29 resultados para Security-critical software

em Universidade do Minho


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dissertação de mestrado integrado em Engenharia Biomédica (área de especialização em Informática Médica)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work was supported by FCT (Fundação para a Ciência e Tecnologia) within Project Scope (UID/CEC/00319/2013), by LIP (Laboratório de Instrumentação e Física Experimental de Partículas) and by Project Search-ON2 (NORTE-07-0162- FEDER-000086), co-funded by the North Portugal Regional Operational Programme (ON.2 - O Novo Norte), under the National Strategic Reference Framework, through the European Regional Development Fund.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dissertação de Mestrado em Engenharia Informática

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An increasing number of m-Health applications are being developed benefiting health service delivery. In this paper, a new methodology based on the principle of calm computing applied to diagnostic and therapeutic procedure reporting is proposed. A mobile application was designed for the physicians of one of the Portuguese major hospitals, which takes advantage of a multi-agent interoperability platform, the Agency for the Integration, Diffusion and Archive (AIDA). This application allows the visualization of inpatients and outpatients medical reports in a quicker and safer manner, in addition to offer a remote access to information. This project shows the advantages in the use of mobile software in a medical environment but the first step is always to build or use an interoperability platform, flexible, adaptable and pervasive. The platform offers a comprehensive set of services that restricts the development of mobile software almost exclusively to the mobile user interface design. The technology was tested and assessed in a real context by intensivists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PhD thesis in Bioengineering

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Tecnologias e Sistemas de Informação

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Ciências da Educação - Especialidade de Desenvolvimento Curricular

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Ciências da Educação - Especialidade em Política Educativa

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Ciências da Educação (Área de Conhecimento: Educação ambiental e para a Sustentabilidade)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tese de Doutoramento em Engenharia Têxtil

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the past four decades the EU cohesion policy’s focus, objectives and content have experienced significant changes as a result of successive reforms aiming at adapting it to a Union in constant evolution. In the early stages, cohesion policy had eminently redistributive goals and it assumed an explicit spatial dimension. In the late nineties, the possibility of an extension towards Eastern European countries and the limited willingness of net contributors to increase funding led to a turning point in cohesion policy. The increased importance of economic growth and job creation in the 2000’s, within the cohesion policy’s context, has led to a misrepresentation of its essence and motivations. Cohesion was losing importance towards competitiveness and regional equity towards national efficiency. Today, cohesion policy is for many EU countries the main mean for mobilising investment in a context of budgetary constraints and credit rationing. In light of the available evidence, it is likely that the overall design and priorities of the current cohesion policy have a limited impact in terms of convergence in many EU regions, especially in the less developed regions. This paper’s main objectives are to analyse the evolution of European cohesion policy throughout its history, to present a picture of cohesion policy in the 2014-2020 programming period and to discuss the main problems associated with its design, priorities and programming model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ICEIM – International Conference in Entrepreneurship and Innovation Management, Roma, 17-18 de setembro de 2015.