125 resultados para secure interoperation
Resumo:
In this article we review recent work on the history of French negation in relation to three key issues in socio-historical linguistics: identifying appropriate sources, interpreting scant or anomalous data, and interpreting generational differences in historical data. We then turn to a new case study, that of verbal agreement with la plupart, to see whether this can shed fresh light on these issues. We argue that organising data according to the author’s date of birth is methodologically sounder than according to date of publication. We explore the extent to which different genres and text types reflect changing patterns of usage and suggest that additional, different case-studies are required in order to make more secure generalisations about the reliability of different sources.
Resumo:
This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).
Resumo:
Free space transmission of an on-off modulated sinusoidal signal through a phase conjugating lens (PCL) is theoretically examined using a combined time/frequency domain approach. The on-off keyed (OOK) signal is generated by a dipole antenna located in the far-field zone of the lens. The PCL consists of a dual layer of antenna elements interconnected via phase conjugating circuitry. We demonstrate that electromagnetic interference between antenna elements creates spatially localised areas of good-quality reception and zones where the signal is significantly denigrated by interference. Next, it is shown that destructive interference and packet desynchronisation effects critically depend on bit rate. It is also shown that a circular concave lens can be used to produce high-quality signal reception in a given direction while suppressing signal reception in all other directions. The effect that the bandwidth of the phase conjugating unit has on the transmitted signal properties for the cases of high and low bit rate OOK modulation are studied and a signal quality characterisation scheme is proposed which uses cross-correlation. The results of the study yields understanding of the performance of phase conjugating arrays under OOK modulation. The work suggests a novel approach for realising a secure communication wireless system.
Resumo:
Phased DM transmitter array synthesis using particle swarm optimization (PSO) is presented in this paper. The PSO algorithm is described in details with key parameters provided for 1-D four-element half-wavelength spaced QPSK DM array synthesis. A DM transmitter array for boresight and 30º direction secure communications are taken as examples to validate the proposed synthesis approach. The optimization process exhibits good convergence performance and solution quality.
Resumo:
Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.
Resumo:
Knowledge-intensive firms (KIFs) have been the subject of growing interest from researchers. However, investigations into the comparative experiences of men and women in KIFs remain sparse, and little is known about women's participation in the processes of innovation and knowledge exchange and combination that are core features of KIFs. The article reports on the findings of a study in the UK and Ireland involving 498 male and female knowledge workers in KIFs. Despite equal levels of qualification and experience, women are more likely to be in lower status and less secure jobs. They also predominantly occupy roles featuring less variety and autonomy than men and, despite comparable levels of knowledge exchange and combination, are less likely to be in a position to translate this into the innovative work behaviours necessary for career advancement. The findings suggest that women's experiences of and participation in knowledge processes within KIFs differ fundamentally from men's. © The Author(s) 2012.
Resumo:
Frequency stability has not necessarily been a major problem for the majority of power systems in the past. However, for economic and environmental reasons, power systems are now operated closer to stability limits to maximise the use of the existing networks. Therefore, introduction of new, more efficient and renewable generation technologies, and their effect on the power system must be fully understood if a reliable and secure electricity supply is to be maintained. Using the Northern Ireland, and interconnected Republic of Ireland electricity networks as a case study, this paper addresses some of the issues regarding integration and modelling of combined cycle gas turbines (CCGT), and wind turbine generator (WTG) technology on a small islanded power system.
Resumo:
The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.
Resumo:
Physical Access Control Systems are commonly used to secure doors in buildings such as airports, hospitals, government buildings and offices. These systems are designed primarily to provide an authentication mechanism, but they also log each door access as a transaction in a database. Unsupervised learning techniques can be used to detect inconsistencies or anomalies in the mobility data, such as a cloned or forged Access Badge, or unusual behaviour by staff members. In this paper, we present an overview of our method of inferring directed graphs to represent a physical building network and the flows of mobility within it. We demonstrate how the graphs can be used for Visual Data Exploration, and outline how to apply algorithms based on Information Theory to the graph data in order to detect inconsistent or abnormal behaviour.
