WorldWideScience

Sample records for futuristic improved security

  1. M-Banking Security - a futuristic improved security approach

    Directory of Open Access Journals (Sweden)

    Aaradhana A Deshmukh

    2010-01-01

    Full Text Available In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  2. M-Banking Security - a futuristic improved security approach

    CERN Document Server

    Navale, Geeta S; Deshmukh, Aaradhana A

    2010-01-01

    In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  3. A futuristic approach towards interface layer modifications for improved efficiency in inverted organic solar cells

    Energy Technology Data Exchange (ETDEWEB)

    Tiwari, J. P., E-mail: jai-ti2002@yahoo.com, E-mail: tiwarijp@mail.nplindia.org; Ali, Farman; Sharma, Abhishek; Chand, Suresh [Physics of Energy Harvesting Division (Organic and Hybrid Solar Cell Group), CSIR-National Physical Laboratory, CSIR-Network of Institutes for Solar Energy (NISE), Dr. K. S. Krishnan Marg, New Delhi 110012 (India); Pillai, Sriraj; Parakh, Sonal [Physics of Energy Harvesting Division (Organic and Hybrid Solar Cell Group), CSIR-National Physical Laboratory, CSIR-Network of Institutes for Solar Energy (NISE), Dr. K. S. Krishnan Marg, New Delhi 110012 (India); Department of Physics, Delhi Technological University, Bawana Road, Delhi 110042 (India)

    2014-01-27

    Inverted polymer Solar Cells of the classical poly (3-hexylthiophene) (P3HT):(6,6)-phenyl-C{sub 61}butyric acid methyl ester (PC{sub 61}BM) blend on indium tin oxide substrates were fabricated, which shows improved device performance, by using a facile solution–processed ZnO-polyelectrolytes [poly (diallyldimethylammonium chloride) (PDADMAC), Poly (acrylic acid sodium salt) (PAS), poly (4-styrenesulfonic acid) (PSS), and Polyvinylpyrrolidone (PVP)] nanocomposite as a cathode interface layer compared to devices using pristine ZnO as cathode buffer layer in ambient conditions. The devices with different combinations of polyelectrolyte with ZnO show different improvements in the device efficiency. The combinations of ZnO with PVP and PDADMAC show highest amount of improvements in the efficiency by a factor of ∼17–19. The improvement of the efficiency may be due to various phenomena, such as the passivation of ZnO surface as well as bulk traps, work function modification, improved energy level alignment, improved electronic coupling of the inorganic/organic interface, improved light harvesting, and decrease of surface as well as bulk charge recombination in the device. The introduction of polyelectrolyte into ZnO inhibits the aggregation of ZnO nanoparticles yielding the large area ZnO nanoclusters; and hence, forming the uniform film of ZnO resulting in the modifications of morphology as well as electronic structure of ZnO-polyelectrolyte nano-composite favouring better electronic coupling between cathode and active layer and hence enhancing the current and, consequently, the efficiency. This simple low temperature ZnO-polyelectrolyte nanocomposite based protocol proposed for cathode interface layer modification may be very much useful for roll to roll industrial manufacturing of organic solar cells.

  4. Crime and Justice: Taking a Futuristic Approach.

    Science.gov (United States)

    Stephens, Gene; Tafoya, William L.

    1985-01-01

    How to apply futuristic approaches to crime and justice in an effort to prevent crime and deal more effectively with offenders is described. Planning, brainstorming, using the Delphi method, and opinion polling are discussed. (Author/RM)

  5. A new futuristic glaucoma therapeutic management paradigm

    Directory of Open Access Journals (Sweden)

    Anusuya Gehlot

    2015-04-01

    Full Text Available Glaucoma is a group of diseases, characterized by a progressive form of optic nerve damage. Current studies indicate more selective pathophysiological involvement, thereby targeted therapies are warranted. Although both the prostaglandin analogs and beta blockers are still, most commonly used drugs for glaucoma, due to their efficacy, lack of adverse effects. In addition, a stepped care approach is the corner stone for its management. In addition, attempts have been made to enhance patient compliance and ocular delivery of already available anti-glaucoma drugs such as pilocarpine and timolol maleate. Notable among futuristic treatment options are; novel delivery systems, benzalkonium chloride-free drugs, various glaucoma drainage devices, new targeted therapies and prompt diagnosis plus aggressive treatment, in patients with primary angle closure glaucoma. Promising new focus on vision sparing, greater patient safety and tolerability will provide improved treatment options and long-term preservation of vision and quality of life. [Int J Basic Clin Pharmacol 2015; 4(2.000: 195-197

  6. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  7. Improving Information Security Risk Management

    Science.gov (United States)

    Singh, Anand

    2009-01-01

    manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…

  8. SNIF: A Futuristic Neutrino Probe for Undeclared Nuclear Fission Reactors

    CERN Document Server

    Lasserre, Thierry; Mention, Guillaume; Reboulleau, Romain; Cribier, Michel; Letourneau, Alain; Lhuillier, David

    2010-01-01

    Today reactor neutrino experiments are at the cutting edge of fundamental research in particle physics. Understanding the neutrino is far from complete, but thanks to the impressive progress in this field over the last 15 years, a few research groups are seriously considering that neutrinos could be useful for society. The International Atomic Energy Agency (IAEA) works with its Member States to promote safe, secure and peaceful nuclear technologies. In a context of international tension and nuclear renaissance, neutrino detectors could help IAEA to enforce the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). In this article we discuss a futuristic neutrino application to detect and localize an undeclared nuclear reactor from across borders. The SNIF (Secret Neutrino Interactions Finder) concept proposes to use a few hundred thousand tons neutrino detectors to unveil clandestine fission reactors. Beyond previous studies we provide estimates of all known background sources as a function of the detecto...

  9. Improved security analysis of Fugue-256

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde;

    2011-01-01

    in the G transform. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Next we study the security of Fugue-256 against free-start distinguishers and free-start collisions. In this direction, we use an improved variant of the differential...

  10. A improved Network Security Situation Awareness Model

    Directory of Open Access Journals (Sweden)

    Li Fangwei

    2015-08-01

    Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.

  11. Improving Social Security's Financial Capability Assessments.

    Science.gov (United States)

    Appelbaum, Paul S; Birkenmaier, Julie; Norman, Marc

    2016-07-01

    When Social Security beneficiaries are incapable of managing their benefits, the agency can appoint a representative payee to administer benefits on their behalf. A committee of the Institute of Medicine was asked by the Social Security Administration to review the process by which financial capability determinations are made and to recommend improvements. The committee's conclusions and recommendations include the following: giving priority to real-world financial performance in assessing capability, providing clearer instructions to informants, developing systematic approaches to identifying beneficiaries at risk of incapability, exploring the use of a supervised direct payment option, and instituting regular data collection to assist in improving operations.

  12. Improving security of a chaotic encryption approach

    OpenAIRE

    Li, SJ; Mou, XQ; Cai, YL

    2001-01-01

    E. Alvarez et al. presented a new chaotic encryption approach recently. But soon G. Alvarez et al. broke it with four cryptanalytic methods and found some other weaknesses. In this Letter we point out why the original scheme is so vulnerable to the proposed four attacks. The chief reasons are two essential defects existing in the original scheme. Based on such a fact, we present an improved encryption scheme to obtain higher security. The cryptographic properties of the improved scheme are st...

  13. Improved security analysis of Fugue-256

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Bagheri, Nasour; Knudsen, Lars Ramkilde

    2011-01-01

    in the G transform. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Next we study the security of Fugue-256 against free-start distinguishers and free-start collisions. In this direction, we use an improved variant of the differential...... transform is mapped with a transform to a 256-bit digest. In this paper, we present some improved as well as new analytical results of Fugue-256 (with lengthpadding). First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the G transform to 16.5 rounds, thus showing weak diffusion...

  14. Improved information security using robust Steganography system

    CERN Document Server

    Juneja, Mamta

    2010-01-01

    Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. In this paper, a specific image based steganography technique for communicating information more securely between two locations is proposed. The author incorporated the idea of secret key and password security features for authentication at both ends in order to achieve high level of security. As a further improvement of security level, the information has been permuted, encoded and then finally embedded on an image to form the stego image. In addition segmented objects extraction and reassembly of the stego image through normalized cut method has been carried out at the sender side and receiver side respectively in ord...

  15. QAODV: Improved Security Routing Protocol of AODV

    OpenAIRE

    Ruihui Mu; Wuqiang Zhang

    2013-01-01

    Network control system (NCS) has higher requirements on QoS index of the network, but MANET can hardly meet the demands of control systems because of its own characteristics. The paper improves AODV and proposes AODV routing protocol QAODV with certain QoS security in combination with NCS and MANET, and expounds routing detection, routing register and routing maintenance. Simulation results show that end-to-end delay and packet loss of QAODV reduces evidently compared with AODV, and the proto...

  16. IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-07-01

    Full Text Available Quantum Cryptography or Quantum Key Distribution (QKD solves the key distribution problem byallowing the exchange of a cryptographic key between two remote parties with absolute security,guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it wasnoted that quantum computers could break public key cryptosystems based on number theory. Actually,the progress of research in this field allows the implementation of QKD outside of laboratories. Effortsare made to exploit this technology in the existing communication networks and to improve theperformance and reliability of the implemented technologies. Some research is in progress for theintegration of QKD with the protocols in different layers of OSI model. The examples of such researcheffort are the integration of QKD in point-to-point protocol (PPP OSI layer 2 and the integration ofQKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technologyfor enhancing the security of modern computing applications on the internet. In this paper, we present anovel extension of the TLS protocol based on QKD. We introduce a scheme for integrating QuantumCryptography in this protocol. Our approach improves the security of the process of authentication anddata encryption. Also, we describe an example to illustrate the feasibility of our scheme’simplementation.

  17. Armour Protection and Affordable Protection for Futuristic Combat Vehicles

    National Research Council Canada - National Science Library

    V. Madhu; T. Balakrishna Bhat

    2011-01-01

    .... Hence, the mechanized forces are still likely to be one of the dominant forces on the futuristic battlefield and would be the primary target of enemy forces capable of engaging from tank guns up...

  18. Digitization and its futuristic approach in prosthodontics.

    Science.gov (United States)

    Bhambhani, Ritika; Bhattacharya, Jayanta; Sen, Saibal Kr

    2013-09-01

    Digitization has become part and parcel of the contemporary prosthodontics with the probability of most of the procedures being based on the digital techniques in near future. Let us think of X-rays or photographs, making impressions, recording jaw movements or fabricating prosthesis, educating and training new dentists or patient motivation for practice build up, all has become digital. CAD-CAM has revolutionized not just the ceramic technology but has also been used for the CAD-CAM implant surgeries, maxillofacial prosthesis and diagnostic splints. Today a practicing dentist needs to be abreast with the latest but with the technology changing so fast, this poses a great challenge. There is endless scope of digitisation and technology in prosthodontics- let it be in the clinical and lab procedures like use of CAD-CAM technology, stereolithography, rapid prototyping, use of virtual articulators and digital face bows, digital radiographs, or in the field of training, education and research by the use of virtual patient programs, dental softwares, optoelectronic recording of jaw motion, digital instron machine, retention testing device, audiovisual aids,… the list will remain endless. The article reviews those various aspects of prosthodontics where digitization has modified the conventional procedures. For discussion they have been considered under the educational aspect, diagnostics, treatment procedures, prosthesis fabrication and lastly the research and futuristic development. The day is not far when remote sensing robotic devices would be performing the restorations under the command and surveillance of the master-the dentist without his immediate presence.

  19. Proofs of Security for Improved Rabin Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    DONG Xiao-lei; LU Rong-xing; CAO Zhen-fu

    2006-01-01

    The improved RSA signature scheme can be strictly proved to be equivalent to the factoring problem. In the improved RSA signature scheme, when the public exponent e= 1, the scheme becomes the improved Rabin signature. Such an improved Rabin signature scheme is reviewed and the techniques from the provable security is applied to analyze its security.

  20. Army After Next, Airland Battle 2000, Futuristic Concepts or Jules Verne?

    Science.gov (United States)

    1998-04-14

    service or government agency. STRATEGY RESEARCH PROJECT ARMY AFTER NEXT, AIRLAND BATTLE 2000, FUTURISTIC CONCEPTS OR JULES VERNE ? BY...AIRLAND BATTLE 2000, FUTURISTIC CONCEPTS OR JULES VERNE ? by LTC Francis G. Mahon Dr. Douglas V. Johnson Project Advisor Colonel Ronald Ouellette...Battle 2000, Futuristic Concepts or Jules Verne ? FORMAT: Strategy Research Project DATE: 14 April 1998 PAGES: 67 CLASSIFICATION

  1. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  2. Collaborating toward improving food security in Nunavut.

    Science.gov (United States)

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  3. Improving Tamper Detection for Hazardous Waste Security

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-02-26

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them.

  4. Futurist Art: Motion and Aesthetics As a Function of Title

    Science.gov (United States)

    Mastandrea, Stefano; Umiltà, Maria A.

    2016-01-01

    Very often the titles of Futurist paintings contain words denoting movement in order to satisfy their artistic poetic focused on motion and velocity. The aim of the present study is to investigate the reported dynamism and aesthetic quality of several Futurist artworks as a function of their title. Ten Futurist artworks with a movement-related word in the title were selected for this study. The titles were manipulated, resulting in four conditions for each painting: the “original title” with the movement word; an “increased” title in which an adjective was added in order to intensify the sense of dynamism; a “decreased” title, in which the movement word was eliminated; no title. Participants evaluated the movement suggested by each painting in the four different title conditions, rated their beauty and reported how much they liked the work. Results showed that the manipulation of the title had an effect on the reported movement: compared to the others, paintings presented with the “original” and with the “increased” title received significant higher movement scores. Of interest, beauty did not differ across conditions, but liking was higher for the conditions with more movement. Lastly, positive correlations between the quantity of perceived movement and aesthetic evaluation were found. From the present results it can be concluded that Futurists attributed much relevance to the titles of their artworks in order to effectively increase the expression of the movement represented. PMID:27242471

  5. Security of supply in electricity markets: Improving cost efficiency of supplying security and possible welfare gains

    DEFF Research Database (Denmark)

    Klinge Jacobsen, Henrik; Grenaa Jensen, Stine

    2012-01-01

    by possible welfare gains. From a welfare perspective it is possible that security levels are too high and obtained with too high costs. Adjusting the effort so that marginal cost for securing supply is at similar levels in generation capacity and in network maintenance could increase welfare even without......In liberalised markets the ability to maintain security of electricity supply is questioned because security is characterised as a public good. We discuss if this property can be modified with changing technology. Furthermore, we examine if construction of markets for security can be justified...... the need to construct markets. Secondarily, a consumer defined average level of security might improve welfare. Finally, different willingness to pay among customers and construction of advanced markets might increase welfare further. We argue that several cost and welfare improvements can be achieved...

  6. Computer Security: improve software, avoid blunder

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Recently, a severe vulnerability has been made public about how Apple devices are wrongly handling encryption. This vulnerability rendered SSL/TLS protection useless, and permitted attackers checking out a wireless network to capture or modify data in encrypted sessions.   In other words, all confidential data like passwords, banking information, etc. could have been siphoned off by a targeted attack. While Apple has been quick in providing adequate security patches for iOS devices and Macs, it is an excellent example of how small mistakes can lead to big security holes. Here is the corresponding code from Apple’s Open Source repository. Can you spot the issue? 1 static OSStatus 2 SSLVerifySignedServerKeyExchange(SSLContext *ctx, bool isRsa, SSLBuffer signedParams, uint8_t *signature, UInt16 signatureLen) 3 { 4              OSStatus &nb...

  7. Improving the Security of CardSpace

    Directory of Open Access Journals (Sweden)

    Alrodhan WaleedA

    2009-01-01

    Full Text Available CardSpace (formerly known as InfoCard is a digital identity management system that has recently been adopted by Microsoft. In this paper we identify two security shortcomings in CardSpace that could lead to a serious privacy violation. The first is its reliance on user judgements of the trustworthiness of service providers, and the second is its reliance on a single layer of authentication. We also propose a modification designed to address both flaws. The proposed approach is compatible with the currently deployed CardSpace identity metasystem and should enhance the privacy of the system whilst involving only minor changes to the current CardSpace framework. We also provide a security and performance analysis of the proposal.

  8. Improving Nigerian Border Security -- A Comprehensive Approach

    Science.gov (United States)

    2012-11-02

    threats, overlapping jurisdictions between different agencies, presence of private sector businesses, and partnerships with neighboring states produce a...help us increase trade amongst West African states. Increased trade means that more goods and services will be produced , increased production means...Border Security, Cooperation and Integration, 69. 22. Adeola and Fayomi, Implications of Cross Border Migration, 6-7. 23. Ibid., 7. 24. Aluko Ola

  9. Information security improving blocklist driven firewall implementation

    OpenAIRE

    2013-01-01

    The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. An Internet firewall is an essential component of a modern computer network and it is used to impleme...

  10. University awarded grant to improve food security in Africa

    OpenAIRE

    2008-01-01

    Amid global concerns about food security, the U.S. Agency for International Development has awarded a $1 million grant to Virginia Tech's Office of International Research, Education, and Development to improve agricultural productivity and ease trade barriers in Africa.

  11. Improving Web Application Security Using Penetration Testing

    Directory of Open Access Journals (Sweden)

    D. SriNithi

    2014-08-01

    Full Text Available The main issues of current web application is easily hacking the user information by unauthorized person. The development of entire web application depends on scripting languages that easily displays the user authentication code to the web browser. All code must be transferred through query string parameter (URL of the web application. This kind of application security fails when verifying it by penetration testing which is based on XSS languages. This study overcomes the security issues by developing a web application based on cross site scripting technique which the user codes are encrypted using RSA algorithm and cookies, cross domain verification based on encrypted use code. XSS vulnerabilities come in different forms and may be categorized into two varieties: reflected and stored. Reflected is on type of attack which can be performed against applications that employ a dynamic page error message to users. Stored XSS vulnerability appears when data submitted by one user is store in the application or in the back-end database. The user cookies of the web browser store only the encrypted key values. These techniques applied in Enterprise web application it support multiple organization for processing product purchase order, sales order and invoice details.

  12. Implementing Improved Security and Encryption for Balloon Flight Systems

    Science.gov (United States)

    Denney, Andrew; Stilwell, Bryan D.

    The Columbia Scientific Balloon Facility uses a broad array of communication techniques be-tween its balloon-borne flight systems and ground command and control systems. These com-munication mediums vary from commercially available routing such as e-mail and IP based TCP/UDP protocols to military grade proprietary line-of-sight configurations; each with their own unique benefits and shortfalls. While each new advancement in technology improves secu-rity in some capacity, it does not always address the limitation of older, less advanced security or encryption capabilities. As the proliferation of newer, more commercially viable technologies become common place, safeguarding mission critical applications from unauthorized access and improve data integrity in the process becomes ever more necessary. Therefore, this paper will evaluate several security measures and methods of data encryption; including formalizing a standardized security philosophy that improves and addresses the mixture of established and emerging technologies.

  13. Improved security analysis of Fugue-256 (poster)

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde; Bagheri, Nasoor

    2011-01-01

    We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST's SHA3 competition. First we improve Aumasson and Phans' integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.......5 rounds. Next we improve the designers' meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256. © 2011 Springer-Verlag.......We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST's SHA3 competition. First we improve Aumasson and Phans' integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16...

  14. Improving the security of arbitrated quantum signature protocols

    CERN Document Server

    Sun, Zhiwei; Long, Dongyang

    2011-01-01

    Arbitrated quantum signatures (AQS), for signing quantum message, have been proposed. It was claimed that the AQS schemes could guarantee unconditional security. However, we show that all the presented AQS protocols are insecure if quantum one-time pad encryption is used. Our attack and security analysis show that the signer (Alice) can always successfully acquire Bob's secret key and disavow any of her signatures. So the original version of the protocol is revised. As a consequence, the attack we present can be prevented, and accordingly the security of the protocol is improved.

  15. Leverage points for improving global food security and the environment.

    Science.gov (United States)

    West, Paul C; Gerber, James S; Engstrom, Peder M; Mueller, Nathaniel D; Brauman, Kate A; Carlson, Kimberly M; Cassidy, Emily S; Johnston, Matt; MacDonald, Graham K; Ray, Deepak K; Siebert, Stefan

    2014-07-18

    Achieving sustainable global food security is one of humanity's contemporary challenges. Here we present an analysis identifying key "global leverage points" that offer the best opportunities to improve both global food security and environmental sustainability. We find that a relatively small set of places and actions could provide enough new calories to meet the basic needs for more than 3 billion people, address many environmental impacts with global consequences, and focus food waste reduction on the commodities with the greatest impact on food security. These leverage points in the global food system can help guide how nongovernmental organizations, foundations, governments, citizens' groups, and businesses prioritize actions.

  16. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  17. INDUSTRIAL WASTE MANAGEMENT TO IMPROVE ENVIRONMENTAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Perfilov

    2016-01-01

    Full Text Available Aim. Disposal of industrial waste to improve the environmental safety by means of recycling and reusing in the manufacture of building materials.Materials and methods. We made a selection of new optimum compositions of fiber-concretes using industrial carbon black from heat generating productions, glass fibers, plasticizers, activated mixing water produced using an ultrasonic unit.Results. New fiber-reinforced concrete compositions were developed using carbon black as an additive. As a result of the processing of the experimental data, it has been revealed that introduction of carbon black as an additive contributed to the increase of the strength characteristics of nearly all fiber-reinforced concrete compositions. It has been found that microparticles of carbon black accumulate the products of hydration of portlandcement-hydrosilicate calcium on the surface and contribute to the formation of a solid microarming concrete structure.Conclusions. The use of industrial carbon black in fibrous concrete mixture using restructured water improves its rheological properties, reduces its segregation and improves the homogeneity of the concrete. Recycling and re-using carbon black in the production of building materials will improve the environmental ecology.

  18. Increasing Effectiveness of IDS to Improve Security in Intranet

    Directory of Open Access Journals (Sweden)

    Umesh K. Singh

    2005-01-01

    Full Text Available Today Intrusion Detection Systems (IDS are becoming one of the most important tools for intranet security. Research regarding Intrusion Detection Systems (IDSs has become more active with the recent increases in illegal accesses to computer systems. Many researchers focus only on the techniques or mechanisms for detecting intrusions automatically, without considering the security of IDSs themselves. When an intruder attacks and breaks into a system, he or she often deletes system logs and stops auditing processes. Thus, the security of an intrusion detection system is an important aspect of intrusion detection. This study explores the methods for increasing effectiveness in configurations of an IDS for obtaining maximum effects in security in an intranet. We also discuss the hurdles that have blocked successful measurements in this area and present suggestions for improving effectiveness of an IDS.

  19. Improving Security of Audio Watermarking in Image using Selector Keys

    Directory of Open Access Journals (Sweden)

    Amir Reza Fazli

    2012-06-01

    Full Text Available This study presents a novel watermarking algorithm for improving the security and robustness of hiding audio data in an image. Multi resolution discrete wavelet transform is used for embedding the audio watermark in an image. In this context, security is quantified from an information theoretic point of view by means of the equivocation and information leakage of the secret parameters. The selector keys are used as a criterion to determine the location of appropriate wavelet blocks and wavelet coefficients for embedding the watermark. Also, simulations assess the security levels derived in the theoretical part of the paper. The experimental results demonstrate that using the selector keys enhance the security level of the watermark embedding for a variety of scenarios. The level of the algorithm robustness is shown by considering Normalized Correlation (NC between the original audio watermark and extracted watermark.

  20. Health in India -- a futuristic scenario.

    Science.gov (United States)

    Ali, A

    1999-01-01

    There has been considerable progress in the health situation in India over the last five decades following its independence. Mortality decreased dramatically, the death rate declined from 27.4 to 8.9, and the infant mortality rate decreased by almost half in 1997. Life expectancy, on the other hand, almost doubled from 32 years at the time of independence to 62 years in 1997. However, there are wide variations in the values of these health indicators among different regions. Progress has been uneven and confined to more advanced states. Improvements in the health status of the people have been most notable in the states of Kerala, Maharashtra, and Punjab, whereas states like Madhya Pradesh, Uttar Pradesh, Orissa and Rajasthan had the least progress. These neglected areas are considered as the result of various factors in India's political economy, which hinders health policy development and its implementation. In the last part of this article, major health problems, as well as recommendations for remedial actions are outlined.

  1. Improving Security in the ATLAS PanDA System

    CERN Document Server

    Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

  2. What's under the hood? Improving SCADA security with process awareness

    NARCIS (Netherlands)

    Chromik, Justyna J.; Remke, Anne; Haverkort, Boudewijn R.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to us

  3. Futurist images for your ear: or, how to listen to visual poetry, painting, and silent cinema

    NARCIS (Netherlands)

    Strauven, W.

    2009-01-01

    This paper discusses the crucial tension between expression and experience in the Futurist art-action programme, by focusing on its noisy dimension. In the 1910s, the Futurists shocked the bourgeois audience with clamorous happenings and educated their senses towards a new aesthetics of mixed sensat

  4. New method of improving the security of the hyperchaotic cryptosystem

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In chaotic cryptosystems, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some classical methods. The results show that for improving the security of the chaotic cryptosystems, besides the high dimension, the sub-Nyquist sampling interval (SI) is also necessary. Then, we verify this result using the methods of time series analysis.

  5. An improved multilevel fuzzy comprehensive evaluation algorithm for security performance

    Institute of Scientific and Technical Information of China (English)

    LI Ling-juan; SHEN Ling-tong

    2006-01-01

    It is of great importance to take various factors into account when evaluating the network security performance.Multilevel fuzzy comprehensive evaluation is a relatively valid method. However, the traditional multilevel fuzzy comprehensive evaluation algorithm relies on the expert's knowledge and experiences excessively, and the result of the evaluation is usually less accurate. In this article, an improved multilevel fuzzy comprehensive evaluation algorithm, based on fuzzy sets core and entropy weight is presented. Furthermore, a multilevel fuzzy comprehensive evaluation model of P2P network security performance has also been designed, and the improved algorithm is used to make an instant computation based on the model. The advantages of the improved algorithm can be embodied in comparison with the traditional evaluation algorithm.

  6. Can experience-based household food security scales help improve food security governance?

    Science.gov (United States)

    Pérez-Escamilla, Rafael

    2012-12-01

    Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs have increased awareness about food and nutrition insecurity in the court of public opinion. Thus, it's important to understand the potential that EBFSSs have for improving food and nutrition security governance within and across countries. The case of Brazil illustrates the strong likelihood that EBFSSs do have a strong potential to influence food and governance from the national to the municipal level. A recent Gallup World Poll data analysis on the influence of the '2008 food crisis' on food hardship illustrates how even a single item from EBFSSs can help examine if food security governance in different world regions modifies the impact of crises on household food insecurity. Systematic research that bridges across economics, political science, ethics, public health and program evaluation is needed to better understand if and how measurement in general and EBFSSs in particular affect food security governance.

  7. Can experience-based household food security scales help improve food security governance?

    OpenAIRE

    2012-01-01

    Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs hav...

  8. Understanding and Improving the Smartphone Ecosystem: Measurements, Security and Tools

    OpenAIRE

    Wei, Xuetao

    2013-01-01

    The smartphone ecosystem encompasses smartphones' hardware and software platform, applications (apps) running on top of the platform, as well the infrastructural components. As the smartphone ecosystem is becoming an important part of our daily life, it is essential to profile, understand and, ultimately, secure the devices and the information they collect and manipulate. To this end, we pave the way for understanding and improving the smartphone ecosystem by designing useful tools, performin...

  9. Improving residual risk management through the use of security metrics

    OpenAIRE

    Pagett, Jonathan

    2012-01-01

    Introduction Reported security breaches over the last 3 years suggest that a large number of security procedures are not currently operating at full effectiveness. Security breaches have ranged from the loss of personal details of 25 million UK citizens to the disclosure of national security information assets. It is highly likely that the organisations involved in these security breaches performed risk assessments for their information assets and implemented a range of security contr...

  10. Towards a Critical Futurism. Part Two: Revising and Refining a Futurist Perspective.

    Science.gov (United States)

    Slaughter, Richard A.

    1984-01-01

    Whether accepted notions of science provide appropriate models for futurism is discussed, underlying ideological issues are examined, and ways in which futurists may re-interpret their own roles are presented. (Author/RM)

  11. Between Word and Image: Women Futurists and Parole in Liberta' 1914-1924

    OpenAIRE

    Lasker-Ferretti, Janaya Sandra

    2012-01-01

    After F.T. Marinetti, the leader of futurism, theorized parole in libertà (or wordsinfreedom) in his manifestoes, numerous futurists participated in this verbovisual practice. Although paroliberismo was a characteristic form of expression that dominated futurist poetics preceding, during, and after World War I, little scholarly work has been done on the wordsinfreedom authored by women and how they might differ from those created by their male counterparts. Women, outcast as they were by futu...

  12. A Hyper Modern Cryptography Algorithm to Improved Data Security: HMCA

    Directory of Open Access Journals (Sweden)

    Vishwa Gupta

    2011-12-01

    Full Text Available In this paper, we propose an improved block cipher symmetric encryption algorithm that has the same structure of encryption and decryption. So far, conventional cryptography algorithms have difference structure of encryption and decryption. We devise our algorithm by inserting a symmetric layer using random number, encryption number and XOR operations, in which the whole proposed algorithm rounds uses encryption procedure and the same for it decryption procedure. The symmetry layer is put between encryption part and decryption one. The proposed algorithm has the batter speed compared with the comparing encryption algorithm. Nevertheless, the proposed algorithm improves encryption security by inserting the symmetric layer. The proposed algorithm will be useful to the applications which require the same procedure of encryption and decryption

  13. 75 FR 29399 - Improving Energy Security, American Competitiveness and Job Creation, and Environmental...

    Science.gov (United States)

    2010-05-26

    ... May 21, 2010 Improving Energy Security, American Competitiveness and Job Creation, and Environmental... energy security, and improve our environment. We already have made significant strides toward reducing... Clean Air Act (CAA) and the Energy Independence and Security Act of 2007 (EISA) to establish...

  14. Security Measurement Based On GQM To Improve Application Security During Requirements Stage

    Directory of Open Access Journals (Sweden)

    Ala A. Abdulrazeg

    2015-05-01

    Full Text Available Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at the requirement analysis stage of the application development life cycle may help in mitigating security defects before they spread their wings into the latter stages of the development life cycle and into the final version of product. In this paper, we present a security metrics model based on the Goal Question Metric (GQM approach, focusing on the design of the misuse case model. Misuse case is a technique to identify threats and integrate security requirements during the requirement analysis stage. The security metrics model helps in discovering and evaluating the misuse case models by ensuring a defect-free model. Here, the security metrics are based on the OWASP top 10-2010, in addition to misuse case modeling antipattern.

  15. Smart Door Lock System: Improving Home Security using Bluetooth Technology

    National Research Council Canada - National Science Library

    Jayant Dabhade; Amirush Javare; Tushar Ghayal; Ankur Shelar; Ankita Gupta

    2017-01-01

      In today's world, smart home control system is necessary in daily life. As the technology is emerging a lot it's time for us to be more technical related to home secure security and easy access to the user...

  16. Improved Feistel-based ciphers for wireless sensor network security

    Institute of Scientific and Technical Information of China (English)

    Tamara PAZYNYUK; Jian-zhong LI; George S.OREKU

    2008-01-01

    Wireless sensor networks (WSNs) are exposed to a variety of attacks.The quality and complexity of attacks are rising day by day.The proposed work aims at showing how the complexity of modem attacks is growing accordingly,leading to a similar rise in methods of resistance.Limitations in computational and battery power in sensor nodes are constraints on the diversity of security mechanisms.We must apply only suitable mechanisms to WSN where our approach was motivated by the application of an improved Feistel scheme.The modified accelerated-cipher design uses data-dependent permutations,and can be used for fast hardware,firmware,software and WSN encryption systems.The approach presented showed that ciphers using this approach are less likely to suffer intrusion of differential cryptanalysis than currently used popular WSN ciphers like DES,Camellia and so on

  17. Improvement of McCullagh-Barreto key agreement with KCI-security

    Institute of Scientific and Technical Information of China (English)

    WANG Xiao-fen; DONG Qing-kuan; ZHOU Yu; XIAO Guo-zhen

    2009-01-01

    McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI attack). In this paper, we give a formal treatment of key compromise impersonation (KCI) attack and define the security notion against it. Then an variant of McCullagh-Barreto protocol is presented with only one more Hash operation. The improved protocol preserves perfect forward security and KGC forward security, and furthermore is proved to be secure against KCI attack under k-Gap-BCAA1 assumption.

  18. Fixing Security Together: Leveraging trust relationships to improve security in organizations

    OpenAIRE

    Kirlappos, I.; Sasse, M. A.

    2015-01-01

    Current approaches to information security focused on deploying security mechanisms, creating policies and communicating those to employees. Little consideration was given to how policies and mechanisms affect trust relationships in an organization, and in turn security behavior. Our analysis of 208 in-depth interviews with employees in two large multinational organizations found two trust relationships: between the organization and its employees (organization-employee trust), and between emp...

