a characterization of language that accords with what is known about the mind and brain from other disciplines-and the Generalization Commitment-which represents a dedication to characterizing general principles that apply to all aspects of human language. The article also outlines the assumptions and worldview which arises from these commitments, as represented in the work of leading cognitive linguists. WIREs Cogn Sci 2012, 3:129-141. doi: 10.1002/wcs.1163 For further resources related to this article, please visit the WIREs website.

  4. An IOT Security Risk Autonomic Assessment Algorithm

    Directory of Open Access Journals (Sweden)

    Zhengchao Ma

    2013-02-01

    Full Text Available In terms of Internet of Things (IOT system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain.

  5. Accelerate China’s Social Security Legislation

    Institute of Scientific and Technical Information of China (English)

    王延中

    2008-01-01

    Since the financial crisis in Asia in 1997, China’s social security system has undergone continual reform and readjustment, and has proved to be an integral part of government efforts to perfect the socialist market economy as well as in building a socialist harmonious society. Although social security construction has achieved certain results, it has also left a lot of problems. With the rapid growth of China’s economy and revenue, people from all walks of life are putting ever-increasing demands on the social security system; therefore, the construction of a sound social security system suited to China’s current situation still remains an arduous task. In this article, the author have reviewed the 10 years development of China’s social security system, analyzed problems and challenges and proposed its suggestions.

  6. An immunity based network security risk estimation

    Institute of Scientific and Technical Information of China (English)

    LI Tao

    2005-01-01

    According to the relationship between the antibody concentration and the pathogen intrusion intensity, here we present an immunity-based model for the network security risk estimation (Insre). In Insre, the concepts and formal definitions of self,nonself, antibody, antigen and lymphocyte in the network security domain are given. Then the mathematical models of the self-tolerance, the clonal selection, the lifecycle of mature lymphocyte, immune memory and immune surveillance are established. Building upon the above models, a quantitative computation model for network security risk estimation,which is based on the calculation of antibody concentration, is thus presented. By using Insre, the types and intensity of network attacks, as well as the risk level of network security, can be calculated quantitatively and in real-time. Our theoretical analysis and experimental results show that Insre is a good solution to real-time risk evaluation for the network security.

  7. Cognitive fitness.

    Science.gov (United States)

    Gilkey, Roderick; Kilts, Clint

    2007-11-01

    Recent neuroscientific research shows that the health of your brain isn't, as experts once thought, just the product of childhood experiences and genetics; it reflects your adult choices and experiences as well. Professors Gilkey and Kilts of Emory University's medical and business schools explain how you can strengthen your brain's anatomy, neural networks, and cognitive abilities, and prevent functions such as memory from deteriorating as you age. The brain's alertness is the result of what the authors call cognitive fitness -a state of optimized ability to reason, remember, learn, plan, and adapt. Certain attitudes, lifestyle choices, and exercises enhance cognitive fitness. Mental workouts are the key. Brain-imaging studies indicate that acquiring expertise in areas as diverse as playing a cello, juggling, speaking a foreign language, and driving a taxicab expands your neural systems and makes them more communicative. In other words, you can alter the physical makeup of your brain by learning new skills. The more cognitively fit you are, the better equipped you are to make decisions, solve problems, and deal with stress and change. Cognitive fitness will help you be more open to new ideas and alternative perspectives. It will give you the capacity to change your behavior and realize your goals. You can delay senescence for years and even enjoy a second career. Drawing from the rapidly expanding body of neuroscience research as well as from well-established research in psychology and other mental health fields, the authors have identified four steps you can take to become cognitively fit: understand how experience makes the brain grow, work hard at play, search for patterns, and seek novelty and innovation. Together these steps capture some of the key opportunities for maintaining an engaged, creative brain.

  8. Cognitive maps

    DEFF Research Database (Denmark)

    Minder, Bettina; Laursen, Linda Nhu; Lassen, Astrid Heidemann

    2014-01-01

    . Conceptual clustering is used to analyse and order information according to concepts or variables from within the data. The cognitive maps identified are validated through the comments of some of the same experts. The study presents three cognitive maps and respective world-views explaining how the design...... and innovation field are related and under which dimensions they differ. The paper draws preliminary conclusions on the implications of the different world- views on the innovation process. With the growing importance of the design approach in innovation e.g. design thinking, a clear conception...

  9. Our Buildings, Ourselves.

    Science.gov (United States)

    Roodman, David Malin; Lenssen, Nicholas

    1994-01-01

    Reviews in detail environmental impacts associated with buildings. Discusses building construction, internal environments, building life spans, building materials, protection from climate, and amenities. (LZ)

  10. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  11. ECONOMY "SMART BUILDINGS" HOUSING

    Directory of Open Access Journals (Sweden)

    Stanka Djurić

    2017-01-01

    Full Text Available In terms of ensuring national security and the security of energy supply and energy sources, such as liquid fuels and gas, as well as energy independence from energy imports and energy, the focus of our strategy to shift towards renewable energy sources. In fact, whether a state of more or less energy-independent, to a large extent can be determined by the percentage participation renewable energy in meeting the total energy requirements. So, the consumption of renewable energy source (solar energy, wind energy, geothermal energy, hydropower and small watercourses, biomass and biogas is put in relation with the amount of power and energy which are imported from foreign countries (liquid fuels and gas. Based on data published by the European statistics agency, in developed European countries is the fact that renewable energy sources accounted for 10-12% of the total energy balance of individual countries. Here, the situation is very worrying, given that renewable energy resources still account for only 1% in the energy balance, which is negligible and intolerable little. On the other hand, environmental awareness that is constantly improving and developing required to behave and act in accordance with the capabilities and resources of nature and the natural environment. As the largest building and construction consume energy and also the biggest polluters of the environment, point to the request to change the method of construction and thus to change the way of life on the planet. Poor and inadequate access to the building and construction industry certainly is recognized as the most important factor in global warming. The progress of civilization, especially in terms of technical and technological innovation brings the design and construction of facilities that will be compatible with the environment. For designers and investors is to develop, design and build "green".

  12. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  13. 基于计算机云服务的政府政务数据信息安全体系构建%Administrative Data based on the Government to Build Information Security System Computer Cloud Services

    Institute of Scientific and Technical Information of China (English)

    胡光鲁

    2014-01-01

    This paper focuses on the relationship between computers and cloud services between government financial data from multiple angles explored the Administrative data security system computer cloud services built.%主要讲述了计算机云服务与政府财务数据信息之间的关系,从多个角度探讨了计算机云服务的政府政务数据信息安全体系构建方式。

  14. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  15. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  16. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  18. Cognitive remission

    DEFF Research Database (Denmark)

    Bortolato, Beatrice; Miskowiak, Kamilla W; Köhler, Cristiano A

    2016-01-01

    dysfunction in MDD. Several other novel agents may be repurposed as cognitive enhancers for MDD treatment, including minocycline, insulin, antidiabetic agents, angiotensin-converting enzyme inhibitors, S-adenosyl methionine, acetyl-L-carnitine, alpha lipoic acid, omega-3 fatty acids, melatonin, modafinil...

  19. Cognitive Science.

    Science.gov (United States)

    Cocking, Rodney R.; Mestre, Jose P.

    The focus of this paper is on cognitive science as a model for understanding the application of human skills toward effective problem-solving. Sections include: (1) "Introduction" (discussing information processing framework, expert-novice distinctions, schema theory, and learning process); (2) "Application: The Expert-Novice…

  20. Moral Cognition

    NARCIS (Netherlands)

    Schleim, Stephan; Clausen, Jens; Levy, Neil

    2015-01-01

    Research on moral cognition is a growing and heavily multidisciplinary field. This section contains chapters addressing foundational psychological, neuroscientific, and philosophical issues of research on moral decision-making. Further- more, beyond summarizing the state of the art of their respecti

  1. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  2. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  3. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  4. Research on Issues concerning Social Security for Migrant Workers in Harmonious Society

    OpenAIRE

    Zhang, Hua

    2013-01-01

    This article analyzes the status quo of social security for migrant workers in China, and points out that there are deep system and concept reasons for the lack of labor rights and interests security, social security, equality and the right to development, political participation channels for the current migrant workers. This article then expounds the adverse effects of lack of social security for migrant workers on building a harmonious society: the lack of social security for migrant worker...

  5. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  6. Competence Building

    DEFF Research Database (Denmark)

    Borrás, Susana; Edquist, Charles

    on the one hand, and the real world of innovation policy-making on the other, typically not speaking to each other. With this purpose in mind, this paper discusses the role of competences and competence-building in the innovation process from a perspective of innovation systems; it examines how governments...... and public agencies in different countries and different times have actually approached the issue of building, maintaining and using competences in their innovation systems; it examines what are the critical and most important issues at stake from the point of view of innovation policy, looking particularly...

  7. Capturing Cognitive Processing Time for Active Authentication

    Science.gov (United States)

    2014-02-01

    Description Physical biometrics relies on physical characteristics, such as fingerprints or retinal patterns. The behavioral biometric of keystroke...cognitive fingerprint for continuous authentication. Its effectiveness has been verified through a campus-wide experiment at Iowa State University...typing rhythm (CTR), Support Vector Machine (SVM), Behavioral Biometrics 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF

  8. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  9. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  10. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  11. Air quality in quarters and system of personal security

    Directory of Open Access Journals (Sweden)

    L.L. Goshka

    2010-10-01

    Full Text Available In the article climatic systems are considered as systems of personal security. Roles of State, building proprietors, inhabitants in the formation of climate favorable for health are analysed. Regulated heat and air conditioning systems are considered particularly, because they can give personal security in temperature.

  12. Channels: Runtime System Infrastructure for Security-typed Languages

    Science.gov (United States)

    2008-10-01

    Department of the Air Force contract number FA8750-07-2- 0036. The U.S. Government has for itself and others acting on its behalf an unlimited, paid-up...8] B. Hicks, S. Rueda , T. Jaeger, and P. McDaniel. From trusted to secure: Building and executing applications that enforce system security. In

  13. Logistics in Security Force Assistance: Sustainable Partner Development

    Science.gov (United States)

    2014-05-22

    original hypothesis of this paper was that efforts to build partner capacity historically only included sustainment training in a limited fashion . The...LOGISTICS IN SECURITY FORCE ASSISTANCE: SUSTAINABLE PARTNER DEVELOPMENT A Monograph by MAJ J. Troy Fisher United...Logistics in Security Force Assistance: Sustainable Partner Development 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT

  14. Command and Control during Security Incidents/Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  15. Potential of Cognitive Computing and Cognitive Systems

    Science.gov (United States)

    Noor, Ahmed K.

