56 resultados para secure routing protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Una de les qüestions que ens preocupen com a psicòlegs i psicòlogues en l'àmbit penitenciari és saber fer front d’una manera vàlida i efectiva a les diverses situacions de crisi o emergència que es produeixen en aquest medi, encara que sigui puntualment, no per això deixen de ser significatives i a vegades traumàtiques, tant per a les persones preses com per al seu context. Tanmateix, som conscients que els professionals que assisteixen les persones o grups en crisi a la presó no són necessàriament psicòlegs, sinó que sovint són els funcionaris de vigilància o els mateixos membres de la direcció del centre els que han d’assumir aquestes funcions. És com a tècnics especialistes en el comportament i la personalitat humana i en la solució dels problemes relacionals que podem col·laborar i assessorar els responsables en la gestió d’aquests conflictes en procediments i estratègies del tractament més efectius a l’hora de negociar i assolir un equilibri adaptatiu entre les diverses parts que conformen els escenaris en crisi. Un dels objectius que ens plantejarem la comunitat de pràctiques en aquest curs 2009 és identificar les diverses situacions de crisi que es poden produir a la presó i elaborar un conjunt de protocols d’actuació psicològica que orientin el professional (el psicòleg inicialment però també d’altres agents del canvi dels comportaments antisocials) sobre quina és la millor manera d’intervenir-hi. No obstant això, es considera que més enllà de l'elaboració de guies o manuals d’intervenció (al cap i a la fi això es pot consultar en la literatura especialitzada sobre aquest tema), es tractava de ser el més pràctics possible i recollir en un tríptic aquella informació pertinent (allò imprescindible que s’ha de saber per actuar de manera efectiva i quins són els errors que cal evitar encara que només sigui per no complicar encara més les coses) que fos fàcil d’utilitzar per part del professional, és a dir, un recordatori esquematitzat però rigorós del pla d’acció que cal seguir per fer front a la crisi. També es pretén que sigui obert a les experiències i coneixements resolutius de qui intervé en aquestes situacions d’emergència i que permeti el feedback amb el grup de la comunitat de pràctiques, qui ho validaria, per tal d’anar incrementat progressivament la validesa i fiabilitat de l'instrument. Aquest curs presentem dos protocols/tríptics d’actuació: 1) notificació de males noticies/acompanyament en el dol; 2) intervenció en el risc de suïcidi o en conductes de autòlisi. La idea és elaborar-ne més en pròximes edicions. A més a més, com a protocol en format audiovisual, es presenta un curtmetratge on es desenvolupa una actuació psicològica per tal de desactivar una conducta violenta/ amenaçant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need for integration in the supply chain management leads us to considerthe coordination of two logistic planning functions: transportation andinventory. The coordination of these activities can be an extremely importantsource of competitive advantage in the supply chain management. The battle forcost reduction can pass through the equilibrium of transportation versusinventory managing costs. In this work, we study the specific case of aninventory-routing problem for a week planning period with different types ofdemand. A heuristic methodology, based on the Iterated Local Search, isproposed to solve the Multi-Period Inventory Routing Problem with stochasticand deterministic demand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract. The ability of 2 Rapid Bioassessment Protocols (RBPs) to assess stream water quality was compared in 2 Mediterranean-climate regions. The most commonly used RBPs in South Africa (SAprotocol) and the Iberian Peninsula (IB-protocol) are both multihabitat, field-based methods that use macroinvertebrates. Both methods use preassigned sensitivity weightings to calculate metrics and biotic indices. The SA- and IB-protocols differ with respect to sampling equipment (mesh size: 1000 lm vs 250 300 lm, respectively), segregation of habitats (substrate vs flow-type), and sampling and sorting procedures (variable time and intensity). Sampling was undertaken at 6 sites in South Africa and 5 sites in the Iberian Peninsula. Forty-four and 51 macroinvertebrate families were recorded in South Africa and the Iberian Peninsula, respectively; 77.3% of South African families and 74.5% of Iberian Peninsula families were found using both protocols. Estimates of community similarity compared between the 2 protocols were .60% similar among sites in South Africa and .54% similar among sites in the Iberian Peninsula (BrayCurtis similarity), and no significant differences were found between protocols (Multiresponse Permutation