  19. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  20. Improving organisational resilience through enterprise security risk management.

    Science.gov (United States)

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  1. Stormwater harvesting: Improving water security in South Africa's urban areas

    Directory of Open Access Journals (Sweden)

    Lloyd Fisher-Jeffes

    2017-01-01

    Full Text Available The drought experienced in South Africa in 2016 one of the worst in decades has left many urbanised parts of the country with limited access to water, and food production has been affected. If a future water crisis is to be averted, the country needs to conserve current water supplies, reduce its reliance on conventional surface water schemes, and seek alternative sources of water supply. Within urban areas, municipalities must find ways to adapt to, and mitigate the threats from, water insecurity resulting from, inter alia, droughts, climate change and increasing water demand driven by population growth and rising standards of living. Stormwater harvesting (SWH is one possible alternative water resource that could supplement traditional urban water supplies, as well as simultaneously offer a range of social and environmental benefits. We set out three position statements relating to how SWH can: improve water security and increase resilience to climate change in urban areas; prevent frequent flooding; and provide additional benefits to society. We also identify priority research areas for the future in order to target and support the appropriate uptake of SWH in South Africa, including testing the viability of SWH through the use of real-time control and managed aquifer recharge.

  2. Defining the e-learner’s security profile: Towards awareness improvement

    Indian Academy of Sciences (India)

    MARJAN MILOS EVIC; DANIJELA MILOS EVIC

    2016-03-01

    The paper presents an improved e-learner model that supports monitoring of user behavior related to information security. The model is built upon standardized IMS specification, according to literature research and survey conducted among e-learners. It is positioned as key part of an extended LTSA architecture in which the learner data is used to improve learner security position by continuous delivery of important information and adapting security mechanisms. The implementation is considered in Moodle LMS.

  3. An Improved Hybrid Mechanism for Secure Data Communication

    Directory of Open Access Journals (Sweden)

    Sangeeta Dhall

    2016-06-01

    Full Text Available The In today's era with increase in the use of internet and networking devices, there is an increase in demand for more secure data communication. This problem has led to development of hybrid security mechanisms. Various techniques are available in literature that makes use of different steganography and cryptographic mechanisms which has certain pros and cons. In this paper, we propose a new hybrid security mechanism that tries to choose the best cryptographic and steganography mechanism. In addition, to increase the embedding capacity of the proposed mechanism, Huffman encoding scheme is used. The proposed strategy is implemented in MATLAB-09. In order to check the efficacy of the proposed technique three types of analysis were performed named as: security, robustness and efficiency analysis. It is found from the simulation and results that the proposed scheme outperforms other techniques in literature in every aspect.

  4. Improved Security Models & Protocols in Online Mobile Business Financial Transactions

    OpenAIRE

    Sreeramana Aithal

    2017-01-01

    Chapter I : Introduction to Mobile Business and Mobile Banking Chapter II : Review of Literature on Mobile Business Technology, Mobile Banking Services & Security Chapter III : Research Objectives and Methodology Chapter IV : Results and Discussion Chapter V : Summary and Conclusions Bibliography

  5. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. POLICE OFFICE MODEL IMPROVEMENT FOR SECURITY OF SWARM ROBOTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-09-01

    Full Text Available This paper focuses on aspects of information security for group of mobile robotic systems with swarm intellect. The ways for hidden attacks realization by the opposing party on swarm algorithm are discussed. We have fulfilled numerical modeling of potentially destructive information influence on the ant shortest path algorithm. We have demonstrated the consequences of attacks on the ant algorithm with different concentration in a swarm of subversive robots. Approaches are suggested for information security mechanisms in swarm robotic systems, based on the principles of centralized security management for mobile agents. We have developed the method of forming a self-organizing information security management system for robotic agents in swarm groups implementing POM (Police Office Model – a security model based on police offices, to provide information security in multi-agent systems. The method is based on the usage of police station network in the graph nodes, which have functions of identification and authentication of agents, identifying subversive robots by both their formal characteristics and their behavior in the swarm. We have suggested a list of software and hardware components for police stations, consisting of: communication channels between the robots in police office, nodes register, a database of robotic agents, a database of encryption and decryption module. We have suggested the variants of logic for the mechanism of information security in swarm systems with different temporary diagrams of data communication between police stations. We present comparative analysis of implementation of protected swarm systems depending on the functioning logic of police offices, integrated in swarm system. It is shown that the security model saves the ability to operate in noisy environments, when the duration of the interference is comparable to the time necessary for the agent to overcome the path between police stations.

  7. Improving Mental Health Reporting Practices in Between Personnel Security Investigations

    Science.gov (United States)

    2017-06-01

    review and SME discussions underscore the need to further clarify mental health -related reporting requirements (generally) and to provide guidance to SMs... health issues of potential risk to national security. Training should stress reporting requirements and should address how to FINDINGS...influenced DoD requirements , specifically for self, co-worker, and supervisor reporting of security-relevant mental health issues. Early personnel

  8. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    Energy Technology Data Exchange (ETDEWEB)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  9. Improving Land Dry Farmer Capacity Toward Adequate Food Security

    Directory of Open Access Journals (Sweden)

    Sitti Aminah

    2015-09-01

    Full Text Available Land dry farmers have not enrolled in supporting food security. Most of the farmer are the peasants with low capacity to produce food. The purpose of the research is to formulate policy recommendation to increase capacity of the peasants for support food security. The data were collected using following techniques: questionnaire, interview and focus group discussion. The data were analyzed using descriptive statistics and structural equation modelling (SEM. The research results showed that the peasant characteristics and the peasants capacity are within low category, influencing the level of food security. The Government are expected actively to increase the peasant’s capacity by optimizing efforts: providing extension and training in participatory ways; increasing role of facilitator and researcher in empowerment process, increasing the peasants’ access to production input, credit facilities and wider markets, give incentive to the peasants so that they can do double working, as well as increasing coordination between government institutions and stakeholder.

  10. AN ENCRYPTION ALGORITHM FOR IMPROVING DATABASE SECURITY USING ROT & REA

    Directory of Open Access Journals (Sweden)

    M. Sujitha

    2015-06-01

    Full Text Available Database is an organized collection of data, many user wants to store their personal and confidential data’s in such database. Unauthorized persons may try to get the data’s from database and misuse them without the owner’s knowledge. To overcome such problem the advanced control mechanism, known as Database security was introduced. Encryption algorithm is one of the way to give protection to the database from various threat or hackers who target to get confidential information. This paper discuss about the proposed encryption algorithm to give security to such database.

  11. Using Automatic Identification System Technology to Improve Maritime Border Security

    Science.gov (United States)

    2014-12-01

    18 Dave Dixon et al., Security Modeling for Maritime Port Defense Resource Allocation ( Aiken , SC: Savannah River National Laboratory, 2010), 3...Maritime Port Defense Resource Allocation. Aiken , SC: Savannah River National Laboratory, 2010. Eggers, William D., and John O’Leary. If We Can Put a

  12. A Secure Behavior Modification Sensor System for Physical Activity Improvement

    Science.gov (United States)

    Price, Alan

    2011-01-01

    Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…

  13. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... ADMINISTRATION 20 CFR Part 416 RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008 (HEART Act) AGENCY: Social Security Administration. ACTION... Income (SSI) program made by the HEART Act. We inadvertently stated the RIN incorrectly as 0960- AD78...

  14. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  15. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    NARCIS (Netherlands)

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developi

  16. Information Security in Education: Are We Continually Improving?

    Directory of Open Access Journals (Sweden)

    Dennis Bialaszewski

    2015-06-01

    Full Text Available This paper will shed light on the lack of the development of appropriate monitoring systems in the field of education. Test banks can be easily purchased. Smart phones can take and share pictures of exams. A video of an exam given through Blackboard can easily be made. A survey to determine the extent of cheating using technology was given to several university students. Evidence is provided that shows security is lacking as evidenced by the number of students who have made use of technological advances to cheat on exams. The findings and conclusion may serve as evidence for administrators and policy makers to re-assess efforts being made to increase security in online testing.

  17. Improving method for calculating integral index of personnel security of company

    Directory of Open Access Journals (Sweden)

    Chjan Khao Yui

    2016-06-01

    Full Text Available The paper improves the method of calculating the integral index of personnel security of a company. The author has identified four components of personnel security (social and motivational safety, occupational safety, not confliction security, life safety which are characterized by certain indicators. Integral index of personnel security is designed for the enterprises of machine-building sector in Kharkov region, taking into account theweight coefficients j-th component of bj, and weighting factors that determine the degree of contribution of the ith parameter in the integral index aіj as defined by experts.

  18. A new method for improving security in MANETs AODV Protocol

    Directory of Open Access Journals (Sweden)

    Zahra Alishahi

    2012-10-01

    Full Text Available In mobile ad hoc network (MANET, secure communication is more challenging task due to its fundamental characteristics like having less infrastructure, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In MANET, attacks can be broadly classified in two categories: routing attacks and data forwarding attacks. Any action not following rules of routing protocols belongs to routing attacks. The main objective of routing attacks is to disrupt normal functioning of network by advertising false routing updates. On the other hand, data forwarding attacks include actions such as modification or dropping data packet, which does not disrupt routing protocol. In this paper, we address the “Packet Drop Attack”, which is a serious threat to operational mobile ad hoc networks. The consequence of not forwarding other packets or dropping other packets prevents any kind of communication to be established in the network. Therefore, there is a need to address the packet dropping event takes higher priority for the mobile ad hoc networks to emerge and to operate, successfully. In this paper, we propose a method to secure ad hoc on-demand distance vector (AODV routing protocol. The proposed method provides security for routing packets where the malicious node acts as a black-hole and drops packets. In this method, the collaboration of a group of nodes is used to make accurate decisions. Validating received RREPs allows the source to select trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers.

  19. National Security: An Overview of Professional Development Activities Intended to Improve Interagency Collaboration

    Science.gov (United States)

    2010-11-01

    professional development activities could help bridge those gaps. GAO was asked to identify: (1) training and other professional development activities intended to improve the ability of key national security agencies’ personnel to collaborate across organizational lines and (2) how these activities were intended to improve participants’ collaboration abilities. To address these objectives, GAO asked nine key agencies involved in national security issues to submit information on professional development activities that

  20. Improving System Security and User Privacy in Secure Electronic Transaction (SET with X.509 v3 Certificate

    Directory of Open Access Journals (Sweden)

    Saidu Muhammad

    2015-04-01

    Full Text Available With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.

  1. IMPROVING VIRTUAL MACHINE SECURITY THROUGH INTELLIGENT INTRUSION DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    Ambikavathi C

    2015-04-01

    Full Text Available Virtualization is the key feature of cloud computing which facilitates sharing of common resources among cloud users. As cloud computing is a shared facility and accessed remotely, it is vulnerable to various attacks. The shared resources may be exploited by the attackers through vulnerabilities. Virtualization technology is implemented by instantiating a virtual machine to each cloud user based on their requirements. Many virtual machines are instantiated on a single physical infrastructure. Although this virtualization technology is more beneficent for the users by means of low cost and for service providers by means of better utilization, it has several risks, in which security is the major one. Benefits of virtualization go beyond the cost savings. By better planning and management virtualization risk can be mitigated. The proposed work secures virtual machines by creating VM profiles, packet monitoring and by conducting periodic centralized vulnerability scans. It is consistent because both signature based and anomaly based IDS are combined. It is efficient because only the VMs affected by infected packets are scanned for vulnerability.

  2. Advanced Concepts of the Propulsion System for the Futuristic Gun Ammunition

    Directory of Open Access Journals (Sweden)

    R.S. Darnse

    2003-10-01

    Full Text Available This review paper reports various concepts of the gun propulsion system to meet the goal of the futuristic hypervelocity projectiles. The nonconventional concepts, such as liquid gun propellant, rail gun, coil gun, electrothermal gun, electrothermal chemical gun along with conventional energetic solid gun propellant have been discussed. Even though muzzle velocity around 2000 m/s has been claimed to be achieved using such nonconventional propulsion systems, it will take quite some time before such systems are in regular use in the battlefield. Hence, solid gun propellants containing novel energetic ingredients (binders, plasticisers, and oxidisers would continue to be used in the near future and are expected to meet the requirements of the futuristic gun ammunition.

  3. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  4. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2010-03-01

    Full Text Available User authentication in wireless sensor networks (WSN is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  5. Improved Security of Attribute Based Encryption for Securing Sharing of Personal Health Records

    Directory of Open Access Journals (Sweden)

    Able E Alias

    2014-11-01

    Full Text Available Cloud computing servers provides platform for users to remotely store data and share the data items to everyone. Personal health record (PHR has emerged as a patient –centric model of health information exchange. Confidentiality of the shared data is the major problem when patients uses the commercial cloud servers because it can be view by everyone., to assure the patient’s control over access to their own medical records; it is a promising method to encrypt the files before outsourcing and give access control to that data. Privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control In this paper a high degree of patient privacy is guaranteed by exploiting multi-authority ABE. Divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users

  6. IMPROVED SECURITY OF ATTRIBUTE BASED ENCRYPTION FOR SECURING SHARING OF PERSONAL HEALTH RECORDS

    Directory of Open Access Journals (Sweden)

    Able E Alias

    2015-10-01

    Full Text Available Cloud computing servers provides platform for users to remotely store data and share the data items to everyone. Personal health record (PHR has emerged as a patient –centric model of health information exchange. Confidentiality of the shared data is the major problem when patients uses the commercial cloud servers because it can be view by everyone., to assure the patient’s control over access to their own medical records; it is a promising method to encrypt the files before outsourcing and give access control to that data. Privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control In this paper a high degree of patient privacy is guaranteed by exploiting multi-authority ABE. Divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users.

  7. Security Analysis and Improvement of Fingerprint Authentication for Smartphones

    Directory of Open Access Journals (Sweden)

    Young-Hoo Jo

    2016-01-01

    Full Text Available Currently, an increasing number of smartphones are adopting fingerprint verification as a method to authenticate their users. Fingerprint verification is not only used to unlock these smartphones, but also used in financial applications such as online payment. Therefore, it is very crucial to secure the fingerprint verification mechanism for reliable services. In this paper, however, we identify a few vulnerabilities in one of the currently deployed smartphones equipped with fingerprint verification service by analyzing the service application. We demonstrate actual attacks via two proof-of-concept codes that exploit these vulnerabilities. By the first attack, a malicious application can obtain the fingerprint image of the owner of the victimized smartphone through message-based interprocess communication with the service application. In the second attack, an attacker can extract fingerprint features by decoding a file containing them in encrypted form. We also suggest a few possible countermeasures to prevent these attacks.

  8. Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security

    CERN Document Server

    Li, Jiangyuan; Weber, Steven

    2010-01-01

    We consider a cooperative wireless network in the presence of one of more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper (cooperative jamming (CJ)). We investigate two objectives, i.e., maximization of achievable secrecy rate subject to a total power constraint, and minimization of total power transmit power under a secrecy rate constraint. For the first design objective with a single eavesdropper we obtain expressions for optimal weights under the DF protocol in closed form, and give an algorithm that converges to the optimal solution for the CJ scheme; while for multiple eavesdroppers we give an algorithm for the solution using the DF protocol that is guarantee...

  9. A Technique to improve Security of Data in Multilevel Trust

    Directory of Open Access Journals (Sweden)

    Dr. T. Jebarajan

    2014-05-01

    Full Text Available The Privacy Preserving Data Mining technique that is used widely to conserve security of data is a random perturbation method. The original data is modified and many copies are created according to the trust levels in each field. The addition of noise level also varies with each trust level. The amount of noise added to the lower order trust level is less, whereas it is high in the higher order trust level. There is a chance for the hackers to reconstruct the original data with some non linear techniques. This challenge is addressed by the proposal of a novel non linear technique. Here, the noise level of each copy is checked after perturbation of the actual data. If any similarity is found in the noise level, reconstruction of the original data is possible. Therefore, additional noise is included in the perturbed data. This process is repeated till zero percent of similarity of data is attained.

  10. Systems analysis and futuristic designs of advanced biofuel factory concepts.

    Energy Technology Data Exchange (ETDEWEB)

    Chianelli, Russ; Leathers, James; Thoma, Steven George; Celina, Mathias C.; Gupta, Vipin P.

    2007-10-01

    The U.S. is addicted to petroleum--a dependency that periodically shocks the economy, compromises national security, and adversely affects the environment. If liquid fuels remain the main energy source for U.S. transportation for the foreseeable future, the system solution is the production of new liquid fuels that can directly displace diesel and gasoline. This study focuses on advanced concepts for biofuel factory production, describing three design concepts: biopetroleum, biodiesel, and higher alcohols. A general schematic is illustrated for each concept with technical description and analysis for each factory design. Looking beyond current biofuel pursuits by industry, this study explores unconventional feedstocks (e.g., extremophiles), out-of-favor reaction processes (e.g., radiation-induced catalytic cracking), and production of new fuel sources traditionally deemed undesirable (e.g., fusel oils). These concepts lay the foundation and path for future basic science and applied engineering to displace petroleum as a transportation energy source for good.

  11. Food security: increasing yield and improving resource use efficiency.

    Science.gov (United States)

    Parry, Martin A J; Hawkesford, Malcolm J

    2010-11-01

    Food production and security will be a major issue for supplying an increasing world population. The problem will almost certainly be exacerbated by climate change. There is a projected need to double food production by 2050. In recent times, the trend has been for incremental modest yield increases for most crops. There is an urgent need to develop integrated and sustainable approaches that will significantly increase both production per unit land area and the resource use efficiency of crops. This review considers some key processes involved in plant growth and development with some examples of ways in which molecular technology, plant breeding and genetics may increase the yield and resource use efficiency of wheat. The successful application of biotechnology to breeding is essential to provide the major increases in production required. However, each crop and each specific agricultural situation presents specific requirements and targets for optimisation. Some increases in production will come about as new varieties are developed which are able to produce satisfactory crops on marginal land presently not considered appropriate for arable crops. Other new varieties will be developed to increase both yield and resource use efficiency on the best land.

  12. Security analysis and improvements of arbitrated quantum signature schemes

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  13. Formulation, computation and improvement of steady state security margins in power systems. Part I: Theoretical framework

    Energy Technology Data Exchange (ETDEWEB)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T. [School of Engineering of Universidad Pontificia Comillas, C/Alberto Aguilera, 23, 28015 Madrid (Spain)

    2011-02-15

    A steady state security margin for a particular operational point can be defined as the distance from this initial point to the secure operational limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. A comprehensive literature survey has shown that these security margins have been studied separately. This fact has suggested to the authors the possibility of researching a common analysis framework valid for all of them. This is the first part of a two-part paper. In part I, a novel mathematical formulation valid to address the study of any steady state security margin is proposed. The developed general approach is presented in three steps: (a) formulation, (b) computation, and (c) improvement of security margins. In part II, the performance of the proposed approach when used to compute and improve the aforementioned steady security margins is illustrated through its application to the Spanish power system. Results denote that this approach can be a useful tool to solve a variety of practical situations in modern real power systems. (author)

  14. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    Science.gov (United States)

    Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  15. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    Science.gov (United States)

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  16. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    Directory of Open Access Journals (Sweden)

    S K Hafizul Islam

    Full Text Available Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1 the correctness of identity and password are not verified during the login and password change phases; (2 it is vulnerable to impersonation attack and privileged-insider attack; (3 it is designed without the revocation of lost/stolen smart card; (4 the explicit key confirmation and the no key control properties are absent, and (5 user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  17. Cryptanalysis and improvement of quantum secure communication network protocol with entangled photons for mobile communications

    Science.gov (United States)

    Gao, Gan

    2014-12-01

    Recently, a communication protocol called controlled bidirectional quantum secret direct communication for mobile networks was proposed by Chou et al (2014 Mobile Netw. Appl. 19 121). We study the security of the proposed communication protocol and find that it is not secure. The controller, Telecom Company, may eavesdrop secret messages from mobile devices without being detected. Finally, we give a possible improvement of the communication protocol.

  18. Reducing food wastage, improving food security? An inventory study on stakeholders’ perspectives and the current state

    OpenAIRE

    Tielens, J.; Candel, J.J.L.

    2014-01-01

    This study is concerned with the relation between food wastage reduction and the improvement of food security. The central question of this inventory study is to what extent interventions to reduce food wastage are effective contributions for food security, in particular for local access in developing regions, but also the food system stability in general? To investigate this, an overview of international actors working in the field of wastage has been made, with a European/Dutch focus. Their...

  19. Selection of UPFC Suitable Locations for System Security Improvement Under Normal and Network Contingencies

    OpenAIRE

    Visakha, K; Thukaram, D; Jenkins, Lawrence; Khincha, HP

    2003-01-01

    Electric power systems are exposed to various contingencies. Network contingencies often contribute to overloading of network branches, unsatisfactory voltages and also leading to problems of stability/voltage collapse. To maintain security of the systems, it is desirable to estimate the effect of contingencies and plan suitable measures to improve system security/stability. This paper presents an approach for selection of UPFC suitable locations considering normal and network contingencies a...

  20. Cryptanalysis and improvement of controlled secure direct communication

    Institute of Scientific and Technical Information of China (English)

    Kao Shih-Hung; Hwang Tzonelih

    2013-01-01

    This paper points out that,due to a flaw in the sender's encoding,the receiver in Gao et al.'s controlled quantum secret direct communication (CQSDC) protocol [Chin.Phys.14 (2005),No.5,p.893] can reveal the whole secret message without permission from the controller.An improvement is proposed to avoid this flaw.

  1. Security Guarantee of Agriculture Industry Based on the Improvement of Legal System of Peasant Specialized Cooperative

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Current status of several management models of the agriculture industry is introduced,as well as its impacts on industrial security.The management models are mainly the enterprise-like operation model,"enterprise + peasant household" model,small-scale peasants’ operation model,and peasant specialized cooperative model.Functions of peasant specialized cooperative in ensuring the security of agricultural industry are introduced,which are enhancing the industrial security by organization degree,promoting the industrial security by scale economy formed by cooperative organizations,fully utilizing the resources by the factor allocation capability,and ensuring the industrial security by industrial chain improvement.Development predicaments of the peasant specialized cooperative at present are analyzed,such as small scale,poor economic benefits,and non-standard operation.Analysis shows that institutional absence is the main reason causing these predicaments.And suggestions on improving the cooperatives system in the Law of the People’s Republic of China on Peasants Specialized Cooperatives are put forward,in order to better ensure the security of agriculture industry

  2. Sustainability impact assessment to improve food security of smallholders in Tanzania

    Energy Technology Data Exchange (ETDEWEB)

    Schindler, Jana, E-mail: jana.schindler@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin (Germany); Graef, Frieder, E-mail: graef@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); König, Hannes Jochen, E-mail: hkoenig@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Mchau, Devotha, E-mail: dvtmchau@yahoo.com [Agricultural Research Institute (ARI Hombolo/Makutupora), P. O. Box 1676, Dodoma (Tanzania, United Republic of); Saidia, Paul, E-mail: saidiapaul@gmail.com [Sokoine University of Agriculture (SUA) Morogoro, Department of Crop Science and Production, P O. Box 3005, Morogoro (Tanzania, United Republic of); Sieber, Stefan, E-mail: stefan.sieber@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Socio-Economics, Eberswalder Straße 84, 15374 Müncheberg (Germany)

    2016-09-15

    The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agricultural production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.

  3. Security Solutions for Networked Control Systems Based on DES Algorithm and Improved Grey Prediction Model

    Directory of Open Access Journals (Sweden)

    Liying Zhang

    2013-11-01

    Full Text Available Compared with the conventional control systems, networked control systems (NCSs are more open to the external network. As a result, they are more vulnerable to attacks from disgruntled insiders or malicious cyber-terrorist organizations. Therefore, the security issues of NCSs have been receiving a lot of attention recently. In this brief, we review the existing literature on security issues of NCSs and propose some security solutions for the DC motor networked control system. The typical Data Encryption Standard (DES algorithm is adopted to implement data encryption and decryption. Furthermore, we design a Detection and Reaction Mechanism (DARM on the basis of DES algorithm and the improved grey prediction model. Finally, our proposed security solutions are tested with the established models of deception and DOS attacks. According to the results of numerical experiments, it's clear to see the great feasibility and effectiveness of the proposed solutions above.

  4. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    Science.gov (United States)

    2015-05-14

    Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs Report Documentation Page Form... fairness of personnel security in the DoD In the wake of events like 9-11, Ft. Hood, and the Washington Navy Yard shootings, we expanded our

  5. Improved Rate-Equivocation Regions for Secure Cooperative Communication

    CERN Document Server

    Marina, Ninoslav; Poor, H Vincent

    2011-01-01

    A simple four node network in which cooperation improves the information-theoretic secrecy is studied. The channel consists of two senders, a receiver, and an eavesdropper. One or both senders transmit confidential messages to the receiver, while the eavesdropper tries to decode the transmitted message. The main result is the derivation of a newly achievable rate-equivocation region that is shown to be larger than a rate-equivocation region derived by Lai and El Gamal for the relay-eavesdropper channel. When the rate of the helping interferer is zero, the new rate-equivocation region reduces to the capacity-equivocation region over the wire-tap channel, hence, the new achievability scheme can be seen as a generalization of a coding scheme proposed by Csiszar and Korner. This result can naturally be combined with a rate-equivocation region given by Tang et al. (for the interference assisted secret communication), yielding an even larger achievable rate-equivocation region.

  6. Performance of a system of reservoirs on futuristic front

    Science.gov (United States)

    Saha, Satabdi; Roy, Debasri; Mazumdar, Asis

    2016-10-01

    Application of simulation model HEC-5 to analyze the performance of the DVC Reservoir System (a multipurpose system with a network of five reservoirs and one barrage) on the river Damodar in Eastern India in meeting projected future demand as well as controlling flood for synthetically generated future scenario is addressed here with a view to develop an appropriate strategy for its operation. Thomas-Fiering model (based on Markov autoregressive model) has been adopted for generation of synthetic scenario (monthly streamflow series) and subsequently downscaling of modeled monthly streamflow to daily values was carried out. The performance of the system (analysed on seasonal basis) in terms of `Performance Indices' (viz., both quantity based reliability and time based reliability, mean daily deficit, average failure period, resilience and maximum vulnerability indices) for the projected scenario with enhanced demand turned out to be poor compared to that for historical scenario. However, judicious adoption of resource enhancement (marginal reallocation of reservoir storage capacity) and demand management strategy (curtailment of projected high water requirements and trading off between demands) was found to be a viable option for improvement of the performance of the reservoir system appreciably [improvement being (1-51 %), (2-35 %), (16-96 %), (25-50 %), (8-36 %) and (12-30 %) for the indices viz., quantity based reliability, time based reliability, mean daily deficit, average failure period, resilience and maximum vulnerability, respectively] compared to that with normal storage and projected demand. Again, 100 % reliability for flood control for current as well as future synthetically generated scenarios was noted. The results from the study would assist concerned authority in successful operation of reservoirs in the context of growing demand and dwindling resource.

  7. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  8. Strategies for Improving Housing Security System in China:A Case Study on Beijing

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Since China’s transformation to a market economy, residential segregation has become increasingly serious in Beijing. This paper analyses the problems of "affordable housing" and "low-rent housing" schemes of Beijing and makes suggestions on diminishing the residential segregation of the city by improving the Housing Security System.

  9. An Improvement of the Web Applications Security%提高Web应用程序安全

    Institute of Scientific and Technical Information of China (English)

    梁万龙

    2013-01-01

    In this article, The Web application security were analyzed, how to improve the safety of Web application program is discussed.%  就目前互联网上的Web应用程序的安全性进行了分析,针对提高Web应用程序的安全进行了阐述。

  10. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  11. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...

  12. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, Ricardo; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    2002-01-01

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs an

  13. Enhancement on "Security analysis and improvements of arbitrated quantum signature schemes"

    CERN Document Server

    Hwang, Tzonelih; Chong, Song-Kong

    2011-01-01

    Recently, Zou et al. [Phys. Rev. A 82, 042325 (2010)] demonstrated that two arbitrated quantum signature (AQS) schemes are not secure, because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a signature. By using a public board, Zou et al. proposed two AQS schemes to solve the problem. This work shows that the same security problem may exist in Zou et al.'s schemes and also that a malicious party can reveal the other party's secret key without being detected by using Trojan-horse attacks. Accordingly, an improved scheme is proposed to resolve the problems.

  14. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali.

    Science.gov (United States)

    Borresen, Erica C; Stone, Cordelia; Boré, Abdoulaye; Cissoko, Alima; Maiga, Ababacar; Koita, Ousmane A; Ryan, Elizabeth P

    2016-06-08

    Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community's needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM) for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage). The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage). The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  15. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali

    Directory of Open Access Journals (Sweden)

    Erica C. Borresen

    2016-06-01

    Full Text Available Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community’s needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage. The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage. The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  16. Improving the security of arbitrated quantum signature against the forgery attack

    Science.gov (United States)

    Zhang, Ke-Jia; Zhang, Wei-Wei; Li, Dan

    2013-08-01

    As a feasible model for signing quantum messages, some cryptanalysis and improvement of arbitrated quantum signature (AQS) have received a great deal of attentions in recent years. However, in this paper we find the previous improvement is not suitable implemented in some typical AQS protocols in the sense that the receiver, Bob, can forge a valid signature under known message attack. We describe the forgery strategy and present some corresponding improved strategies to stand against the forgery attack by modifying the encryption algorithm, an important part of AQS. These works preserve the merits of AQS and lead some potential improvements of the security in quantum signature or other cryptography problems.

  17. Improving the security of multiparty quantum secret sharing against Trojan horse attack

    CERN Document Server

    Deng, F G; Deng, Fu-Guo; Zhou, Hong-Yu

    2005-01-01

    Security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang et al. [Phys. Rev. A \\textbf{71}, 044301 (2005)] is analyzed in the case that the agent who prepares the quantum signal, say Bob wants to eavesdrop the information about the unitary operations done by the other agent, Charlie by using a Trojan horse attack. Bob can replace the single-photon signal with a multi-photon one and Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.

  18. Toward Improved Understanding of Food Security: A Methodological Examination Based in Rural South Africa

    Science.gov (United States)

    Kirkland, Tracy; Kemp, Robert S.; Hunter, Lori M.; Twine, Wayne S.

    2014-01-01

    Accurate measurement of household food security is essential to generate adequate information on the proportion of households experiencing food insecurity, especially in areas or regions vulnerable to food shortages and famine. This manuscript offers a methodological examination of three commonly used indicators of household food security – experience of hunger, dietary diversity, and coping strategies. Making use of data from the Agincourt Health and Demographic Surveillance Site in rural South Africa, we examine the association between the indicators themselves to improve understanding of the different insight offered by each food security “lens.” We also examine how the choice of indicator shapes the profile of vulnerable households, with results suggesting that dietary diversity scores may not adequately capture broader food insecurity. Concluding discussion explores programmatic and policy implications as related to methodological choices. PMID:25414598

  19. Toward Improved Understanding of Food Security: A Methodological Examination Based in Rural South Africa.

    Science.gov (United States)

    Kirkland, Tracy; Kemp, Robert S; Hunter, Lori M; Twine, Wayne S

    2013-03-01

    Accurate measurement of household food security is essential to generate adequate information on the proportion of households experiencing food insecurity, especially in areas or regions vulnerable to food shortages and famine. This manuscript offers a methodological examination of three commonly used indicators of household food security - experience of hunger, dietary diversity, and coping strategies. Making use of data from the Agincourt Health and Demographic Surveillance Site in rural South Africa, we examine the association between the indicators themselves to improve understanding of the different insight offered by each food security "lens." We also examine how the choice of indicator shapes the profile of vulnerable households, with results suggesting that dietary diversity scores may not adequately capture broader food insecurity. Concluding discussion explores programmatic and policy implications as related to methodological choices.

  20. NARRATIVE AND META-ANALYTIC REVIEW OF INTERVENTIONS AIMING TO IMPROVE MATERNAL-CHILD ATTACHMENT SECURITY.

    Science.gov (United States)

    Letourneau, Nicole; Tryphonopoulos, Panagiota; Giesbrecht, Gerald; Dennis, Cindy-Lee; Bhogal, Sanjit; Watson, Barry

    2015-01-01

    Early secure maternal-child attachment relationships lay the foundation for children's healthy social and mental development. Interventions targeting maternal sensitivity and maternal reflective function during the first year of infant life may be the key to promoting secure attachment. We conducted a narrative systematic review and meta-analysis to examine the effectiveness of interventions aimed at promoting maternal sensitivity and reflective function on maternal-child attachment security, as measured by the gold standard Strange Situation (M. Ainsworth, M. Blehar, B. Waters, & S. Wall, 1978) and Q-set (E. Waters & K. Deane, 1985). Studies were identified from electronic database searches and included randomized or quasi-randomized controlled parallel-group designs. Participants were mothers and their infants who were followed up to 36 months' postpartum. Ten trials, involving 1,628 mother-infant pairs, were included. Examination of the trials that provided sufficient data for combination in meta-analysis revealed that interventions of both types increased the odds of secure maternal-child attachment, as compared with no intervention or standard intervention (n = 7 trials; odds ratio: 2.77; 95% confidence interval: 1.69, 4.53, n = 965). Of the three trials not included in the meta-analyses, two improved the likelihood of secure attachment. We conclude that interventions aimed at improving maternal sensitivity alone or in combination with maternal reflection, implemented in the first year of infants' lives, are effective in promoting secure maternal-child attachments. Intervention aimed at the highest risk families produced the most beneficial effects.