    2014-11-01

    Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The cognitive assistants engage, individually or collectively, with humans through a combination of adaptive multimodal interfaces, and advanced visualization and navigation techniques. The realization of future cognitive environments requires the development of a cognitive innovation ecosystem for the engineering workforce. The continuously expanding major components of the ecosystem include integrated knowledge discovery and exploitation facilities (incorporating predictive and prescriptive big data analytics); novel cognitive modeling and visual simulation facilities; cognitive multimodal interfaces; and cognitive mobile and wearable devices. The ecosystem will provide timely, engaging, personalized / collaborative, learning and effective decision making. It will stimulate creativity and innovation, and prepare the participants to work in future cognitive enterprises and develop new cognitive products of increasing complexity. http://www.aee.odu.edu/cognitivecomp

  16. 军队医院网络安全风险与控制%Security Risk Analysis of Military Hospital Network Security and Practice on Security Operation

    Institute of Scientific and Technical Information of China (English)

    杨俊; 刘敏超

    2015-01-01

    Hospital network is a carrier of hospital information system. Building network security has the proper meaning of military hospital informatization. By analyzing the complexity and security risk of military hospital network, we summarized the network security operation scheme including physical isolation, physical security, access security, internet security, authorization and terminal security in practice.%医院网络是医院信息系统的载体,构建安全网络是军队医院信息化的题中之义。通过分析军队医院网络复杂性及其安全风险,总结我院构建网络隔离、物理安全、接入安全、互联安全、权限管理和终端安全的网络安全运维实践方案。

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  18. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  19. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  20. Implementing message systems in multilevel secure environments: Problems and approaches

    Science.gov (United States)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  1. Building Procurement

    DEFF Research Database (Denmark)

    Andersson, Niclas

    2007-01-01

    despite this excellent book, the knowledge, expertise, well-articulated argument and collection of recent research efforts that are provided by the three authors will help to make project success less elusive. The book constitutes a thorough and comprehensive investigation of building procurement, which......, which gives the book a challenging contribution to the existing body of knowledge....

  2. Building Sandcastles

    DEFF Research Database (Denmark)

    Jensen, Steffen Moltrup Ernø; Korsgaard, Steffen; Shumar, Wes

    of entrepreneurship education. Our theoretical and methodological approach builds on Actor-Network Theory. The empirical settings of our study consist of two entrepreneurship courses which differ in terms of temporal extension and physical setting. Data is collected using observation and interview techniques. Our...

  3. Building Partnerships.

    Science.gov (United States)

    Kisner, Mary J.; And Others

    1997-01-01

    Defines school-business partnerships and reviews changes in such partnerships over the past 25 years. Provides steps to building effective partnerships for school-to-work activities: review the school's mission; select partners that will bring strength to the relationship; set clearly defined, realistic goals; maintain the partnership; and…

  4. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  5. Nonquantum Cognition

    CERN Document Server

    Ghose, Partha

    2012-01-01

    The Hilbert space structure of classical field theory is proposed as a general theoretical framework to model human cognitive processes which do not often follow classical (Bayesian) probability principles. This leads to an extension of the circumplex model of affect and a Poincar\\'{e} sphere representation. A specific toy field theoretic model of the brain as a coherent structure in the presence of noise is also proposed that agrees qualitatively with Pavlovian fear conditioning studies.

  6. Can cognitive science create a cognitive economics?

    Science.gov (United States)

    Chater, Nick

    2015-02-01

    Cognitive science can intersect with economics in at least three productive ways: by providing richer models of individual behaviour for use in economic analysis; by drawing from economic theory in order to model distributed cognition; and jointly to create more powerful 'rational' models of cognitive processes and social interaction. There is the prospect of moving from behavioural economics to a genuinely cognitive economics.

  7. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  8. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  9. A Survey on Spectrum Sensing Security Issues in Cognitive Radio Networks%认知无线电网络中频谱感知安全的研究进展

    Institute of Scientific and Technical Information of China (English)

    汪晓睿; 刘全

    2011-01-01

    频谱感知是认知无线电网络中的核心功能,它的引入可使次用户在不干扰主用户的前提下实现对授权频段的伺机接入,然而,同时也给网络带来了许多安全方面的新隐患.该文对频谱感知安全的最新研究进展进行了综述,针对物理层的伪装主用户攻击,分析了两种主流解决思路的可行性.针对链路层的篡改感知数据攻击,分别在信息融合式和分布式两种不同的感知场景下,归纳并比较了几种典型抗攻击策略的优劣.在此基础上,明确了下一步的主要研究方向.%In CRNs,spectrum sensing is the core functionality,and with the help of it, the secondary users are allowed to access the authorized spectrum bands in an opportunistic manner, without causing any interference to the primary users. However,it also brings in some new security threats. In this paper,the recent advances of security issues in CRNs are surveyed. For the primary user emulation attacks in the physical layer,the feasibility of two mainstream solutions is analyzed. For the spectrum sensing data falsification attacks in the link layer,the performances of several typical anti-attack strategies are summarized and compared,in the information-fusion-based CSS scenario and the decentralized CSS scenario,respectively. Furthermore,the main directions for the future research are viewed.

  10. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  11. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  12. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  13. Based on combination of L2TP and IPSec VPN security technology research

    Directory of Open Access Journals (Sweden)

    Ya-qin Fan

    2012-01-01

    Full Text Available This report is written to provide a method of building secure VPN by combination of L2TP and IPSec in order to meet the requirements of secure transmission of data and improve the VPN security technology. It remedies the secured short comes of L2TP Tunneling Protocol Tunneling Protocol and IPSec security. Simulation and analysis show that the construction method can improve the security of data transmission, and the simulation results of VPN is valuable for security professionals to refer.

  14. Building energy demand aggregation and simulation tools

    DEFF Research Database (Denmark)

    Gianniou, Panagiota; Heller, Alfred; Rode, Carsten

    2015-01-01

    to neighbourhoods and cities. Buildings occupy a key place in the development of smart cities as they represent an important potential to integrate smart energy solutions. Building energy consumption affects significantly the performance of the entire energy network. Therefore, a realistic estimation...... of the aggregated building energy use will not only ensure security of supply but also enhance the stabilization of national energy balances. In this study, the aggregation of building energy demand was investigated for a real case in Sønderborg, Denmark. Sixteen single-family houses -mainly built in the 1960s......- were examined, all connected to the regional district heating network. The aggregation of building energy demands was carried out according to typologies, being represented by archetype buildings. These houses were modelled with dynamic energy simulation software and with a simplified simulation tool...

  15. Network Security Scanner

    OpenAIRE

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  16. Some Opinions on the Relation between Security Economy and Economic Security

    Directory of Open Access Journals (Sweden)

    VALERIU IOAN-FRANC

    2010-12-01

    Full Text Available The paper basically deals with two important concepts: security economy and economic security. The former is a relatively new term implying the way of building an entire system of protection by measures and activities to prevent deliberate actions affecting the quality of life and goods, while the latter is a term understood only post factum, when the threats to the economic security of a state have had effect. Therefore, a macroeconomic equilibrium at the world level should be correlated with internal political, economic and social equilibrium in order to ensure long-term sustainable development of the economy.

  17. Low-Cost Security Measures for School Facilities

    Science.gov (United States)

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  18. Building Letters

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Cabinet是种十分吸引人却很简单的衬线字体,是由一名匿名字体设计师专门为Building Letters最新的资金筹集活动所设计的。这个Building Letters包中包含一个CDROM,有32种字体,以及一本专门设计的杂志和两张由Eboy和Emigre所设计的海报。字体光盘样例是由世界顶级的字体设计师们设计的.

  19. Building Bridges

    DEFF Research Database (Denmark)

    The report Building Bridges adresses the questions why, how and for whom academic audience research has public value, from the different points of view of the four working groups in the COST Action IS0906 Transforming Audiences, Transforming Societies – “New Media Genres, Media Literacy and Trust...... in the Media”, “Audience Interactivity and Participation”, “The Role of Media and ICT Use for Evolving Social Relationships” and “Audience Transformations and Social Integration”. Building Bridges is the result of an ongoing dialogue between the Action and non-academic stakeholders in the field of audience...... Belgrade), Leo Pekkala (Finnish Centre for Media Education and Audiovisual Media/MEKU), Julie Uldam (Network on Civic Engagement and Social Innovation) and Gabriella Velics (Community Media Forum Europe)....

  20. A Research Proposal on Cognitive Opportunistic Communications and Cognitive Cross-layer Protocol Stack Design

    Science.gov (United States)

    2012-07-23

    ABSTRACT 16. SECURITY CLASSIFICATION OF: The specific aims of the project include: (i) to propose a Cognitive Network concept by applying the cognition loop...identify the technology being used (e.g., ZigBee vs. Bluetooth, vs. IEEE 802.11), and is therefore a useful tool on which cognitive behaviors can be built...The developed tool has the ability to detect spectrum occupancy, with the potential to also identify the technology being used (e.g., ZigBee vs

  1. Building economics

    DEFF Research Database (Denmark)

    Pedersen, D.O.(red.)

    Publikationen er på engelsk. Den omfatter alle indlæg på det fjerde internationale symposium om byggeøkonomi, der blev arrangeret af SBI for det internationale byggeforskningsråd CIB. De fem bind omhandler: Methods of Economic Evaluation, Design Optimization, Ressource Utilization, The Building...... Market og Economics and Technological Forecasting in Construction. Et indledende bind bringer statusrapporter for de fem forskningsområder, og det sidste bind sammenfatter debatten på symposiet....

  2. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  3. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  4. Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach

    Directory of Open Access Journals (Sweden)

    G.K. Pradhan

    2010-07-01

    Full Text Available To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing environment has been recognized as an imperative requirement and to advance homeland security effort. The key incentive following this research is to build a secure and trusted information-sharing approach for governmentdepartments. This paper presents an efficient role and cooperation based information sharing approach for secure exchange of confidential and top secret information amongst security personnels and government departments within the national boundaries using public key cryptography. The devised approach makes use of cryptographic hash function; public key cryptosystem and a unique and complex mapping function for securely exchanging confidential information. Furthermore, the proposed approach facilitates privacy preserving information sharing with probable restrictions based on the rank of the security personnels. The developed role and cooperation based information sharing approach ensures secure and stream-lined information sharing among security personnels and government intelligence departments to avoid threatening activities. The experimental results demonstrate the effectiveness of theproposed information sharing approach.