Resumo:
Directional modulation (DM) is a recently introduced technique for secure wireless transmission using direct physical layer wave-front manipulation. This paper provides a bit error rate (BER)-based DM array synthesis method. It is shown for the first time that the standard constellation mappings in In-phase and Quadrature (IQ) space to a pre-specified BER can be exactly achieved along a given specified spatial direction. Different receiver capabilities are investigated and different assessment metrics for each case are discussed. The approach is validated for a 1 × 4 element dipole array operating at 1 GHz.
Resumo:
In this paper metrics for assessing the performance of directional modulation (DM) physical-layer secure wireless systems are discussed. In the paper DM systems are shown to be categorized as static or dynamic. The behavior of each type of system is discussed for QPSK modulation. Besides EVM-like and BER metrics, secrecy rate as used in information theory community is also derived for the purpose of this QPSK DM system evaluation.
Resumo:
Financial and cultural aspects of corporate giving by UK and non-UK companies in response to the December 2004 South Asia Tsunami disaster are explored in this article. Literatures on corporate giving rationales, concepts of disaster and donor activity in disasters provide an underpinning. The article seeks to make connections between this high profile if short-lived business giving and the funding of the arts that is sought from business; and to draw tentative lessons for arts funding when seeking business support. The giving accounts in the wake of the Tsunami from a non-probability sample of 56 UK companies and 16 non-UK companies were examined. Reported online to the UK charity Business in the Community, these accounts were accessed in February 2005 and scrutinized thematically. Concurrently, company financial profiles to accompany giving figures were constructed. Although linkages between donation levels and financial performance were lacking, emerging themes included the role of employees, influencing company giving and creating a climate of expectation of firms' contributions. These developments may have important implications for business funding for the arts, where leading philanthropists are prominent as individuals in the giving landscapes; but employees' collective involvement is not marked. Alternatively, cultivation of employees as would-be donors, indirectly via their firms, may be a more secure, if lower level route to funding for some arts organizations than dependence on high profile business leaders. The article considers alternative scenarios for company giving in disaster contexts, including as a sustained and lasting giving theme or as company support as a ‘one-off’ event, rock-star style. The likely development of employee power as a key element in company giving is explored; and its wider meanings for funding in arts settings, (where the giver as rock star heroine/hero is also prominent) are considered.
Resumo:
The EU is considered to be one of the main proponents of what has been called the deep trade agenda—that is, the push for further trade liberalization with an emphasis on the removal of domestic non-tariff regulatory measures affecting trade, as opposed to the traditional focus on the removal of trade barriers at borders. As negotiations on the Doha Development Round have stalled, the EU has attempted to achieve these aims by entering into comprehensive free trade agreements (FTAs) that are not only limited exclusively to tariffs but also extend to non-tariff barriers, including services, intellectual property rights (IPRs), competition, and investment. These FTAs place great emphasis on regulatory convergence as a means to secure greater market openings. The paper examines the EU's current external trade policy in the area of IP, particularly its attempts to promote its own regulatory model for the protection of IP rights through trade agreements. By looking at the IP enforcement provisions of such agreements, the article also examines how the divisive issues that are currently hindering the progress of negotiations at WTO level, including the demands from developing countries to maintain a degree of autonomy in the area of IP regulation as well as the need to balance IP protection with human rights protection, are being dealt with in recent EU FTAs.
Resumo:
The paper examines the role of shared spaces in divided cities in promoting future sustainable communities and spaces described as inclusive to all. It addresses the current challenges that prevent such inclusiveness and suggests future trends of its development to be of benefit to the wider city community. It explains how spaces in divided cities are carved up into perceived ownerships and territorialized areas, which increases tension on the shared space between territories; the control of which can often lead to inter-community disputes. The paper reports that common shared space in-between conflicting communities takes on increased importance since the nature of the conflict places emphasis on communities’ confidence, politically and socially, while also highlighting the necessity for confidence in inclusion and feeling secure in the public domain. In order to achieve sustainable environments, strategies to promote shared spaces require further focus on the significance of everyday dynamics as essential aspects for future integration and conflict resolution.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.