  1. Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2017-01-01

    Full Text Available The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF is presented. Proposed modification avoids discrete logarithm attack (DLA which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ system of equations, which is a system representing a subclass of multivariate quadratic (MQ systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA and chosen ciphertext attack (CCA is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.

  2. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  3. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  4. TMR-MCDB: Enhancing Security in a Multi-cloud Model through Improvement of Service Dependability

    Directory of Open Access Journals (Sweden)

    Mohammed Alzain

    2014-06-01

    Full Text Available In IT enterprises, different computing needs are provided as a service. The service providers take care of the customers’ needs by, for example, maintaining software or purchasing expensive hardware. In addition, there are many benefits of using the technology available from cloud service providers, such as access to large-scale, on-demand, flexible computing infrastructures. However, increasing the dependability of cloud computing is important in order for its potential to be realized. Data security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of the information stored in the cloud, as is the trustworthiness of the cloud service provider. The risk of malicious insiders in the cloud and the failure of cloud services have received intense attention by cloud users. This paper focuses on issues related to service dependability in order to enhance the data security of multi-cloud computing. Service dependability, which encompasses data output trustworthiness, is one of the important factors in enhancing data security in a multi-cloud computing environment. We apply triple modular redundancy (TMR techniques with the sequential method into our previously proposed Multi-Cloud Database (MCDB model to improve the data output trustworthiness of our newly proposed TMR-MCDB model. In addition, the improvement in data trustworthiness enhances data security in our TMR-MCDB model. This paper analyzes the impact of data trustworthiness implementation using the voting technique to evaluate the model performance.

  5. Australia's Efforts to Improve Food Security for Aboriginal and Torres Strait Islander Peoples.

    Science.gov (United States)

    Davy, Deanna

    2016-12-01

    Australia is a wealthy country; however, available evidence suggests that food security among Aboriginal and Torres Strait Islander peoples has not yet been achieved. Aboriginal and Torres Strait Islander peoples living in remote, regional, and urban parts of Australia experience food insecurity for a number of reasons that usually include low income and a lack of access to affordable and healthy food. The much higher rate of illness and disease that this population experiences compared to non-indigenous Australians is directly related to food insecurity. This paper examines the food insecurity among Aboriginal and Torres Strait Islander peoples and recent Australian government efforts to combat this problem. The paper first considers what constitutes a human rights-based approach to achieving food security. Second, it describes the food insecurity that currently exists among Aboriginal and Torres Strait Islander peoples across the three pillars of food access, food availability, and food use. Third, the paper critically examines recent and current Australian government policy aimed at improving food security. The paper concludes with some reflections regarding how the Australian government can improve its efforts to achieve food security for Aboriginal and Torres Strait Islander peoples.

  6. Formulation, computation and improvement of steady state security margins in power systems. Part II: Results

    Energy Technology Data Exchange (ETDEWEB)

    Echavarren, F.M.; Lobato, E.; Rouco, L.; Gomez, T. [School of Engineering of Universidad Pontificia Comillas, C/Alberto Aguilera, 23, 28015 Madrid (Spain)

    2011-02-15

    A steady state security margin for a particular operating point can be defined as the distance from this initial point to the secure operating limits of the system. Four of the most used steady state security margins are the power flow feasibility margin, the contingency feasibility margin, the load margin to voltage collapse, and the total transfer capability between system areas. This is the second part of a two part paper. Part I has proposed a novel framework of a general model able to formulate, compute and improve any steady state security margin. In Part II the performance of the general model is validated by solving a variety of practical situations in modern real power systems. Actual examples of the Spanish power system will be used for this purpose. The same computation and improvement algorithms outlined in Part I have been applied for the four security margins considered in the study, outlining the convenience of defining a general framework valid for the four of them. The general model is used here in Part II to compute and improve: (a) the power flow feasibility margin (assessing the influence of the reactive power generation limits in the Spanish power system), (b) the contingency feasibility margin (assessing the influence of transmission and generation capacity in maintaining a correct voltage profile), (c) the load margin to voltage collapse (assessing the location and quantity of loads that must be shed in order to be far away from voltage collapse) and (d) the total transfer capability (assessing the export import pattern of electric power between different areas of the Spanish system). (author)

  7. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available in progress on a proposed hybrid spread spectrum coding and artificial noise approach to improving the physical layer security of wireless communication channels. The authors are optimistic that, the proposed method will further improve the physical layer...

  8. Worlds without War: Reflections on Elise Boulding's Life, Work and Legacy as a Peace Educator, Feminist and Futurist

    Science.gov (United States)

    Hutchinson, Francis P.; Milojevic, Ivana

    2012-01-01

    Our joint article focuses on Elise Boulding's creative work and legacy as a feminist peace theorist, peace educator and futures educator. Boulding throughout her life was deeply concerned not only with critiquing the institution of war but of working for better, more peaceable worlds. She was very much a "practical futurist". Various important…

  9. Security Analysis and Improvement of User Authentication Framework for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Nan Chen

    2014-01-01

    Full Text Available Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many secure challenges, one of which is authentication. In this paper, we firstly analyze a user authentication framework for cloud computing proposed by Amlan Jyoti Choudhury et al and point out the security attacks existing in the protocol. Then we propose an improved user authentication scheme. Our improved protocol ensures user legitimacy before entering into the cloud. The confidentiality and the mutual authentication of our protocol are formally proved by the strand space model theory and the authentication test method. The simulation illustrates that the communication performance of our scheme is efficient

  10. SAFETY AND SECURITY IMPROVEMENT IN PUBLIC TRANSPORTATION BASED ON PUBLIC PERCEPTION IN DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Tri Basuki JOEWONO

    2006-01-01

    Three aspects of an improvement agenda are proposed based on the perception data, namely technology, management, and institution. This agenda is clarified by a set of action plans incorporating the responsible parties and a time frame. The action plan is divided into three terms to define a clear goal for each step. The short-term action focuses on the hardware and on preparing further steps, whereas the medium-term action focuses on developing and improving the standard of safety and security. The long-term action focuses on advancing safety and security practices. The effectiveness of this agenda and action plan rests upon a set of assumptions, such as the degree of seriousness from the authoritative institution, fair distribution of information, the availability of reasonable resources, and coordinated and collaborative action from all parties involved to reach the objective.

  11. Improving Security Levels Of IEEE802.16e Authentication By Diffie-Hellman Method

    Directory of Open Access Journals (Sweden)

    Mohammad Zabihi

    2011-11-01

    Full Text Available In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authentication method according to Diffie-Hellman and in the last we compare different methods for authentication to improve security in IEEE802.16e. CPN is a useful for simulation and compare protocol together so we use CPN tools in this paper.

  12. Actions Needed to Improve the Reliability of Afghan Security Force Assessments

    Science.gov (United States)

    2010-06-29

    Assessment Tool VTT Validation Transition Team SIGAR Audit-10-11 Security/ANSF Capability Ratings Page 1 Actions Needed to Improve the...the part of Afghan units. In addition, IJC’s Validation Transition Team ( VTT ), which provides independent validation of CM1 capabilities for the...personnel were present for duty in ANA-fielded combat units. The ANA’s manning shortage was confirmed in statements by VTT officials who reported

  13. SMART CITY: FUTURISTIC VISION OF THE KNOWLEDGE SOCIETY IN SUCRE DEPARTMENT-COLOMBIA

    Directory of Open Access Journals (Sweden)

    Elkin Quiñones

    2016-10-01

    Full Text Available This article aims to analyze Smart City as a strategy of futuristic vision of the knowledge society-Colombia Sucre department. This item is theoretically centered on the concepts of Nunez (2011, Godet and Durance (2011, Rodriguez and Lamb (2007, Lopez and Correa (2007, among others. Methodologically it is based on a positivist scientific paradigm descriptive with a non-experimental, cross-sectional design field. The population consisted of (22 subject to the following characteristics: active in the academic, business and political sectors in the Department of Sucre Colombia. Among the results it was concluded that there weaknesses in the knowledge of universities, businesses and government in the full development of the characteristics and categorization of Smart City, which are essential to know the sustainability and growth of these cities boasting technology to solve situations of communities.

  14. Model of Information Security Risk Assessment based on Improved Wavelet Neural Network

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2013-09-01

    Full Text Available This paper concentrates on the information security risk assessment model utilizing the improved wavelet neural network. The structure of wavelet neural network is similar to the multi-layer neural network, which is a feed-forward neural network with one or more inputs. Afterwards, we point out that the training process of wavelet neural networks is made up of four steps until the value of error function can satisfy a pre-defined error criteria. In order to enhance the quality of information security risk assessment, we proposed a modified version of wavelet neural network which can effectively combine all influencing factors in assessing information security risk by linear integrating several weights. Furthermore, the proposed wavelet neural network is trained by the BP algorithm with batch mode, and the weight coefficients of the wavelet are modified with the adopting mode. Finally, a series of experiments are conduct to make performance evaluation. From the experimental results, we can see that the proposed model can assess information security risk accurately and rapidly

  15. Satellite Image Security Improvement by Combining DWT-DCT Watermarking and AES Encryption

    Directory of Open Access Journals (Sweden)

    Naida.H.Nazmudeen

    2014-06-01

    Full Text Available With the large-scale research in space sciences and technologies, there is a great demand of satellite image security system for providing secure storage and transmission of satellite images. As the demand to protect the sensitive and valuable data from satellites has increased and hence proposed a new method for satellite image security by combining DWT-DCT watermarking and AES encryption. Watermarking techniques developed for multimedia data cannot be directly applied to the satellite images because here the analytic integrity of the data, rather than perceptual quality, is of primary importance. To improve performance, combine discrete wavelet transform (DWT with another equally powerful transform; the discrete cosine transform (DCT. The combined DWT-DCT watermarking algorithm’s imperceptibility was better than the performance of the DWT approach. Modified decision based unsymmetrical trimmed median filter (MDBUTMF algorithm is proposed for the restoration of satellite images that are highly corrupted by salt and pepper noise. Satellite images desire not only the watermarking for copyright protection but also encryption during storage and transmission for preventing information leakage. Hence this paper investigates the security and performance level of joint DWT-DCT watermarking and Advanced Encryption Standard (AES for satellite imagery. Theoretical analysis can be done by calculating PSNR and MSE. The experimental results demonstrate the efficiency of the proposed scheme, which fulfils the strict requirements concerning alterations of satellite images.

  16. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    (nicknamed MiniMac). While TinyOT has already been implemented, we present in this paper the first implementation of MiniMac, using the same platform as the existing TinyOT implementation. We also suggest several improvements of MiniMac, both on the protocol design and implementation level. In particular, we...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...

  17. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  18. 76 FR 63811 - Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and...

    Science.gov (United States)

    2011-10-13

    ... Documents#0;#0; ] Executive Order 13587 of October 7, 2011 Structural Reforms To Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information By the authority... to ensure the responsible sharing and safeguarding of classified national security...

  19. AODV Improvement by Modification at Source Node and Securing It from Black Hole Attack.

    Directory of Open Access Journals (Sweden)

    Debarati Roy Choudhury

    2014-08-01

    Full Text Available MANETS suffer from constraints in power, storage and computational resources ,as a result, they are more vulnerable to various communications security related attacks. therefore we attempt to focus on analyzing and improving the security of routing protocol for MANETS viz. the Ad hoc On Demand Distance Vector (AODVrouting protocol. We propose modifications to the AODV we propose an algorithm to counter the Black hole attack on the routing protocols in MANETs. All the routes has unique sequence number and the malicious node has the highest Destination Sequence number and it is the first RREP to arrive. So the comparison is made only to the first entry in the table without checking other entries in the table

  20. Trade and commerce in improved crops and food: an essay on food security.

    Science.gov (United States)

    Kershen, Drew L

    2010-11-30

    Agricultural trade between nations is a significant proportion of total international trade. Agricultural trade in transgenic crops faces extra complications due to the existence of domestic and international regimes that focus specifically on agricultural biotechnology. These specialized regimes create legal and commercial challenges for trade in transgenic crops that have significant implications for the food security of the nations of the world. By food security, one should understand not just the available supply of food, but also the quality of the food and the environmental impact of agricultural production systems. These specialized regimes for transgenic crops can either encourage or hinder the adoption of agricultural biotechnology as a sustainable intensive agriculture. Sustainable intensive agriculture offers hope for agronomic improvements for agricultural production, socio-economic betterment for farmers and environmental benefits for societies. Sustainable intensive agriculture offers particular hope for the poorest farmers of the world because agricultural biotechnology is a technology in the seed.

  1. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  2. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  3. Cryptanalysis and Improvement on "Robust EPR-Pairs-Based Quantum Secure Communication with Authentication Resisting Collective Noise"

    Science.gov (United States)

    Yue, Qiu-Ling; Yu, Chao-Hua; Liu, Bin; Wang, Qing-Le

    2016-10-01

    Recently, Chang et al. [Sci Chin-Phys Mech Astron. 57(10), 1907-1912, 2014] proposed two robust quantum secure communication protocols with authentication based on Einstein-Podolsky-Rosen (EPR) pairs, which can resist collective noise. In this paper, we analyze the security of their protocols, and show that there is a kind of security flaw in their protocols. By a kind of impersonation attack, the eavesdropper can obtain half of the message on average. Furthermore, an improved method of their protocols is proposed to close the security loophole.

  4. Genetically Engineered Crops and Certified Organic Agriculture for Improving Nutrition Security in Africa and South Asia.

    Science.gov (United States)

    Pray, Carl; Ledermann, Samuel

    2016-01-01

    In Africa and South Asia, where nutrition insecurity is severe, two of the most prominent production technologies are genetically modified (GM) crops and certified organic agriculture. We analyze the potential impact pathways from agricultural production to nutrition. Our review of data and the literature reveals increasing farm-level income from cash crop production as the main pathway by which organic agriculture and GM agriculture improve nutrition. Potential secondary pathways include reduced prices of important food crops like maize due to GM maize production and increased food production using organic technology. Potential tertiary pathways are improvements in health due to reduced insecticide use. Challenges to the technologies achieving their impact include the politics of GM agriculture and the certification costs of organic agriculture. Given the importance of agricultural production in addressing nutrition security, accentuated by the post-2015 sustainable development agenda, the chapter concludes by stressing the importance of private and public sector research in improving the productivity and adoption of both GM and organic crops. In addition, the chapter reminds readers that increased farm income and productivity require complementary investments in health, education, food access and women's empowerment to actually improve nutrition security.

  5. Improved Security of Audit Trail Logs in Multi-Tenant Cloud Using ABE Schemes

    Directory of Open Access Journals (Sweden)

    Bhanu Prakash Gopularam

    2014-11-01

    Full Text Available Cloud computing is delivery of services rather than a product and among different cloud deployment models, the public cloud provides improved scalability and cost reduction when compared to others. Security and privacy of data is one of the key factors in transitioning to cloud. Typically the cloud providers have a demilitarized zone protecting the data center along with a reverse proxy setup. The reverse proxy gateway acts as initial access point and provides additional capabilities like load balancing, caching, security monitoring capturing events, syslogs related to hosts residing in the cloud. The audit-trail logs captured by reverse proxy server comprise important information related to all the tenants. While the PKI infrastructure works in cloud scenario it becomes cumbersome from manageability point of view and they lack flexibility in providing controlled access to data. In this paper we evaluate risks associated with security and privacy of audit logs produced by reverse proxy server. We provide a two-phase approach for sharing the audit-logs with users allowing fine-grained access. In this paper we evaluate certain Identity-Based and Attribute-Based Encryption schemes and provide detailed analysis on performance.

  6. Does participation in a social security scheme improve household dietary diversity?

    Directory of Open Access Journals (Sweden)

    Adenuga Olajumoke M.

    2015-01-01

    Full Text Available Social protection in the form of cash transfer is emerging as a policy objective to solve the problem of poverty and food insecurity in developing countries. However, the extent to which this is feasible is yet to be empirically examined. This study was therefore carried out to assess the effect of the Ekiti State Social Security Scheme (ESSSS on the dietary diversity of beneficiary households in Ekiti State, Nigeria. The study employed a three-stage random sampling technique to collect data from 200 respondents using a structured questionnaire. Descriptive statistics, Household Dietary Diversity Score (HDDS in terciles and the Poisson Maximum Likelihood Estimator were the main analytical tools employed for the study. The result of the Poisson maximum likelihood estimator at p ≤ 0.05 showed that access to the Ekiti State Social Security Scheme (ESSSS, years of education and total monthly income were found to significantly influence household dietary diversity. The study concluded that the Ekiti State Social Security Scheme (ESSSS has a positive effect on household dietary diversity of beneficiaries. It was recommended that the government should endeavour to increase the number of beneficiaries of the programme and organize nutrition-oriented programmes for the elderly people to improve the food substitution knowledge of the households.

  7. Optimal cost and allocation for UPFC using HRGAPSO to improve power system security and loadability

    Energy Technology Data Exchange (ETDEWEB)

    Marouani, I.; Guesmi, T.; Hadj Abdallah, H.; Ouali, A. [Sfax Engineering National School, Electrical Department, BP: W, 3038 Sfax (Tunisia)

    2011-07-01

    With the electricity market deregulation, the number of unplanned power exchanges increases. Some lines located on particular paths may become overload. It is advisable for the transmission system operator to have another way of controlling power flows in order to permit a more efficient and secure use of transmission lines. The FACTS devices (Flexible AC Transmission Systems) could be a mean to carry out this function. In this paper, unified power flow controller (UPFC) is located in order to maximize the system loadability and index security. The optimization problem is solved using a new evolutionary learning algorithm based on a hybrid of real genetic algorithm (RGA) and particle swarm optimization (PSO) called HRGAPSO. The Newton-Raphson load flow algorithm is modified to consider the insertion of the UPFC devices in the network. Simulations results validate the efficiency of this approach to improvement in security, reduction in losses of power system, minimizing the installation cost of UPFC and increasing power transfer capability of the existing power transmission lines. The optimization results was performed on 14-bus test system and implemented using MATLAB.

  8. Optimal cost and allocation for UPFC using HRGAPSO to improve power system security and loadability

    Directory of Open Access Journals (Sweden)

    Marouani I., Guesmi T., Hadj Abdallah H., Ouali A.

    2011-09-01

    Full Text Available With the electricity market deregulation, the number of unplanned power exchanges increases. Some lines located on particular paths may become overload. It is advisable for the transmission system operator to have another way of controlling power flows in order to permit a more efficient and secure use of transmission lines. The FACTS devices (Flexible AC Transmission Systems could be a mean to carry out this function. In this paper, unified power flow controller (UPFC is located in order to maximize the system loadability and index security. The optimization problem is solved using a new evolutionary learning algorithm based on a hybrid of real genetic algorithm (RGA and particle swarm optimization (PSO called HRGAPSO. The Newton-Raphson load flow algorithm is modified to consider the insertion of the UPFC devices in the network. Simulations results validate the efficiency of this approach to improvement in security, reduction in losses of power system, minimizing the installation cost of UPFC and increasing power transfer capability of the existing power transmission lines. The optimization results was performed on 14-bus test system and implemented using MATLAB.

  9. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  10. The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes

    Science.gov (United States)

    Zhang, Long; Zhang, Hai-Yan; Zhang, Ke-Jia; Wang, Qing-Le

    2017-06-01

    In recent years, some quantum proxy signature schemes based on controlled teleportation are proposed by Cao et al.. In these schemes, the properties of quantum mechanics are directly applied to ensure the security. In this paper, we have summarized a general model from the quantum proxy signature schemes. Furthermore, it can be seen that there exist some loopholes which have not been considered in the previous analysis. Specifically, the receiver can forge a valid signature. And these schemes can not be immune to collusive attack. To overcome these loopholes, some improved ideas are presented in this paper.

  11. Security Analyses and Improvement of Arbitrated Quantum Signature with an Untrusted Arbitrator

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen; Mateus, Paulo

    2013-09-01

    Very recently, an arbitrated quantum signature (AQS) scheme of classical message with an untrusted arbitrator was presented (Yang et al. in Eur. Phys. J., D, At. Mol. Opt. Plasma Phys. 61(3):773-778, 2011). In this paper, the security of the AQS scheme with an untrusted arbitrator is analyzed. An AQS scheme with an untrusted arbitrator should satisfy the unforgeable property and undeniable property. In particular, the malicious verifier can not modify a message and its signature to produce a new message with a valid signature, and the dishonest signer who really has sent the message to the verifier which the verifier accepted as an authentic one cannot later deny having sent this message. However, we show that, in the AQS scheme with an untrusted arbitrator, the dishonest signer can successfully disavow his/her signature and the malicious verifier can counterfeit a valued signature for any message by known message attack when he has received a message-signature pair. Then, we suggest an improved AQS scheme of classical message with an untrusted arbitrator which can solve effectively the two problems raised above. Furthermore, we prove the security of the improved scheme.

  12. Improving Water Sustainability and Food Security through Increased Crop Water Productivity in Malawi

    Directory of Open Access Journals (Sweden)

    Luxon Nhamo

    2016-09-01

    Full Text Available Agriculture accounts for most of the renewable freshwater resource withdrawals in Malawi, yet food insecurity and water scarcity remain as major challenges. Despite Malawi’s vast water resources, climate change, coupled with increasing population and urbanisation are contributing to increasing water scarcity. Improving crop water productivity has been identified as a possible solution to water and food insecurity, by producing more food with less water, that is, to produce “more crop per drop”. This study evaluated crop water productivity from 2000 to 2013 by assessing crop evapotranspiration, crop production and agricultural gross domestic product (Ag GDP contribution for Malawi. Improvements in crop water productivity were evidenced through improved crop production and productivity. These improvements were supported by increased irrigated area, along with improved agronomic practices. Crop water productivity increased by 33% overall from 2000 to 2013, resulting in an increase in maize production from 1.2 million metric tons to 3.6 million metric tons, translating to an average food surplus of 1.1 million metric tons. These developments have contributed to sustainable improved food and nutrition security in Malawi, which also avails more water for ecosystem functions and other competing economic sectors.

  13. Lidar and Dial application for detection and identification: a proposal to improve safety and security

    Science.gov (United States)

    Gaudio, P.; Malizia, A.; Gelfusa, M.; Murari, A.; Parracino, S.; Poggi, L. A.; Lungaroni, M.; Ciparisse, J. F.; Di Giovanni, D.; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.

    2017-01-01

    Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research & academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.

  14. Speaker identification for the improvement of the security communication between law enforcement units

    Science.gov (United States)

    Tovarek, Jaromir; Partila, Pavol

    2017-05-01

    This article discusses the speaker identification for the improvement of the security communication between law enforcement units. The main task of this research was to develop the text-independent speaker identification system which can be used for real-time recognition. This system is designed for identification in the open set. It means that the unknown speaker can be anyone. Communication itself is secured, but we have to check the authorization of the communication parties. We have to decide if the unknown speaker is the authorized for the given action. The calls are recorded by IP telephony server and then these recordings are evaluate using classification If the system evaluates that the speaker is not authorized, it sends a warning message to the administrator. This message can detect, for example a stolen phone or other unusual situation. The administrator then performs the appropriate actions. Our novel proposal system uses multilayer neural network for classification and it consists of three layers (input layer, hidden layer, and output layer). A number of neurons in input layer corresponds with the length of speech features. Output layer then represents classified speakers. Artificial Neural Network classifies speech signal frame by frame, but the final decision is done over the complete record. This rule substantially increases accuracy of the classification. Input data for the neural network are a thirteen Mel-frequency cepstral coefficients, which describe the behavior of the vocal tract. These parameters are the most used for speaker recognition. Parameters for training, testing and validation were extracted from recordings of authorized users. Recording conditions for training data correspond with the real traffic of the system (sampling frequency, bit rate). The main benefit of the research is the system developed for text-independent speaker identification which is applied to secure communication between law enforcement units.

  15. Improvement of system security with unified-power-flow controller at suitable locations under network contingencies of interconnected systems

    OpenAIRE

    Thukaram, D; Jenkins, L.; Visakha, K

    2005-01-01

    The operation and planning of large interconnected power systems are becoming increasingly complex. To maintain security of such systems, it is desirable to estimate the effect of contingencies and plan suitable measures to improve system security/stability. The paper presents an approach for selection of unified-power-flow-controller (UPFC-) suitable locations considering normal and network contingencies after evaluating the degree of severity of the contingencies. The ranking is evaluated u...

  16. Security Analysis and Improvements of Session Key Establishment for Clustered Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2016-01-01

    Full Text Available WSN (wireless sensor network is one of the main technologies in IoT (Internet of Things applications or services. To date, several schemes have been proposed to establish a pair-wise key between two nodes in WSN, and most of them are designed to establish long-term keys used throughout the network lifetime. However, in the near future, if WSN will be used for information infrastructures in various fields such as manufacturing, distribution, or public facilities management and its life cycle can be as long as that of other common networks, it will definitely be advantageous in terms of security to encrypt messages using session keys instead of long-term keys. In this paper, we propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH key exchange and hash chain. The proposed scheme eliminates vulnerabilities of existing schemes for WSN and has improved security. The proposed scheme is efficient in terms of energy costs compared to related schemes.

  17. High Lightweight Encryption Standard (HLES as an Improvement of 512-Bit AES for Secure Multimedia

    Directory of Open Access Journals (Sweden)

    GUESMIA Seyf Eddine

    2016-01-01

    Full Text Available In today’s scenario, people share information to another people frequently using network. Due to this, more amount of information are so much private but some are less private. Therefore, the attackers or the hackers take the advantage and start attempting to steal the information since 2001. the symmetric encryption algorithm called 512-bit AES provides high level of security, but it's almost be impossible to be used in multimedia transmissions and mobile systems because of the need for more design area that effect in the use of large memory space in each round and the big encryption time that it takes. This paper presents an improvement of 512-bit AES algorithm with efficient utilization of resources such as processor and memory space. The proposed approach resists the linear and differential encrypt analysis and provides high security level using a 512-bit size of key block and data block and ameliorates the performance by minimizing the use of memory space and time encryption to be able to work in specific characteristics of resource-limited systems. The experimental results on several data (text, image, sound, video show that the used memory space is reduced to quarter, and the encryption time is reduced almost to the half. Therefore, the adopted method is very effective for encryption of multimedia data.

  18. Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

    Institute of Scientific and Technical Information of China (English)

    Feng HUANG; Yong FENG

    2009-01-01

    The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps.Chaotic maps are often used in encrypting images.However,the encryption has periodic-ity,no diffusion,and at the same time,the real keys space of encryption are fewer than the theoretical keys space,which consequently results in potential security problems.Thus,this article puts forward several ways to solve the problems including adding diffusion mechanism,changing the design of keys and developing a composite encryption system.It designs an algorithm for the version B of the discretized baker map,which is one of the most prevalent chaotic maps,based on which a new image encryption is proposed to avoid the above problems.The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps,such as the cat map.

  19. Sustaining World Food Security with Improved Cassava Processing Technology: The Nigeria Experience

    Directory of Open Access Journals (Sweden)

    Peter O. Kolawole

    2010-11-01

    Full Text Available Cassava is a very important food crop that is capable of providing food security. However, a lot of problems prevent the development and use of modern equipment for its production. Most of the cassava produced still comes from peasant farmers who depend on manual tools for their field operations and these farmers have made Nigeria the world’s largest producer of the crop. An increase in production of cassava to sustain the world food security needs improved machinery to allow its continuous cultivation and processing. Reasons for the low success recorded in the mechanization of cassava harvesting and processing were traced, and the attempts that have been made in the recent past by various engineers in Nigeria researching towards achieving mechanized harvesting and processing of cassava are well explained. The machinery required for cassava production in Africa, the development of new machines, and the need for more research and development in harvesting and processing machineries, which can reduce poverty worldwide and make food available and accessible for all, are also discussed. Research efforts made and the challenges facing the engineers, farmers, scientists and food processors towards achieving mechanical harvesting and processing of cassava are presented. Breeding a cassava variety with a regular shape for easy mechanization is one solution that could help the engineers worldwide.

  20. Study on Promotion of City Public Security and Improvement of City Planning

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>1. Problems existing in city publicsecurity The city public security (CPS) refers tothe security guarantee provided and led by governments for the people, property,as well as important lifeline systems of

  1. 改进的PMAC及安全性分析%Improved PMAC and its security analysis

    Institute of Scientific and Technical Information of China (English)

    晁仕德; 张绍兰; 田华; 杨义先

    2009-01-01

    According to the forgery attack on PMAC proposed by Lee Changhcon et al,the weakness is found.The method to pro-cess the last block of message is proposed to avoid the forgery attack by using the fact that the block cipher has same output with the same input using a key.The security of the improved scheme is analysed.%针对Lee Changhoon等人对PMAC工作模式提出的伪造攻击,找到PMAC被攻击的弱点.改进了PMAC最后一个消息块的处理方式,避免了利用分组密码在同一个密钥下相同输入有相同输出这一特点进行的伪造攻击,并给出了改进方案的安全性分析.

  2. Improving Podcast Distribution on Gwanda using PrivHab: a Multiagent Secure Georouting Protocol.

    Directory of Open Access Journals (Sweden)

    Adrián SÁNCHEZ-CARMONA

    2015-12-01

    Full Text Available We present PrivHab, a multiagent secure georouting protocol that improves podcast distribution on Gwanda, Zimbabwe. PrivHab learns the whereabouts of the nodes of the network to select an itinerary for each agent carrying a piece of data. PrivHab makes use of cryptographic techniques to make the decisions while preserving nodes' privacy. PrivHab uses a waypoint-based georouting that achieves a high performance and low overhead in rugged terrain areas that are plenty of physical obstacles. The store-carry-and-forward approach used is based on mobile agents and is designed to operate in areas that lack network infrastructure. The PrivHab protocol is compared with a set of well-known delay-tolerant routing algorithms and shown to outperform them.

  3. An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    CERN Document Server

    Farouk, Hala A

    2011-01-01

    The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagra...

  4. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  5. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    CERN Document Server

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  6. The role of community and population ecology in applying mycorrhizal fungi for improved food security.

    Science.gov (United States)

    Rodriguez, Alia; Sanders, Ian R

    2015-05-01

    The global human population is expected to reach ∼9 billion by 2050. Feeding this many people represents a major challenge requiring global crop yield increases of up to 100%. Microbial symbionts of plants such as arbuscular mycorrhizal fungi (AMF) represent a huge, but unrealized resource for improving yields of globally important crops, especially in the tropics. We argue that the application of AMF in agriculture is too simplistic and ignores basic ecological principals. To achieve this challenge, a community and population ecology approach can contribute greatly. First, ecologists could significantly improve our understanding of the determinants of the survival of introduced AMF, the role of adaptability and intraspecific diversity of AMF and whether inoculation has a direct or indirect effect on plant production. Second, we call for extensive metagenomics as well as population genomics studies that are crucial to assess the environmental impact that introduction of non-local AMF may have on native AMF communities and populations. Finally, we plead for an ecologically sound use of AMF in efforts to increase food security at a global scale in a sustainable manner.

  7. Emergence of a utopian vision of modernist and futuristic houses and cities in early 20th century

    Science.gov (United States)

    Ma, Nan

    2017-04-01

    Throughout the development of literature on urban design theories, utopian thinking has played a crucial role as utopians were among the first designers. Many unrealized utopian projects such as The Radiant City, have presented a research laboratory and positive attempts for all architects, urban designers and theorists. In this essay, a utopian vision following under More’s and Jameson’s definitions is discussed, examining how the utopian vision of modernist and futuristic houses and cities emerged in the early twentieth century in response to several factors, what urban utopia aimed to represent, and how such version was represented in the built form and the urban landscapes.

  8. Methodology to Improve Aviation Security With Terrorist Using Aircraft as a Weapon

    Science.gov (United States)

    2013-09-01

    Whitcomb Chair , Department of Systems Engineering iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT The aviation industry is a large... wheelchair -bound man was stopped by airport security when he began distributing leaflets to publicize his cause. “Shortly after his standoff with airport...security, the disgruntled petitioner detonated his devices” (FlorCruz, 2013). Airport security had seen the wheelchair -bound man distributing

  9. Improving the Coast Guard Ports, Waterways and Coastal Security Outcome Measure

    Science.gov (United States)

    2009-06-01

    I want to express heartfelt thanks to my family. To Ellen Wrynn, my bride and constant companion of over 23 years who has supported me in every...breach. Consequences may be based on impacts to life, economic security, symbolic value, and national defense. The probability of a security breach...an attempt to achieve equivalency between death/injury, economic losses, environmental impacts, national security degradation, and symbolic damage

  10. 75 FR 54285 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-07

    ... Earnings Assistance and Relief Tax Act of 2008 (HEART Act) AGENCY: Social Security Administration. ACTION... Security Income (SSI) program made by the HEART Act. The HEART Act changes the way we treat certain cash..., generally providing a higher SSI benefit (section 201(a) of the HEART Act); Excluding from countable income...