  5. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  6. WASTE TREATMENT BUILDING SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    F. Habashi

    2000-06-22

    The Waste Treatment Building System provides the space, layout, structures, and embedded subsystems that support the processing of low-level liquid and solid radioactive waste generated within the Monitored Geologic Repository (MGR). The activities conducted in the Waste Treatment Building include sorting, volume reduction, and packaging of dry waste, and collecting, processing, solidification, and packaging of liquid waste. The Waste Treatment Building System is located on the surface within the protected area of the MGR. The Waste Treatment Building System helps maintain a suitable environment for the waste processing and protects the systems within the Waste Treatment Building (WTB) from most of the natural and induced environments. The WTB also confines contaminants and provides radiological protection to personnel. In addition to the waste processing operations, the Waste Treatment Building System provides space and layout for staging of packaged waste for shipment, industrial and radiological safety systems, control and monitoring of operations, safeguards and security systems, and fire protection, ventilation and utilities systems. The Waste Treatment Building System also provides the required space and layout for maintenance activities, tool storage, and administrative facilities. The Waste Treatment Building System integrates waste processing systems within its protective structure to support the throughput rates established for the MGR. The Waste Treatment Building System also provides shielding, layout, and other design features to help limit personnel radiation exposures to levels which are as low as is reasonably achievable (ALARA). The Waste Treatment Building System interfaces with the Site Generated Radiological Waste Handling System, and with other MGR systems that support the waste processing operations. The Waste Treatment Building System interfaces with the General Site Transportation System, Site Communications System, Site Water System, MGR

  7. Dynamically Reconfigurable FFTs for Cognitive Radio on a Multiprocessor Platform

    NARCIS (Netherlands)

    Zhang, Qiwei; Walters, K.H.G.; Kokkeler, A.B.J.; Smit, G.J.M.

    2008-01-01

    Multiprocessor platforms have been proposed as an enabling technology for Cognitive Radio. In this paper, we explore various FFT implementations on a multiprocessor prototype platform as building components for OFDM based Cognitive Radio. The results show that our FFT implementations on the multipro

  8. The Rationality Debate: Application of Cognitive Psychology to Mathematics Education

    Science.gov (United States)

    Leron, Uri; Hazzan, Orit

    2006-01-01

    Research in mathematics education usually attempts to look into students' learning and other mental processes. It could therefore be expected to build on knowledge acquired within the academic discipline of cognitive psychology. Our aim in this paper is to show how some recent developments in cognitive psychology can help interpret empirical…

  9. Development of cognitive model for navigating on the web

    NARCIS (Netherlands)

    Juvina, I.

    2006-01-01

    The objective of this thesis is to build a cognitive model of human performance in Web-assisted tasks. The research is driven by the following questions: What are the most important factors in determining success in Web-assisted tasks? What cognitive mechanisms are involved in these factors? What

  10. 移动计算安全性%Mobile Computing Security

    Institute of Scientific and Technical Information of China (English)

    胡健; 刘锦德

    2000-01-01

    In the first,security issues in open system that supports mobile computing are discussed in detail,and then the fundamental principle for building a security system in the environment of mobile computing is given.According to the principle,security issues and policies related to mobile code programming language and mobile agent system are further discussed.

  11. X.509 Authentication Services to Enhance the Data Security in Cloud Computing

    OpenAIRE

    Surbhi Chauhan; Kamal Kant; Arjun Singh

    2012-01-01

    This paper represents a method to build a Cloud Security by giving concept of X.509 authentication services. We are discussing theory of cloud computing, feature of cloud computing and cloud security .We proposed a X.509 format to enhances data security in cloud (Public). Cloud computing is a new computational paradigm that offers an innovative business model for organization.

  12. Danish Interests in Regional Security Institutions in East Africa

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    through capacity building projects anchored in different regional security institutions. The report illuminates some of the risks that such capacity building projects might confront. Furthermore the report points out some of the challenges that exist in the cooperation between the Ministry of Foreign......For the past decade, peace and security in East Africa have gained increasing focus internationally. The region has experienced armed conflicts, civil wars, rebellion, drought and famine. Yet, at the same time, there is an emerging ambition among a number of African states to handle security issues...... on the continent independently. Such ambitions have fostered a variety of military capacity building programmes supported by external donors. The present report explores how up until now Denmark has sought to contribute to strengthening political and military security in East Africa. This has mainly been done...

  13. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  14. Quantum Oblivious Transfer: a secure practical implementation

    Science.gov (United States)

    Nagy, Marius; Nagy, Naya

    2016-12-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  15. Quantum Oblivious Transfer: a secure practical implementation

    Science.gov (United States)

    Nagy, Marius; Nagy, Naya

    2016-09-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  16. Conceptions of cognition for cognitive engineering

    DEFF Research Database (Denmark)

    Blomberg, Olle

    2011-01-01

    as part of the development of a new understanding of what cognition is and where the boundaries of cognitive systems are. Cognition, it is claimed, is not just situated or embedded, but extended and distributed in the world. My main question in this article is what the practical significance...... that there is not anything special about the biological boundary of the skin and skull per se, rather than some positive claim about where the boundaries of extended or distributed cognitive systems really are. I also examine the role of the concept of cognition in the theoretical frameworks of Distributed Cognition, Joint...

  17. On security arguments of the second round SHA-3 candidates

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart;

    2012-01-01

    In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5 and SHA-1. NIST received many submissions, 51...... of which got accepted to the first round. 14 candidates were left in the second round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection process is the SHA-3 hash function security. We identify two important classes of security arguments...... for the new designs: (1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions for the second round candidates...

  18. Cyberpsychology: a human-interaction perspective based on cognitive modeling.

    Science.gov (United States)

    Emond, Bruno; West, Robert L

    2003-10-01

    This paper argues for the relevance of cognitive modeling and cognitive architectures to cyberpsychology. From a human-computer interaction point of view, cognitive modeling can have benefits both for theory and model building, and for the design and evaluation of sociotechnical systems usability. Cognitive modeling research applied to human-computer interaction has two complimentary objectives: (1) to develop theories and computational models of human interactive behavior with information and collaborative technologies, and (2) to use the computational models as building blocks for the design, implementation, and evaluation of interactive technologies. From the perspective of building theories and models, cognitive modeling offers the possibility to anchor cyberpsychology theories and models into cognitive architectures. From the perspective of the design and evaluation of socio-technical systems, cognitive models can provide the basis for simulated users, which can play an important role in usability testing. As an example of application of cognitive modeling to technology design, the paper presents a simulation of interactive behavior with five different adaptive menu algorithms: random, fixed, stacked, frequency based, and activation based. Results of the simulation indicate that fixed menu positions seem to offer the best support for classification like tasks such as filing e-mails. This research is part of the Human-Computer Interaction, and the Broadband Visual Communication research programs at the National Research Council of Canada, in collaboration with the Carleton Cognitive Modeling Lab at Carleton University.

  19. MYCELIUM BUILDING

    OpenAIRE

    Jondelius, Olof

    2015-01-01

    This work is looking in to what possibilites and restrictions comes with using mycelium as a building material for a small house. It includes reasoning around solutions for some of the problems and presenting some ideas of how to use some of the materials properties in your favor. A general background of why we need to start look in to alternative materials for all petroleum materials are presented. Det här arbetet har varit inriktat på att se vilka möjligheter samt begränsningar det skul...

  20. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  1. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism.......Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  2. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  3. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  4. QUAIL: A Quantitative Security Analyzer for Imperative Code

    DEFF Research Database (Denmark)

    Biondi, Fabrizio; Wasowski, Andrzej; Traonouez, Louis-Marie;

    2013-01-01

    Quantitative security analysis evaluates and compares how effectively a system protects its secret data. We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information. QUAIL builds a Markov Chain model...... the safety of randomized protocols depending on secret data, allowing to verify a security protocol’s effectiveness. We experiment with a few examples and show that QUAIL’s security analysis is more accurate and revealing than results of other tools...

  5. Secrets and lies digital security in a networked world

    CERN Document Server

    Schneier, Bruce

    2000-01-01

    Bestselling author Bruce Schneier offers his expert guidance on achieving security on a networkInternationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to

  6. Social Security Fund Ready to Enter International Market

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Vice-Chairman of the Board of the National Social Security Fund Council. Feng Jianshen. revealed recently that. from now on. China plans to use five years or even a longer thne to make the total social security fund assets reach RMB 1 tillion and build the National Social Security Fund Council into a world first-rate old-age pension administrative agency.Feng emphasized that after three years' operation, social security fund has entered into a crucial period. The key lies in innovation, which, first of ...

  7. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  8. Cultural Security: The Notion, Resources and the Instruments of Implimentation

    Directory of Open Access Journals (Sweden)

    A. Yu. Goloborod’ko

    2015-01-01

    Full Text Available The paper deals with the description of some components for cognitive- methodological construct considered in the context of state culture policy tools as factor of strengthening of cultural security in the system of national security of the modern Russia. The construct presents the possibilities to accumulate through state cultural policytools a powerful protecting potential of culture in Russia in social formation and strengthening of the state viability. 

  9. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  10. CORPORATE IDENTITY AS A FACTOR OF CORPORATE SECURITY

    OpenAIRE

    Perelygina, Elena B.

    2011-01-01

    Forming-up of the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  11. Sequential motor skill: cognition, perception and action

    NARCIS (Netherlands)

    Ruitenberg, M.F.L.

    2013-01-01

    Discrete movement sequences are assumed to be the building blocks of more complex sequential actions that are present in our everyday behavior. The studies presented in this dissertation address the (neuro)cognitive underpinnings of such movement sequences, in particular in relationship to the role

  12. COGNITIVE COMPETENCE COMPARED TO COGNITIVE INDEPENDENCE AND COGNITIVE ACTIVITY

    Directory of Open Access Journals (Sweden)

    Irina B. Shmigirilova

    2014-01-01

    Full Text Available The research is aimed at identifying the essence of the cognitive competence concept in comparison with the concepts of cognitive independence and activity.Methods: The methodology implies a theoretical analysis of psychopedagogical and methodological materials on the cognitive competence formation; generalized teaching experience; empirical methods of direct observations of educational process in the secondary school classrooms; interviews with school teachers and pupils.Results: The research outcomes reveal a semantic intersection between the cognitive competence, independence and activity, and their distinctive features. The paper emphasizes the importance of cognitive competence as an adaptive mechanism in situations of uncertainty and instability.Scientific novelty: The author clarifies the concept of cognitive competence regarding it as a multi-component and systematic characteristic of a personality.Practical significance: The research findings can be used by specialists in didactics developing the teaching techniques of cognitive competence formation for schoolchildren.