Procedure). Ordination based on Non-metric Multidimensional Scaling grouped macroinvertebrate samples on the basis of site rather than protocol. Biotic indices generated with the 2 protocols at each site did not differ. Thus, both RBPs produced equivalent results, and both were able to distinguish between biotic communities (mountain streams vs foothills) and detect water-quality impairment, regardless of differences in sampling equipment, segregation of habitats, and sampling and sorting procedures. Our results indicate that sampling a single habitat may be sufficient for assessing water quality, but a multihabitat approach to sampling is recommended where intrinsic variability of macroinvertebrate assemblages is high (e.g., in undisturbed sites in regions with Mediterranean climates). The RBP of choice should depend on whether the objective is routine biomonitoring of water quality or autecological or faunistic studies.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the evolution of the P2P research eld, new problems, such as those related with information security, have arisen. It is important to provide security mechanisms to P2P systems, since it has already become one of the key issues when evaluating them. However, even though many P2P systems have been adapted to provide a security baseline to their underlying applications, more advanced capabilities are becoming necessary. Speci cally, privacy preservation and anonymity are deemed essential to make the information society sustainable. Unfortunately, sometimes, it may be di cult to attain anonymity unless it is included into the system's initial design. The JXTA open protocols speci cation is a good example of this kind of scenario. This work studies how to provide anonymity to JXTA's architecture in a feasible manner and proposes an extension which allows deployed services to process two-way messaging without disclosing the endpoints'identities to third parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA define un conjunto de seis protocolos básicos especialmente adecuados para una computación ad hoc, permanente, multi-hop, peer-to-peer (P2P). Estos protocolos permiten que los iguales cooperen y formen grupos autónomos de pares. Este artículo presenta un método que proporciona servicios de seguridad en los protocolos básicos: protección de datos, autenticidad, integridad y no repudio. Los mecanismos que se presentan son totalmente distribuidos y basados ¿¿en un modelo puro peer-to-peer, que no requieren el arbitraje de un tercero de confianza o una relación de confianza establecida previamente entre pares, que es uno de los principales retos en este tipo de entornos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured in terms of lost packet ratio, latency and jitter using different encryption algorithms, no security and just the use of IP firewalls in Local and Wide Area Networks (LAN and WAN). The results of laboratory tests indicate that the impact on the overall performance of VoIP depends upon the bandwidth availability and encryption algorithm used. The implementation of any encryption algorithm in low bandwidth environments degrades the voice quality due to increased loss packets and packet latency, but as bandwidth increases encrypted VoIP calls provided better service compared to an unsecured environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Las redes móviles ad hoc son redes formadas por lainterconexión de terminales inalámbricos que de manera autónoma,sin ninguna administración central, establecen enlaces decomunicación entre ellos. La infraestructura de red la componenlos propios terminales de usuarios que actúan de gestores yencaminadores de paquetes. Así, un usuario cualquiera puedeconectarse con un terminal remoto a través de una conexiónmultisalto entre diferentes usuarios. En este tipo de redes tanabiertas, uno de los retos prioritarios es proteger el anonimatode los sujetos y sus localizaciones. En este artículo hacemos unrepaso de las técnicas existentes a través de los protocolos que sehan propuesto en la literatura, y exponemos los problemas queaun quedan abiertos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cognitive radio networks sense spectrum occupancyand manage themselves to operate in unused bands without disturbing licensed users. Spectrum sensing is more accurate if jointly performed by several reliable nodes. Even though cooperative sensing is an active area of research, the secureauthentication of local sensing reports remains unsolved, thus empowering false results. This paper presents a distributed protocol based on digital signatures and hash functions, and ananalysis of its security features. The system allows determining a final sensing decision from multiple sources in a quick and secure way.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.