  11. An approach to improve the match-on-card fingerprint authentication system security

    CSIR Research Space (South Africa)

    Nair, Kishor Krishnan

    2016-07-01

    Full Text Available -on-Card (TOC), Match-on- Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...

  12. Automated Information Security Will Not Improve until Effectively Supported by IRM.

    Science.gov (United States)

    Chick, Morey J.

    1989-01-01

    The first of two articles on the nature of the growing problem of automated information systems security, especially in the federal government, this article presents a brief history of the problem and describes the need for integrating security activities into overall policies and programs to help reduce system vulnerabilities and risks. (23…

  13. Contribution of Security Forces Personnel to Deter Migration and Improve Stability in West Africa

    Science.gov (United States)

    2017-06-09

    within the Department of Political Affairs. The objective of this organ is to develop policy and strategy to intervene in case of conflict or...Security and Sustainable Development ” (Information sheet, International Organization for Migration, Bamako, Mali, October 2016), accessed 20 February...and Border Management in Mali: IOM Assistance for Security and Sustainable Development .” Information Sheet, International Organization for Migration

  14. Seeking A Breakthrough: The Improvement of The Asia-Pacific Security Structure From the Perspective of “One Belt One Road” Initiative

    Directory of Open Access Journals (Sweden)

    Zhang Zhaoxi

    2016-12-01

    Full Text Available The U.S alliance in the Asia-Pacific region has exerted significant influence on Asia-Pacific security architecture for a long time. While with the deepening of interdependence among Asia-Pacific countries, the development of regional international relations has outdated the existing security architecture in this region. It is imperative to improve the architecture in that there are plenty of structural hurdles, such as the obsolescence of security concepts, the fragmentation of security mechanism and the dearth of public goods on security affairs. OBOR, which is exemplary as a new multilateral cooperative initiative and has interacted profoundly with the regional security of the Asia-Pacific, holds endogenous relations with the Asia-Pacific security architecture. OBOR could improve the Asia-Pacific security architecture in the following ways: to create a new model of security maintenance in light of the advanced ideas given by OBOR; to design new institutional frameworks which are more normative and effective with mechanical innovations stemming from OBOR; to enrich the security public goods in the Asia-Pacific region under the reference of co-construction and sharing the idea of OBOR. However, the practice of improvement will face tremendous challenges both internally and externally. These challenges should be prudently analyzed and treated in order to better fulfill the co-evolution in the process of the construction of OBOR and the improvement of the Asia-Pacific security architecture, for the promotion of long-termed prosperity and stability in this region.

  15. Do low-cost ceramic water filters improve water security in rural South Africa?

    Science.gov (United States)

    Lange, Jens; Materne, Tineke; Grüner, Jörg

    2016-10-01

    This study examined the performance of a low-cost ceramic candle filter system (CCFS) for point of use (POU) drinking water treatment in the village of Hobeni, Eastern Cape Province, South Africa. CCFSs were distributed in Hobeni and a survey was carried out among their users. The performance of 51 CCFSs was evaluated by dip slides and related to human factors. Already after two-thirds of their specified lifetime, none of the distributed CCFSs produced water without distinct contamination, and more than one-third even deteriorated in hygienic water quality. Besides the water source (springs were preferable compared to river or rain water), a high water throughput was the dominant reason for poor CCFS performance. A stepwise laboratory test documented the negative effects of repeated loading and ambient field temperatures. These findings suggest that not every CCFS type per se guarantees improved drinking water security and that the efficiency of low-cost systems should continuously be monitored. For this purpose, dip slides were found to be a cost-efficient alternative to standard laboratory tests. They consistently underestimated microbial counts but can be used by laypersons and hence by the users themselves to assess critical contamination of their filter systems.

  16. Spectroelectrochemistry as a Strategy for Improving Selectivity of Sensors for Security and Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Heineman, William R.; Seliskar, Carl J.; Morris, Laura K.; Bryan, Samuel A.

    2012-12-19

    Spectroelectrochemistry provides improved selectivity for sensors by electrochemically modulating the optical signal associated with the analyte. The sensor consists of an optically transparent electrode (OTE) coated with a film that preconcentrates the target analyte. The OTE functions as an optical waveguide for attenuated total reflectance (ATR) spectroscopy, which detects the analyte by absorption. Alternatively, the OTE can serve as the excitation light for fluorescence detection, which is generally more sensitive than absorption. The analyte partitions into the film, undergoes an electrochemical redox reaction at the OTE surface, and absorbs or emits light in its oxidized or reduced state. The change in the optical response associated with electrochemical oxidation or reduction at the OTE is used to quantify the analyte. Absorption sensors for metal ion complexes such as [Fe(CN)6]4- and [Ru(bpy)3]2+ and fluorescence sensors for [Ru(bpy)3]2+ and the polycyclic aromatic hydrocarbon 1-hydroxypyrene have been developed. The sensor concept has been extended to binding assays for a protein using avidin–biotin and 17β-estradiol–anti-estradiol antibodies. The sensor has been demonstrated to measure metal complexes in complex samples such as nuclear waste and natural water. This sensor has qualities needed for security and defense applications that require a high level of selectivity and good detection limits for target analytes in complex samples. Quickly monitoring and designating intent of a nuclear program by measuring the Ru/Tc fission product ratio is such an application.

  17. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  18. A neural-network-based exponential H∞ synchronisation for chaotic secure communication via improved genetic algorithm

    Science.gov (United States)

    Hsiao, Feng-Hsiag

    2016-10-01

    In this study, a novel approach via improved genetic algorithm (IGA)-based fuzzy observer is proposed to realise exponential optimal H∞ synchronisation and secure communication in multiple time-delay chaotic (MTDC) systems. First, an original message is inserted into the MTDC system. Then, a neural-network (NN) model is employed to approximate the MTDC system. Next, a linear differential inclusion (LDI) state-space representation is established for the dynamics of the NN model. Based on this LDI state-space representation, this study proposes a delay-dependent exponential stability criterion derived in terms of Lyapunov's direct method, thus ensuring that the trajectories of the slave system approach those of the master system. Subsequently, the stability condition of this criterion is reformulated into a linear matrix inequality (LMI). Due to GA's random global optimisation search capabilities, the lower and upper bounds of the search space can be set so that the GA will seek better fuzzy observer feedback gains, accelerating feedback gain-based synchronisation via the LMI-based approach. IGA, which exhibits better performance than traditional GA, is used to synthesise a fuzzy observer to not only realise the exponential synchronisation, but also achieve optimal H∞ performance by minimizing the disturbance attenuation level and recovering the transmitted message. Finally, a numerical example with simulations is given in order to demonstrate the effectiveness of our approach.

  19. The right to secure food in the perspective of the general improvement of the fundamental rights.

    Science.gov (United States)

    Rodotà, Stefano

    2010-01-01

    The 9th International Congress of the European Society EurSafe (European Society of Agricultural and Food Ethics) was held on September 15-18, 2010, in Bilbao, Spain, gathering 150 experts from more than 20 countries, with the purpose of reflecting on ethical-social and legal issues posed by bio-scientific advances and the challenges of agriculture and food in the Third Millennium. Under the motto "Global Food Security: Ethical and Legal Challenges", the Congress was organized by the Inter-University Chair in Law and the Human Genome and particular attention was paid to the need to improve access to sufficient, nutritionally adequate and safe food for all humankind, and to the socio-economic and political obstacles which, from day to day, impede this access, given that twenty years after taking on the Millennium Objectives, poverty and hunger have not only failed to decline, but continue to reach record figures. Professor Stefano Rodotà, member of the European Group on Ethics in Science and New Technologies, deserves a special mention. That Group, independent and multidisciplinary, was created for the purpose of advising the European Commission on ethical aspects of science and new technologies in connection with the preparation and implementation of Community legislation and policy. Below we reproduce the speech given by Professor Stefano Rodotà during the EurSafe 2010 Congress's Plenary Session hold in Bilbao, 17th September 2010.

  20. Improving Student Engagement in the Study of Professional Ethics: Concepts and an Example in Cyber Security.

    Science.gov (United States)

    Bustard, John D

    2017-04-11

    In spite of the acknowledged importance of professional ethics, technical students often show little enthusiasm for studying the subject. This paper considers how such engagement might be improved. Four guiding principles for promoting engagement are identified: (1) aligning teaching content with student interests; (2) taking a pragmatic rather than a philosophical approach to issue resolution; (3) addressing the full complexity of real-world case studies; and (4) covering content in a way that students find entertaining. The use of these principles is then discussed with respect to the specific experience of developing and presenting a master's module in Ethical and Legal Issues in Cyber Security at Queens University Belfast. One significant aspect of the resulting design is that it encourages students to see ethical issues in systemic terms rather than from an individual perspective, with issues emerging from a conflict between different groups with different vested interests. Case studies are used to examine how personal and business priorities create conflicts that can lead to negative press, fines and punitive legal action. The module explores the reasons why organisations may be unaware of the risks associated with their actions and how an inappropriate response to an ethical issue can significantly aggravate a situation. The module has been delivered in three successive years since 2014 and been well received on each occasion. The paper describes the design of the module and the experience of delivering it, concluding with a discussion of the effectiveness of the approach.

  1. Distributed beamforming designs to improve physical layer security in wireless relay networks

    Science.gov (United States)

    Qian, Mujun; Liu, Chen; Fu, Youhua

    2014-12-01

    This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

  2. Rice proteomics: a model system for crop improvement and food security.

    Science.gov (United States)

    Kim, Sun Tae; Kim, Sang Gon; Agrawal, Ganesh Kumar; Kikuchi, Shoshi; Rakwal, Randeep

    2014-03-01

    Rice proteomics has progressed at a tremendous pace since the year 2000, and that has resulted in establishing and understanding the proteomes of tissues, organs, and organelles under both normal and abnormal (adverse) environmental conditions. Established proteomes have also helped in re-annotating the rice genome and revealing the new role of previously known proteins. The progress of rice proteomics had recognized it as the corner/stepping stone for at least cereal crops. Rice proteomics remains a model system for crops as per its exemplary proteomics research. Proteomics-based discoveries in rice are likely to be translated in improving crop plants and vice versa against ever-changing environmental factors. This review comprehensively covers rice proteomics studies from August 2010 to July 2013, with major focus on rice responses to diverse abiotic (drought, salt, oxidative, temperature, nutrient, hormone, metal ions, UV radiation, and ozone) as well as various biotic stresses, especially rice-pathogen interactions. The differentially regulated proteins in response to various abiotic stresses in different tissues have also been summarized, indicating key metabolic and regulatory pathways. We envision a significant role of rice proteomics in addressing the global ground level problem of food security, to meet the demands of the human population which is expected to reach six to nine billion by 2040.

  3. Developing GM super cassava for improved health and food security: future challenges in Africa

    Directory of Open Access Journals (Sweden)

    Adenle Ademola A

    2012-08-01

    Full Text Available Abstract Background There is an urgent need to solve the problem of micronutrient malnutrition that is prevalent among young children and women in Africa. Genetically modified (GM biofortified cassava has great potential to solve part of this problem, but controversy surrounding GM technology and lack of awareness, limited facilities, biased news and other factors may hinder the adoption of GM cassava in the future. Method Using semi-structured interviews in Ghana and Nigeria, this paper examines the perspectives of scientists, including the BioCassava Plus (BC+ team, on the potential adoption of GM cassava for improving health and food security in Africa. The article also examines issues around the regulatory system and transfer and acceptance of GM cassava among scientists. Results and discussion The result suggests that an overwhelming majority of scientists agree that GM biofortified cassava will benefit the health of millions in Africa, and that GM cassava conferred with disease and pest resistance will increase cassava production as it is currently plagued by cassava mosaic diseases (CMD. However, respondents are wary of long-term effects of GM cassava on the environment and lack of a regulatory framework to facilitate the adoption of GM cassava. Even though scientists expressed little or no concern about health risks of GM cassava, they were concerned that consumers may express such concerns given limited understanding of GM technology. Conclusion The article concludes with a summary of priorities for policy development with regard to adopting biofortified food products.

  4. Consumption Culture and Art Education: Cultural Compounds of Traditional Resistances and Futuristic Strategies in Postmodern(ist Art Education

    Directory of Open Access Journals (Sweden)

    Metin EKER

    2011-03-01

    Full Text Available Consumption Culture and Art Education: Cultural Compounds of Traditional Resistances and Futuristic Strategies In Postmodern(ist Art Education New cultural fields and definitions have begun to develop through the globalization of cultural policies. It is inevitable that pedagogical debates in reference to the culture contact with art education in a great level. While a cultural study is to have a connection with other fields, art education is thought to be fed by a dynamic forming a common ground between conditions of cultural fields and those of itself. It is likely to express plenty of contents to be referred to art education by regarding culture of consumption of culture and art as an axis. These contents consist of the following titles such as traditional, actual and futuristic assessments of culture, experience of consumption, aesthetic of consumption, contents of visual and social consumption, concepts of consumption in art and consumption motivations of postmodern individual. Therefore, it is required to consider that connection between consumption culture and art education is a content belonging to postmodern art education and will become a notable scope in prospective art education in view of strategic facts

  5. Strategies to enable the adoption of animal biotechnology to sustainably improve global food safety and security.

    Science.gov (United States)

    Tizard, Mark; Hallerman, Eric; Fahrenkrug, Scott; Newell-McGloughlin, Martina; Gibson, John; de Loos, Frans; Wagner, Stefan; Laible, Götz; Han, Jae Yong; D'Occhio, Michael; Kelly, Lisa; Lowenthal, John; Gobius, Kari; Silva, Primal; Cooper, Caitlin; Doran, Tim

    2016-10-01

    The ability to generate transgenic animals has existed for over 30 years, and from those early days many predicted that the technology would have beneficial applications in agriculture. Numerous transgenic agricultural animals now exist, however to date only one product from a transgenic animal has been approved for the food chain, due in part to cumbersome regulations. Recently, new techniques such as precision breeding have emerged, which enables the introduction of desired traits without the use of transgenes. The rapidly growing human population, environmental degradation, and concerns related to zoonotic and pandemic diseases have increased pressure on the animal agriculture sector to provide a safe, secure and sustainable food supply. There is a clear need to adopt transgenic technologies as well as new methods such as gene editing and precision breeding to meet these challenges and the rising demand for animal products. To achieve this goal, cooperation, education, and communication between multiple stakeholders-including scientists, industry, farmers, governments, trade organizations, NGOs and the public-is necessary. This report is the culmination of concepts first discussed at an OECD sponsored conference and aims to identify the main barriers to the adoption of animal biotechnology, tactics for navigating those barriers, strategies to improve public perception and trust, as well as industry engagement, and actions for governments and trade organizations including the OECD to harmonize regulations and trade agreements. Specifically, the report focuses on animal biotechnologies that are intended to improve breeding and genetics and currently are not routinely used in commercial animal agriculture. We put forward recommendations on how scientists, regulators, and trade organizations can work together to ensure that the potential benefits of animal biotechnology can be realized to meet the future needs of agriculture to feed the world.

  6. Multi-energy x-ray detectors to improve air-cargo security

    Science.gov (United States)

    Paulus, Caroline; Moulin, Vincent; Perion, Didier; Radisson, Patrick; Verger, Loïck

    2017-05-01

    X-ray based systems have been used for decades to screen luggage or cargo to detect illicit material. The advent of energy-sensitive photon-counting x-ray detectors mainly based on Cd(Zn)Te semi-conductor technology enables to improve discrimination between materials compared to single or dual energy technology. The presented work is part of the EUROSKY European project to develop a Single European Secure Air-Cargo Space. "Cargo" context implies the presence of relatively heavy objects and with potentially high atomic number. All the study is conducted on simulations with three different detectors: a typical dual energy sandwich detector, a realistic model of the commercial ME100 multi-energy detector marketed by MULTIX, and a ME100 "Cargo": a not yet existing modified multi-energy version of the ME100 more suited to air freight cargo inspection. Firstly, a comparison on simulated measurements shows the performances improvement of the new multi-energy detectors compared to the current dual-energy one. The relative performances are evaluated according to different criteria of separability or contrast-to-noise ratio and the impact of different parameters is studied (influence of channel number, type of materials and tube voltage). Secondly, performances of multi-energy detectors for overlaps processing in a dual-view system is accessed: the case of orthogonal projections has been studied, one giving dimensional values, the other one providing spectral data to assess effective atomic number. A method of overlap correction has been proposed and extended to multi-layer objects case. Therefore, Calibration and processing based on bi-material decomposition have been adapted for this purpose.

  7. The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution

    Science.gov (United States)

    Luo, Yi; Zhao, Zhiwen; Zhao, Zhangji; Long, Haiming; Su, Wen; Yang, Yixian

    2013-01-01

    In the literature He et al. (Quantum Inf Process, 2011) performed the cryptanalysis about the protocol of secure quantum auction with post-confirmation, and proposed the melioration algorithm in order to defeat the collusion among some malicious bidders in Zhao et al.'s protocol (Zhao et al. in Opt Commun 283:3194, 2010). But unfortunately, this protocol can't defeat the collusion among some malicious bidders either. In this paper, we will analyze the security of He et al.'s protocol and point out the potential loophole. Furthermore, we propose an improved protocol which can defeat the collusion among malicious bidders effectively.

  8. Capacity Building on Food-Crop Farming to Improve Food Production and Food Security in Central Java, Indonesia

    Directory of Open Access Journals (Sweden)

    Waridin

    2013-03-01

    Full Text Available This paper describes the capacity of food-crop production for improving regional food security in Central Java, Indonesia. It is also identify crops which have high and prospective economic-values. The results of the study might help in formulating a proposed model to improve food crops production in supporting food security. The case study was conducted in districts which play the important roles on agriculture (rice production in Central Java, Indonesia. These are Klaten and Magelang districts. Data were collected from farmers and officers from agriculture-related institutions. The results show that Central Java Province has the capacity on food crop (rice production for securing food availability, distribution, and accessibility for people in the region. It has a moderate on food security for the products, and surplus of production have distributed to other regions within the country. However, other food crops still facing shortage of supply since lack of productions. It requires a commitment from government and stakeholders for improving capacity building on agricultural development.

  9. 多级安全数据库BLP模型分析与改进%Analysis and Improvement of Multilevel Secure Database BLP Model

    Institute of Scientific and Technical Information of China (English)

    赵海燕; 赵静

    2013-01-01

    In view of the defects of current multi-level secure database BLP model, improved methods of its security classification, scope and access rules were proposed, in order to improve the security of the database.%针对目前多级安全数据库BLP模型的缺陷,提出了对其密级、范围和访问规则的改进方法,以提高数据库的安全性.

  10. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China.

    Science.gov (United States)

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-06-15

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.

  11. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach—A Case Study for the City of Wuhan in China

    Science.gov (United States)

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-01-01

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348

  12. Improved Formulations for Air-Surface Exchanges Related to National Security Needs: Dry Deposition Models

    Energy Technology Data Exchange (ETDEWEB)

    Droppo, James G.

    2006-07-01

    The Department of Homeland Security and others rely on results from atmospheric dispersion models for threat evaluation, event management, and post-event analyses. The ability to simulate dry deposition rates is a crucial part of our emergency preparedness capabilities. Deposited materials pose potential hazards from radioactive shine, inhalation, and ingestion pathways. A reliable characterization of these potential exposures is critical for management and mitigation of these hazards. A review of the current status of dry deposition formulations used in these atmospheric dispersion models was conducted. The formulations for dry deposition of particulate materials from am event such as a radiological attack involving a Radiological Detonation Device (RDD) is considered. The results of this effort are applicable to current emergency preparedness capabilities such as are deployed in the Interagency Modeling and Atmospheric Assessment Center (IMAAC), other similar national/regional emergency response systems, and standalone emergency response models. The review concludes that dry deposition formulations need to consider the full range of particle sizes including: 1) the accumulation mode range (0.1 to 1 micron diameter) and its minimum in deposition velocity, 2) smaller particles (less than .01 micron diameter) deposited mainly by molecular diffusion, 3) 10 to 50 micron diameter particles deposited mainly by impaction and gravitational settling, and 4) larger particles (greater than 100 micron diameter) deposited mainly by gravitational settling. The effects of the local turbulence intensity, particle characteristics, and surface element properties must also be addressed in the formulations. Specific areas for improvements in the dry deposition formulations are 1) capability of simulating near-field dry deposition patterns, 2) capability of addressing the full range of potential particle properties, 3) incorporation of particle surface retention/rebound processes, and

  13. Security Improvement of WPA 2 (Wi-Fi Protected Access 2)

    OpenAIRE

    A.K.M. Nazmus Sakib; Fariha Tasmin Jaigirdar,; Muntasim Munim,; Armin Akter

    2011-01-01

    WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In t...

  14. The role of sectoral FDI in promoting agricultural production and improving food security

    OpenAIRE

    2015-01-01

    The aim of this paper is to examine the effects of foreign direct investments (FDI) on food security for 55 developing countries in a panel framework over the period 1995-2009. There are various measures of food security that can be used. Our first contribution is to build a composite indicator that synthesizes the food indicators used by the Food and Agriculture Organization to measure the food availability and food utilizati...

  15. Improved E-Banking System With Advanced Encryption Standards And Security Models

    Directory of Open Access Journals (Sweden)

    Sharaaf N. A.

    2015-08-01

    Full Text Available Emerging new Technologies and large scale businesses have made this world a global village. Many business organizations provide online services targeting global consumer bases. Transaction in international scale has been enabled by banks all around the world through E-banking in order to supply the needs of above business organizations. E-banking serves lots of benefits to both customers of banks and banks itself. It adds value to customers satisfaction with better service quality and enables banks to gain a competitive advantage over other competitors. Online banking need to possess high level security in order to provide safe consistent and robust online environment which guarantees secure data transmission and identity of both bank and customer. Lack of security may lead to less trust or hard to trust attitude towards online banking. Although customers are attracted by online banking convenience they seem largely in concern about identity theft and phishing. Analysis of many research papers on e-banking security models and their respective advantages and disadvantages have been discussed in literature review. Username password E-banking dongles fractal images biometric scans and advanced encryption standards are some of the suggested solutions for E-banking security. This study focuses on the security beyond above mechanisms. This paper ensures security of online banking at three levels. At client side using internet dongle integrated with finger print scanning technology at banking sever side and data transmission level. This model also includes username password and advanced encryption for further security. Complete description on the model has been discussed in methodology section. Future works on this topic and Conclusion are covered in separate sections.

  16. Improvement of psychological support for Security Departments Officers in Russian Penal System

    Directory of Open Access Journals (Sweden)

    A. V. Kokurin

    2013-04-01

    Full Text Available We analyze the results of studies on predicting professional success of Security Departments Officers of penitentiary institutions and pretrial detention centers, and on socio-psychological climate in security units (2062 employees of eighteen territorial bodies of the Federal Penitentiary Service of Russia, as well as diagnosis and correction of borderline mental state of employees of these units (372 employees from four regional offices of the Federal Penitentiary Service of Russia. We describe the criteria for determining the psychological suitability to guardian activity in the context of penal system. Using “Questionnaire of social and psychological climate in special divisions of the correctional system in Russia”, we proposed a complex of measures aimed at optimizing the social and psychological climate in the security departments of penitentiary and detention facilities. The application of science based and experimentally tested diagnostic and corrective complex, we recommended a technology for short-term correction of borderline mental states in employees of these units.

  17. State Security Breach Response Laws: State-by-State Summary Table. Using Data to Improve Education: A Legal Reference Guide to Protecting Student Privacy and Data Security

    Science.gov (United States)

    Data Quality Campaign, 2011

    2011-01-01

    Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…

  18. On the "Security analysis and improvements of arbitrated quantum signature schemes"

    CERN Document Server

    Chong, Song-Kong; Hwang, Tzonelih

    2011-01-01

    Recently, Zou et al. [Phys. Rev. A 82, 042325 (2010)] pointed out that two arbitrated quantum signature (AQS) schemes are not secure, because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a signature. By using a public board, they try to propose two AQS schemes to solve the problem. This work shows that the same security problem may exist in their schemes and also a malicious party can reveal the other party's secret key without being detected by using the Trojan-horse attacks. Accordingly, two basic properties of a quantum signature, i.e. unforgeability and undeniability, may not be satisfied in their scheme.

  19. Improved Security Via ''Town Crier'' Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, A. N.

    2003-02-26

    Waste managers are increasingly expected to provide good security for the hazardous materials they marshal. Good security requires, among other things, effective tamper and intrusion detection. We have developed and demonstrated a new method for tamper and intrusion detection which we call the ''town crier method''. It avoids many of the problems and vulnerabilities associated with traditional approaches, and has significant advantages for hazardous waste transport. We constructed two rudimentary town crier prototype systems, and tested them for monitoring cargo inside a truck. Preliminary results are encouraging.

  20. Improved Security Via ''Town Crier'' Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, A. N.

    2003-02-26

    Waste managers are increasingly expected to provide good security for the hazardous materials they marshal. Good security requires, among other things, effective tamper and intrusion detection. We have developed and demonstrated a new method for tamper and intrusion detection which we call the ''town crier method''. It avoids many of the problems and vulnerabilities associated with traditional approaches, and has significant advantages for hazardous waste transport. We constructed two rudimentary town crier prototype systems, and tested them for monitoring cargo inside a truck. Preliminary results are encouraging.

  1. Affordable nutrient solutions for improved food security as evidenced by crop trials

    Science.gov (United States)

    van der Velde, Marijn; See, Linda; You, Liangzhi; Balkovic, Juraj; Fritz, Steffen; Khabarov, Nikolay; Obersteiner, Michael; Wood, Stanley

    2013-04-01

    Robust assessments of attainable crop yields in Africa and South America are pivotal for projections of food security and cropland expansion. In contract to South America, Africa has not achieved significant increases in crop yields. Here we utilize a database of historical FAO crop fertilizer trials at 1358 locations for Sub-Saharan Africa and South America to calculate corn yield gaps at the continental scale. To further the African crop productivity discourse we consider the importance of soil nutrient stoichiometry and the viability of micro-dosing. Importantly, besides N, our crop yield potential estimates account for P which has a notoriously low availability in weathered tropical soils. We investigated yield gaps for corn under two scenarios: a micro-dosing scenario with marginal increases in N and P of 10 kg/ha and a larger yet still conservative scenario with proposed N and P applications of 80 and 20 kg/ha respectively. Two critical findings emerged from the analysis. The first is the degree to which P limits increases in corn yields. For example, under a micro-dosing scenario, in Africa, the addition of small amounts of N alone resulted in yield increases of 8% while the addition of only P increased yields by 26%, with implications for designing better balanced fertilizer distribution schemes. Application of both N and P at 10 kg ha-1 lead to 15% and 32% yield increase. To put the benefits of these higher yields in context, this could save more than 4 and 25 million ha of cropland, or alternatively potentially feed 64 and 150 million people in South America and Africa respectively. The second finding was the relatively large amount of yield increase possible for a small, yet affordable amount of fertilizer application. Using African and South American fertilizer prices we show that the level of investment needed to achieve these results is considerably less than 1% of Agricultural GDP for both a micro-dosing scenario and for a scenario involving higher

  2. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  3. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  4. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  5. Spatio-Temporal Variation and Futuristic Emission Scenario of Ambient Nitrogen Dioxide over an Urban Area of Eastern India Using GIS and Coupled AERMOD–WRF Model

    Science.gov (United States)

    Dey, Sharadia; Gupta, Srimanta; Sibanda, Precious; Chakraborty, Arun

    2017-01-01

    The present study focuses on the spatio-temporal variation of nitrogen dioxide (NO2) during June 2013 to May 2015 and its futuristic emission scenario over an urban area (Durgapur) of eastern India. The concentration of ambient NO2 shows seasonal as well as site specific characteristics. The site with high vehicular density (Muchipara) shows highest NO2 concentration followed by industrial site (DVC- DTPS Colony) and the residential site (B Zone), respectively. The seasonal variation of ambient NO2 over the study area is portrayed by means of Geographical Information System based Digital Elevation Model. Out of the total urban area under consideration (114.982 km2), the concentration of NO2 exceeded the National Ambient Air Quality Standard (NAAQS) permissible limit over an area of 5.000 km2, 0.786 km2 and 0.653 km2 in post monsoon, winter and pre monsoon, respectively. Wind rose diagrams, correlation and regression analyses show that meteorology plays a crucial role in dilution and dispersion of NO2 near the earth’s surface. Principal component analysis identifies vehicular source as the major source of NO2 in all the seasons over the urban region. Coupled AMS/EPA Regulatory Model (AERMOD)–Weather Research and Forecasting (WRF) model is used for predicting the concentration of NO2. Comparison of the observed and simulated data shows that the model overestimates the concentration of NO2 in all the seasons (except winter). The results show that coupled AERMOD–WRF model can overcome the unavailability of hourly surface as well as upper air meteorological data required for predicting the pollutant concentration, but improvement of emission inventory along with better understanding of the sinks and sources of ambient NO2 is essential for capturing the more realistic scenario. PMID:28141866

  6. Spatio-Temporal Variation and Futuristic Emission Scenario of Ambient Nitrogen Dioxide over an Urban Area of Eastern India Using GIS and Coupled AERMOD-WRF Model.

    Science.gov (United States)

    Dey, Sharadia; Gupta, Srimanta; Sibanda, Precious; Chakraborty, Arun

    2017-01-01

    The present study focuses on the spatio-temporal variation of nitrogen dioxide (NO2) during June 2013 to May 2015 and its futuristic emission scenario over an urban area (Durgapur) of eastern India. The concentration of ambient NO2 shows seasonal as well as site specific characteristics. The site with high vehicular density (Muchipara) shows highest NO2 concentration followed by industrial site (DVC- DTPS Colony) and the residential site (B Zone), respectively. The seasonal variation of ambient NO2 over the study area is portrayed by means of Geographical Information System based Digital Elevation Model. Out of the total urban area under consideration (114.982 km2), the concentration of NO2 exceeded the National Ambient Air Quality Standard (NAAQS) permissible limit over an area of 5.000 km2, 0.786 km2 and 0.653 km2 in post monsoon, winter and pre monsoon, respectively. Wind rose diagrams, correlation and regression analyses show that meteorology plays a crucial role in dilution and dispersion of NO2 near the earth's surface. Principal component analysis identifies vehicular source as the major source of NO2 in all the seasons over the urban region. Coupled AMS/EPA Regulatory Model (AERMOD)-Weather Research and Forecasting (WRF) model is used for predicting the concentration of NO2. Comparison of the observed and simulated data shows that the model overestimates the concentration of NO2 in all the seasons (except winter). The results show that coupled AERMOD-WRF model can overcome the unavailability of hourly surface as well as upper air meteorological data required for predicting the pollutant concentration, but improvement of emission inventory along with better understanding of the sinks and sources of ambient NO2 is essential for capturing the more realistic scenario.

  7. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    McNerney, Stuart E. Johnson, Stephanie Pezard, David Stebbins , Renanah Miles, Angela O’Mahony, Chaoling Feng, Tim Oliver, Defense Institution Building... line of work. Today, I will focus on three questions. First, how does the Department of Defense (DoD) prioritize its security cooperation

  8. Agriculture-nutrition linkages : Linking agriculture and food security to nutrition improvement

    NARCIS (Netherlands)

    Dorp, van M.; Oenema, S.; Verdonk, I.

    2011-01-01

    The literature review explores possibilities to include nutritional considerations into policies and programmes in the field of agriculture, value chain development and food security. Rationale for the literature review is the renewed attention for agriculture and nutrition on international agenda’s

  9. Assessing and Improving SCADA Security in the Dutch Drinking Water Sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2009-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequenc

  10. Assessing and improving SCADA security in the Dutch drinking water sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2011-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may re

  11. Improving SCADA security of a local process with a power grid model

    NARCIS (Netherlands)

    Chromik, Justyna J.; Remke, Anne; Haverkort, Boudewijn R.