  13. Cognitive and artificial representations in handwriting recognition

    Science.gov (United States)

    Lenaghan, Andrew P.; Malyan, Ron

    1996-03-01

    Both cognitive processes and artificial recognition systems may be characterized by the forms of representation they build and manipulate. This paper looks at how handwriting is represented in current recognition systems and the psychological evidence for its representation in the cognitive processes responsible for reading. Empirical psychological work on feature extraction in early visual processing is surveyed to show that a sound psychological basis for feature extraction exists and to describe the features this approach leads to. The first stage of the development of an architecture for a handwriting recognition system which has been strongly influenced by the psychological evidence for the cognitive processes and representations used in early visual processing, is reported. This architecture builds a number of parallel low level feature maps from raw data. These feature maps are thresholded and a region labeling algorithm is used to generate sets of features. Fuzzy logic is used to quantify the uncertainty in the presence of individual features.

  14. Cognitive Modeling at ICCM: State of the Art and Future Directions.

    Science.gov (United States)

    Taatgen, Niels A; van Vugt, Marieke K; Borst, Jelmer P; Mehlhorn, Katja

    2016-01-01

    The goal of cognitive modeling is to build faithful simulations of human cognition. One of the challenges is that multiple models can often explain the same phenomena. Another challenge is that models are often very hard to understand, explore, and reuse by others. We discuss some of the solutions that were discussed during the 2015 International Conference on Cognitive Modeling.

  15. Representations in Dynamical Embodied Agents: Re-Analyzing a Minimally Cognitive Model Agent

    Science.gov (United States)

    Mirolli, Marco

    2012-01-01

    Understanding the role of "representations" in cognitive science is a fundamental problem facing the emerging framework of embodied, situated, dynamical cognition. To make progress, I follow the approach proposed by an influential representational skeptic, Randall Beer: building artificial agents capable of minimally cognitive behaviors and…

  16. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ...Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion. In contrast, a hybrid-secure protocol provides different security guarantees depending on the set of corrupted parties and the computational power...... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t privacy and correctness only) for up to t

  17. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  18. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  19. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  20. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  1. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  2. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  3. Enhanced ATM Security System using Biometrics

    Directory of Open Access Journals (Sweden)

    Selina Oko

    2012-09-01

    Full Text Available Because biometrics-based authentication offers several advantages over other authentication methods, there hasbeen a significant surge in the use of biometrics for user authentication in recent years. In this paper the existing security of the ATM (Automated Teller Machine system has been improved by integrating the fingerprint of the user into the banks database as to further authenticate it. This was achieved by modelling and building an ATM simulator that will mimic a typical ATM system. The end result is an enhanced biometric authenticated ATM system that ensures greater security and increased customers confidence in the banking sector.

  4. Security applications of virtual reality GIS

    Science.gov (United States)

    Faust, Nickolas L.

    1996-02-01

    Geographic information systems (GISs) represent a technology that is being used by many disciplines throughout the world. GIS is currently being used in many security related applications for route planning, location of key facilities, and as an index into higher detail data sets such as building plans. The coming of the Olympic Games to the Atlanta area in 1996 gives us a chance to show the practical uses of GIS in security applications. This paper investigates the potential for GIS and visualization techniques to be used in a hostage rescue situation and in planning for the placement of surveillance cameras within the Georgia Tech campus, the 10996 Olympic Village.

  5. Los Alamos CCS (Center for Computer Security) formal computer security model

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  6. Spectrum Security Situational Awareness for Routing in Cognitive Radio Networks%认知网络中一种基于频谱安全态势感知的路由方案

    Institute of Scientific and Technical Information of China (English)

    李方伟; 刘帆; 朱江; 聂益芳

    2014-01-01

    This paper concerns the construction of accurate spectral situation map, which can help to a-chieve frequency resource reuse. The traditional methods of constructing spectrum space situation map do not take the influence of malicious users( MUs) into consideration,but the scheme proposed in this paper makes use of Kriging interpolation to estimate the interference situation over a finite geographical area,and identifies malicious user by location detection method, then constructs a more accurate and more secure spectrum situation map. Finally,the spectrum situation map is applied in the end-to-end route protocols. Simulation results demonstrate that the proposed scheme can construct a complete spectrum situation map and the average error is only 0 . 106 dBm;it can accurately identify malicious users and the detection rate is higher than 80%;it can reduce the routing hops and increase the available spectrum space in the process of routing based on spectrum situation map after identifying MUs.%从构建准确的频谱态势图,实现频率资源充分利用的角度出发,针对目前在构建频谱态势图时没有考虑恶意用户( Malicious User,MU)存在的情况,结合克里金( Kriging)插值法估计空域内频谱干扰态势,通过地理位置检测方案识别MU,从而构建更准确、更安全的频谱态势图,并将其用于端到端的路由协议中。仿真结果表明,该方案能构建完整的频谱态势图,平均误差仅为0.106 dBm,能准确识别恶意用户,识别率高于80%;并且通过识别MU,在基于频谱态势图的路由过程中,可以减少路由跳数,增加可用频谱空间。

  7. Building a global information assurance program

    CERN Document Server

    Curts, Raymond J

    2002-01-01

    INTRODUCTION TO INFORMATION ASSURANCE (IA)AuthenticationConfidentialityNon-repudiationBASIC CONCEPTSAttributesInformation AttributesPure Information AttributesAttributes Influenced by the SystemSystem AttributesSecurity AttributesInformation System Support Planning PrinciplesThe Bottom Line, RevisitedInformation Assurance (IA)Commercial CapabilitiesSecurityNetwork ViewsRisk ManagementCognitive HierarchyTypes of LogicSummaryRISK, THREAT AND VULNERABILITYOVERVIEW OF SYSTEMS ENGINEERINGA Systems Engineering Case StudyCase Study BackgroundThe MissionThe GoalAn Approach Toward A SolutionCase Tools:

  8. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  9. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  10. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  11. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  12. Understanding global security

    OpenAIRE

    Hough, Peter

    2013-01-01

    Fully revised to incorporate recent developments, this third edition of Understanding Global Security analyzes the variety of ways in which peoples lives are threatened and / or secured in contemporary global politics. The traditional focus of Security Studies texts: war, deterrence and terrorism are analyzed alongside non-military security issues such as famine, crime, disease, disasters, environmental degradation and human rights abuses to provide a comprehensive survey of how and why peopl...

  13. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  14. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  17. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  18. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  19. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  20. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an impl

  1. Quantum secure circuit evaluation

    Institute of Scientific and Technical Information of China (English)

    CHEN Huanhuan; LI Bin; ZHUANG Zhenquan

    2004-01-01

    In order to solve the problem of classical secure circuit evaluation, this paper proposes a quantum approach. In this approach, the method of inserting redundant entangled particles and quantum signature has been employed to strengthen the security of the system. Theoretical analysis shows that our solution is secure against classical and quantum attacks.

  2. Secure Disk Mixed System

    Directory of Open Access Journals (Sweden)

    Myongchol Ri

    2013-01-01

    Full Text Available We propose a disk encryption method, called Secure Disk Mixed System (SDMS in this paper, for data protection of disk storages such as USB flash memory, USB hard disk and CD/DVD. It is aimed to solve temporal and spatial limitations of existing disk encryption methods and to control security performance flexibly according to the security requirement of system.

  3. Indicators for energy security

    NARCIS (Netherlands)

    Kruyt, B.; van Vuuren, D.P.; de Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability,

  4. Crayons and security

    OpenAIRE

    Sue Dwyer

    1999-01-01

    Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  5. Crayons and security

    Directory of Open Access Journals (Sweden)

    Sue Dwyer

    1999-04-01

    Full Text Available Until recently I have thought of security in terms of guards, radios, grilled windows and doors, close coordination with other internationalNGOs and a strong organisational security policy. This was until I attended the InterAction/OFDA security training course in London inSeptember 1998.

  6. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  7. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  8. Homeland Security and Information.

    Science.gov (United States)

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  9. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  10. Existing buildings

    DEFF Research Database (Denmark)

    Gram-Hanssen, Kirsten

    2014-01-01

    their homes. These policy measures include building regulations, energy tax and different types of incentives and information dissemination. The conclusion calls for new and innovative policy measures to cope with the realities of renovations of owner-occupied houses and how energy efficiency improvement......This paper deals with the energy consumption of existing owner-occupied detached houses and the question of how they can be energy renovated. Data on the age of the Danish housing stock, and its energy consumption is presented. Research on the potential for energy reductions in the Danish housing...... sector is discussed, and it is shown that there is a huge potential for reductions. It is a well-known problem that even if there are relevant technical means and even if it is economically feasible, the majority of house owners do not energy renovate their homes. This paper intends to address what can...

  11. 48 CFR 652.237-71 - Identification/Building Pass.

    Science.gov (United States)

    2010-10-01

    ... Pass. 652.237-71 Section 652.237-71 Federal Acquisition Regulations System DEPARTMENT OF STATE CLAUSES... Identification/Building Pass. As prescribed in 637.110(b), insert the following clause. Identification/Building Pass (APR 2004) (a) Contractors working in domestic facilities who already possess a security...

  12. Wide Area Security Region Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  13. Subjective cognitive complaints and amyloid burden in cognitively normal older individuals

    Science.gov (United States)

    Amariglio, Rebecca E.; Becker, J. Alex; Carmasin, Jeremy; Wadsworth, Lauren P.; Lorius, Natacha; Sullivan, Caroline; Maye, Jacqueline E.; Gidicsin, Christopher; Pepin, Lesley C.; Sperling, Reisa A.; Johnson, Keith A.; Rentz, Dorene M.

