4 resultados para Political of security

em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cloud remains a tempting trend from a financial perspective, there are several other aspects that must be taken into account by companies before they decide to do so. One of the most important aspect refers to security: while some cloud computing security issues are inherited from the solutions adopted to create such services, many new security questions that are particular to these solutions also arise, including those related to how the services are organized and which kind of service/data can be placed in the cloud. Aiming to give a better understanding of this complex scenario, in this article we identify and classify the main security concerns and solutions in cloud computing, and propose a taxonomy of security in cloud computing, giving an overview of the current status of security in this emerging technology.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, we perform a thorough analysis of a spectral phase-encoded time spreading optical code division multiple access (SPECTS-OCDMA) system based on Walsh-Hadamard (W-H) codes aiming not only at finding optimal code-set selections but also at assessing its loss of security due to crosstalk. We prove that an inadequate choice of codes can make the crosstalk between active users to become large enough so as to cause the data from the user of interest to be detected by other user. The proposed algorithm for code optimization targets code sets that produce minimum bit error rate (BER) among all codes for a specific number of simultaneous users. This methodology allows us to find optimal code sets for any OCDMA system, regardless the code family used and the number of active users. This procedure is crucial for circumventing the unexpected lack of security due to crosstalk. We also show that a SPECTS-OCDMA system based on W-H 32(64) fundamentally limits the number of simultaneous users to 4(8) with no security violation due to crosstalk. More importantly, we prove that only a small fraction of the available code sets is actually immune to crosstalk with acceptable BER (<10(-9)) i.e., approximately 0.5% for W-H 32 with four simultaneous users, and about 1 x 10(-4)% for W-H 64 with eight simultaneous users.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Access control is a key component of security in any computer system. In the last two decades, the research on Role Basead Access Control Models was intense. One of the most important components of a Role Based Model is the Role-Permission Relationship. In this paper, the technique of systematic mapping is used to identify, extract and analyze many approaches applied to establish the Role-Permission Relationship. The main goal of this mapping is pointing directions of significant research in the area of Role Based Access Control Models.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Objective This study analyzed the internal functioning, organization and political participation of the local food and nutrition security council and possible implications of their participation on the creation of a municipal food and nutrition security policy in the city of Sao Paulo. Methods This qualitative study was done in three stages: document analysis; observation of meetings and semi-structured interviews with board members considered key informants. The axis of analysis was the political participation of the council, considering its internal aspects, like board members, operating dynamics of political participation of its members and the relationship between these topics and the council's actions for the definition and creation of a food and nutrition security policy. Results The intellectual profile of the board members does not represent the majority of the population, thereby facilitating the omission of actual issues in council discussions. Its strict internal dynamics and the asymmetry of its members generally prevent the active participation of board members and, specifically, discussions about a food and nutrition security policy. The so-called "militant members" have a differentiated, more aggressive participation, with greater mastery of the subject and its topics. Conclusion The board member profiles, internal organization of the council, complexity of the subject and its low insertion in the society distance the council from social needs and lead them to act incipiently with regard to the municipal policies of food and nutrition security.