    2016-01-01

    Security of networks controlling smart grids is an important subject. The shift of the power grid towards a smart grid results in more distributed control functions, while intrusion detection of the control network mostly remains centrally based. Moreover, existing local (host-based) intrusion detec

  12. Final Environmental Assessment for the Boles Wells Field Perimeter Security Improvement Project Otero County, New Mexico

    Science.gov (United States)

    2005-10-03

    2-5 3.0 AFFECTED ENV" IRONMENT ...County, New Mexico. The majority of the existing fence is five-strand barbed wired secured on iron "T" posts or wooden posts. Access to the well field...mesquite ( Prosopis glandulosa var. torreyana), prickly pear (Opuntia spp.), and opportunistic plants in disturbed areas. State-listed noxious weeds

  13. Using Real Option Thinking to Improve Decision Making in Security Investment

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Houmb, Siv Hilde; Daneva, Maya

    2010-01-01

    Making well-founded security investment decisions is hard: several alternatives may need to be considered, the alternatives' space is often diffuse, and many decision parameters that are traded-off are uncertain or incomplete. We cope with these challenges by proposing a method that supports decisio

  14. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Chaudhry, Shehzad Ashraf; Mahmood, Khalid; Naqvi, Husnain; Khan, Muhammad Khurram

    2015-11-01

    Telecare medicine information system (TMIS) offers the patients convenient and expedite healthcare services remotely anywhere. Patient security and privacy has emerged as key issues during remote access because of underlying open architecture. An authentication scheme can verify patient's as well as TMIS server's legitimacy during remote healthcare services. To achieve security and privacy a number of authentication schemes have been proposed. Very recently Lu et al. (J. Med. Syst. 39(3):1-8, 2015) proposed a biometric based three factor authentication scheme for TMIS to confiscate the vulnerabilities of Arshad et al.'s (J. Med. Syst. 38(12):136, 2014) scheme. Further, they emphasized the robustness of their scheme against several attacks. However, in this paper we establish that Lu et al.'s scheme is vulnerable to numerous attacks including (1) Patient anonymity violation attack, (2) Patient impersonation attack, and (3) TMIS server impersonation attack. Furthermore, their scheme does not provide patient untraceability. We then, propose an improvement of Lu et al.'s scheme. We have analyzed the security of improved scheme using popular automated tool ProVerif. The proposed scheme while retaining the plusses of Lu et al.'s scheme is also robust against known attacks.

  15. Applying Data Mining Techniques to Improve Information Security in the Cloud: A Single Cache System Approach

    Directory of Open Access Journals (Sweden)

    Amany AlShawi

    2016-01-01

    Full Text Available Presently, the popularity of cloud computing is gradually increasing day by day. The purpose of this research was to enhance the security of the cloud using techniques such as data mining with specific reference to the single cache system. From the findings of the research, it was observed that the security in the cloud could be enhanced with the single cache system. For future purposes, an Apriori algorithm can be applied to the single cache system. This can be applied by all cloud providers, vendors, data distributors, and others. Further, data objects entered into the single cache system can be extended into 12 components. Database and SPSS modelers can be used to implement the same.

  16. Improving Security of the Baptista's Cryptosystem Using Two-step Logistic Map

    Directory of Open Access Journals (Sweden)

    Balram Nitharwal

    2016-08-01

    Full Text Available Over last 3 decades, many cryptography algorithms based on chaos have been proposed that are very fast in computation. Chaos is used for secured communication in two ways as analog secured communication and digital chaotic ciphers. This paper is mainly focused at digital chaotic cryptosystem. In symmetric cryptosystems, same key is used for both encryption and decryption purpose. In 1998, Baptista gave the most used symmetric cryptosystem based on Ergodic property of logistic map. Later on, many refinements were done in Baptista's algorithm. By going through later proposed refinements in this cryptosystem, some flaws are observed. Proposed scheme has a two-step logistic map that is a feedback mechanism using an extra variable to come over these flaws. At last, there is comparison between proposed scheme and other version of Baptista type cryptosystem, which shows that the proposed scheme is better than previous ones and it is resist against behavior analysis attack and partial key recovery attack.

  17. Improving food and nutritional security of small and marginal coconut growers through diversification of crops and enterprises

    Directory of Open Access Journals (Sweden)

    Maria Luz George

    2010-10-01

    Full Text Available This paper presents the impact of integrating interventions like nutrition gardening, livestock rearing, product diversification and allied income generation activities in small and marginal coconut homesteads along with nutrition education in improving the food and nutritional security as well as the income of the family members. The activities were carried out through registered Community Based Organizations (CBOs in three locations in Kerala, India during 2005-2008. Data was collected before and after the project periods through interviews using a pre-tested questionnaire containing statements indicating the adequacy, quality and diversity of food materials. Fifty respondents each were randomly selected from the three communities, thereby resulting in a total sample size of 150. The data was analysed using SPSS by adopting statistical tools like frequency, average, percentage analysis, t – test and regression. Participatory planning and implementation of diverse interventions notably intercropping and off-farm activities along with nutrition education brought out significant improvements in the food and nutritional security, in terms of frequency and quantity of consumption as well as diet diversity. At the end of the project, 96%of the members became completely food secure and 72% nutritionally secure. The overall consumption of fruits, vegetables and milk by both children and adults and egg by children recorded increase over the project period. Consumption of fish was more than the Recommended Dietary Intake (RDI level during pre and post project periods. Project interventions like nutrition gardening could bring in surplus consumption of vegetables (35% and fruits (10% than RDI. In spite of the increased consumption of green leafy vegetables and milk and milk products over the project period, the levels of consumption were still below the RDI levels. CBO-wise analysis of the consumption patterns revealed the need for location

  18. Improving Regional Security in Central America: Military Engagement Options for Nicaragua

    Science.gov (United States)

    2002-12-01

    peaceful resolution. This group was made up of foreign ministers from Mexico , Venezuela, Colombia, and Panama and was named after Contadora Island, the...from: Martine, George and Guzman, Jose Miguel, UNFPA Country Support Team, Mexico Source: OPS/OMS (1994); CEPAL (1999); OPS-Nicaragua (http...State. Isacson, Adam 1998. Seguridad Cooperativa en Centroamérica. (Cooperative Security in Central America) Diálogo Centro-americano No. 35

  19. Another Security Improvement over the Lin et al.'s E-voting Scheme

    Science.gov (United States)

    Asaar, Maryam Rajabzadeh; Mohajeri, Javad; Salmasizadeh, Mahmoud

    In 2003, Lin et al. have proposed an electronic voting scheme which can be utilized in large-scale elections, and claimed it detects double voting. But in this paper, by presenting an attack, we show that voters can successfully vote more than once without being detected. Hence, we propose a new modified scheme based on the Lin et al.'s scheme with the same efficiency to solve this weakness and analyze its security.

  20. Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Science.gov (United States)

    2014-09-18

    FINGERPRINTING I. Introduction Modern wireless communications networks have revolutionized the ways in which information is shared. Inexpensive low-rate wireless ... Wireless Intrusion Detection and Device Fingerprinting through PHY Manipulation 2.1 Introduction Properly securing low-rate LR-WPANs is challenging due... wireless interference or are completely uninterpretable by the receiver. Influence of wireless noise is mitigated by operating on IEEE 802.15.4 channel

  1. ECC Based Authentication System for Performance Improvement in Security of Cloud

    Directory of Open Access Journals (Sweden)

    Sumita Dey

    2016-03-01

    Full Text Available Recent years have witnessed the trend of Craning cloud-based services for very large scale distribution, content storage and processing. Security and privacy are among top concerns for the public cloud environments. Here new methodology was clopped for assessing the cryptographic key strength. This methodology needs calculation of true economics cost of key retrieval for the most common cryptographic primitives. Valuable insight provided by resulting points over the time in the selection of cryptographic key sizes. Analysis and recommendation of parameter is an very important task for cryptographers, crucially including key size and thus implying key strength, for cryptographic primitives. Then resulting data extrapolated for the Moore’s Law and underlying algorithms by using complexity estimate, more than Moore, Less than Moore in an attempt to assess the longevity of associated keys. In this results in key size recommendations for public-key cryptosystems that over security comparable to popular symmetric cryptosystems; it leads to security estimates in terms of hardware cost or execution time.

  2. Improving Cyber-Security of Smart Grid Systems via Anomaly Detection and Linguistic Domain Knowledge

    Energy Technology Data Exchange (ETDEWEB)

    Ondrej Linda; Todd Vollmer; Milos Manic

    2012-08-01

    The planned large scale deployment of smart grid network devices will generate a large amount of information exchanged over various types of communication networks. The implementation of these critical systems will require appropriate cyber-security measures. A network anomaly detection solution is considered in this work. In common network architectures multiple communications streams are simultaneously present, making it difficult to build an anomaly detection solution for the entire system. In addition, common anomaly detection algorithms require specification of a sensitivity threshold, which inevitably leads to a tradeoff between false positives and false negatives rates. In order to alleviate these issues, this paper proposes a novel anomaly detection architecture. The designed system applies the previously developed network security cyber-sensor method to individual selected communication streams allowing for learning accurate normal network behavior models. Furthermore, the developed system dynamically adjusts the sensitivity threshold of each anomaly detection algorithm based on domain knowledge about the specific network system. It is proposed to model this domain knowledge using Interval Type-2 Fuzzy Logic rules, which linguistically describe the relationship between various features of the network communication and the possibility of a cyber attack. The proposed method was tested on experimental smart grid system demonstrating enhanced cyber-security.

  3. IMPROVING THE EFFICIENCY OF COMMONWEALTH OF INDEPENDENT STATES BANKS IN UTILIZING THE POTENTIAL OF SECURITIES IN CONDITIONS OF ELIMINATING THE EFFECT OF GLOBAL FINANCIAL CRISIS

    Directory of Open Access Journals (Sweden)

    SAIDULLO ABDULLAEV

    2010-12-01

    Full Text Available Article is dedicated to unleashing the potential of securities used by banks of CIS in the post-crisis period for the purposes of restructuring of capital, to strengthen its resource base and improve liquidity.

  4. Construction of monitoring model and algorithm design on passenger security during shipping based on improved Bayesian network.

    Science.gov (United States)

    Wang, Jiali; Zhang, Qingnian; Ji, Wenfeng

    2014-01-01

    A large number of data is needed by the computation of the objective Bayesian network, but the data is hard to get in actual computation. The calculation method of Bayesian network was improved in this paper, and the fuzzy-precise Bayesian network was obtained. Then, the fuzzy-precise Bayesian network was used to reason Bayesian network model when the data is limited. The security of passengers during shipping is affected by various factors, and it is hard to predict and control. The index system that has the impact on the passenger safety during shipping was established on basis of the multifield coupling theory in this paper. Meanwhile, the fuzzy-precise Bayesian network was applied to monitor the security of passengers in the shipping process. The model was applied to monitor the passenger safety during shipping of a shipping company in Hainan, and the effectiveness of this model was examined. This research work provides guidance for guaranteeing security of passengers during shipping.

  5. Analysing and improving security of Zeroconf networks%Zeroconf网络的安全性分析及改进

    Institute of Scientific and Technical Information of China (English)

    周亦敏; 沈嘉杰

    2013-01-01

    分析并指出Zeroconf(Zero configuration)网络易受到DNS欺骗攻击,提出并实现了一种增强其安全性的改进策略.该策略通过DNSSEC对Zeroconf网络中DNS消息收发提供权限认证和信息完整性检查,同时针对Zeroconf网络无中心、自组织的特点,改进DNSSEC原有的公钥分配和管理机制以适应其特性.实验结果证实该策略提高了Zeroconf网络的安全性.%Zeroconf (Zero configuration) networks security are analyzed, and it is pointed out that Zeroconf networks are vulnerable to DNS spoofing attack. An improvement strategy is proposed. The strategy provides DNS message in Zeroconf networks with authentication and integrity by DNSSEC, and improves the DNSSEC public key distribution and management mechanisms in order to adapt to Zeroconf networks that are non-centralized and self-organizing. The experimental results show that the improvement strategy increases the security of Zeroconf networks.

  6. The Justice of Improving Security and Confronting Poverty: The Role of Transnational NGOs and Communities in Somalia

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2017-01-01

    of such efforts in Somalia following the collapse of the state in 1991, and suggests the need for better coordination between state and non-state transnational initiatives. Methodologically, the article combines discussion of the underlying causes of poverty and insecurity in Somalia with the presentation......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  7. The Role of Information Security Management Systems in Supply Chain Performance Improvement

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Taghva

    2012-02-01

    Full Text Available In recent years, the researchers have emphasized on positive effect of information system on supply chain performance such as organizational processes integration, information sharing, information technology, etc. In other hand, information security management system is one of the subjects that researches considered its effects on increase accuracy and effective information exchange, access to accurate and timely information and reduce errors of information system. Since, any research has not been done on this ground (the importance of ISMS on supply chain performance. Therefore, it was felt that a research should have done on these approaches on supply chain. In this respect, current research was seeking that how ISMS had impact on supply chain performance in automotive industry and this was the innovative aspect of this paper. So first of all, after the review of the information security management system literature, supply chain performance was considered by the balanced scorecard approach then the most important factors of these two subjects was extracted by correlation analysis. In this way, it was considered that how ISMS had impact on supply chain performance by correlation analysis. The results showed that different dimensions of ISMS (information uniformity, prevent the human and machine mistake, information be accuracy, and rectitude and instruction for users had impact on four dimensions of supply chain performance (customers, financial, internal processes and learning and growth in three levels (strategic, technical, and operational in supply chain. At the end, it was showed that ISMS lays the ground for increase supply chain performance.

  8. Comment on ``Security analysis and improvements of arbitrated quantum signature schemes''

    Science.gov (United States)

    Hwang, Tzonelih; Luo, Yi-Ping; Chong, Song-Kong

    2012-05-01

    Recently, Zou, and Qiu [Phys. Rev. APLRAAN1050-294710.1103/PhysRevA.82.042325 82, 042325 (2010)] demonstrated that two arbitrated quantum signature (AQS) schemes are not secure because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a signature. By using a public board, Zou and Qiu's proposed two AQS schemes to solve the problem. This work shows that the same security problem may exist in Zou and Qiu's schemes. Moreover, a malicious verifier, Bob, can actively negate a signed order if he wants to. This attack, a special case of the denial-of-service (DoS) attack mentioned by Cai [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.91.109801 91, 109801 (2003)], is important in quantum cryptography. Bob may get some benefits from this DoS attack since he can actively deny Alice's signed order without being detected. This work also shows that a malicious signer can reveal the verifier's secret key without being detected by using Trojan-horse attacks.

  9. German Energy Security and Its Implications on Regional Security

    Science.gov (United States)

    2016-12-01

    SECURITY AND ITS IMPLICATIONS ON REGIONAL SECURITY by Philemon Sakamoto December 2016 Thesis Advisor: Robert E. Looney Second Reader...DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE GERMAN ENERGY SECURITY AND ITS IMPLICATIONS ON REGIONAL SECURITY 5. FUNDING NUMBERS 6...and overall regional security and stability. Using a liberal framework, it illustrates how policies established to improve energy security may act

  10. From waste disposal service to power supplier. A landfill is turned into a futuristic energy farm; Vom Entsorger zum Versorger. Eine Muellkippe wird zum futuristischen Energiepark

    Energy Technology Data Exchange (ETDEWEB)

    Boeckh, Martin

    2011-11-15

    On a landfill operated by the waste disposal utility of the Rhein-Neckar district, an energy farm is currently under construction. Apart from a PV system and landfill gas production, a biomass-fuelled heating power station was recently commissioned. Further plants will follow, i.e. pellets production, power generation by a Wankel engine, and a futuristic plant for pressureless oil production from waste plastics.

  11. Current and potential cyber attacks on medical journals; guidelines for improving security.

    Science.gov (United States)

    Dadkhah, Mehdi; Seno, Seyed Amin Hosseini; Borchardt, Glenn

    2017-03-01

    At the moment, scholarly publishing is faced with much academic misconduct and threats such as predatory journals, hijacked journals, phishing, and other scams. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats. It seems that information security is missing in some parts of scholarly publishing that particularly involves medical journals. In this paper, we explain different types of cyber-attacks that especially threaten editors and academic journals. We then explain the details involved in each type of attack. Finally, we present general guidelines for detection and prevention of the attacks. In some cases, we use small experiments to show that our claim is true. Finally, we conclude the paper with a prioritization of these attacks.

  12. Modelling energy and environmental impacts of traditional and improved shea butter production in West Africa for food security.

    Science.gov (United States)

    Naughton, Colleen C; Zhang, Qiong; Mihelcic, James R

    2017-01-15

    This study improves the global application of methods and analyses, especially Life Cycle Assessment (LCA), that properly incorporates environmental impacts of firewood and a social sustainability indicator (human energy) as tools for sustainable human development. Specifically shea butter production processes, common throughout sub-Saharan Africa and crucial to food security, environmental sustainability, and women's empowerment, are analyzed. Many economic activities in the world rely on firewood for energy and labor that aren't included in traditional LCAs. Human energy (entirely from women) contributed 25-100% of shea butter production processes (2000-6100kJ/kg of shea butter) and mechanized production processes had reduced human energy without considerably greater total energy. Firewood accounted for 94-100% of total embodied energy (103 and 172MJ/kg of shea butter for improved and traditional shea butter production processes respectively) and global warming potential and 18-100% of human toxicity of the production processes. Implementation of improved cookstoves modeled in this study could reduce: (1) global warming potential by 78% (from 18 to 4.1kg CO2 eq/kg and 11 to 2.4kg CO2 eq/kg of shea butter for the traditional and improved processes respectively), (2) the embodied energy of using firewood by 52% (from 170 to 82MJ/kg and 103 to 49MJ/kg for the traditional and improved processes respectively), and (3) human toxicity by 83% for the non-mechanized traditional and improved processes (from 0.041 to 0.0071 1,4 DB eq/kg and 0.025 to 0.0042 1,4 DB eq/kg respectively). In addition, this is the first study to compare Economic Input-Output Life Cycle Assessment (EIO-LCA) and process-based LCA in a developing country and evaluate five traditional and improved shea butter production processes over different impact categories. Overall, this study developed a framework to evaluate and improve processes for achievement of the United Nation's Sustainable Development

  13. Neoindustrialization as a factor in improving economic security of old-industrial regions

    Directory of Open Access Journals (Sweden)

    Ol’ga Aleksandrovna Romanova

    2012-06-01

    Full Text Available This paper proves that the paradigm of the world of the XXIcentury is neoindustrialization on the basis of alternativestrategic goals of the global economy associated with the formation of post-industrial society and financialization neoindustrialization. A systematic proposal for the driving forces and mechanisms for its implementation is suggested. It is shown that target-oriented approach can be successfully used at the regional level as a mechanism for economic neoindustrialization of an old-industrial region. Conceptual approach to developing comprehensive program of industrial development in the industrial region that implements the ideas of neoindustrialization in relation to industry of Sverdlovsk region is presented. It was found that the regional technology platform can be an effective tool for combining the interests of territorial and sectoral development. It is proved that the idea of neoindustrialization can be realized only as a result of wise industrial policy and road map formation for the movement to an entirely new high-tech based industrial development. In the process of forming, the problem of neoindustrialization of a «pure» market as a factor in increasing the economic security is actualized.

  14. The application of multiloop diagnostics model to assess and improve the economic security of enterprises

    Directory of Open Access Journals (Sweden)

    Pluzhnikov Vladimir

    2017-01-01

    Full Text Available The author’s research is dedicated to the enhancement of the level of the enterprise economic safety. This task involves developing the concept of an integrated system for early prevention of dangers and threats of business activity, substantiation of procedures for regulating the activities of the enterprise in accordance with the changing external and internal factors. Multiloop diagnostics model is proposed to identify causal relations of management dysfunction. It allows you to receive an adequate assessment of the basic parameters of activity of the enterprise and accurately identify its status. Researching problems of economic safety of the enterprise such diagnostic methods as economic and logical analysis, statistical monitoring and strategic management were applied. There was made a conclusion that a qualitative assessment is a key tool of the level assessment of the enterprise economic safety, its control, and monitoring. It allows you to get reliable information about the real possibilities of the enterprise at different stages of development, to monitor and evaluate the level of economic security, find effective solutions to transition to a higher level of economic safety of the enterprise.

  15. Dynamic Allocation of CPUs in Multicore Processor for Performance Improvement in Network Security Applications

    Directory of Open Access Journals (Sweden)

    Sudhakar Gummadi

    2011-01-01

    Full Text Available Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor based systems. Numerous applications benefit from use of multiple cores. Increasing performance of the system by increasing the number of CPUs of the multicore processor for a given application warrants detailed experimentation. In this study, the results of the experimentation done by dynamic allocation/deallocation of the CPU based on the workload conditions for the packet processing for security application are analyzed and presented. Approach: This evaluation was conducted on SunfireT1000 server having Sun UltraSPARC T1 multicore processor. OpenMP tasking feature is used for scheduling the logical CPUs for the parallelized application. Dynamic allocation of a CPU to a process is done depending on the workload characterization. Results: Execution time for packet processing was analyzed to arrive at an effective dynamic allocation methodology that is dependant on the hardware and the workload. Conclusion/Recommendations: Based on the analysis, the methodology and the allocation of the number of CPUs for the parallelized application are suggested.

  16. Waste management to improve food safety and security for health advancement.

    Science.gov (United States)

    Lin, Angela Yu-Chen; Huang, Susana Tzy-Ying; Wahlqvist, Mark L

    2009-01-01

    Economic growth inevitably influences the food chain. Growing demand with changes in lifestyle and health consciousness encourage use of packaged and pre-prepared foods. The needs of environmental protection from waste generated are largely overlooked, and a lack of knowledge about the impact on the environment and its health effects constitute food security/safety problems. Food production and waste generation directly affect resource (i.e., energy and water) consumption and often contaminate the environment. More pressure on food production has inculcated the use of pesticides, herbicides, antibiotics and chemical fertilizers which add to current global pollution. At least half of food grown is discarded before and after it reaches consumers. It is estimated that one third to half of landfill waste comes from the food sector. This landfill releases green house gases (GHG) as well as leachate which worsen soil and water quality and safety. Pharmaceutical and chemical contaminations from residential, industrial and agricultural sources make their way into nearby water and soil and can eventually affect our food systems. Phthalates, PFOA, BPA, commonly used in plastics and personal care products, are found in unacceptable concentrations in Taiwanese waters. They, too, contribute to food contamination and long-term health risk. Existing waste management strategies warrant more stringent norms for waste reduction at source. Awareness through education could reduce food waste and its consequences. This review encompasses impacts of food production systems on the environment, pollution which results from food waste, costs and economic advantages in food waste management, and health consequences of waste.

  17. Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm.

    Science.gov (United States)

    Sang, Jun; Zhao, Jun; Xiang, Zhili; Cai, Bin; Xiang, Hong

    2015-08-05

    Gyrator transform has been widely used for image encryption recently. For gyrator transform-based image encryption, the rotation angle used in the gyrator transform is one of the secret keys. In this paper, by analyzing the properties of the gyrator transform, an improved particle swarm optimization (PSO) algorithm was proposed to search the rotation angle in a single gyrator transform. Since the gyrator transform is continuous, it is time-consuming to exhaustedly search the rotation angle, even considering the data precision in a computer. Therefore, a computational intelligence-based search may be an alternative choice. Considering the properties of severe local convergence and obvious global fluctuations of the gyrator transform, an improved PSO algorithm was proposed to be suitable for such situations. The experimental results demonstrated that the proposed improved PSO algorithm can significantly improve the efficiency of searching the rotation angle in a single gyrator transform. Since gyrator transform is the foundation of image encryption in gyrator transform domains, the research on the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of such image encryption algorithms.

  18. Security Analysis of Image Encryption Based on Gyrator Transform by Searching the Rotation Angle with Improved PSO Algorithm

    Directory of Open Access Journals (Sweden)

    Jun Sang

    2015-08-01

    Full Text Available Gyrator transform has been widely used for image encryption recently. For gyrator transform-based image encryption, the rotation angle used in the gyrator transform is one of the secret keys. In this paper, by analyzing the properties of the gyrator transform, an improved particle swarm optimization (PSO algorithm was proposed to search the rotation angle in a single gyrator transform. Since the gyrator transform is continuous, it is time-consuming to exhaustedly search the rotation angle, even considering the data precision in a computer. Therefore, a computational intelligence-based search may be an alternative choice. Considering the properties of severe local convergence and obvious global fluctuations of the gyrator transform, an improved PSO algorithm was proposed to be suitable for such situations. The experimental results demonstrated that the proposed improved PSO algorithm can significantly improve the efficiency of searching the rotation angle in a single gyrator transform. Since gyrator transform is the foundation of image encryption in gyrator transform domains, the research on the method of searching the rotation angle in a single gyrator transform is useful for further study on the security of such image encryption algorithms.

  19. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  20. Potential impact on food safety and food security from persistent organic pollutants in top soil improvers on Mediterranean pasture

    Energy Technology Data Exchange (ETDEWEB)

    Brambilla, G.; Abate, V. [Istituto Superiore di sanità, Veterinary Public Health Dept, Viale Regina Elena 299, 00161 Rome (Italy); Battacone, G. [Università degli Studi di Sassari, Agricultural Science, Viale Italia, 39 07100 Sassari (Italy); De Filippis, S.P. [Istituto Superiore di sanità, Toxicological Chemistry Unit, Viale Regina Elena 299, 00161 Rome (Italy); Esposito, M. [Istituto Zooprofilattico Sperimentale del Mezzogiorno, Via Salute 2, 08055 Portici, (Neaples) (Italy); Esposito, V. [Agenzia Regionale Per la Protezione dell' Ambiente Regione Puglia, Via Anfiteatro 8, 74100 Taranto (Italy); Miniero, R. [Istituto Superiore di sanità, Toxicological Chemistry Unit, Viale Regina Elena 299, 00161 Rome (Italy)

    2016-02-01

    The organic carbon of biosolids from civil wastewater treatment plants binds persistent organic pollutants (POPs), such as polychlorodibenzo -dioxins and -furans (PCDD/Fs), dioxin and non-dioxin -like polychlorobiphenyls (DL and NDL-PCBs), polybrominated diphenyl ethers (PBDEs), and perfluorooctane sulfonic acid (PFOS). The use of such biosolids, derived digestates and composts as top soil improvers (TSIs) may transfer POPs into the food chain. We evaluated the potential carry-over of main bioavailable congeners from amended soil-to-milk of extensive farmed sheep. Such estimates were compared with regulatory limits (food security) and human intakes (food safety). The prediction model was based on farming practices, flocks soil intake, POPs toxicokinetics, and dairy products intake in children, of the Mediterranean area. TSI contamination ranged between 0.20–113 ng WHO-TEQ/kg dry matter for PCDD/Fs and DL-PCBs (N = 56), 3.40–616 μg/kg for ∑{sub 6} NDL-PCBs (N = 38), 0.06–17.2 and 0.12–22.3 μg/kg for BDE no. 47 and no. 99, 0.872–89.50 μg/kg for PFOS (N = 27). For a 360 g/head/day soil intake of a sheep with an average milk yield of 2.0 kg at 6.5% of fat percentage, estimated soil quality standards supporting milk safety and security were 0.75 and 4.0 ng WHO-TEQ/kg for PCDD/Fs and DL-PCBs, and 3.75 and 29.2 μg/kg for ∑{sub 6} NDL-PCBs, respectively. The possibility to use low-contaminated TSIs to maximize agriculture benefits and if the case, to progressively mitigate highly contaminated soils is discussed. - Highlights: • Top soil improvers were characterized for selected POPs content, in Italy. • Grazing behaviour makes sheep sensitive to top soil contamination. • Environmental quality standards for grazing areas were modelled • The impact on Mediterranean sheep milk safety/security was evaluated. • Low contaminated TSIs support safe intake and compliance of dairy products.

  1. Improving Water Sustainability and Food Security through Increased Crop Water Productivity in Malawi

    OpenAIRE

    Luxon Nhamo; Tafadzwanashe Mabhaudhi; Manuel Magombeyi

    2016-01-01

    Agriculture accounts for most of the renewable freshwater resource withdrawals in Malawi, yet food insecurity and water scarcity remain as major challenges. Despite Malawi’s vast water resources, climate change, coupled with increasing population and urbanisation are contributing to increasing water scarcity. Improving crop water productivity has been identified as a possible solution to water and food insecurity, by producing more food with less water, that is, to produce “more crop per drop...

  2. African Security Challenges: Now and Over the Horizon Improving African Security Through the Use of Non/Less-Than -Lethal Force: Challenges , Issues and Approaches

    Science.gov (United States)

    2010-05-01

    on an expat to serve as director of police. According to the expert, because the senior officer corps within the country was so politicized...Further, expats may be able to be more controlled than locals to ensure policing and security goals are met. 28 This expert further explained why

  3. 加强和改进公安法学教育的理性思考%Rational Thinking on Strengthening and Improving Public Security Law Education

    Institute of Scientific and Technical Information of China (English)

    彭玉伟

    2015-01-01

    Public security law education is the basis of public se-curity education. It plays an irreplaceable role in the culture of public security reserve talents. But there are some problems in public security law education at present, such as unreasonable arrangement of law courses, lack of public security characteristic of specified teaching materials, disjunction of teaching contents and public security practice, relatively single and backward of teaching methods, and so on. So the basic position public security law education hasn't been really established. The reasons of these problems are complicated and multi-level. In order to promote the reformation of public security law education, and strengthen and improve public security law education, we should positively cope with from three levels of country, university and teacher.%公安法学教育是公安教育的基础,在公安后备人才培养中具有不可替代的作用。当前公安法学教育中存在着法学课程安排不合理、指定教材缺乏公安特色、教学内容与公安执法实践脱节、教学方法相对单一落后等诸多问题,公安法学教育的基础地位并未真正确立。而造成这些问题产生的原因是复杂的、多层次的。推动公安法学教育改革,加强和改进公安法学教育,应当从国家、学校、教师三个层面进行积极应对。

  4. Improved decryption quality and security of a joint transform correlator-based encryption system

    Science.gov (United States)

    Vilardy, Juan M.; Millán, María S.; Pérez-Cabré, Elisabet

    2013-02-01

    Some image encryption systems based on modified double random phase encoding and joint transform correlator architecture produce low quality decrypted images and are vulnerable to a variety of attacks. In this work, we analyse the algorithm of some reported methods that optically implement the double random phase encryption in a joint transform correlator. We show that it is possible to significantly improve the quality of the decrypted image by introducing a simple nonlinear operation in the encrypted function that contains the joint power spectrum. This nonlinearity also makes the system more resistant to chosen-plaintext attacks. We additionally explore the system resistance against this type of attack when a variety of probability density functions are used to generate the two random phase masks of the encryption-decryption process. Numerical results are presented and discussed.

  5. Affordable nutrient solutions for improved food security as evidenced by crop trials.

    Directory of Open Access Journals (Sweden)

    Marijn van der Velde

    Full Text Available The continuing depletion of nutrients from agricultural soils in Sub-Saharan African is accompanied by a lack of substantial progress in crop yield improvement. In this paper we investigate yield gaps for corn under two scenarios: a micro-dosing scenario with marginal increases in nitrogen (N and phosphorus (P of 10 kg ha(-1 and a larger yet still conservative scenario with proposed N and P applications of 80 and 20 kg ha(-1 respectively. The yield gaps are calculated from a database of historical FAO crop fertilizer trials at 1358 locations for Sub-Saharan Africa and South America. Our approach allows connecting experimental field scale data with continental policy recommendations. Two critical findings emerged from the analysis. The first is the degree to which P limits increases in corn yields. For example, under a micro-dosing scenario, in Africa, the addition of small amounts of N alone resulted in mean yield increases of 8% while the addition of only P increased mean yields by 26%, with implications for designing better balanced fertilizer distribution schemes. The second finding was the relatively large amount of yield increase possible for a small, yet affordable amount of fertilizer application. Using African and South American fertilizer prices we show that the level of investment needed to achieve these results is considerably less than 1% of Agricultural GDP for both a micro-dosing scenario and for the scenario involving higher yet still conservative fertilizer application rates. In the latter scenario realistic mean yield increases ranged between 28 to 85% in South America and 71 to 190% in Africa (mean plus one standard deviation. External investment in this low technology solution has the potential to kick start development and could complement other interventions such as better crop varieties and improved economic instruments to support farmers.

  6. Business models and business model innovation in a “Secure and Distributed Cloud Clustering (DISC) Society”

    DEFF Research Database (Denmark)

    Lindgren, Peter; Taran, Yariv

    2011-01-01

    of secure business models and how business models can be operated and innovated in a secure context have intensified tremendously. The development of new mobile and wireless security technologies gives hopes to really realize a secure cloud clustering society where business models can act and be innovated......The development and innovation of business models to a secure distributed cloud clustering society (DISC)—is indeed still a complex venture and has not been widely researched yet. Numerous types of security technologies are in these years proposed and in the “slip stream” of these the study...... secure—but we still have some steps to go before we reach the final destination. The paper gives a conceptual futuristic outlook on behalf of the input from SW2010 and state of the art business model research to what we can expect of business Model and business model innovation in a future secure cloud...

  7. Potential impact on food safety and food security from persistent organic pollutants in top soil improvers on Mediterranean pasture.