    2012-01-01

    Accumulating evidence suggests that subjective cognitive complaints (SCC) may indicate subtle cognitive decline characteristic of individuals with preclinical Alzheimer’s disease (AD). In this study, we sought to build upon previous studies by associating SCC and amyloid-β deposition using Positron Emission Tomography with Pittsburg Compound B (PiB-PET) in cognitively normal older individuals. One-hundred thirty one subjects (mean age 73.5 ± 6) were administered three subjective cognitive questionnaires and a brief neuropsychological battery. A relationship between a subjective memory complaints composite score and cortical PiB binding was found to be significant, even after controlling for depressive symptoms. By contrast, there were no significant relationships between objective cognitive measures of memory and executive functions and cortical PiB binding. Our study suggests that SCC may be an early indicator of AD pathology detectable prior to significant objective impairment. PMID:22940426

  14. Integrating Responsive Building Elements in Buildings

    DEFF Research Database (Denmark)

    Haase, Matthias; Amato, Alex; Heiselberg, Per

    2006-01-01

    There is a global need for a more sustainable building development. About 50% of energy is used in buildings indicating that buildings provide a considerable potential for operational energy savings. Studies were conducted with the following objectives: to perform a state-of-the-art review...... energy strategies to develop guidelines and procedures for estimation of environmental performance of responsive building elements and integrated building concepts This paper introduces the ideas of this collaborative work and discusses its usefulness for Hong Kong and China. Special focus was put...... of responsive building elements, of integrated building concepts and of environmental performance assessment methods to improve and optimize responsive building elements to develop and optimize new building concepts with integration of responsive building elements, HVAC-systems as well as natural and renewable...

  15. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  16. Idle School Buildings in Rural Areas: Will they Be Useful?

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Taking the case of Enshi City,we survey the supply of public services in rural areas from education,health,culture and social security; reveal the relationship between the use of idle school buildings in rural areas and the improvement of public services in rural areas. On the basis of expounding the status quo of idle school buildings and public services in rural areas of Enshi City,the following recommendations are put forward: using the idle school buildings to develop rural public education; using the idle school buildings to develop rural public health and medical services; using the idle school buildings to develop public cultural undertakings in rural areas; using the idle school buildings to develop social security undertakings in rural areas.

  17. Relevance theory: pragmatics and cognition.

    Science.gov (United States)

    Wearing, Catherine J

    2015-01-01

    Relevance Theory is a cognitively oriented theory of pragmatics, i.e., a theory of language use. It builds on the seminal work of H.P. Grice(1) to develop a pragmatic theory which is at once philosophically sensitive and empirically plausible (in both psychological and evolutionary terms). This entry reviews the central commitments and chief contributions of Relevance Theory, including its Gricean commitment to the centrality of intention-reading and inference in communication; the cognitively grounded notion of relevance which provides the mechanism for explaining pragmatic interpretation as an intention-driven, inferential process; and several key applications of the theory (lexical pragmatics, metaphor and irony, procedural meaning). Relevance Theory is an important contribution to our understanding of the pragmatics of communication.

  18. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  19. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  20. Network Security Using Firewalls

    Directory of Open Access Journals (Sweden)

    Radu Lucaciu

    2008-05-01

    Full Text Available As networks increase in size and complexity, security products are growing in sophistication and security threats are becoming more ingenious. The usage of security solutions has become inevitable for all modern organisations. There is no perfect security, but the idea is to make a network so hard to access, that it doesn’t worth trying. One of the crucial components that contribute to this security are firewalls. It is important to prevent undesired data before it ever gets into the target system. This is the job of firewalls and the article covers this topic.

  1. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  2. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  3. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  4. A risk management model for securing virtual healthcare communities.

    Science.gov (United States)

    Chryssanthou, Anargyros; Varlamis, Iraklis; Latsiou, Charikleia

    2011-01-01

    Virtual healthcare communities aim to bring together healthcare professionals and patients, improve the quality of healthcare services and assist healthcare professionals and researchers in their everyday activities. In a secure and reliable environment, patients share their medical data with doctors, expect confidentiality and demand reliable medical consultation. Apart from a concrete policy framework, several ethical, legal and technical issues must be considered in order to build a trustful community. This research emphasises on security issues, which can arise inside a virtual healthcare community and relate to the communication and storage of data. It capitalises on a standardised risk management methodology and a prototype architecture for healthcare community portals and justifies a security model that allows the identification, estimation and evaluation of potential security risks for the community. A hypothetical virtual healthcare community is employed in order to portray security risks and the solutions that the security model provides.

  5. A Cognitive Approach to Network Monitoring in Heterogeneous Environments

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    Abstract— Introducing intelligence by means of cognition for managing, protecting, processing, and delivering of information in mobile communication systems is the way towards ubiquitous, converged and secure communications. In this context, this paper introduces the concept of quality of informa......Abstract— Introducing intelligence by means of cognition for managing, protecting, processing, and delivering of information in mobile communication systems is the way towards ubiquitous, converged and secure communications. In this context, this paper introduces the concept of quality...... is an improved network performance in terms of maximized throughput and faster accessibility to services, minimized transport delay, improved network coverage and simplified security management. This is achieved by introducing an intelligent functionality that entails the use of cognitive learning algorithms...

  6. Smart Buildings: Business Case and Action Plan

    Energy Technology Data Exchange (ETDEWEB)

    Ehrlich, Paul; Diamond, Rick

    2009-04-01

    General Services Administration (GSA) has been a pioneer in using Smart Building technologies but it has yet to achieve the full benefits of an integrated, enterprise-wide Smart Building strategy. In July 2008, GSA developed an initial briefing memorandum that identified five actions for a Smart Buildings feasibility study: (1) Identify and cluster the major building systems under consideration for a Smart Buildings initiative; (2) Identify GSA priorities for these clusters; (3) Plan for future adoption of Smart Building strategies by identifying compatible hardware; (4) Develop a framework for implementing and testing Smart Building strategies and converged networks; and (5) Document relevant GSA and industry initiatives in this arena. Based on this briefing memorandum, PBS and FAS retained consultants from Lawrence Berkeley National Laboratory, Noblis, and the Building Intelligence Group to evaluate the potential for Smart Buildings within GSA, and to develop this report. The project has included extensive interviews with GSA staff (See Appendix A), a review of existing GSA standards and documents, and an examination of relevant GSA and industry initiatives. Based on interviews with GSA staff and a review of GSA standards and documents, the project team focused on four goals for evaluating how Smart Building technology can benefit GSA: (1) Achieve Energy Efficiency Mandates--Use Smart Building technology as a tool to meet EISA 2007 and EO 13423 goals for energy efficiency. (2) Enhance Property Management--Deploy enterprise tools for improved Operations and Maintenance (O&M) performance and verification. (3) Implement Network as the Fourth Utility--Utilize a converged broadband network to support Smart Building systems and provide GSA clients with connectivity for voice, data and video. (4) Enhance Safety and Security--Harmonize Physical Access Control Systems (PACS) with Smart Building Systems.

  7. Medical database security evaluation.

    Science.gov (United States)

    Pangalos, G J

    1993-01-01

    Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability. In order to meet these requirements a number of security functions must be specified covering areas such as access control, auditing, error recovery, etc. Appropriate confidence in these functions is also required. The 'trust' in trusted computer systems rests on their ability to prove that their secure mechanisms work as advertised and cannot be disabled or diverted. The general framework and requirements for medical database security and a number of parameters of the evaluation problem are presented and discussed. The problem of database security evaluation is then discussed, and a number of specific proposals are presented, based on a number of existing medical database security systems.

  8. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  9. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  10. COGNITIVE COMPETENCE COMPARED TO COGNITIVE INDEPENDENCE AND COGNITIVE ACTIVITY

    OpenAIRE

    2014-01-01

    The research is aimed at identifying the essence of the cognitive competence concept in comparison with the concepts of cognitive independence and activity.Methods: The methodology implies a theoretical analysis of psychopedagogical and methodological materials on the cognitive competence formation; generalized teaching experience; empirical methods of direct observations of educational process in the secondary school classrooms; interviews with school teachers and pupils.Results: The researc...

  11. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Energy Technology Data Exchange (ETDEWEB)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  12. Building energy analysis tool

    Science.gov (United States)

    Brackney, Larry; Parker, Andrew; Long, Nicholas; Metzger, Ian; Dean, Jesse; Lisell, Lars

    2016-04-12

    A building energy analysis system includes a building component library configured to store a plurality of building components, a modeling tool configured to access the building component library and create a building model of a building under analysis using building spatial data and using selected building components of the plurality of building components stored in the building component library, a building analysis engine configured to operate the building model and generate a baseline energy model of the building under analysis and further configured to apply one or more energy conservation measures to the baseline energy model in order to generate one or more corresponding optimized energy models, and a recommendation tool configured to assess the one or more optimized energy models against the baseline energy model and generate recommendations for substitute building components or modifications.

  13. User-oriented and cognitive models of information retrieval

    DEFF Research Database (Denmark)

    Järvelin, Kalervo; Ingwersen, Peter

    2010-01-01

    The domain of user-oriented and cognitive IR is first discussed, followed by a discussion on the dimensions and types of models one may build for the domain.  The focus of the present entry is on the models of user-oriented and cognitive IR, not on their empirical applications. Several models...... with different emphases on user-oriented and cognitive IR are presented - ranging from overall approaches and relevance models to procedural models, cognitive models, and task-based models. The present entry does not discuss empirical findings based on the models....

  14. Building America

    Energy Technology Data Exchange (ETDEWEB)

    Brad Oberg

    2010-12-31

    Builders generally use a 'spec and purchase' business management system (BMS) when implementing energy efficiency. A BMS is the overall operational and organizational systems and strategies that a builder uses to set up and run its company. This type of BMS treats building performance as a simple technology swap (e.g. a tank water heater to a tankless water heater) and typically compartmentalizes energy efficiency within one or two groups in the organization (e.g. purchasing and construction). While certain tools, such as details, checklists, and scopes of work, can assist builders in managing the quality of the construction of higher performance homes, they do nothing to address the underlying operational strategies and issues related to change management that builders face when they make high performance homes a core part of their mission. To achieve the systems integration necessary for attaining 40% + levels of energy efficiency, while capturing the cost tradeoffs, builders must use a 'systems approach' BMS, rather than a 'spec and purchase' BMS. The following attributes are inherent in a systems approach BMS; they are also generally seen in quality management systems (QMS), such as the National Housing Quality Certification program: Cultural and corporate alignment, Clear intent for quality and performance, Increased collaboration across internal and external teams, Better communication practices and systems, Disciplined approach to quality control, Measurement and verification of performance, Continuous feedback and improvement, and Whole house integrated design and specification.

