87 resultados para Site security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Energy security is an important topic on the world agenda and has augmented its importance since the term “peak oil” was coined. Energy security is a crucial issue for most countries but some are more dependent on foreign supply than others. Traditionally, the Baltic States have been dependent on Russia for much of their oil and gas supplies, which makes them vulnerable to political pressure. Therefore, energy security, that is ensuring sufficient supply and safe delivery and in this case reduce dependency on a single provider – Russia, entails a conspicuous foreign policy dimension. Estonia, Latvia and Lithuania have been described as energy islands within the EU. This paper tries to answer the question if energy security of the Baltic States has improved since their accession to the EU in 2004. Additionally, it will analyse the prospects of energy security, noting that one of the Lithuanian aims during its European presidency in 2013 is to improve energy security of the Baltic States by fostering cooperation with EU member states.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Institute has professionals with extensive experience in training, specifically with experience in the field of police and emergencies training. Moreover, it also has very talented people. But above all, our institution has public professionals with a desire to serve, who love security and emergency responders and want to provide them with the best knowledge to make them every day better professionals. In the quest for continuous training improvement, its during 2009 when e-learning begins to have a presence at the Institute. Virtual training methodology becomes a facilitator for the training of various professionals, avoiding geographical displacement and easing the class schedule.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A very accurate archaeological dating of a Roman site in NE Spain (El Vila-sec) was made based on the typology of pottery artifacts. Three different phases were identifi ed with activity ranging from the mid- 1st century BC to the early-3rd century AD. Analyses of bricks from kilns at El Vila-sec produced data on their stored archaeomagnetic vector. These data were compared with the secular variation curve for the Iberian Peninsula and the SCHA.DIF.3K regional archaeomagnetic model. Both, the reference curve and the model, produced probability distributions for the final period of use for two kilns from the second archaeological phase that were not used during the third phase. At a 95% con fidence level, both time distributions cover a wide chronological range including the presumed archaeological age. Both the Iberian secular variation curve and the SCHA.DIF.3K regional model proved to be suitable models for dating the site, although on their own they do not produce a single unambiguous solution. This archaeomagnetic approach could also be applied to neighbouring archaeological sites that have an imprecise archaeological age.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines the correlation between buccal dental microwear and stable isotopes. The buccal surface of post-canine teeth casts from El Collado, the largest Mesolithic site in Spain, were examined under Scanning Electron Microscope; photomicrographs were taken from the middle third of the buccal surface with magnification 100X. Only six individuals passed the criteria for buccal dental microwear analysis. The photomicrographs were treated by adobe Photoshop 8.01 to cover an area 0.56 mm² of middle third of buccal surface, the output photomicrographs were digitized using Sigmascan Pro 5 by SPSS. Then the correlation between buccal microwear pattern and stable isotopes of the same individuals, of the previous study of Guixe et al., 2006, was examined using a Pearson test. Statistical analysis revealed that there is no significant correlation between stable isotopes and buccal dental microwear of the people of the Mesolithic site of El Collado. The historical and archaeological documentation suggest that the Mesolithic people tended to consume marine food. Fish-drying techniques were used during the Mesolithic period which allowed the introduction of dust and sand to the fish. These abrasive particles affected the buccal dental microwear pattern, so that no correlation between the isotopes and microwear may be expected. This also suggests that the buccal dental microwear pattern exceeds dietary reconstruction to reconstruct food processing techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

H3K4me3 is a histone modification that accumulates at the transcription-start site (TSS) of active genes and is known to be important for transcription activation. The way in which H3K4me3 is regulated at TSS and the actual molecular basis of its contribution to transcription remain largely unanswered. To address these questions, we have analyzed the contribution of dKDM5/LID, the main H3K4me3 demethylase in Drosophila, to the regulation of the pattern of H3K4me3. ChIP-seq results show that, at developmental genes, dKDM5/LID localizes at TSS and regulates H3K4me3. dKDM5/LID target genes are highly transcribed and enriched in active RNApol II and H3K36me3, suggesting a positive contribution to transcription. Expression-profiling show that, though weakly, dKDM5/LID target genes are significantly downregulated upon dKDM5/LID depletion. Furthermore, dKDM5/LID depletion results in decreased RNApol II occupancy, particularly by the promoter-proximal Pol lloser5 form. Our results also show that ASH2, an evolutionarily conserved factor that locates at TSS and is required for H3K4me3, binds and positively regulates dKDM5/LID target genes. However, dKDM5/LID and ASH2 do not bind simultaneously and recognize different chromatin states, enriched in H3K4me3 and not, respectively. These results indicate that, at developmental genes, dKDM5/LID and ASH2 coordinately regulate H3K4me3 at TSS and that this dynamic regulation contributes to transcription.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades. El principal valor de JXME es su simplicidad para crear peer-to-peer (P2P) en dispositivos limitados. Además de evaluar las funciones JXME, también es importante tener en cuenta el nivel de seguridad por defecto que se proporciona. Este artículo presenta un breve análisis de la situación actual de la seguridad en JXME, centrándose en la versión JXME-Proxyless, identifica las vulnerabilidades existentes y propone mejoras en este campo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

JXTA define un conjunto de seis protocolos básicos especialmente adecuados para una computación ad hoc, permanente, multi-hop, peer-to-peer (P2P). Estos protocolos permiten que los iguales cooperen y formen grupos autónomos de pares. Este artículo presenta un método que proporciona servicios de seguridad en los protocolos básicos: protección de datos, autenticidad, integridad y no repudio. Los mecanismos que se presentan son totalmente distribuidos y basados ¿¿en un modelo puro peer-to-peer, que no requieren el arbitraje de un tercero de confianza o una relación de confianza establecida previamente entre pares, que es uno de los principales retos en este tipo de entornos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The JXTA-Overlay project is an effort to use JXTA technologyto provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability or overall performance, it does not take security into account. However, as P2P applications have evolved to fulfill more complex scenarios, security has become a very important aspect to take into account when evaluating a P2P framework. This work proposes a security extension specifically suited to JXTA-Overlay¿s idiosyncrasies, providing an acceptable solution to some of its current shortcomings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.