    Science.gov (United States)

    Brambilla, G; Abate, V; Battacone, G; De Filippis, S P; Esposito, M; Esposito, V; Miniero, R

    2016-02-01

    The organic carbon of biosolids from civil wastewater treatment plants binds persistent organic pollutants (POPs), such as polychlorodibenzo -dioxins and -furans (PCDD/Fs), dioxin and non-dioxin -like polychlorobiphenyls (DL and NDL-PCBs), polybrominated diphenyl ethers (PBDEs), and perfluorooctane sulfonic acid (PFOS). The use of such biosolids, derived digestates and composts as top soil improvers (TSIs) may transfer POPs into the food chain. We evaluated the potential carry-over of main bioavailable congeners from amended soil-to-milk of extensive farmed sheep. Such estimates were compared with regulatory limits (food security) and human intakes (food safety). The prediction model was based on farming practices, flocks soil intake, POPs toxicokinetics, and dairy products intake in children, of the Mediterranean area. TSI contamination ranged between 0.20-113 ng WHO-TEQ/kg dry matter for PCDD/Fs and DL-PCBs (N = 56), 3.40-616 μg/kg for ∑6 NDL-PCBs (N = 38), 0.06-17.2 and 0.12-22.3 μg/kg for BDE no. 47 and no. 99, 0.872-89.50 μg/kg for PFOS (N = 27). For a 360 g/head/day soil intake of a sheep with an average milk yield of 2.0 kg at 6.5% of fat percentage, estimated soil quality standards supporting milk safety and security were 0.75 and 4.0 ng WHO-TEQ/kg for PCDD/Fs and DL-PCBs, and 3.75 and 29.2 μg/kg for ∑6 NDL-PCBs, respectively. The possibility to use low-contaminated TSIs to maximize agriculture benefits and if the case, to progressively mitigate highly contaminated soils is discussed.

  8. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  9. Agroecology and sustainable food systems: Participatory research to improve food security among HIV-affected households in northern Malawi.

    Science.gov (United States)

    Nyantakyi-Frimpong, Hanson; Mambulu, Faith Nankasa; Bezner Kerr, Rachel; Luginaah, Isaac; Lupafya, Esther

    2016-09-01

    This article shares results from a long-term participatory agroecological research project in northern Malawi. Drawing upon a political ecology of health conceptual framework, the paper explores whether and how participatory agroecological farming can improve food security and nutrition among HIV-affected households. In-depth interviews were conducted with 27 farmers in HIV-affected households in the area near Ekwendeni Trading Centre in northern Malawi. The results show that participatory agroecological farming has a strong potential to meet the food, dietary, labour and income needs of HIV-affected households, whilst helping them to manage natural resources sustainably. As well, the findings reveal that place-based politics, especially gendered power imbalances, are imperative for understanding the human impacts of the HIV/AIDS epidemic. Overall, the study adds valuable insights into the literature on the human-environment dimensions of health. It demonstrates that the onset of disease can radically transform the social relations governing access to and control over resources (e.g., land, labour, and capital), and that these altered social relations in turn affect sustainable disease management. The conclusion highlights how the promotion of sustainable agroecology could help to partly address the socio-ecological challenges associated with HIV/AIDS.

  10. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  11. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an impl

  12. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an impl

  13. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  15. Security Dialogues: Building Better Relationships between Security and Business

    OpenAIRE

    Ashenden, D.; Lawrence, D.

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff. Published in IEEE Security and Privacy (2016) vol 14/3 pp 82-87 (http://doi.ieeecomputers...

  16. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  17. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  18. Évolution et manifestation de la nouvelle esthétique de l’image et de la poétique de la parole dans l’avant-garde russe, exprimée dans les livres d’artistes futuristes

    Directory of Open Access Journals (Sweden)

    Elina Knorpp

    2011-07-01

    Full Text Available Bien que le futurisme russe, à ses débuts, fût influencé par les futuristes italiens, il évolua d’une manière autonome. Dans le domaine de la littérature, on trouve un grand nombre de groupements futuristes divers, tandis que dans les arts visuels, le soi disant Cubo-futurisme voyait le jour. Le Cubo-futurisme liait des tendances cubistes et futuristes afin de faire advenir une forme singulièrement russe. Les livres futuristes, publiés dans les années 1910, nous montrent la naissance d’une nouvelle esthétique du texte et de l’image ainsi que la rupture avec les anciennes normes littéraires et artistiques. Ceci s’exprime à travers des illustrations, la création d’une nouvelle langue et l’entrelacs de l’image et de la parole. Cet article analyse les commencements du futurisme en Russie à partir de plusieurs livres russes pris comme exemples de cette esthétique nouvelle.Although the Russian Futurist movement was initially influenced by the Italian Futurists, it developed in an independent way. In literature, there had been a number of different futurist groups, whereas in the visual arts, the so-called Cubo-Futurism was established, linking the cubist and futurist tendencies in a singularly Russian form. Futurist books, published in the1910s, show the birth of a new aesthetics of text and image and the break with older literary and artistic norms. This was expressed through illustrations, new language and the affiliation of image and word. This article examines the beginnings of Futurism in Russia and considers a few Futurist books as examples of this new aesthetic.

  19. Report: EPA Should Improve Management Practices and Security Controls for Its Network Directory Service System and Related Servers

    Science.gov (United States)

    Report #12-P-0836, September 20, 2012. EPA's OEI is not managing key system management documentation, system administration functions, the granting and monitoring of privileged accounts, and the application of security controls associated with its DSS.

  20. 78 FR 41413 - Aviation Security Advisory Committee (ASAC) Meeting

    Science.gov (United States)

    2013-07-10

    ... SECURITY Transportation Security Administration Aviation Security Advisory Committee (ASAC) Meeting AGENCY... Meeting. SUMMARY: The Transportation Security Administration (TSA) will hold a meeting of the Aviation... and provides advice and recommendations for improving aviation security measures to the Administrator...

  1. 适用多级安全网络的BLP改进模型%Improved BLP model for multi-level secure network

    Institute of Scientific and Technical Information of China (English)

    白玮; 吴强; 张学平

    2013-01-01

    SBLP,an improved BLP (Bell-LaPadula) model was presented for exchanging information in multi-level secure networks securely and efficiently.Its finite-state machine definition and state change rules were given,and its security was formally proved.The model provides a theoretical base to information exchanging in multi-level secure networks by attaching objects and subjects with changeable secure labels,and gave full consideration to subjects creating,subjects illegal tracking and so on,which can slove the problems of BLP model using in the multi-level secure network.Finally,a simple scenario using the model was given.%为实现不同安全级网络间的互联互通,提出了一种适用于多级安全网络的安全策略模型SBLP,给出了其状态机模型定义和状态变化规则,并形式化地证明了其安全性.该模型通过为主客体添加可变的安全级标记,充分考虑了主体创建、主体违规追踪等问题,有效解决了等级化网络中BLP模型过于严格的问题,为等级化安全网络互联互通提供了必要的理论基础.最后,给出了该模型的一个简单的应用场景.

  2. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  3. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  4. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  5. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs) in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Science.gov (United States)

    Koo, Fung Kuen; Chen, Xi; Chow, Eric P F; Jing, Jun; Zheng, Jun; Zhao, Junshi; Zhang, Lei

    2015-01-01

    This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs) and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1) participants' attitudes towards NSPs, (2) participants' opinions on the effectiveness and barriers of NSPs, and (3) suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division). Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34) regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24) questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  6. Protection against noise and cold. Futuristic noise and heat protection in dwelling houses. Schutz vor Laerm und Kaelte. Zukunftsorientierter Schall- und Waermeschutz im Wohnungsbau

    Energy Technology Data Exchange (ETDEWEB)

    Prepens, M.

    1987-01-01

    Noise protection, particularly in dwelling houses, has great importance for the health and well-being of human beings. This report is concerned with sensible and futuristic noise protection and the associated environmental protection by economical use of energy, using the example of outside and inside walls. Methods of building using sand lime bricks are considered here. Heat and noise insulation is examined on double-shelled KS outside walls with core insulation and on single shell outside walls with a thermal skin. In order to make use in the optimum way of direct and indirect solar irradiation, the method of construction should be aimed at thermal storage capability. The energy saving effect on a highly insulated house is given as an example.

  7. Office of Command Security Total Quality Management Plan

    Science.gov (United States)

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM ( Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  8. GPs' role security and therapeutic commitment in managing alcohol problems: a randomised controlled trial of a tailored improvement programme

    NARCIS (Netherlands)

    Keurhorst, M.N.; Beurden, I. van; Anderson, P.D.; Heinen, M.M.; Akkermans, R.P.; Wensing, M.; Laurant, M.G.

    2014-01-01

    BACKGROUND: General practitioners with more positive role security and therapeutic commitment towards patients with hazardous or harmful alcohol consumption are more involved and manage more alcohol-related problems than others. In this study we evaluated the effects of our tailored multi-faceted

  9. A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Reza Fotohi

    2016-07-01

    Full Text Available Vehicular Ad-Hoc Networks (VANET are a proper subset of mobile wireless networks, where nodes are revulsive, the vehicles are armed with special electronic devices on the motherboard OBU (On Board Unit which enables them to trasmit and receive messages from other vehicles in the VANET. Furthermore the communication between the vehicles, the VANET interface is donated by the contact points with road infrastructure. VANET is a subgroup of MANETs. Unlike the MANETs nodes, VANET nodes are moving very fast. Impound a permanent route for the dissemination of emergency messages and alerts from a danger zone is a very challenging task. Therefore, routing plays a significant duty in VANETs. decreasing network overhead, avoiding network congestion, increasing traffic congestion and packet delivery ratio are the most important issues associated with routing in VANETs. In addition, VANET network is subject to various security attacks. In base VANET systems, an algorithm is used to dicover attacks at the time of confirmation in which overhead delay occurs. This paper proposes (P-Secure approach which is used for the detection of DoS attacks before the confirmation time. This reduces the overhead delays for processing and increasing the security in VANETs. Simulation results show that the P-Secure approach, is more efficient than OBUmodelVaNET approach in terms of PDR, e2e_delay, throughput and drop packet rate.

  10. Technical difficulties. Recent health IT security breaches are unlikely to improve the public's perception about the safety of personal data.

    Science.gov (United States)

    Becker, Cinda

    2006-02-20

    Consumers who claimed in recent surveys that they were "more afraid of cyber crimes than physical crimes" may have had reason for caution. A spate of well-publicized information thefts and security breaches at healthcare organizations have eroded trust in technology, says Carol Diamond, left, of the Markle Foundation, and that could have an adverse effect on acceptance of electronic medical records.

  11. Attachment Security as a Mechanism Linking Foster Care Placement to Improved Mental Health Outcomes in Previously Institutionalized Children

    Science.gov (United States)

    McLaughlin, Katie A.; Zeanah, Charles H.; Fox, Nathan A.; Nelson, Charles A.

    2012-01-01

    Background: Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously…

  12. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  13. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  14. Improved Security Issues with Cloud Analysis%云计算的应用改进与安全问题分析

    Institute of Scientific and Technical Information of China (English)

    王晓艳

    2014-01-01

    随着信息技术的不断发展,云计算已经成为一种新型的互联网服务模式,已经得到广泛使用。本文主要探讨分析云计算存在的一些安全问题及云计算的应用改进,以促进云计算服务安全、可持续的发展。%With the continuous development of information technology, cloud computing has become a new Internet service model, has been widely used. This paper discusses some of the security issues and the application of improved analysis of cloud computing cloud computing exists to promote cloud computing services security and sustainable development.

  15. 一种增强WAPI安全性的改进方法%An Improved Method for Enhancing the Security of WAPI

    Institute of Scientific and Technical Information of China (English)

    胡雪; 封化民; 陈迎亚; 吴阳阳

    2015-01-01

    WAPI is an authentication and encryption security protocol of GB 15629.11, the Chinese WLAN standard. This paper introduces the background and working principle of WAPI standard, analyzes the WAPI security defects in the process of identity authentication and key agreement, and improves the defects above. In the process of identity authentication, the new protocol not only authenticate the legitimacy of user certificate, but also authenticate the user has the corresponding private key; in the process of key agreement, the new protocol apply key exchange protocol——MTI to the key exchange process, and improve the safety of key exchange. This paper lists the key process of the improved WAI identity authentication interaction, and gives the security analysis. On the basis of the improved WAPI, we put forward a mobile terminal solution taking advantage of the independent security medium (mobile phone using SD-Key as security medium, PAD using the USB-Key as security medium). Compared with the national standard, modiifed WAPI has been greatly improved in terms of safety. In the standardization of WAPI products, the enhanced mobile terminal solutions proposed in this paper has great reference signiifcance to improving the WAPI standard security.%WAPI是中国无线局域网国家标准GB 15629.11中提出的用来实现无线局域网鉴别和加密的机制。文章介绍了WAPI标准产生的背景和工作原理,分析指出了中国无线局域网国家标准WAPI在身份认证和密钥协商过程存在的安全缺陷,并针对文中提出的缺陷做出相应的改进。身份认证过程中,改进的方案不仅认证用户证书的合法性,还认证用户是否拥有对应的私钥;在密钥协商阶段,将密钥交换协议——MTI应用到密钥交换过程,提高了密钥交换的密码学安全性。文章列出改进的WAI鉴别基础结构关键交互过程,并给出了详细的安全性分析。文章在改进的WAPI基础上,提

  16. The National Homeland Security Research Center

    Data.gov (United States)

    Federal Laboratory Consortium — The National Homeland Security Research Center advances our nation's security by providing scientific products and expertise to improve the ability to respond to and...

  17. A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems

    Directory of Open Access Journals (Sweden)

    S.Ramesh

    2014-08-01

    Full Text Available Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resist various attacks and have some weakness. Leu and Hsieh proposed an efficient and secure dynamic ID based remote user authentication for distributed environment using smart cards but is vulnerable to impersonation attack, leak verifier attack, stolen smart card attack. We propose a strong authentication scheme with user anonymity and secured dynamic ID based remote user authentication using smart cards that remove aforementioned weakness in distributed systems. The function and performance efficiency of our scheme was analysed and proved to provide a strong mutual authentication between user and server when compared with the existing methods.

  18. Analysis of the Effectiveness of the Departament of Defense Industrial Security Program and Recommendations for Program Improvement

    Science.gov (United States)

    1984-12-10

    deposit box in his name in a bank in Tijuana , Mexico. The case against Harper has now been completed with his sentencing and incarceration. But certain...ensued. Before going to Warsaw, Harper had driven with Louise to Tijuana and placed his remaining collection of classified documents in a safe...Boyce was an employee of TRW, Incorporated, in Redondo Beach , California. From 1975 to 1977 he worked as a security clerk in a "black vault" operated at

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  1. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  2. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  3. Securing personal network clusters

    NARCIS (Netherlands)

    Jehangir, Assed; Heemstra de Groot, Sonia M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  4. Food assistance is associated with improved body mass index, food security and attendance at clinic in an HIV program in central Haiti: a prospective observational cohort study

    Directory of Open Access Journals (Sweden)

    Ivers Louise C

    2010-08-01

    Full Text Available Abstract Background Few data are available to guide programmatic solutions to the overlapping problems of undernutrition and HIV infection. We evaluated the impact of food assistance on patient outcomes in a comprehensive HIV program in central Haiti in a prospective observational cohort study. Methods Adults with HIV infection were eligible for monthly food rations if they had any one of: tuberculosis, body mass index (BMI 2, CD4 cell count 3 (in the prior 3 months or severe socio-economic conditions. A total of 600 individuals (300 eligible and 300 ineligible for food assistance were interviewed before rations were distributed, at 6 months and at 12 months. Data collected included demographics, BMI and food insecurity score (range 0 - 20. Results At 6- and 12-month time-points, 488 and 340 subjects were eligible for analysis. Multivariable analysis demonstrated that at 6 months, food security significantly improved in those who received food assistance versus who did not (-3.55 vs -0.16; P Conclusions Food assistance was associated with improved food security, increased BMI, and improved adherence to clinic visits at 6 and 12 months among people living with HIV in Haiti and should be part of routine care where HIV and food insecurity overlap.

  5. 提升铁路线路治安工作质量的思考%Reflections on Improving the Quality of the Public Security on Railway

    Institute of Scientific and Technical Information of China (English)

    顾群

    2012-01-01

    The public security on railway plays an important role in social economic development. At the "Oct. 17th" conference for all railway police leading cadres, the Party committee of the department puts forward that the activity of creating the green channel of railway security should be one of the "Two Tasks" and "Five Brands" and should be promoted with all efforts. Through the reflections on the problems and reasons about the daily security on the "two railroads" including Huainan and Fuyang - Huainan which are administered by Huainan railway police station of Bengbu railway division of public security, this paper, with the purpose of improving the quality of the public security on railway, expounds from five aspects: to improve patrol and prevention mechanism, to enhance daily supervision, to promote propaganda effect, to manage hidden perils, and to propel comprehensive treatment.%铁路线路治安稳定对社会经济发展起着重要作用。在全路公安领导干部“10·17”会议上,部局党组专门提出要将创建线路治安绿色通道活动作为“两大任务”和“五大品牌”之一,全力打造推进。通过对蚌埠铁路公安处淮南车站派出所管内“二通道”淮南、阜淮等线路在日常治安防控中存在的问题及原因反思剖析,围绕如何进一步提升线路治安防控,从改进巡防机制、加强日常督导、提升宣传实效、狠抓隐患整治、推动综合治理等五个方面进行了阐述。

  6. Security analysis and improvement of certificateless signcryption scheme%对一个无证书签密方案的分析与改进

    Institute of Scientific and Technical Information of China (English)

    秦艳琳; 吴晓平

    2015-01-01

    He 对 Liu 等人提出的无证书签密方案进行了改进,用以实现 AⅠ类型敌手攻击下签密方案的不可伪造性。但通过对 He 所提的改进方案进行安全性分析发现,该方案无法抵制 AⅡ类型敌手的伪造签密攻击,并且用户在签密过程中使用的一次性数据一旦发生泄露也会影响方案的安全性。由此,基于椭圆曲线离散对数问题提出一个新的无证书签密方案,安全性及效率分析表明新方案能弥补 He 所提方案存在的安全漏洞且运行效率不低于同类方案。%To realize unforgeability of signcryption scheme under AⅠ’s attack,He Debiao proposed an improvement of a cer-tificateless signcryption scheme presented by Liu,et al.Security analysis indicated that He’s scheme could not resist AⅡ’s attack,and it was also not secure when revealed the one-off data used in signcryption.To solve the security problem existed in He’s scheme,this paper developed a novel certificateless signcryption scheme based on elliptic curve discrete logarithm prob-lem.Analysis shows that new scheme is more secure than He’s and no less efficient than schemes of same kind.

  7. How to Improve SCTP Host Signaling Security%浅谈如何提高SCTP所承载信令的安全性

    Institute of Scientific and Technical Information of China (English)

    林奇峰

    2013-01-01

    通过对物理层、IP层、SCTP层以及应用层的分析,就如何提高SCTP所承载信令的安全性进行了较为详细的阐述,为IP化改造做好充分准备。%It analyzes the physical layer, IP layer, SCTP layer and application layer, points out the improvement of VoIP signaling security, to prepare for VoIP transformation.

  8. GPER路由协议的安全性改进%Improvements on GPER Routing Protocol Security

    Institute of Scientific and Technical Information of China (English)

    王新生; 李海涛; 赵衍静

    2011-01-01

    As Wireless Sensor Network(WSN) deployed in the natural environment, the network faces many security problems and the trust relation between nodes is difficult to confirm.Aiming at the problem, a fuzzy trust model is established to deal with the trust evaluation and calculation problems between nodes by adopting fuzzy theory, and this fuzzy trust model is used to solve routing security issues for WSN.Experimental results show that the trust model can evaluate the trust status of the node effectively and resist packet loss of misbehavior nodes.%无线传感器网络存在很多安全问题,节点间的信任关系难以确认.针对上述问题,采用模糊理论建立一种模糊信任模型解决节点间信任的评价、计算问题,并用该模糊信任模型解决无线传感器网络的路由安全问题.实验结果表明,该信任模型能有效评价节点的信任状态,抵御不良节点的丢包问题.

  9. Application of Improved SQUARE Model in Software Security Requirements Elicitation%改进的 SQUARE 模型在软件安全需求获取中的应用

    Institute of Scientific and Technical Information of China (English)

    范洁; 许盛伟; 娄嘉鹏

    2013-01-01

    The eliciting of security requirement is a key factor to ensure software's security .To obtain the software's security requirement effectively , on the basis of the analysis of the Security Quality Re-quirements Engineering model , the steps of the SQUARE model was improved , and the classification standard about security requirements was defined , and the XML Schema definition of security require-ments document was presented .This thesis applied the Light -SQUARE model to university student Score Management System and elicited its security requirement , and stored the security requirement with XML format , realized cross-platform usability of the security requirement .%安全需求的获取是确保软件安全性的关键因素。为有效地获取软件的安全需求,在分析安全质量需求工程SQUARE模型的基础上,改进了该模型的执行步骤,制定了安全需求的分类标准,给出了安全需求文档的XML模式定义。应用改进的SQUARE模型对高校学生成绩管理系统进行安全需求获取,并将安全需求文档以XML格式进行存储,实现了安全需求的跨平台通用。

  10. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  11. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    Science.gov (United States)

    2010-12-01

    Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area

  12. Social Security Umbrella Expanded

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The government issues a draft law to improve the country’s social security system Zhao Yanfang, 25, is an engineer at a designing institute in Beijing.After she graduated from a university in Jiangsu Province in 2005,

  13. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  14. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  15. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  16. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study

    Directory of Open Access Journals (Sweden)

    Herron Caroline M

    2010-07-01

    Full Text Available Abstract Background Genetically Modified (GM crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Methods Nineteen individual interviews (10 male and 9 female and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Results Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. Conclusion This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they

  17. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study.

    Science.gov (United States)

    Lewis, Christopher P; Newell, James N; Herron, Caroline M; Nawabu, Haidari

    2010-07-12

    Genetically Modified (GM) crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Nineteen individual interviews (10 male and 9 female) and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they believe use of GM biotechnology is an appropriate way in which

  18. AODV路由协议的安全性改进%Security improvement of AODV routing protocol

    Institute of Scientific and Technical Information of China (English)

    王寒冰; 张曦煌

    2012-01-01

    针对Ad Hoc网络易遭受黑洞攻击而造成大量丢包现象的安全问题,提出了一种基于非合作博弈理论的安全路由方法.以Ad Hoc网络节点和恶意节点为对象建立双人博弈模型,理论分析证明该模型存在纳什均衡点,即对博弈的双方均存在优势策略.Ad Hoc网络根据自己的优势策略选择路由进行防御和网络传输,恶意节点根据自己的优势策略采取网络攻击行为.分析和仿真结果表明,新方法能有效地选择比较安全的路由,从而减少了恶意节点对Ad Hoc网络进行黑洞攻击造成的影响,降低了路由开销和网络丢包率.%To defend the Ad Hoc network against blackhole attacks which cause a significant number of dropped packets, a new approach based on non-cooperative game theory is presented. A two-player game theory model is made regarding the Ad Hoc network as one player and malicious nodes as the other. Theoretical analysis proves that there exists a Nash equilibrium point in the model. There are dominant strategies for both parts of the two players. According to their own dominant strategies, the Ad Hoc network selectes a route to defend and to transmit packets, and the malicious nodes launch blackhole attacks. Analysis and simulation results show that the proposed approach can efficiently select a secure route in order to reduce the influence of the attacks by the malicious nodes against Ad Hoc network, and thus reducing the route overhead and the packet loss rate.

  19. The Effect of Recent and Futuristic Changes in Cotton Production Technology on Direct and Fixed Costs Per Acre, Mississippi, 2004

    OpenAIRE

    2005-01-01

    The introduction of genetically modified seed technology dramatically changed cotton production practices. Production systems based on reduced tillage and BtRR varieties improved net returns by $47.35 per acre (53%) when compared to systems based on conventional tillage and non-transgenic varieties. The impact of other technology induced changes are reported.

  20. Intelligent Sensors Security

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2010-01-01

    Full Text Available The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408 used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC related security design patterns and to improve the effectiveness of the sensor development process.

  1. Intelligent Sensors Security

    Science.gov (United States)

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  2. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  3. Improving smallholder food security through investigations of carcass composition and beef marketing of buffalo and cattle in northern Lao PDR.

    Science.gov (United States)

    Nampanya, Sonevilay; Khounsy, Syseng; Phonvisay, Aloun; Bush, Russell David; Windsor, Peter Andrew

    2015-04-01

    This study determined the carcass composition of Lao indigenous buffalo (Bubalus bubalis) and cattle (Bos indicus), then examined trends in bovine meat marketing following review of records of beef production and prices in the two major cities of Luang Prabang (LPB) and Xieng Khoung (XK) provinces in northern Laos. Samples from 41 buffalo and 81 cattle (n = 122) were collected from animals slaughtered in May-June 2014, with live weights, carcass weights and other carcass-related variables collected. The animals were classified into four age cohort groups (4, 4-6 and >6 years) with quantitative and dichotomous qualitative traits determined. There were significant differences in buffalo and cattle predicted mean carcass weights between age classification categories (p = 0.003 and 0.001) but not in dressing percentages (p = 0.1 and 0.1). The carcass weight of buffalo was 104 (±23.1)-176 (±12.0) kg compared to 65 (±8.7)-84 (±6.5) kg of cattle, with dressing percentages of 37-40 and 39-42 %, respectively. Despite an average bovine meat price increase of 42-48 % between 2011 and 2013, there was a reduction in the numbers of large ruminants slaughtered in the surveyed cities of LPB (11 %) and XK (7 %), with bovine meat availability per person of 5.2-6.6 kg (LPB) and 3.0-3.8 kg (XK). Improving the sustainability of the bovine meat supply in Laos requires a systems approach involving improvements to animal health and production, livestock marketing, plus the critical development of improved slaughterhouse facilities enabling a meat-processing sector to emerge. This development pathway is of particular importance for building the capacity of Laos to reduce food insecurity and alleviate the poverty of its largely rural smallholder community.

  4. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  5. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  6. Securing Cyberspace: Towards an Agenda for Research and Practice

    Directory of Open Access Journals (Sweden)

    Renaud Levesque

    2015-11-01

    Full Text Available In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i research is conducted, ii cybersecurity researchers are educated, iii new defendable systems are developed, and iv effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future.

  7. 7 CFR 1822.269 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Security. 1822.269 Section 1822.269 Agriculture..., Procedures, and Authorizations § 1822.269 Security. Each loan will be secured by a mortgage on the property purchased or improved with the loan, and a security interest in the funds held by the corporation in...

  8. ATIP Report: Cyber Security Research in China

    Science.gov (United States)

    2015-06-05

    networks such as telecommunications ( telecom ) carrier backbone networks has improved, but domain name systems remains the weak link concerning security...analysis, cloud security, mobile security, and security of wireless sensor networks in China, and an overview of these research achievements is...provided within. KEYWORDS: Government S&T Policy / Funding, Information Technology / IT, Mathematics, Telecommunications / Networking COUNTRY

  9. 75 FR 26171 - Cyber Security Certification Program

    Science.gov (United States)

    2010-05-11

    ... rely on the durability and security of IP-based networks to move capital and to track goods and... networks with better security practices. The reduced incentive for heightened cyber security likely is... improve network security. Moreover, the Commission's review of the best practices indicates that,...

  10. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  11. Information security management: a proposal to improve the effectiveness of information security in the scientific research environment; Gestao da seguranca da informacao: uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica

    Energy Technology Data Exchange (ETDEWEB)

    Alexandria, Joao Carlos Soares de

    2009-07-01

    The increase of the connectivity in the business environment, combined with the growing dependency of information systems, has become the information security management an important governance tool. Information security has as main goal to protect the business transactions in order to work normally. In this way, It will be safeguarding the business continuity. The threats of information come from hackers' attacks, electronic frauds and spying, as well as fire, electrical energy interruption and humans fault. Information security is made by implementation of a set of controls, including of the others politics, processes, procedures, organizational structures, software and hardware, which require a continuous management and a well established structure to be able to face such challenges. This work tried to search the reasons why the organizations have difficulties to make a practice of information security management. Many of them just limit to adopt points measures, sometimes they are not consistent with their realities. The market counts on enough quantity of standards and regulations related to information security issues, for example, ISO/IEC 27002, American Sarbanes-Oxley act, Basel capital accord, regulations from regulatory agency (such as the Brazilians ones ANATEL, ANVISA and CVM). The market researches have showed that the information security implementation is concentrated on a well-defined group of organization mainly formed by large companies and from specifics sectors of economy, for example, financial and telecommunication. However, information security must be done by all organizations that use information systems to carry out their activities, independently of its size or economic area that it belongs. The situation of information security in the governmental sector of Brazil, and inside its research institutions, is considered worrying by the Brazilian Court of Accounts (TCU). This research work presents an assessment and diagnostic proposal

  12. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  16. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  17. WPA/WPA2-PSK的安全性分析与改进%Security Analysis and Improvement of WPA/WPA2-PSK

    Institute of Scientific and Technical Information of China (English)

    吴一尘

    2013-01-01

    In order to overcome the vulnerability of WEP itself, Wi-Fi Alliance puts forward WPA/WPA2 security solutions. But in actual applications, WPA/WPA2 still exist some defects which can be attacked. Especially in WPA/WPA2-PSK mode, user passphrase can be acquired through the dictionary attack after capturing several specific wireless packets. Through the analysis of the dictionary attack principle, an improved method of dynamic key negotiation in WPA/WPA2-PSK mode is developed. The improved method is based on symmetric key encryption technology and could avoid user passphrase suffering from dictionary attack. The improved method strengthens the safety of WPA/WPA2-PSK mode.%为了克服WEP本身的弱点给无线网络安全带来的影响,Wi-Fi联盟提出了WPA/WPA2安全方案.但在实际应用中,WPA/WPA2依然存在一些缺陷可被攻击者利用.特别是在预共享密钥(WPA/WPA2-PSK)模式下,攻击者只要截获几个特定的无线数据包,就可以通过字典破解获取用户密码,严重威胁无线网络的安全性.通过分析字典破解的原理,提出一种基于对称密钥加密技术的WPA/WPA2-PSK动态密钥协商过程改进方法,改进后的密钥协商过程能够避免用户密码遭受字典破解,增强了WPA/WPA2-PSK模式的安全性.

  18. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  19. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  20. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  1. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  2. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  3. Information Security Service Branding – beyond information security awareness

    OpenAIRE

    Rahul Rastogi; Rossouw Von Solms

    2012-01-01

    End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, i...

  4. Information Security Governance: When Compliance Becomes More Important than Security

    OpenAIRE

    Tan, Terence C. C.; Ruighaver, Anthonie B.; Ahmad, Atif

    2010-01-01

    International audience; Current security governance is often based on a centralized decision making model and still uses an ineffective 20th century risk management approach to security. This approach is relatively simple to manage since it needs almost no security governance below the top enterprise level where most decisions are made. However, while there is a role for more corporate governance, new regulations, and improved codes of best practice to address current weak organizational secu...

  5. Improved reputation model in secure routing protocol of WMN%Mesh网络安全路由协议声誉模型的改进

    Institute of Scientific and Technical Information of China (English)

    曾萍; 宋杰; 杨亚涛; 张历

    2012-01-01

    Reputation program utilize the observing between the nodes to detect the bad one with good results. However, with the shortcomings of the large calculation and complicated process, it can not effectively deal with the high strength attack. Therefore, the program is proposed to determine the reputation value of the nodes. By contrasting the behavior between the ahead and latter nodes detect, the bad one to compute reputation value with Markov algorithm and give every node corresponding rewards and punishments. It is highly resistant performance to attack, can improve security and robustness of the overall sys tern, and less calculated quantity.%声誉方案利用节点之间相互观察和通告的手段来检测不良节点,具有较好的效果.然而,该方案也存在着计算量大,处理过程复杂、不能有效应对高攻击性等缺点,因此提出改进的声誉值确定方案.通过对前后跳节点行为的对比检测,采用Markov算法来计算节点的声誉值并进行相应的奖惩,使其具有较高的抗攻击性能,能够提高整个系统的安全性和鲁棒性,并且计算量不大.

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  10. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  11. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  12. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  13. TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS

    Directory of Open Access Journals (Sweden)

    Sen-Tarng Lai

    2015-12-01

    Full Text Available E-commerce is an important information system in the network and digital age. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve ecommerce security has become a topic worthy of further exploration. Combining routine security test and security event detection procedures, this paper proposes the Two-Layer Secure Prevention Mechanism (TLSPM. Applying TLSPM, routine security test procedure can identify security vulnerability and defect, and develop repair operations. Security event detection procedure can timely detect security event, and assist follow repair. TLSPM can enhance the e-commerce security and effectively reduce the security risk of e-commerce critical data and asset.

  14. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  15. Application of Improved Biba Model in Security Operating System%Biba改进模型在安全操作系统中的应用

    Institute of Scientific and Technical Information of China (English)

    郭荣春; 刘文清; 徐宁; 李继云

    2012-01-01

    The strict integrity strategy of classical Biba model does not consider the problem of complexity in application of host-guest and the problem of the integrity of the label when the information transmits to outside of Security Subsystem of Operating System(SSOOS). According to GB/T 20272-2006 specification for safety operating system, this paper improves classical Biba model in the flexibility in integrity of host-guest, operation complexity and the integrity of the label beside SSOOS. Theory analysis result shows that improved Biba model enhances system usability on basis of guaranteeing integrity of Biba model.%经典Biba模型的严格完整性策略在应用中未考虑主客体操作的复杂性,且信息向操作系统安全子系统(SSOOS)范围外传输时存在完整性问题.针对上述问题,根据GB/T20272-2006中结构化保护级标准对安全操作系统完整性的要求,在主客体完整性的灵活性、操作复杂性、SSOOS之外完整性标签等方面对Biba模型进行改进.理论分析结果证明,该模型在确保经典Biba模型完整性的基础上,大幅提升了系统的可用性.