  15. The latent structure of secure base script knowledge.

    Science.gov (United States)

    Waters, Theodore E A; Fraley, R Chris; Groh, Ashley M; Steele, Ryan D; Vaughn, Brian E; Bost, Kelly K; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I

    2015-06-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the secure base script). To date, however, the latent structure of secure base script knowledge has gone unexamined-this despite that such basic information about the factor structure and distributional properties of these individual differences has important conceptual implications for our understanding of how representations of early experience are organized and generalized, as well as methodological significance in relation to maximizing statistical power and precision. In this study, we report factor and taxometric analyses that examined the latent structure of secure base script knowledge in 2 large samples. Results suggested that variation in secure base script knowledge-as measured by both the adolescent (N = 674) and adult (N = 714) versions of the Attachment Script Assessment-is generalized across relationships and continuously distributed.

  16. Crew goal setting for security control

    OpenAIRE

    Wetter, Olive Emil; Hofer, Franziska; Jonas, Klaus

    2013-01-01

    This study investigated the effectiveness, efficiency, and robustness of simple goal setting in airport security control. As outcome, crew performance in terms of productivity (Experiment 1, field setting) was studied. Furthermore, the moderating role of negative and positive priming due to a previous task on the impact of goals (Experiment 2, laboratory setting) was analyzed. This research builds a bridge from goal setting theory to practice and prepares the grounds for its application in se...

  17. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  18. Cyberspace Forensics Readiness and Security Awareness Model

    Directory of Open Access Journals (Sweden)

    Aadil Al-Mahrouqi

    2015-06-01

    Full Text Available The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs. However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1 Forensics Readiness, 2 Active Forensics, and 3 Forensics Awareness.

  19. Security Policy Enforcement Through Refinement Process

    CERN Document Server

    Stouls, Nicolas

    2010-01-01

    In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project, based on the research of network testing methods from a high-level security policy.

  20. Human Security Agendas

    Institute of Scientific and Technical Information of China (English)

    Alan Hunter

    2012-01-01

    Ⅰ.IntroductionThe need for governments and international organisations to gain a better understanding of "security" is ever more urgent.For example in the conflict in Libya in early 2011,many security dilemmas were visible:the protection of Libyan civilians,the security of the regime,whether and how the UN or NATO should intervene,whether Europe would be threatened with a massive refugee flow,how to protect or evacuate foreign citizens (including Chinese),how to secure food and medical supplies in the midst of armed conflict.Such events may be termed "complex emergencies" which often raise legal, military and humanitarian issues simultaneously.International law and practice do not provide clear guidelines on such situations,and responses can be random,contingent on a variety of factors.Traditional concepts of security,for example protection of national borders,are certainly still relevant and legally enforceable,but more sophisticated concepts are needed to respond to security dilemmas in today's globalised world.Human security as a concept was first developed within the UN system in the 1990s,and set out,for example,in Human Security Now [1] The first section of this paper tracks the development of Human Security discourse,and also examines the broadening of the "security"concept in recent years.The second section reports on institutions with a specific interest in Human Security,for example within the UN system and in universities.The third section acknowledges some critiques of the Human Security paradigm.The last section reports on new directions that may enrich the Human Security agenda.

  1. Anatomy of a Security Operations Center

    Science.gov (United States)

    Wang, John

    2010-01-01

    Many agencies and corporations are either contemplating or in the process of building a cyber Security Operations Center (SOC). Those Agencies that have established SOCs are most likely working on major revisions or enhancements to existing capabilities. As principle developers of the NASA SOC; this Presenters' goals are to provide the GFIRST community with examples of some of the key building blocks of an Agency scale cyber Security Operations Center. This presentation viII include the inputs and outputs, the facilities or shell, as well as the internal components and the processes necessary to maintain the SOC's subsistence - in other words, the anatomy of a SOC. Details to be presented include the SOC architecture and its key components: Tier 1 Call Center, data entry, and incident triage; Tier 2 monitoring, incident handling and tracking; Tier 3 computer forensics, malware analysis, and reverse engineering; Incident Management System; Threat Management System; SOC Portal; Log Aggregation and Security Incident Management (SIM) systems; flow monitoring; IDS; etc. Specific processes and methodologies discussed include Incident States and associated Work Elements; the Incident Management Workflow Process; Cyber Threat Risk Assessment methodology; and Incident Taxonomy. The Evolution of the Cyber Security Operations Center viII be discussed; starting from reactive, to proactive, and finally to proactive. Finally, the resources necessary to establish an Agency scale SOC as well as the lessons learned in the process of standing up a SOC viII be presented.

  2. Ideology, motivated reasoning, and cognitive reflection

    Directory of Open Access Journals (Sweden)

    Dan M. Kahan

    2013-07-01

    Full Text Available Decision scientists have identified various plausible sources of ideological polarization over climate change, gun violence, national security, and like issues that turn on empirical evidence. This paper describes a study of three of them: the predominance of heuristic-driven information processing by members of the public; ideologically motivated reasoning; and the cognitive-style correlates of political conservativism. The study generated both observational and experimental data inconsistent with the hypothesis that political conservatism is distinctively associated with either unreflective thinking or motivated reasoning. Conservatives did no better or worse than liberals on the Cognitive Reflection Test (Frederick, 2005, an objective measure of information-processing dispositions associated with cognitive biases. In addition, the study found that ideologically motivated reasoning is not a consequence of over-reliance on heuristic or intuitive forms of reasoning generally. On the contrary, subjects who scored highest in cognitive reflection were the most likely to display ideologically motivated cognition. These findings corroborated an alternative hypothesis, which identifies ideologically motivated cognition as a form of information processing that promotes individuals' interests in forming and maintaining beliefs that signify their loyalty to important affinity groups. The paper discusses the practical significance of these findings, including the need to develop science communication strategies that shield policy-relevant facts from the influences that turn them into divisive symbols of political identity.

  3. Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction

    Science.gov (United States)

    Hurlin, Clément; Kirchner, Hélène

    We present a specification approach of secured systems as transition systems and security policies as constraints that guard the transitions. In this context, security properties are expressed as invariants. Then we propose an abduction algorithm to generate possible security policies for a given transition-based system. Because abduction is guided by invariants, the generated security policies enforce security properties specified by these invariants. In this framework we are able to tune abduction in two ways in order to: (i) filter out bad security policies and (ii) generate additional possible security policies. Invariant-guided abduction helps designing policies and thus allows using formal methods much earlier in the process of building secured systems. This approach is illustrated on role-based access control systems.

  4. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  5. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... of security experiences in design. The methods: Mobile probing, Prompted exploration workshops, and Acting out security involve potential future users in the process of designing IT security sensitive IT artifacts. Mobile probing collects narratives of user encounters with IT security. Prompted exploration...... of a research through design process. An everyday mobile digital signature solution has been designed, and the design problem, the design process, and the design results are presented in this dissertation. Several of my empirical findings show that the way users experience security does matter. Users...

  6. Securing Wireless Sensor Networks: Security Architectures

    Directory of Open Access Journals (Sweden)

    David Boyle

    2008-01-01

    Full Text Available Wireless sensor networking remains one of the most exciting and challenging research domains of our time. As technology progresses, so do the capabilities of sensor networks. Limited only by what can be technologically sensed, it is envisaged that wireless sensor networks will play an important part in our daily lives in the foreseeable future. Privy to many types of sensitive information, both sensed and disseminated, there is a critical need for security in a number of applications related to this technology. Resulting from the continuous debate over the most effective means of securing wireless sensor networks, this paper considers a number of the security architectures employed, and proposed, to date, with this goal in sight. They are presented such that the various characteristics of each protocol are easily identifiable to potential network designers, allowing a more informed decision to be made when implementing a security protocol for their intended application. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks, packet insertion etc. Authentication can be defined as a security mechanism, whereby, the identity of a node in the network can be identified as a valid node of the network. Subsequently, data authenticity can be achieved; once the integrity of the message sender/receiver has been established.

  7. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  8. Information security culture.

    OpenAIRE

    2008-01-01

    The current study originated from the realisation that information security is no longer solely dependent on technology. Information security breaches are often caused by users, most of the time internal to the organisation, who compromise the technology-driven solutions. This interaction between people and the information systems is seemingly the weakest link in information security. A people-oriented approach is needed to address this problem. Incorporating the human element into informatio...

  9. Information security factors systematization

    OpenAIRE

    Янченко, Вадим Николавевич; Ивченко, Александр Владимирович; Залога, Вильям Александрович; Дынник, Оксана Дмитриевна

    2015-01-01

    In this article the necessity of solving the theoretical and practical task, aimed on development the methodological basis for elaboration and implementation of information security management system, has been considered. Based on research results of scientific works and the requirements in the field of information security management the universal multilevel system of information security factors of organizations (enterprises) in the wood properties form was offered by using quality control ...

  10. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  11. Design for Security Workshop

    Science.gov (United States)

    2014-09-30

    devices and systems  Tools for secure interplay between hardware and software  Design environment for modeling and simulating hardware attacks and...and email  Improperly secured devices – no PIN lock  User intervention – jailbreaking, unlocking  Mobile has become the enterprise security...Apps  Content providers  DRM for movies, songs, etc.  Finance companies  Account data, passwords  IOT  home automation, health, etc

  12. Vehicle Tracking and Security

    Science.gov (United States)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  13. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  14. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  15. The European Energy Performance of Buildings Directive

    DEFF Research Database (Denmark)

    Petersen, Steffen; Hviid, Christian Anker

    This paper investigates the actual energy use for building operation with the calculated energy use according to the Danish implementation of the European Energy Performance of Buildings Directive (EPBD). This is important to various stakeholders in the building industry as the calculated energy ...... calculated energy use. More buildings should be investigated in the same manner before any sound conclusion can be made regarding whether the implementation of EPBD in a wide context leads to truly energy-efficient buildings.......This paper investigates the actual energy use for building operation with the calculated energy use according to the Danish implementation of the European Energy Performance of Buildings Directive (EPBD). This is important to various stakeholders in the building industry as the calculated energy...... performance is used for estimating investment security, operating budgets and for policy making. A case study shows that the actual and calculated energy use is practically the same in an average scenario. In the worst-case uncertainty scenario, the actual energy use is 20 % higher than the corrected...