  16. Improving radiation awareness and feeling of personal security of non-radiological medical staff by implementing a traffic light system in computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Heilmaier, C.; Mayor, A.; Zuber, N.; Weishaupt, D. [Stadtspital Triemli, Zurich (Switzerland). Dept. of Radiology; Fodor, P. [Stadtspital Triemli, Zurich (Switzerland). Dept. of Anesthesiology and Intensive Care Medicine

    2016-03-15

    Non-radiological medical professionals often need to remain in the scanning room during computed tomography (CT) examinations to supervise patients in critical condition. Independent of protective devices, their position significantly influences the radiation dose they receive. The purpose of this study was to assess if a traffic light system indicating areas of different radiation exposure improves non-radiological medical staff's radiation awareness and feeling of personal security. Phantom measurements were performed to define areas of different dose rates and colored stickers were applied on the floor according to a traffic light system: green = lowest, orange = intermediate, and red = highest possible radiation exposure. Non-radiological medical professionals with different years of working experience evaluated the system using a structured questionnaire. Kruskal-Wallis and Spearman's correlation test were applied for statistical analysis. Fifty-six subjects (30 physicians, 26 nursing staff) took part in this prospective study. Overall rating of the system was very good, and almost all professionals tried to stand in the green stickers during the scan. The system significantly increased radiation awareness and feeling of personal protection particularly in staff with ? 5 years of working experience (p < 0.05). The majority of non-radiological medical professionals stated that staying in the green stickers and patient care would be compatible. Knowledge of radiation protection was poor in all groups, especially among entry-level employees (p < 0.05). A traffic light system in the CT scanning room indicating areas with lowest, in-termediate, and highest possible radiation exposure is much appreciated. It increases radiation awareness, improves the sense of personal radiation protection, and may support endeavors to lower occupational radiation exposure, although the best radiation protection always is to re-main outside the CT room during the scan.

  17. Improving rice-based rainfed production systems in Southeast Asia for contributing towards food security and rural development through sustainable crop production intensification

    Directory of Open Access Journals (Sweden)

    Abha Mishra

    2016-04-01

    Full Text Available Continuing degradation of the environment and the cumulating food, energy, water and financial crises have led to a situation where many people’s access to sufficient, nutritious food is affected as well as their livelihoods, income, and ultimate food and nutrition security. In the wake of these stresses and crises, there is an emerging interest to find efficient, easily accessible and sustainable approaches that can address these crises. One candidate for this is the System of Rice Intensification (SRI with its “less can produce more” prescription. A regional collaborative project currently underway is being implemented in rainfed areas of the Lower Mekong River Basin (LMB countries. This involves smallholder rice farmers, researchers, extension personnel, and development professionals, together with staff of relevant government ministries (http://www.sri-lmb.ait.asia/. The project objective is to produce healthier and profitable rice crops under rainfed conditions using SRI methods, evaluated and refined through farmers’ participatory action research (FPAR. As part of the action-research, more than 120 sets of field experiments have been carried out at 60 FPAR sites in Cambodia and Thailand, directly involving 3600 farmers. The experiments have ranged from the integration of many SRI principles with farmers’ current local practices or improved practices which was termed as “SRI-transition” to full demonstrations and assessments of SRI methodology, i.e., SRI demonstration. The initial calculation of yields has showed an average paddy yield of 5.03 t/ha with SRI-transition, whereas with SRI-demonstration the average yield was 6.41 t/ha. These yields were 60 and 100% higher than the average baseline yield in the region, 3.14 t/ha, for the same farmers and same locales. Productivity gains (dollars gained/dollars spent per ha were calculated for both rainfed and irrigated production areas. In comparative terms, the economic gains for

  18. Improving Security Ties with India

    Science.gov (United States)

    2007-11-02

    Mohammed Ali Jinnah , with it being split between East (today’s Bangladesh) and West Pakistan. India, although predominantly Hindu, has a large Muslim...population. At partition , most Muslims elected to live in East and West Pakistan. India wanted to grow as an independent state and Nehru did not want...bilateral relations between these states. 19 Pakistan is the greatest immediate concern to India in South Asia. Ever since partition , the two have been

  19. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in t

  20. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  1. A Futuristic Perspective for Counselors.

    Science.gov (United States)

    Walz, Garry R.; Benjamin, Libby

    Some generalizations drawn from the literature on futurism are set forth in this monograph. Possible social and behavioral consequences of these as they relate to the work of the counselor are projected. The document then suggests some ways counselors can help clients to create rewarding personal futures, and describes a futures studies program…

  2. Autobot Evolution: A Futuristic approach

    Directory of Open Access Journals (Sweden)

    N.Hariharan#

    2011-06-01

    Full Text Available SCABOR is an approach for the 3-D lane detection and autonomous driving. Its main attribute is to diagnose the metrology of roads. It has a wide significance in determining the basic structure, the presence of humps and dips and gives a clear and cache information of the way .Our view on this paper is to apply SCABOR along with the application of the GLOBAL POSITIONING SYSTEM in autonomous driving system for safe and fast driving. Here the SCABOR technology’s currentapplication is outlined and its use has been extended to traffic system. We have suggested a unique method for flexible driving. We also suggest ways in which SCABOR technology can be enhanced forfuture applications. Among the significant advantages, these techniques perform well even in high risk zones and congested areas with up to 100% accuracy where many other techniques fail.

  3. Improvement and security analysis about signcryption scheme in electronic commerce%电子商务签密方案的改进与安全性分析

    Institute of Scientific and Technical Information of China (English)

    许德武

    2013-01-01

    首先介绍了数字签密与传统的“签名+加密”的方法相比所具有的优势,并给出了构成数字签密方案的四个子算法.然后简要介绍了签密方案涉及到的数学基础,并对现有的几种标准模型下的基于身份的数字签密方案进行了回顾,对Yu等所提方案的安全性进行了分析,指出它在挑选密文攻击方面是不安全的.接下来提出一种改进的数字签密方案,分别对构成该方案的系统建立、密钥提取、数字签密、解签密四个子算法进行了分析.从适应性选择消息下的不可伪造性和选择密文攻击下的密文不可区分性两个方面对方案的安全性进行了简要的说明.最后对改进方案的效率与其它几种方案进行了比较,得出了改进的方案在密文长度等方面存在一定优势的结论,并提出了下一步的研究计划.%Firstly,the paper presents the advantage of digital signcryption over the traditional "signature+encryption" method,and describes the four sub-algorithms which compose the digital signcryption scheme.Secondly,it briefly introduces the mathematical basis of the digital signcryption,reviews several existing identity-based digital signcryption schemes under the standard model.It analyses the security of the digital signcryption scheme designed by Yu,and points out that it is insecure when it is attacked by select ciphertext.Thirdly,it gives an improved digital signcryption scheme,and respectively analyses the digital signcryption scheme consisting of four sub-algorithms-the system establish algorithm,the key extraction algorithm,the digital signcryption algorithm and the unsigncryption algorithm.The scheme's security is briefly described through the two aspects of unforgeability under adaptive select message and ciphertext indistinguishability under select ciphertext attack.Finally,the paper compares the efficiency of the improved scheme with other schemes,concluding that the improved scheme is

  4. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  5. Port security in the Persian Gulf

    OpenAIRE

    Munson, Mark B.

    2008-01-01

    The United States and the international community have implemented numerous measures since 2001 designed to improve the security of maritime commerce. Special attention has been paid to the vulnerability of port facilities to exploitation by terrorists or other illicit actors. While the implementation of enhanced port security measures in Saudi Arabia, UAE, and Iraq may have improved some aspects of maritime security, significant vulnerabilities remain. While strong physical security at ...

  6. 监管理论变迁与证券监管制度完善的路径选择%Changes in Regulation Theories and Approaches to Improvement of Securities Regulation System

    Institute of Scientific and Technical Information of China (English)

    刘灿辉; 曾繁华; 游保德

    2012-01-01

    Regulation theory has an important role in guiding the improvement of securities regulation system,and a national securities regulation system whether is perfect or not,will affect the healthy and orderly development of securities markets.This paper,by examining the changes in regulatory theory,discovers the securities regulation and its theory are bound by the economic mainstream thought.The crisis is an important impetus to the development of regulation theory,and the theory is restricted by its precondition which has its own limitations.This may lead to market failure or regulation failure,which would affect the validity of the securities market.By analysing the advantages and disadvantages of domestic and international regulation theory,this paper hope to improve China's securities regulatory system.%监管理论对证券监管体制完善有着重要指导作用,而一个国家证券监管体制是否完善,又会影响证券市场健康有序发展。文章在考察监管理论的变迁中,发现证券监管及其理论受约束于主流经济思想,危机是监管理论发展的重要推动力,理论受约束于其前提条件,具有自身局限性,结果可能导致市场失灵或监管失灵,从而影响证券市场的有效性。通过对国内外监管理论优缺点的分析,借此选择完善我国证券监管制度路径。

  7. 基于改进的3-D Secure协议的移动支付安全解决方案%ON SAFE SOLUTION OF MOBILE PAYMENT BASED ON IMPROVED 3-D SECURE PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    卫红春; 马丁

    2011-01-01

    A new safe solution of mobile payment based on improved 3-D Secure protocol is presented by learning from existing mobile transaction payment patterns abroad and in conjunction with the features of security requirements of domestic financial system, The solution adopts AES algorithm to encrypt communication message and uses a set of security authentication systems supporting the multi-channel secure message transmission control to ensure the safety of the customers', the merchants' and the funds information in mobile payment transaction.The feasibility and security of the solution in payment transaction are analysed, tested and validated as well.%借鉴国外已有的移动交易支付模式,结合我国金融系统的特点及安全要求,提出了一种基于改进的3-D Secure协议的移动支付安全方案,该方案采用AES(Advanced Encryption Standard)算法对通信报文加密,通过一套支持多信道报文安全传输控制的安全认证体系,来保证在移动支付业务中的客户、商户和资金信息的安全.分析并测试验证了该方案在支付业务中的可行性和安全性.

  8. Is Social Security Tax Feasible?

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ China's Finance Minister Xie Xuren recently wrote an article for an official publication of the Central Committee of the Communist Party of China on deepening taxation reform.He said that China was considering phasing in a social security tax to improve the fund-raising system for social security programs.

  9. System and method for key generation in security tokens

    Energy Technology Data Exchange (ETDEWEB)

    Evans, Philip G.; Humble, Travis S.; Paul, Nathanael R.; Pooser, Raphael C.; Prowell, Stacy J.

    2015-10-27

    Functional randomness in security tokens (FRIST) may achieve improved security in two-factor authentication hardware tokens by improving on the algorithms used to securely generate random data. A system and method in one embodiment according to the present invention may allow for security of a token based on storage cost and computational security. This approach may enable communication where security is no longer based solely on onetime pads (OTPs) generated from a single cryptographic function (e.g., SHA-256).

  10. Argumentation-Based Security Requirements Elicitation: The Next Round

    NARCIS (Netherlands)

    Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roelf J.

    2014-01-01

    Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of

  11. Argumentation-based security requirements elicitation: the next round

    NARCIS (Netherlands)

    Ionita, Dan; Bullee, Jan-Willem; Wieringa, Roel

    2014-01-01

    Information Security Risk Assessment can be viewed as part of requirements engineering because it is used to translate security goals into security requirements, where security requirements are the desired system properties that mitigate threats to security goals. To improve the defensibility of the

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. The Transportation Security Administration’s Four Major Security Programs for Mass Transit--How They Can Be Improved to Address the Needs of Tier II Mass Transit Agencies

    Science.gov (United States)

    2011-03-01

    THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS AFSD Assistant Federal Security Director APTA American Public...Presentations should be made to executive management the way APTA peer review briefings are provided. Executive management of mass transit agencies...with DOT and other relevant associations like APTA on the development of standards (OIG, 2008, pp. 10, 11, 18) The IG noted that the 9/11 Commission

  14. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  15. 基于Hits算法的Web安全改进模型%An Improved Web Security Model Based on Hits Algorithm

    Institute of Scientific and Technical Information of China (English)

    陈志德; 郭扬富; 许力; 郑金花

    2012-01-01

    In search engines, some malicious pages are hidden in search results athigh rank position. In this paper, an improved Hits algorithm-based web security model is proposed. The vector space model is used to evaluate the risk of the web pages. The malicious pages are punished to reduce the rank position in the search results. The probability of the malicious pages to be accessed is reduced. The experimental results show that the Authority value of a malicious web page is reduced and Authority value of the non-malicious web is increased in this model. Therefore, the probabili- ty that the malicious web pages are clicked is reduced.%针对某些恶意页面利用搜索引擎的局限性隐藏在搜索结果排名较靠前的位置这一问题,本文提出了基于Hits算法的Web安全改进模型.该模型在Hits算法的基础上,结合向量空间模型来评价网页的风险程度,通过对恶意页面的Authority值进行"惩罚"来降低恶意页面在搜索结果中的排序,从而减低恶意页面被访问到的概率.实验结果表明,恶意网页的Authority值明显降低,而非恶意网页的Authority值有所上升,这使得用户通过搜索引擎点击到恶意页面的概率大幅降低.

  16. Improved Meteorological Input for Atmospheric Release Decision support Systems and an Integrated LES Modeling System for Atmospheric Dispersion of Toxic Agents: Homeland Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, E; Simpson, M; Larsen, S; Gash, J; Aluzzi, F; Lundquist, J; Sugiyama, G

    2010-04-26

    When hazardous material is accidently or intentionally released into the atmosphere, emergency response organizations look to decision support systems (DSSs) to translate contaminant information provided by atmospheric models into effective decisions to protect the public and emergency responders and to mitigate subsequent consequences. The Department of Homeland Security (DHS)-led Interagency Modeling and Atmospheric Assessment Center (IMAAC) is one of the primary DSSs utilized by emergency management organizations. IMAAC is responsible for providing 'a single piont for the coordination and dissemination of Federal dispersion modeling and hazard prediction products that represent the Federal position' during actual or potential incidents under the National Response Plan. The Department of Energy's (DOE) National Atmospheric Release Advisory Center (NARAC), locatec at the Lawrence Livermore National Laboratory (LLNL), serves as the primary operations center of the IMAAC. A key component of atmospheric release decision support systems is meteorological information - models and data of winds, turbulence, and other atmospheric boundary-layer parameters. The accuracy of contaminant predictions is strongly dependent on the quality of this information. Therefore, the effectiveness of DSSs can be enhanced by improving the meteorological options available to drive atmospheric transport and fate models. The overall goal of this project was to develop and evaluate new meteorological modeling capabilities for DSSs based on the use of NASA Earth-science data sets in order to enhance the atmospheric-hazard information provided to emergency managers and responders. The final report describes the LLNL contributions to this multi-institutional effort. LLNL developed an approach to utilize NCAR meteorological predictions using NASA MODIS data for the New York City (NYC) region and demonstrated the potential impact of the use of different data sources and data

  17. About Security Solutions in Fog Computing

    Directory of Open Access Journals (Sweden)

    Eugen Petac

    2016-01-01

    Full Text Available The key for improving a system's performance, its security and reliability is to have the dataprocessed locally in remote data centers. Fog computing extends cloud computing through itsservices to devices and users at the edge of the network. Through this paper it is explored the fogcomputing environment. Security issues in this area are also described. Fog computing providesthe improved quality of services to the user by complementing shortages of cloud in IoT (Internet ofThings environment. Our proposal, named Adaptive Fog Computing Node Security Profile(AFCNSP, which is based security Linux solutions, will get an improved security of fog node withrich feature sets.

  18. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  19. Cyber Security Evaluation Tool

    Energy Technology Data Exchange (ETDEWEB)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  20. Chaotic iterations versus Spread-spectrum: topological-security and stego-security

    CERN Document Server

    Guyeux, Christophe; Bahi, Jacques M

    2011-01-01

    A new framework for information hiding security, called topological-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are topologically-secure too. In this paper, the links between the two notions of security is deepened and the usability of topological-security is clarified, by presenting a novel data hiding scheme that is twice stego and topological-secure. This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative topological-security properties. Incidentally, this result shows that the new framework for security tends to improve the ability to compare data hiding scheme.

  1. What Price Security?

    Directory of Open Access Journals (Sweden)

    Donald C. Masters

    2009-01-01

    Full Text Available This article presents a critique of the Copenhagen Consensus Center's(CCC exhaustive study on transnational terrorism, published in 2008.The implications of this study are controversial, yet highly relevant in today's economic environment. The Obama administration must come toterms with fiscal realities that will challenge budget priorities and invigorate what will undoubtedly prove to be tough negotiations on Capitol Hill for homeland security dollars. It is proposed here that standard economic tools such as benefit cost analysis, cost effectiveness criteria, and simulation models can help identify areas where security can be either extended or improved using fewer resources. Greater movement towards competitive procurement practices will also result in lower costs and higher returns on security investments.

  2. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  3. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  4. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in this

  5. Secured transactions

    NARCIS (Netherlands)

    Beale, H.

    2008-01-01

    In this paper I describe the work that is currently under way, within the Network of Excellence charged with creating a draft Common Frame of Reference, to draft rules on security over moveable assets. After a brief introduction, I deal with two broad questions: (1) the general aims and scope of the

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no state

  7. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  8. Medical network security and viruses.

    Science.gov (United States)

    Fernandez Del Val, C

    1991-01-01

    Medical network as connecting Hospital Information Systems are needed in order to exchange, compare and make accessible data. The use of OSI standard communication protocols (open-network environment) will allow to interconnect multiple vendor systems and to accommodate a wide range of underlaying of communication technologies. The security of information on a given host may become dependent of the security measures employed by the network and by other hosts. Computer viruses modifies the executable code and thrive in network environment filled with personal computers and third-party software. Most networks and computers, permit users to share files; this, let the viruses to bypass the security mechanisms of almost every commercial operating system. However, computer viruses axes not the only threat to the information in a network environment. Other as deliberate (passive attacks -wire-tapping-) and accidental threat (unauthorized access to the information) are potential risks to the security information. Cryptographic techniques that now are widely used can resolve the external security problems of the network and improve the internal security ones. This paper begins describing the threats to security that arise in an open-network environment, and goes to establish the security requirements of medical communication networks. This is followed by a description of security services as: confidentiality, integrity, authentication, access control, etc., that will be provided to include security mechanisms in such network. The integration of these security mechanisms into the communication protocols allows to implement secure communication systems that not only must provide the adequate security, but also must minimize the impact of security on other features as for example the efficiency. The remainder of the paper describes how the security mechanisms are formed using current cryptographic facilities as algorithms, one-way functions, cryptographic systems (symmetric

  9. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  10. Biological and Chemical Security

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  11. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  12. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available information security posture and to improve on it. The potential attack surface of a nation is extremely large however and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a...

  13. ESeal Calculus: A Secure Mobile Calculus

    Institute of Scientific and Technical Information of China (English)

    PengRong; UuPing

    2003-01-01

    The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open-channels,ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improves the expression ability and efficiency of Seal calculus without losing security.

  14. ESeal Calculus: A Secure Mobile Calculus

    Institute of Scientific and Technical Information of China (English)

    Peng Rong; Chen Xin-meng; Liu Ping

    2003-01-01

    The ESeal Calculus is a secure mobile calculus based on Seal Calculus. By using open-channels, ESeal Calculus makes it possible to communicate between any two arbitrary seals with some secure restrictions. It improves the expression ability and efficiency of Seal calculus without losing security.

  15. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. Food security vs. nutrition security.

    Science.gov (United States)

    Venugopal, K R

    1999-01-01

    This article presents the status of food security versus nutrition security in India. Food security is defined as the availability and the access of food to all people; whereas nutrition security demands the intake of a wide range of foods which provides the essential needed nutrients. It is estimated that the average dietary intake in India is 2280 calories. In 9 major states, the average was less than 2400 calories, suggesting poverty. In a 1988-90 survey, only 10% of the children, and about 50% of the adults, were considered to have a normal nutritional status. The rest suffered from different levels of Chronic Energy Deficiency. In addition, contradictions have also developed within policies in India that seek to address these issues. Recognizing that agriculture is the key to poverty eradication, India recently drafted the Agriculture Policy. The Policy focuses on rain-fed farming, unemployment, and malnutrition in rural areas, revitalizing the cooperatives, and increasing the involvement of nongovernmental organizations. However, there are certain issues of concern in the Policy with the most damaging aspect seen in the promotion of existing inequalities in the rural sector.

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. Metaphors for cyber security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  20. 基于IEEE 802.1 x/EAP-TLS认证协议安全性的改进%The Improvement of Security based on IEEE 802 . 1 x/EAP-TLS Protocol

    Institute of Scientific and Technical Information of China (English)

    孟迪

    2014-01-01

    Nowadays, the Internet Technology develops rapidly, the application of WLAN has become more and more widespread. Because the wireless network has the nature of opening,at the same time of applying rap-idly,the security problem is constraining the wireless network. By studying the security of IEEE 802. 1x/EAP-TLS protocol,this thesis provides an improvement scheme to make the information which are transmitted be-tween client and AP more secure,promote the security of wireless network in some degree.%在网络技术飞速发展的今天,无线网的应用范围越来越广泛.由于无线网具有开放性,在广泛应用的同时,其安全问题也成为了制约网络发展的关键问题.本文详细研究了IEEE 802.1x/EAP-TLS认证协议的安全问题,针对安全漏洞提出了改进方案,通过对客户端与认证系统之间传递信息的改进,在一定程度上提升了无线网的安全性.

  1. 基于Android系统的手机信息安全分析及策略改进%The Information Security Analysis and Strategy Improvement of AndroidMobile Phone

    Institute of Scientific and Technical Information of China (English)

    贾能

    2016-01-01

    随着移动互联网的发展,Android智能手机在市场上占据着很大的份额。文章首先分析了Android现有的安全机制沙箱模型和数字证书,然后提出Android系统存在的安全问题,最后从系统开发者和用户2个角度设计安全策略来对现有的安全策略进行改进。%With the development of mobile Internet, mobile phones using Androidsystem occupy a large share in the market. First of all, this paper analyzes sandbox model and digital certiifcate which are the existing security mechanisms of Androidsystem. Secondly, security problems in the Androidsystem have been put forward. Finally, security strategies are designed from two angles of system developers and users to improve the existing security strategy.

  2. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    , but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following....... Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent. Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During...... the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral...

  3. Homeland security intelligence : to what end?

    OpenAIRE

    2010-01-01

    CHDS State/Local Approved for public release; distribution is unlimited In this thesis, I present potential solution sets to the question of why homeland security leaders and practitioners use intelligence to improve homeland security decisions. Specific roles and benefits of intelligence are identified, analyzed, and where applicable, extended to domestic security objectives across the homeland security community spectrum. This thesis purports and defends the theory that there are many...

  4. Solutions to the GSM Security Weaknesses

    CERN Document Server

    Toorani, Mohsen; 10.1109/NGMAST.2008.88

    2010-01-01

    Recently, the mobile industry has experienced an extreme increment in number of its users. The GSM network with the greatest worldwide number of users succumbs to several security vulnerabilities. Although some of its security problems are addressed in its upper generations, there are still many operators using 2G systems. This paper briefly presents the most important security flaws of the GSM network and its transport channels. It also provides some practical solutions to improve the security of currently available 2G systems.

  5. Image Security

    Science.gov (United States)

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  6. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  7. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  8. Protecting New York’s Infrastructure: Improving Overall Safety and Security Through New Partnerships and Concentration on Planning, Engineering and Design

    Science.gov (United States)

    2013-12-01

    design phase requires conceptualizing an asset through drawings and discussions with architects and engineers. It requires new partnerships and...both the public and private arenas. Similar to the homeland security focuses established within NYS and 52 Terry Leach , “Federally Owned or Leased...Three Decades,” The Atlantic Wire , 2013. 46 methods and models are required to be utilized and

  9. Security of supply

    OpenAIRE

    2007-01-01

    Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. Ramsay discusses security of energy supplies in a global market; Hasan M. Qabazard outlines OPEC’s abiding commitment to energy security.

  10. Does the Implementation of Centralized Securities Lending & Borrowing Improve China’ s Securities Market Quality? -Empirical Analysis of Shanghai and Shenzhen Stock Market Based on Difference in Difference Model%实施转融通制度提高了我国证券市场质量吗?--运用双重差分模型对沪深股市的实证分析

    Institute of Scientific and Technical Information of China (English)

    代宏霞; 林祥友

    2014-01-01

    By taking 50 kinds of stocks involved in the underlying securities of centralized securities lending &borrowing as processing group, by taking 50 kinds of stocks involved in the underlying securities of margin trading but not involved in the underlying securities of centralized securities lending & borrowing as contrast group, by using the transaction data of nearly 10 months before and after the implementation of centralized securities lending& borrowing, the net influence of the implementation of centralized securities lending & borrowing on the market quality such as liquidity, volatility, order and so on is studied based on difference in difference model, the obtained reliable conclusion is that centralized securities lending & borrowing improves the liquidity of securities market to certain extent, significantly restricts the volatility of securities market, obviously boosts the validity of securities market and generally improves the quality of securities market. Securities market supervisors should further broaden the scope of the underlying securities of centralized securities lending & borrowing, increase the quantity of the underlying securities of centralized securities lending & borrowing, make different processing for the securities before and after entering into the underlying securities of centralized securities lending & borrowing, meanwhile, the traders should also make proper choice while making transaction strategies.%以50种纳入转融通标的证券的股票构造处理组,以50种纳入融资融券标的证券但未纳入转融通标的证券的股票构造控制组,利用转融通制度实施前后各10个交易月份的数据,采用双重差分模型研究转融通制度的实施对证券市场流动性、波动性、有效性等市场质量的净影响,得到的可靠结论是:转融通制度在一定程度上提高了证券市场的流动性,显著抑制了证券市场的波动性,显著提高了证券市场的有效性,

  11. IMPROVED SECURITY WARNING ALGORITHM BASED ON CODE POLLUTION IDENTIFICATION%改进的基于代码污染识别安全警告的算法

    Institute of Scientific and Technical Information of China (English)

    牛霜霞; 吕卓; 张威; 莫坚松

    2016-01-01

    the software.For the shortcomings of the static code auditing tools,we study three different ways to improve the performance of them.First,for commercial static code analysis tool coverity,we re-analyse the results,and create a set of specific warnings from the security point of view.Secondly,we modify the open source code analysis tool Findbugs,and only analyse those codes to be tainted by user inputs.Thirdly,we develop an auditing tool for grey box,which focuses on XSS (cross-site scripting)vulnerabilities in Java code,and use data flow analysis to determine the entry point of vulnerabilities.Experimental results show that the project B reduces the warning numbers by 20% and the project E produces 2% of warnings only,the number of warnings produced by a tool is lowered,and this provides the developers with more information to discriminate whether the warning is a real security threat.

  12. Security Guarantee of Agriculture Industry Based on the Improvement of Cooperative Legal Institution%基于完善农民专业合作社法律制度的农业产业安全保障

    Institute of Scientific and Technical Information of China (English)

    杜文骄; 任大鹏

    2011-01-01

    对我国当前几种农业经营模式对产业安全的影响进行了分析,重点介绍了农民专业合作社在保障农业产业安全中的作用,主要有:组织化程度提高对产业安全的促进作用;通过合作社组织形成规模经济对产业安全的推动作用;合作社要素配置能力可以实现资源的充分利用;通过合作社完善产业链条从而保障产业安全.分析了目前我国农民专业合作社的发展困境:组织规模小、经济效益不高、组织运行不规范,表明制度缺失是造成困境的主要原因,提出了完善中关于联合社制度的建议,以期更好地保障农业产业安全.%Current status of several management models of the agriculture industry is introduced, as well as its impacts on industrial security. The management models are mainly the enterprise - like operation model, "enterprise + peasant household" model, small-scale peasants' operation model, and peasant specialized cooperative model. Functions of peasant specialized cooperative in ensuring the security of agriculture industry are introduced, which are enhancing the industrial security by organization degree, promoting the industrial security by scale economy formed by cooperative organizations, fully utilizing the resources by the factor allocation capability, and ensuring the industrial security by industrial chain improvement. Development predicaments of the peasant specialized cooperative at present are analyzed, such as small scale, poor economic benefits, and non-standard operation. Analysis shows that institutional absence is the main reason causing these predicaments. And suggestions on improving the cooperatives system in the law of the People's Republic of China on Peasants Specialized Cooperatives are put forward, in order to better ensure the security of agriculture industry

  13. Motorola Secure Software Development Model

    Directory of Open Access Journals (Sweden)

    Francis Mahendran

    2008-08-01

    Full Text Available In today's world, the key to meeting the demand for improved security is to implement repeatable processes that reliably deliver measurably improved security. While many organizations have announced efforts to institutionalize a secure software development process, there is little or no industry acceptance for a common process improvement framework for secure software development. Motorola has taken the initiative to develop such a framework, and plans to share this with the Software Engineering Institute for possible inclusion into its Capability Maturity Model Integration (CMMI®. This paper will go into the details of how Motorola is addressing this issue. The model that is being developed is designed as an extension of the existing CMMI structure. The assumption is that the audience will have a basic understanding of the SEI CMM® / CMMI® process framework. The paper will not describe implementation details of a security process model or improvement framework, but will address WHAT security practices are required for a company with many organizations operating at different maturity levels. It is left to the implementing organization to answer the HOW, WHEN, WHO and WHERE aspects. The paper will discuss how the model is being implemented in the Motorola Software Group.

  14. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  15. Information Security

    OpenAIRE

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W. Ph.

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  16. Securing smart grid technology

    Science.gov (United States)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  17. 构建并完善电子政务安全的有益思考%Establishment and Improvement of E-government Security Good Thinking

    Institute of Scientific and Technical Information of China (English)

    方友军

    2012-01-01

    随着信息时代的到来和网络的普遍应用,电子政务应运而生。网络的出现为政务信息的公开提供了良好的平台,同时电子政务更加有利于人民群众参与民主决策。随之电子政务的发展,电子政务的安全隐患也频频出现,影响电子政务信息的真实性和有效性。本文通过针对电子政务中存在的安全问题进行分析思考,并提出了一些解决电子政务安全问题的对策。%with the advent of the information age and the universal application of the network, the electronic government affairs emerge as the times require. The emergence of the network for the government information publicity provides a good platform for e-government, and more conducive to people's participation in democratic decision-making. With the development of e-government, e-government security risks are also frequently occur, affecting e-government information authenticity and validity. This article through to the E-government security problems in the analytical thinking, and puts forward some solving e-government security problem countermeasure.

  18. OWDP and Its Secure Implementation

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed network performance monitor and will effectively safeguard the monitor procedure against intensive attacks.

  19. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  20. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  1. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  2. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  3. Retail E-Commerce Security Status among Fortune 500 Corporations

    Science.gov (United States)

    Zhao, Jensen J.; Zhao, Sherry Y.

    2012-01-01

    The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…

  4. Problems and solutions of information security management in Latvia

    Directory of Open Access Journals (Sweden)

    Deruma S.

    2014-01-01

    Security cannot exist as a standalone function, it should be integrated in the associated processes continuously supervising and improving the security management programme based on predefined criteria. Adopting a holistic approach with regard to security has proven to be a critical contributing factor to effective security in organizations.

  5. On the novel chaotic secure communication scheme design

    Science.gov (United States)

    Wang, B.; Zhong, S. M.; Dong, X. C.

    2016-10-01

    In this paper, the problem on the chaotic secure communication is discussed. First a new dual channel transmission mechanism is presented and used in secure communication scheme design, then the channel-switching techniques are adopted to further improve the security of information transmission. Finally some typical numerical simulations are carried out to demonstrate the effectiveness of the proposed secure communication scheme.

  6. Retail E-Commerce Security Status among Fortune 500 Corporations

    Science.gov (United States)

    Zhao, Jensen J.; Zhao, Sherry Y.

    2012-01-01

    The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…

  7. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  8. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  9. Measuring Security of Web Services in Requirement Engineering Phase

    Directory of Open Access Journals (Sweden)

    Davoud Mougouei

    2015-05-01

    Full Text Available Addressing security in early stages of web service development has always been a major engineering trend. However, to assure security of web services it is required to perform security evaluation in a rigorous and tangible manner. The results of such an evaluation if performed in early stages of the development process can be used to improve the quality of the target web service. On the other hand, it is impossible to remove all of the security faults during the security analysis of web services. As a result, absolute security is never possible to achieve and a security failure may occur during the execution of web service. To avoid security failures, a measurable level of fault tolerance is required to be achieved through partial satisfaction of security goals. Thus any proposed measurement technique must care for this partiality. Even though there are some approaches toward assessing the security of web services but still there is no precise model for evaluation of security goal satisfaction specifically during the requirement engineering phase. This paper introduces a Security Measurement Model (SMM for evaluating the Degree of Security (DS in security requirements of web services by taking into consideration partial satisfaction of security goals. The proposed model evaluates overall security of the target service through measuring the security in Security Requirement Model (SRM of the service. The proposed SMM also takes into account cost, technical ability, impact and flexibility as the key features of security evaluation.

  10. Household food security, Ghana.

    Science.gov (United States)

    Tetebo, R

    1997-12-01

    Two major projects incorporating household food security components have been implemented since the ICN. The first is a UNICEF-funded project that addresses community participation in development. The second is a FAO-funded project: "Promoting Household Food Security and Improving Nutrition through Nutrition Education and Training." This project examines the effects of processing and storage procedures on the nutrient quality of traditional and indigenous fruits and vegetables. It is a young project, but much is being learned from it. Other projects aim to minimize food wastage during processing and storage by developing new processing machinery for use by rural households. Women's issues have become central since the ICN and there is increased support from both government and nongovernment sources to help women with food production and processing.

  11. CLOUD COMPUTING AND SECURITY

    Directory of Open Access Journals (Sweden)

    Asharani Shinde

    2015-10-01

    Full Text Available This document gives an insight into Cloud Computing giving an overview of key features as well as the detail study of exact working of Cloud computing. Cloud Computing lets you access all your application and documents from anywhere in the world, freeing you from the confines of the desktop thus making it easier for group members in different locations to collaborate. Certainly cloud computing can bring about strategic, transformational and even revolutionary benefits fundamental to future enterprise computing but it also offers immediate and pragmatic opportunities to improve efficiencies today while cost effectively and systematically setting the stage for the strategic change. As this technology makes the computing, sharing, networking easy and interesting, we should think about the security and privacy of information too. Thus the key points we are going to be discussed are what is cloud, what are its key features, current applications, future status and the security issues and the possible solutions.

  12. A ttack analysis and improvement on the signcryption scheme with public verifiability and forward security%公开验证和前向安全数字签密方案的分析与改进

    Institute of Scientific and Technical Information of China (English)

    周克元

    2015-01-01

    T he signcryption scheme proposed by Zhang Jian‐hang et al is analyzed , and the scheme don’t have the forward security . An improvement scheme is proposed with public verifiability and forward security , the correctness and security are proved . The efficiency of the scheme is increased significantly compared with two existing schemes . Moreover , a new signcryption scheme based on elliptic curves is proposed with public verifiability and forward security . In the algorithm , both the numbers of model multiplication and model inverse are reached the minimum four times and zero times , the efficiency of the algorithm is increased significantly compared with the existing signcryption scheme .%指出张建航等提出的数字签密方案无前向安全性,提出了一个新的可公开验证和前向安全的数字签密方案,并进行了正确性和安全性分析,与已有方案比较,降低了算法复杂度。同时,指出张建航等提出的椭圆曲线数字签密方案复杂度过高,给出了一个新的签密方案,方案具有前向安全性和公开验证性,模乘运算达到最小值4次,模逆运算达到最小值0次,复杂度达到理论最小值。

  13. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  14. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  15. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  16. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  17. 一种基于Hash函数的RFID认证改进协议%An improved hash-based RFID security authentication algorithm

    Institute of Scientific and Technical Information of China (English)

    王旭宇; 景凤宣; 王雨晴

    2014-01-01

    针对使用无线射频识别技术(RFID)进行认证时存在的安全问题,提出了一种结合Hash函数与时间戳技术的认证协议。将标签的标识和时间戳数据通过Hash函数进行加密传输并进行认证。通过BAN逻辑证明和建立协议的Petri网模型仿真实验证明了该协议具有良好的前向安全性,能有效防止重放、位置跟踪、非法访问等攻击。%To settle the potential security problems during the authentication of radio frequency identification,an authen-tication protocol combined with Hash function and time stamp was proposed.The tag’s identification and time stamp data were encrypted and transmitted through the Hash function,when they were used to authenticate.The ban logic proof and the simulative experiment of established Petri model showe the protocol has good forward security and can prevent replay,location tracking,illegal reading and other illegal attacks.

  18. Improved performance of analog and digital acousto-optic modulation with feedback under profiled beam propagation for secure communication using chaos

    Science.gov (United States)

    Almehmadi, Fares S.; Chatterjee, Monish R.

    2014-12-01

    Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise. The simulations with profiled input beams are shown to produce a stronger encryption key (i.e., much lower parametric tolerance thresholds) relative to simulations with uniform plane wave input beams. In each case, it is shown that the tolerance for key parameters drops by factors ranging from 10 to 20 times below those for uniform plane wave propagation. Results are shown to be at consistently lower tolerances for secure transmission of analog and digital signals using parameter tolerance measures, as well as BER performance measures for digital signals. These results hold out the promise for considerably greater information transmission security for such a system.

  19. Stochastic Optimization of Supply Chain Risk Measures –a Methodology for Improving Supply Security of Subsidized Fuel Oil in Indonesia

    Directory of Open Access Journals (Sweden)

    Adinda Yuanita

    2015-08-01

    Full Text Available Monte Carlo simulation-based methods for stochastic optimization of risk measures is required to solve complex problems in supply security of subsidized fuel oil in Indonesia. In order to overcome constraints in distribution of subsidized fuel in Indonesia, which has the fourth largest population in the world—more than 250,000,000 people with 66.5% of productive population, and has more than 17,000 islands with its population centered around the nation's capital only—it is necessary to have a measurable and integrated risk analysis with monitoring system for the purpose of supply security of subsidized fuel. In consideration of this complex issue, uncertainty and probability heavily affected this research. Therefore, this research did the Monte Carlo sampling-based stochastic simulation optimization with the state-of-the-art "FIRST" parameter combined with the Sensitivity Analysis to determine the priority of integrated risk mitigation handling so that the implication of the new model design from this research may give faster risk mitigation time. The results of the research identified innovative ideas of risk based audit on supply chain risk management and new FIRST (Fairness, Independence, Reliable, Sustainable, Transparent parameters on risk measures. In addition to that, the integration of risk analysis confirmed the innovative level of priority on sensitivity analysis. Moreover, the findings showed that the new risk mitigation time was 60% faster than the original risk mitigation time.

  20. Computer Security: professionalism in security, too

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    At CERN, we apply a great deal of dedication and professionalism to all the work we do. This is necessary because of the complexity and sophistication of the devices we deal with. However, when it comes to computer security, we can all agree that there is room for improvement.   In some cases, we’ve observed devices that are connected to our Intranet networks without the adequate level of protection. Also, in order to allow it to be disseminated easily with peers, information is often disclosed on public webpages, sometimes without appropriate consideration of important security-related aspects. Program code is lost due to a lack of proper version control or the use of central storage systems. Systems are brought down by “finger trouble”, confusing the right and wrong IP addresses. Software or system development is done directly on production devices, impinging on their proper operation up to the point where the system grinds to a halt. Applications full of useful fe...

  1. Understanding of the Security Cooperation under the CICA Framework from the Evolving Security Concept

    Institute of Scientific and Technical Information of China (English)

    Qiang Xiaoyun

    2016-01-01

    The complex characteristics and the grim situation of the Asian security in the new period puts construction of a new security structure in Asia on the agenda,and the existing CICA composed of most Asian countries can provide useful help for the Asian security structure construction.The CICA plays a unique role in promoting peace and cooperation in Asia,and in promoting mutual understanding and trust among its member states.Facing the common and comprehensive security challenges in the Asian region,the CICA security concept is also constantly developing and improving.A new Asian security concept advocated by China has become the core content of the CICA security concept,which carries far-reaching significance for pushing Asian countries to boost mutual trust and cooperation,and jointly build a secure and stable environment in the region.Respecting and caring of the security concerns of all Member States,and promoting security and mutual trust through dialogue and cooperation are the CICA main consideration for carrying out security cooperation.The Security cooperation under the future CICA framework should,on the basis of the new security concept,overcome a dilemma for lack of a community of cognition identity,a community of interests,a community of responsibility and a community of shared destiny,actively implement the measures for mutual trust,strengthen mechanisms construction,and make contributions for establishment of a new security structure in Asia.

  2. Model Checking-Based Formal Analysis and Improvement on Wireless Sensor Network Security Protocols%基于模型检测的无线传感网安全协议形式化分析与改进

    Institute of Scientific and Technical Information of China (English)

    陈铁明; 何卡特; 江颉

    2013-01-01

    针对Zhang等人提出的一种基于位置的无线传感网络安全方案,开展基于模型检测的形式化分析与改进研究.首先采用模型检测工具SPIN分析和验证邻居节点认证协议,发现节点移动后将导致邻居节点无法认证的问题;为支持节点可移动,直接对协议给出一种改进方案,并采用模型检测对改进后的协议重新建模分析,发现存在中间人攻击威胁;最后根据模型检测结果,进一步提出用时间戳替换随机数的改进方案,可有效抵御中间人攻击.本文工作表明,模型检测不仅能实现对无线传感网络安全协议的形式化分析与验证,还可有效协助实现安全协议的设计与改进.%Formal analysis and improvement on a novel location-based security mechanism for wireless sensor networks are conducted in this paper. At first, the neighbor node authentication protocol is formally verified using the model check tool SPIN, and it is found that the authentication will fail if the node moves off its location. To obtain a node move-free scheme,an improved location-based authentication security protocol is directly proposed. However, by model checking the modified specification again, a man-in-the-middle attack is eventually detected. Finally, the timestamp is employed to substitute the original nonce to resist the MITM attack. Our works show that model check, as an efficient formal method,can not only analyze and verify the specialized security protocols on wireless sensor networks,but also facilitate the security scheme design and improvement.

  3. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  4. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  5. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  6. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  7. Security analysis and improvement of certificateless proxy blind signature%无证书代理盲签名方案的安全性分析及改进

    Institute of Scientific and Technical Information of China (English)

    葛荣亮; 高德智; 梁景玲; 张云

    2012-01-01

    盲签名广泛应用于电子投票系统、电子支付系统等方面,在盲签名方案中签名者不知道所签信息的具体内容.通过对一个新的无证书代理盲签名方案(魏春艳,蔡晓秋.新的无证书代理盲签名方案.计算机应用,2010,30(12):3341 -3342)进行安全性分析,发现了其中的安全漏洞,签名者可以将所签信息与原始消息进行链接,从而无法满足盲签名方案的安全性要求.同时针对这个问题,提出了一个改进方案,改进方案克服了原方案的安全缺陷.%The blind signature is widely applied to the electronic voting system and electronic paying system, etc. While giving a blind signature, the signer does not know the content of the signed message. This paper analyzed the security of a new certificateless proxy blind signature scheme ( WEI CHUN-YAN, CAI XIAO-QIU. New certificateless proxy blind signature scheme. Journal of Computer Applications, 2010,30( 12): 3341 -3342) and found out the security loophole. The signer can link the signed message with the original message. Thus the scheme can not satisfy the security requirements of the blind signature scheme. To solve this problem, an improved scheme was proposed. The improved scheme eliminates the defect of the original one.

  8. 对 Tasi 群密钥协商协议的改进及安全分析%Improvement and security analysis on Tasi’s group key agreement

    Institute of Scientific and Technical Information of China (English)

    霍丽娟; 李朝阳; 孙垒

    2015-01-01

    针对 J.L.Tsai 等人提出的移动环境下群密钥协商协议存在的安全缺陷,利用数字签名技术,对其进行了改进:在数字签名中加入序列号,用以标记签名和将要生成的群密钥的次序,并将序列号作为数字签名公开验证信息之一,从而实现对移动用户或者具有较强计算能力的节点所发送消息的及时验证.由安全分析可知,改进后的协议不仅具有原来的安全特性,而且可以抵抗重放攻击或冒充攻击.%Aimed at the security defect of group key agreement protocol for mobile environment proposed by J.L.Tsai,the protocol was improved by using the digital signature technology.That is,some serial numbers were inserted in the digital signatures so as to identify the signatures and the order of the group keys to be generated,and the serial numbers were used as part of public information to verify the digital signatures.So the freshness of messages sent by the mobile users or the powerful node could be checked.According to the security analysis,it is found that the improved protocol not only had the old security properties,but also could resist against impersonation attack or forgery attack.

  9. 农民工参加城镇社会保障的现状与政策改进*%Current Situation and Policy Improvement for Migrant Workers to Participate in Urban Social Security

    Institute of Scientific and Technical Information of China (English)

    刘艳文

    2013-01-01

    ,and lagging reform of household register system and land system,which make the interests of the migrant workers difficult to be ensured and which seriously restrict the realization of the sharing of urban social security by the migrant workers. China should let the migrant workers enjoy urban social security to solve the problems in social security of the migrant workers by lowering the standard for the migrant workers to participate in social security,by perfecting and adjusting the policies,and by innovating management methods under current system framework according to the characteristics and demand of the migrant workers group.Presently,the policy system for the migrant workers to participate in urban social security should be improved and perfected by reducing social security fee burden,by perfecting continuous social security enjoyment policy,by implementing overall management at provincial level,by strengthening housing guarantee,and by accelerating the reform of household register system and land system.

  10. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  11. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  13. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  14. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  15. Improving the security of power systems with the use of metaheuristics; Melhorando a seguranca de sistemas de potencia com a utilizacao de metaheuristicas

    Energy Technology Data Exchange (ETDEWEB)

    Silva Neto, C.A. da [Universidade Federal Fluminense (UFF), Niteroi, RJ (Brazil). Inst. de Computacao], e-mail: cneto@ic.uff.br; Schilling, M.T. [Universidade Federal Fluminense (UFF), Niteroi, RJ (Brazil)], E-mail: schilling@ic.uff.br; Souza, J.C.S. [Universidade Federal Fluminense (UFF), Niteroi, RJ (Brazil). Programa de Pos-Graduacao em Computacao], E-mail: julio@ic.uff.br

    2009-07-01

    The paper presents aspects leading the combined use of electromechanical simulations complete and metaheuristics in order to increase the safe operation of electric power systems. The index that measuring the level of security and, consequently, the ability to each candidate solution is the level of damping of oscillations voltage. The complete electromechanics simulations allow a more accurate representation of the elements of the grid resulting in a more reliable diagnosis. Metaheuristics possess a high degree of generalization enabling its application in highly complex optimization problems such as the maximization of the attenuation level of voltage oscillations, which occur in a power system, due to a defect in the net. Due to the unprecedented nature of this methodology will be investigated two different metaheuristics, one based on a evolutionary algorithm and the other in particle swarm.

  16. Improved Multi-antenna Weighting and Space-hopping Secure Communication Technology%一种改进型的多天线加权跳空保密通信技术

    Institute of Scientific and Technical Information of China (English)

    朱磊; 徐家品

    2016-01-01

    The physical layer security of multi⁃antenna communication system has become an important research content of com⁃munication security in recent years.The artificial noise method and antenna array random weighting method of multi⁃antenna secure com⁃munications can realize secure information in a wireless communication system,which guarantees the security at the physical layer of wireless communications.But when the number of eavesdropper antennas are more than or equal to those of the senders,the eavesdropper can intercept signals through Music⁃like.To address this issue,an improved multi⁃antenna array weighting method is proposed.The meth⁃od combines the array weighting method and the space⁃hopping technique, in which the receiver selects the appropriate channel to receive and demodulate according to the generated pattern,but the eavesdropper cannot demodulate the signal since he doesn’ t have the pattern.Even if the eavesdropper knows the space⁃hopping pattern,he cannot obtain the correct message since the artificial noise in zero space cannot be eliminated.%多天线阵列随机加权方法和人工噪声方法可以在物理层保障无线通信的安全。但是,当窃听者天线数大于等于发送者时,窃听者就有可能通过Music⁃like窃取信号。针对此问题,提出了一种改进的多天线阵列加权方法。该方法是通过阵列加权方法和跳空技术相结合,接收者根据生成的跳空图案选择相应信道接收解调,而窃听者没有跳空图案所以不能解调出信号,即使窃听者知道跳空图案,但他不能消除零空间内的人工噪声,窃听者仍然没有办法得到正确的发送信息。仿真结果显示,该方法是一种有效的物理层保密通信方法。

  17. Securing mobile code.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    ;white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.

  18. Secure mediated certificateless signature scheme

    Institute of Scientific and Technical Information of China (English)

    YANG Chen; MA Wen-ping; WANG Xin-mei

    2007-01-01

    Ju et al proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.

  19. Security Issues related with cloud computing

    Directory of Open Access Journals (Sweden)

    Manju,

    2014-04-01

    Full Text Available The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.

  20. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  1. Role of Security in Social Networking

    Directory of Open Access Journals (Sweden)

    David Hiatt

    2016-02-01

    Full Text Available In this paper, the concept of security and privacy in social media, or social networking will be discussed. First, a brief history and the concept of social networking will be introduced. Many of the security risks associated with using social media are presented. Also, the issue of privacy and how it relates to security are described. Based on these discussions, some solutions to improve a user’s privacy and security on social networks will be suggested. Our research will help the readers to understand the security and privacy issues for the social network users, and some steps which can be taken by both users and social network organizations to help improve security and privacy.

  2. Virtual World Security Inspection

    Directory of Open Access Journals (Sweden)

    Nicholas Charles Patterson

    2012-06-01

    Full Text Available Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

  3. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  4. 论高校安全保卫工作存在问题与完善对策%Analysis to the Colleges and Universities Security Work Problems and Improvement Measures

    Institute of Scientific and Technical Information of China (English)

    许莉

    2012-01-01

    Security work in colleges and universities is to safeguard national and social stability, promoting the development of universities, and it has important significance to promote students' healthy development. In recent years, however, frequent incidents against the colleges and universities Safety occur much, which have a negative impact to the construction of safe campus. Colleges and universities security facilities are backward and that colleges and universities Logistics pay more attention on economic benefits than health and safety are the main problems of current security work. To effectively solve these problems, it should improve the psychological quality of students as well as the strengthening of supervision and management of the school, and various government departments should actively cooperate with the governance around the campus environment as the starting point so as to effectively strengthen and improve the college security work.%高校安全保卫工作时维护国家和社会稳定、推动高校自身发展、促进学生健康成长有着重要的意义。但是近些年危害高校安全的事件频发,对平安校园的构建产生了不利影响。高校安全防范设施落后、高校后勤重经济效益,轻卫生安全等均为目前高校安全保卫工作中存在的主要问题。为有效解决上述问题,应当以加强学校的监督管理、提高学生的心理素质以及政府各部门积极配合治理校园周边环境等方面为切入点,切实加强并完善高校安全保卫工作。

  5. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  6. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  7. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  8. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  10. Security Issues in Distributed Database System Model

    OpenAIRE

    MD.TABREZ QUASIM

    2013-01-01

    This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we propose some solution for some security aspects such as multi-level access control, ...

  11. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  12. Should We Enhance the Observing Systems or Improve Coordination Among the Operating Agencies: What is Needed the Most for Security--A Philosophical Discussion

    Science.gov (United States)

    Habib, Shahid

    2006-01-01

    As an integrated observing strategy, the concept of sensorweb for Earth observations is appealing in many aspects. For instance, by increasing the spatial and temporal coverage of observations from space and other vantage points, one can eventually aid in increasing the accuracy of the atmospheric models which are precursor to hurricane track prediction, volcanic eruption forecast, and trajectory path of transcontinental transport of dust, harmful nuclear and chemical plumes. In reality, there is little analysis available in terms of benefits, costs and optimized set of sensors needed to make these necessary observations. This is a complex problem that must be carefully studied and balanced over many boundaries such as science, defense, early warning, security, and surveillance. Simplistically, the sensorweb concept from the technological point of view alone has a great appeal in the defense, early warning and security applications. In fact, it can be relatively less expensive in per unit cost as opposed to building and deploying it for the scientific use. However, overall observing approach should not be singled out and aligned somewhat orthogonally to serve a particular need. On the other hand, the sensorweb should be designed and deployed to serve multiple subject areas and customers simultaneously; and can behave as directed measuring systems for both science and operational entities. Sensorweb can be designed to act as expert systems, and/or also provide a dedicated integrated surveillance network. Today, there is no system in the world that is fully integrated in terms of reporting timely multiple hazards warnings, computing the loss of life and property damage estimates, and is also designed to cater to everyone's needs. It is not an easier problem to undertake and more so is not practically solvable. At this time due to some recent events in the world, the scientific community, social scientists, and operational agencies are more cognizant and getting

  13. The Information Security Management System, Development and Audit

    OpenAIRE

    Traian SURCEL; Cristian AMANCEI

    2007-01-01

    Information security management system (ISMS) is that part of the overall management system, based on a business risk approach, that it is developed in order to establish, implement, operate, monitor, review, maintain and improve information security

  14. The Information Security Management System, Development and Audit

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Information security management system (ISMS is that part of the overall management system, based on a business risk approach, that it is developed in order to establish, implement, operate, monitor, review, maintain and improve information security

  15. Climate change: A threat towards achieving ‘Sustainable Development Goal number two’ (end hunger, achieve food security and improved nutrition and promote sustainable agriculture in South Africa

    Directory of Open Access Journals (Sweden)

    Shingirai S. Mugambiwa

    2017-01-01

    Full Text Available This article aims to assess the impacts of climate change towards the achievement of Sustainable Development Goal number two (SDG 2 as well as examining the poverty alleviation strategies by subsistence farmers in South Africa. Widespread hunger and poverty continue to be among the most life-threatening problems confronting mankind. Available statistics show that global poverty remains a serious challenge around the world. Across the globe, one in five people lives on less than $1 a day and one in seven suffers from chronic hunger. Similarly, the developing world is adversely affected by poverty and hunger. In the sub-Saharan Africa, research has revealed a higher prevalence of hunger, malnutrition, poverty and food insecurity. SDG 2 focuses more on eliminating hunger and promoting sustainable agriculture. The study employed an exploratory design and a qualitative method. Snowball sampling was used in selecting relevant sources which led the researchers to other research work on the same field through keywords and reference lists. The researchers employed discourse analysis to analyse data. The study discovered that there are numerous potential effects climate change could have on agriculture. It affects crop growth and quality and livestock health. Farming practices could also be affected as well as animals that could be raised in particular climatic areas. The impact of climate change as well as the susceptibility of poor communities is very immense. The article concludes that climate change reduces access to drinking water, negatively affects the health of people and poses a serious threat to food security.

  16. Integrated security systems design a complete reference for building enterprise-wide digital security systems

    CERN Document Server

    Norman, Thomas L

    2014-01-01

    Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly coordinated, and highly functional system. With a flexible and scalable enterprise-level system, security decision makers can make better informed decisions when incidents occur and improve their operational efficiencies in ways never before possible. The revised edition covers why designing an integrated security system is essential a

  17. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  18. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  19. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  20. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  1. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  2. On Application of Improved Recurrent Neural Network in Network Security Situation Monitoring%改进的递归神经网络在网络安全态势监测中的应用

    Institute of Scientific and Technical Information of China (English)

    李静

    2014-01-01

    With the expansion and diversification of the network ,network topology structure becomes more complex ,and the data traffic rises rapidly in the network ,which causes the network load increases ,at-tack ,fault and other unexpected severe network security events .Neural network to deal with nonlinear , complexity advantage of this paper ,network security situation prediction based on improved recursive neu-ral networks ,experimental results show that the high efficiency of the method ,results are compared with the actual values ,low error ,high accuracy .%随着网络规模的扩大,组网方式多样化,网络拓扑架构变得更加复杂,网络中的数据流量大规模迅速上升,导致网络负载增大,网络受到的攻击、故障等突发性安全事件更加严峻。该文利用神经网络处理非线性、复杂性等优势,基于改进的递归神经网络预测网络安全态势,实验结果证明该方法运行效率较高,运行结果与实际值相比,误差较低,精确性较高。

  3. Network Security Scanner

    OpenAIRE

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  4. Internet Safety and Security Surveys - A Review

    DEFF Research Database (Denmark)

    Sharp, Robin

    This report gives a review of investigations into Internet safety and security over the last 10 years. The review covers a number of surveys of Internet usage, of Internet security in general, and of Internet users' awareness of issues related to safety and security. The focus and approach...... of the various surveys is considered, and is related to more general proposals for investigating the issues involved. A variety of proposals for how to improve levels of Internet safety and security are also described, and they are reviewed in the light of studies of motivational factors which affect the degree...

  5. Quality and security - They work together

    Science.gov (United States)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  6. Improved network security situation prediction based on recursive neural networks%基于改进的递归神经网络的网络安全态势预测

    Institute of Scientific and Technical Information of China (English)

    蔡均平; 屈雷

    2015-01-01

    Neural network to deal with nonlinear,complexity advantage of this paper,network security situation prediction based on improved recursive neural networks,experimental results show that the high efficiency of the method,results are compared with the actual values,low error,high accuracy.%本文利用神经网络处理非线性、复杂性等优势,基于改进的递归神经网络预测网络安全态势,实验结果证明该方法运行效率较高,运行结果与实际值相比,误差较低,精确性较高。

  7. Improved network security situation prediction based on recursive neural networks%基于改进的递归神经网络的网络安全态势预测

    Institute of Scientific and Technical Information of China (English)

    蔡均平; 屈雷

    2014-01-01

    Neural network to deal with nonlinear,complexity advantage of this paper,network security situation prediction based on improved recursive neural networks,experimental results show that the high efficiency of the method,results are compared with the actual values,low error,high accuracy.%本文利用神经网络处理非线性、复杂性等优势,基于改进的递归神经网络预测网络安全态势,实验结果证明该方法运行效率较高,运行结果与实际值相比,误差较低,精确性较高。

  8. Information fusion for cyber-security analytics

    CERN Document Server

    Karabatis, George; Aleroud, Ahmed

    2017-01-01

    This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. .

  9. A method of improving the security of QR code%一种提高QR码安全性的方法

    Institute of Scientific and Technical Information of China (English)

    张雅奇; 张定会; 江平

    2012-01-01

    The QR code has many advantages. With the widely application of the QR code, the decoding tools were developed rapidly. The security has been concerned. In this paper, a method that the sensitive information of QR code is encrypted with SHA-1 is put forward. Then, the sensitive information is replaced widi its message digest. The new QR code is consisted of the message digest of the sensitive information and the remained non-sensitive message in the original QR code. The attackers can hardly get the sensitive information dirough the decoding tools. Even if the encrypted information of the sensitive information is intercepted, decoding it is infeasible in the calculation for the good nature of oneway of SHA-1.%QR码凭借诸多优势得以广泛应用的同时,QR码解码工具也迅速发展,随之而来的QR码的信息安全问题也备受关注.文中提出了一种用哈希函数SHA-1对QR码的部分敏感信息进行加密,用加密生成的摘要信息替换原始QR码中的敏感信息,用敏感信息的摘要信息和原始QR码中的非敏感信息重新生成新的QR码.用新的QR码替换原始QR码,这样攻击者就无法通过解码工具来直接获取原始QR码中的敏感信息.攻击者即使获得了原QR码中敏感信息的摘要信息,由于SHA-1良好的单向性等性质,要求出其对应的原始敏感信息至少在计算上也是不可行的.

  10. Security of the Internet Transactions

    Institute of Scientific and Technical Information of China (English)

    Felix Musau; Shengbing Ren; Shouyi Yu

    2002-01-01

    The new generation of networked business solutions brings legacy data and applications to the world wide Web, and lets companies redefine internal and external business processes. The present need for internet transaction has forced many business to adopt the internet forms of distribution of its business items. This has threatened security, hence needs to be given a key priority. This paper alights the key areas on how to protect the information we transact on the internet. It also aims at improving the security of our data and the computers we use to access this data.

  11. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    as a particular approach that seeks to limit the scope of security to one’s community – be it the ‘nation-state’ or ‘civilization’. I will suggest that arguing against ‘security communitarianism’ requires paying further attention to the postcolonial critique of cosmopolitanism.......Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  12. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  13. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  14. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  15. Do you write secure code?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    At CERN, we are excellent at producing software, such as complex analysis jobs, sophisticated control programs, extensive monitoring tools, interactive web applications, etc. This software is usually highly functional, and fulfils the needs and requirements as defined by its author. However, due to time constraints or unintentional ignorance, security aspects are often neglected. Subsequently, it was even more embarrassing for the author to find out that his code flawed and was used to break into CERN computers, web pages or to steal data…   Thus, if you have the pleasure or task of producing software applications, take some time before and familiarize yourself with good programming practices. They should not only prevent basic security flaws in your code, but also improve its readability, maintainability and efficiency. Basic rules for good programming, as well as essential books on proper software development, can be found in the section for software developers on our security we...

  16. INNOVATIVE SECURITY: THE BASIC CONCEPTS, ESSENCE

    Directory of Open Access Journals (Sweden)

    V. A. Sakovich

    2016-01-01

    Full Text Available Some theoretical and methodological aspects of a role and value of innovative security in system of national security of the state are considered. The basic concepts of innovative security, essence of innovative security in formation of innovative economy, economy of knowledge are analyzed. Questions of innovative security get the special importance because now innovative technologies and processes of their introduction have crucial value for improvement of quality of life, expansion of possibilities of development and maintenance of national security of all without an exception of the states. In the majority of economically developed states already long time researches devoted to problems of national and economic security are conducted. And, the innovative component in these researches is considered as a component economic or scientific and technical (technological security. The methodology of studying national and economic is in this time developed, security, there was a conceptual device and structure of categories «national security». Recognising importance of the spent workings out on a security problematics, it is necessary to notice that the system research devoted to studying of problems of maintenance of national security in the conditions of innovative development till now it was not spent. Especially it concerns processes of maintenance of interrelation of national security and innovative activity, formation of the concept of innovative security, its realisation in practice. Till now there is no unequivocal interpretation of essence of innovations, their influences on national and economic security. The analysis shows that at transition to an innovative way of development there are changes not only in economy and its making parts, but, and in world outlook, psychological, political, social and economic, scientifically-technological, educational and cultural spheres, institutional structures of the state and a society, in development

  17. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  18. New computer security measures

    CERN Multimedia

    IT Department

    2008-01-01

    As a part of the long-term strategy to improve computer security at CERN, and especially given the attention focused to CERN by the start-up of the LHC, two additional security measures concerning DNS and Tor will shortly be introduced. These are described in the following texts and will affect only a small number of users. "PHISHING" ATTACKS CONTINUE CERN computer users continue to be subjected to attacks by people trying to infect our machines and obtain passwords and other confidential information by social engineering trickery. Recent examples include an e-mail message sent from "La Poste" entitled "Colis Postal" on 21 August, a fake mail sent from web and mail services on 8 September, and an e-mail purporting to come from Hallmark Cards announcing the arrival of an electronic postcard. However, there are many other examples and there are reports of compromised mail accounts being used for more realistic site-specific phishing attempts. Given the increased publicity rela...

  19. Enabling food security by verifying agricultural carbon

    DEFF Research Database (Denmark)

    Kahiluoto, H; Smith, P; Moran, D;

    2014-01-01

    Rewarding smallholders for sequestering carbon in agricultural land can improve food security while mitigating climate change. Verification of carbon offsets in food-insecure regions is possible and achievable through rigorously controlled monitoring......Rewarding smallholders for sequestering carbon in agricultural land can improve food security while mitigating climate change. Verification of carbon offsets in food-insecure regions is possible and achievable through rigorously controlled monitoring...

  20. Strengthening E - Banking security using Keystroke Dynamics

    OpenAIRE

    AHMAD KABIR USMAN; MAHMOOD HUSSA IN SHAH

    2013-01-01

    This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literat...

  1. Health Information Security in Hospitals: the Application of Security Safeguards.

    Science.gov (United States)

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  2. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  3. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  4. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  5. Department of Homeland Security

    Science.gov (United States)

    ... Content Official website of the Department of Homeland Security Contact Us Quick Links Site Map A-Z ... HP - 2016 CISRM HP - 2016 CISRM Critical Infrastructure Security HP - Surge Capacity Force HP - Surge Capacity Force ...

  6. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  7. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  8. Importance of Cyber Security

    National Research Council Canada - National Science Library

    Rajesh Kumar Goutam

    2015-01-01

    ... to secure sensitive business and personal information, as well as to protect national security. The paper details about the nature of cyberspace and shows how the internet is unsecure to transmit the confidential and financial information...

  9. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  10. Privatising security and war

    Directory of Open Access Journals (Sweden)

    José L Gómez del Prado

    2011-03-01

    Full Text Available State security functions normally carried out by national armies or police forces are being outsourced to private military and security companies in countries where conflict is displacing many people....

  11. Understanding global security

    OpenAIRE

    Hough, Peter

    2013-01-01

    Fully revised to incorporate recent developments, this third edition of Understanding Global Security analyzes the variety of ways in which peoples lives are threatened and / or secured in contemporary global politics. The traditional focus of Security Studies texts: war, deterrence and terrorism are analyzed alongside non-military security issues such as famine, crime, disease, disasters, environmental degradation and human rights abuses to provide a comprehensive survey of how and why peopl...

  12. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  13. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  14. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  17. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables, ... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  18. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  19. Windows Security patch required

    CERN Multimedia

    2003-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  20. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.