  16. India-United States Security Cooperation: Past, Present, and Future

    Science.gov (United States)

    2011-12-16

    whole range of categories, including information technology, biotechnology, Nano -technology, and defense techno; and second, confidence building...on its soil remains one of India’s key strategic goals. The security and stability of Afghanistan are crucial to India’s own security concerns...Exchange of information and facilitation of technical assistance on combating marine pollution , as mutually agreed; (iv) Enhancement of their

  17. Security challenges and opportunities in adaptive and reconfigurable hardware

    OpenAIRE

    Costan, Victor Marius; Devadas, Srinivas

    2011-01-01

    We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and low cost that make cloud computing attractive in the first place. We propose augmenting regular cloud servers with a Trusted Computation Base (TCB) that can securely perform high-performance computations. Our TCB achieves cost savings by spreading functionality across two pa...

  18. Learning Tools and Applications for Cognitive Improvement

    Directory of Open Access Journals (Sweden)

    Athanasios Drigas

    2014-06-01

    Full Text Available Learning technologies are an indispensable tool for students’ cognitive improvement and assessment. ICTs in coordination with a concrete pedagogical framework may provide students and teachers flexible, engaging, cost-effective and above all, personalized learning experiences, which focus on the adoption of the 21st century cognitive skills into the actual learning process. Such higher order thinking skills (HOTS entail critical thinking, problem solving, independent inquiry, creativity, communication, collaboration, digital literacy. Therefore, technologically-supported educational environments aim at self-regulated and inquisitive, constructivist, knowledge building rather than knowledge accumulation.

  19. 公安机关如何利用媒体构建良好公共关系——基于对大连市基层派出所的警务实践调研%How the public security organs use the media to build good public relatiom Research based on the police practice of the grassroots police station in Dalian

    Institute of Scientific and Technical Information of China (English)

    凌秋千

    2012-01-01

    The public security organs are the management authorities to maintain social order, while the news media is responsible for the news monitoring functions on all walks of life that the law enforcement, service activities, team management and individual behavior of the public security organs are all under its oversight. With the increasing degree of government ad- ministrative affairs, influence and credibility of the media is also growing that the public security organs gradually recognize the status and role of the media and consciously make the construction of public relations. Faced with the large number of diverse forms of media, what are the problems for the public security organs to deal with the media? How to achieve positive interaction between the.public security organs and the media? The paper started from the police practice of the grassroots police station to explore how to .achieve positive interaction between the public security organs and the media, in order to enhance the quality of the propaganda of the police officers and the capacity to respond to the media, and thus to promote further building a harmonious public relations.%公安机关是维护社会治安的管理机关,新闻媒体担负着对各行各业实施新闻监督的职能,公安机关的执法、服务活动、队伍管理以及警察的个体行为均处于其监督之列。随着政府政务公开力度的加大。媒体的影响力和公信力也越来越大,各地公安机关逐步认识到媒体的地位和作用,有意识地开展警察公共关系建设。面对数量众多,形式多样的媒体,公安机关在应对媒体中存在哪些问题?如何实现公安机关与媒体良性互动?本文从基层公安派出所的警务实践出发探讨如何实现警方与媒体的良性互动,以期提升警务人员的新闻宣传素养和媒体应对能办,从而对进一步构建和谐的公共关系有所推动。

  20. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  1. Laser security systems

    Science.gov (United States)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  2. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  3. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  4. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  5. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  6. Technological options for and Chinese government regulation of building energy efficiency

    Institute of Scientific and Technical Information of China (English)

    FANYaming; LINZhenguo; FUXiangzhao

    2003-01-01

    Improvement of building energy efficiency, as a part of sustainable development strategies, makes great contribution to global environment protection and energy security. Presented in this paper are (i) a comprehensive overview of the technological options for building energy efficiency, (ii) government regulation of building energy efficiency, especially in China, (iii) some suggestions suitable for China.

  7. A cognitive model's view of animal cognition

    Directory of Open Access Journals (Sweden)

    Sidney D'MELLO, Stan FRANKLIN

    2011-08-01

    Full Text Available Although it is a relatively new field of study, the animal cognition literature is quite extensive and difficult to synthesize. This paper explores the contributions a comprehensive, computational, cognitive model can make toward organizing and assimilating this literature, as well as toward identifying important concepts and their interrelations. Using the LIDA model as an example, a framework is described within which to integrate the diverse research in animal cognition. Such a framework can provide both an ontology of concepts and their relations, and a working model of an animal’s cognitive processes that can compliment active empirical research. In addition to helping to account for a broad range of cognitive processes, such a model can help to comparatively assess the cognitive capabilities of different animal species. After deriving an ontology for animal cognition from the LIDA model, we apply it to develop the beginnings of a database that maps the cognitive facilities of a variety of animal species. We conclude by discussing future avenues of research, particularly the use of computational models of animal cognition as valuable tools for hypotheses generation and testing [Current Zoology 57 (4: 499–513, 2011].

  8. BUILDING 341 Seismic Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Halle, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-06-15

    The Seismic Evaluation of Building 341 located at Lawrence Livermore National Laboratory in Livermore, California has been completed. The subject building consists of a main building, Increment 1, and two smaller additions; Increments 2 and 3.

  9. Tribal Green Building Toolkit

    Science.gov (United States)

    This Tribal Green Building Toolkit (Toolkit) is designed to help tribal officials, community members, planners, developers, and architects develop and adopt building codes to support green building practices. Anyone can use this toolkit!

  10. Software Security Requirements Gathering Instrument

    OpenAIRE

    2011-01-01

    Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes Software Security Requirements Gathering Instrument (SSRGI) that helps gather security requirements from the various stakeholders. This will guide the developers to gather security requirements along with th...

  11. Cyberspace security: How to develop a security strategy

    CERN Document Server

    Raggad, Bel G

    2007-01-01

    Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

  12. Genetic influences on social cognition.

    Science.gov (United States)

    Skuse, David H; Gallagher, Louise

    2011-05-01

    Human social behavior develops under the influence of genetic, environmental, and cultural factors. Social cognition comprises our ability to understand and respond appropriately to other people's social approaches or responses. The concept embraces self-knowledge and theory of mind, or the ability to think about emotions and behavior from the perspective of another person. The neuropeptides oxytocin (OT) and vasopressin (AVP) are now known to play an important role, affecting individual differences in parenting behavior, social recognition, and affiliative behaviors. The processes of social cognition are also supported by reward circuitry, underpinned by the dopaminergic neurotransmitter system. Reward processes build social relationships, in parenting and pair-bonding, and influence social interactions that require trust, or display altruism. The impact of emotional regulation upon social behavior, including mood and anxiety, is also mediated through the serotonergic system. Variation in activity of serotonergic networks in the brain influences emotional responsivity, including subjective feelings, physiological responses, emotional expressions, and the tendency to become engaged in action as a consequence of a feeling state. Genetic variation in the receptors associated with OT, AVP, dopamine, and serotonin has been intensively studied in humans and animal models. Recent findings are building an increasingly coherent picture of regulatory mechanisms.

  13. Green building: sustainable building quality; Green Building: nachhaltige Gebaeudequalitaet

    Energy Technology Data Exchange (ETDEWEB)

    Staub, R.

    2010-07-01

    This article takes a look at the 'Portikon' office building near Zurich, Switzerland, that meets the 'Minergie-P' very low energy consumption requirements. The author is of the opinion that the project can be seen as a reference project for sustainable building technology. The structure of the seven-storey building with a central atrium is described and discussed. The 'Minergie-P' energy concept is discussed, as are the 1,100 square meters of photovoltaic panels on the roof of the building. Heating energy is provided by Zurich's waste incineration plant nearby. Electro-biological aspects in the building are taken care of by appropriate earthing and shielding of cables. The building's facility management system and the installations used are briefly discussed.

  14. Muon Fluence Measurements for Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  15. Enhancing regional security agreements through cooperative monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

  16. Danish building typologies

    DEFF Research Database (Denmark)

    Wittchen, Kim Bjarne; Kragh, Jesper

    The objective of TABULA is to develop a harmonised building typology for European countries. Each national building typology will consist of a set of residential model buildings with characteristic energy-related properties (element areas of the thermal building envelope, U-values, supply system...... efficiencies). The model buildings will each represent a specific construction period of the country in question and a specific building size. Furthermore the number of buildings, flats and the overall floor areas will be given, which are represented by the different building types of the national typologies....

  17. Danish building typologies and building stock analyses

    DEFF Research Database (Denmark)

    Wittchen, Kim Bjarne; Kragh, Jesper

    enough to meet the government’s plan to make Danish buildings free from use of fossil fuels by 2035. This will probably require around 50 % energy savings in the Danish building stock as a whole. However, the project has proven that dedicated engagement of locals can speed up market penetration...... energy savings in residential buildings. The intension with this analysis was to investigate the possible energy reduction in Denmark if the same approach had been taken for the entire Danish building stock. The report concludes that the ZeroHome initiative clearly results in energy savings, but far from...... for energy savings in the existing Building stock....

  18. Third-generation security robot

    Science.gov (United States)

    Everett, Hobart R.; Gage, Douglas W.

    1997-01-01

    ROBART III is an advanced demonstration platform for non- lethal security response measures, incorporating reflexive teleoperated control concepts developed on the earlier ROBART II system. The addition of threat-response capability to the detection and assessment features developed on previous systems has been motivated by increased military interest in Law Enforcement and Operations Other Than War. Like the MDARS robotic security system being developed at NCCOSC RDTE DIV, ROBART III will be capable of autonomously navigating in semi-structured environments such as office buildings and warehouses. Reflexive teleoperation mode employs the vehicle's extensive onboard sensor suite to prevent collisions with obstacles when the human operator assumes control and remotely drives the vehicle to investigate a situation of interest. The non-lethal-response weapon incorporated in the ROBART III system is a pneumatically-powered dart gun capable of firing a variety of 3/16-inch-diameter projectiles, including tranquilizer darts. A Gatling-gun style rotating barrel arrangement allows size shots with minimal mechanical complexity. All six darts can be fired individually or in rapid succession, and a visible-red laser sight is provided to facilitate manual operation under joystick control using video relayed to the operator from the robot's head-mounted camera. This paper presents a general description of the overall ROBART III system, with focus on sensor-assisted reflexive teleoperation of both navigation and weapon firing, and various issues related to non-lethal response capabilities.

  19. Ethical principles and guidelines for the development of cognitive systems.

    Energy Technology Data Exchange (ETDEWEB)

    Shaneyfelt, Wendy

    2006-05-01

    As cognitive systems technologies emerge, so too do the ethical issues surrounding their development and use. To develop cognitive systems technologies responsibly, Sandia National Laboratories is establishing a framework to proactively address both real and potential ethical issues. This report contains the principles and guidelines developers can use to guide them as they are confronted with ethical issues related to developing cognitive systems technologies as they apply to U.S. national security. A process to apply these principles offers a practical way to transfer these principles from paper to a working strategy. Case studies are presented to reflect upon potential scenarios and to consider resolution strategies.

  20. 以社保卡为载体的“先诊疗后结算”银医一卡通服务平台建设%BuildingBank-HospitalOne-CardServicePlatformthatSupports SocialSecurityCard-Based"TreatmentbeforePayment"Strategy

    Institute of Scientific and Technical Information of China (English)

    葛孟华; 陈国华; 俞利张

    2013-01-01

      目前多数医院采用传统付费方式,成为老百姓“看病难”主要原因之一。为合理解决此问题,优化服务流程,提高服务质量和效率,我院提出“以患者为中心”创新服务理念,采用信息化、网络化运作模式,利用多种渠道、多种方式为患者提供安全、有效、便捷的诊疗服务。同时采用银行投资,医院HIS开发,医院设计流程等方式,建设以社保卡为载体的“先诊疗后结算”银医一卡通服务平台。%At present, most hospitals use traditional payment methods, which is one of the primary causes resulting in public's difficulty with seeing doctors. In order to solve the problem, to optimize service process and to improve service quality and efficiency, our hospital proposed the"patient-centered"idea. The hospital employed an informationized, webified running model, multiple channels and methods so as to provide the patients with safe, efficient, and convenient medical services. Meanwhile approaches such as bank investment, hospital HIS development, and workflow design were used to build a bank-hospital one-card platform that can offer social security care-based"treatment before payment"services.

  1. Relaxing Chosen-Ciphertext Security

    DEFF Research Database (Denmark)

    Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper Buus

    2003-01-01

    Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from encryption schemes that need to withstand active attacks. In particular, it is regarded as the appropriate security notion for encryption schemes used as components within...... general protocols and applications. Indeed, CCA security was shown to suffice in a large variety of contexts. However, CCA security often appears to be somewhat too strong: there exist encryption schemes (some of which come up naturally in practice) that are not CCA secure, but seem sufficiently secure...... “for most practical purposes.” We propose a relaxed variant of CCA security, called Replayable CCA (RCCA) security. RCCA security accepts as secure the non-CCA (yet arguably secure) schemes mentioned above; furthermore, it suffices for most existing applications of CCA security. We provide three...

  2. Keystone Business Models for Network Security Processors

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-07-01

    Full Text Available Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing” models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.

  3. Building International Genomics Collaboration for Global Health Security

    Directory of Open Access Journals (Sweden)

    Helen H Cui

    2015-12-01

    Full Text Available Genome science and technologies are transforming life sciences globally in many ways, and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement and installation of next generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.

  4. Developing the Bench: Building An Effective Homeland Security Undergraduate Program

    Science.gov (United States)

    2008-03-01

    University Savannah State University Jacksonville State University AMERICAN PUBLIC UNIVERSITY University of Maryland University College...DATA University Courses American Public University - Charles Town, WV Emergency Planning Emergency Response to Terrorism Chemical...0195095707 AMERICAN PUBLIC UNIVERSITY 0195142632 University of Central Missouri 0195158342 Empire State College 0195332474 Virginia Commonwealth

  5. The Role of Romania in Building the New Security Architecture

    Directory of Open Access Journals (Sweden)

    Florica Brasoveanu

    2011-05-01

    Full Text Available The approach towards a multipolar world will be long lasting, and the international communitywill probably pass through a deep restructuring, where the global and regional integration will coexist withthe contradictory trend of fragmentation and ranking of the world. While due to globalism there is almostunlikely to have a war between the great powers, the amplification of the asymmetric risks, includingterrorism, organized crime and proliferation of weapons of mass destruction, is generating more and morereasons for conflict. Against the background of the rapid decrease of natural resources, along with theaccentuated population growth, the battle for strategic resources remained the most stable source of conflict.The fight for them will increase, and the grouping of countries, according to their interests, around the newcenters of power, will increasingly shape more clearly. We will probably assist to the affirmation and increaseof their pressure in order to attract, in the sphere of influence, a larger number of countries, so as to occupy aplace as advantageous as possible, within the new world order. This configuration will be determined by theinterests, knowledge capacity, the volume and quality of information, technological strength and access toresources.

  6. Building Maritime Security in Southeast Asia: Outsiders Not Welcome?

    Science.gov (United States)

    2008-01-01

    Azhar Ghani, “Jakarta Using S’pore, KL as Bogeymen?” Straits Times, 17 March 2007, available at app.mfa.gov.sg. (“KL” refers to Kuala Lumpur , the...strait itself. Malaysia is also concerned with protecting its fishing and tourism industries, which would be adversely affected by collisions and

  7. Building Health Security in Afghanistan: A New Strategy

    Science.gov (United States)

    2012-03-12

    unilaterally by allied units or in partnership with Afghan forces, an emphasis now on embedded trainers would put Afghans in the lead; but with a group of...gravity, and looks for effective partnerships with allied governments and international organizations that share an interest in 18 promoting...www.history.army.mil/ brochures/Afghanistan/Operation%20Enduring%20Freedom.htm# p3 (accessed October 10, 2011). 4 Ibid. 5 Ibid. 6 Ibid. 21 7 Ibid. 8 Ibid. 9

  8. ATM Security Using Fingerprint Biometric Identifer: An Investigative Study

    Directory of Open Access Journals (Sweden)

    Moses Okechukwu Onyesolu

    2012-04-01

    Full Text Available The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use personal identification numbers (PIN's for identification and security clearances. Conventional method of identification based on possession of ID cards or exclusive knowledge like a social security number or a password are not all together reliable. An embedded fingerprint biometric authentication scheme for automated teller machine (ATM banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is fused with the ATM for person authentication to ameliorate the security level.

  9. Electronic Health Record (EHR and Cloud Security: The Current Issues

    Directory of Open Access Journals (Sweden)

    Emmanuel Kusi Achampong

    2014-02-01

    Full Text Available With the advent of the cloud computing and its associated challenges, building a secured electronic health record (EHR in a cloud computing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing concept is becoming a popular information technology (IT infrastructure for facilitating EHR sharing and integration. In this study we discuss security concepts related to EHR sharing and integration in healthcare clouds and analyse the arising security and privacy issues in access and management of EHRs. This paper focus on the current challenges that comes with the use of the cloud computing for EHR purposes.

  10. Human factors in network security

    OpenAIRE

    Jones, Francis B.

    1991-01-01

    Human factors, such as ethics and education, are important factors in network information security. This thesis determines which human factors have significant influence on network security. Those factors are examined in relation to current security devices and procedures. Methods are introduced to evaluate security effectiveness by incorporating the appropriate human factors into network security controls

  11. Google - Security Testing Tool

    OpenAIRE

    Staykov, Georgi

    2007-01-01

    Using Google as a security testing tool, basic and advanced search techniques using advanced google search operators. Examples of obtaining control over security cameras, VoIP systems, web servers and collecting valuable information as: Credit card details, cvv codes – only using Google.

  12. Security Embedding Codes

    CERN Document Server

    Ly, Hung D; Blankenship, Yufei

    2011-01-01

    This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding...

  13. Securing personal network clusters

    NARCIS (Netherlands)

    Jehangir, Assed; Heemstra de Groot, Sonia M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  14. Generalized Software Security Framework

    Directory of Open Access Journals (Sweden)

    Smriti Jain

    2011-01-01

    Full Text Available Security of information has become a major concern in today's digitized world. As a result, effective techniques to secure information are required. The most effective way is to incorporate security in the development process itself thereby resulting into secured product. In this paper, we propose a framework that enables security to be included in the software development process. The framework consists of three layers namely; control layer, aspect layer and development layer. The control layer illustrates the managerial control of the entire software development process with the help of governance whereas aspect layer recognizes the security mechanisms that can be incorporated during the software development to identify the various security features. The development layer helps to integrate the various security aspects as well as the controls identified in the above layers during the development process. The layers are further verified by a survey amongst the IT professionals. The professionals concluded that the developed framework is easy to use due to its layered architecture and, can be customized for various types of softwares.

  15. INDECT Advanced Security Requirements

    CERN Document Server

    Uruena, Manuel; Martinez, Maria; Niemiec, Marcin; Stoianov, Nikolai

    2010-01-01

    This paper reviews the requirements for the security mechanisms that are currently being developed in the framework of the European research project INDECT. An overview of features for integrated technologies such as Virtual Private Networks (VPNs), Cryptographic Algorithms, Quantum Cryptography, Federated ID Management and Secure Mobile Ad-hoc networking are described together with their expected use in INDECT.

  16. Security in the cloud.

    Science.gov (United States)

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  17. Hydrological extremes and security

    Science.gov (United States)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  18. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  19. Smart grid security

    Energy Technology Data Exchange (ETDEWEB)

    Cuellar, Jorge (ed.) [Siemens AG, Muenchen (Germany). Corporate Technology

    2013-11-01

    The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirements, not to mention methods and solutions. The fragmentation of research agendas and proposed approaches or solutions for securing the future smart grid becomes apparent observing the results from different projects, standards, committees, etc, in different countries. The different approaches and views of the papers in this collection also witness this fragmentation. This book contains the following papers: 1. IT Security Architecture Approaches for Smart Metering and Smart Grid. 2. Smart Grid Information Exchange - Securing the Smart Grid from the Ground. 3. A Tool Set for the Evaluation of Security and Reliability in Smart Grids. 4. A Holistic View of Security and Privacy Issues in Smart Grids. 5. Hardware Security for Device Authentication in the Smart Grid. 6. Maintaining Privacy in Data Rich Demand Response Applications. 7. Data Protection in a Cloud-Enabled Smart Grid. 8. Formal Analysis of a Privacy-Preserving Billing Protocol. 9. Privacy in Smart Metering Ecosystems. 10. Energy rate at home Leveraging ZigBee to Enable Smart Grid in Residential Environment.

  20. Security the human factor

    CERN Document Server

    Kearney, Paul

    2010-01-01

    This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.