128 resultados para computer security
Resumo:
Aquest TFC-J2EE, està basat en l'anàlisi, disseny i implementació d'un proveïdor de seguretat en un entorn distribuït. Ha consistit en dues aplicacions independents, una consumidora i l'altre servidora que es comunicaven usant el patró Façana (una façana amigable amaga el negoci i la complexitat de l'aplicació a la que es vol accedir).
Resumo:
Aquest projecte és una mostra de les possibilitats de dotar de seguretat a les aplicacions web i d¿arquitectura Client/Servidor basades en Java
Resumo:
L'objectiu és implementar un esquema criptogràfic que garanteixi les necessitats de seguretat d'un historial mèdic que pot ser gestionat a través d'una xarxa de comunicacions (per exemple tota una intranet d'un centre mèdic).
Resumo:
Al llarg del present treball es construeix una aplicació de gestió d'historials metges per la qual cosa prèviament s'han estudiat els requisits de seguretat exigibles a la mateixa, com condicionants fonamentals per a la seva posada en funcionament.
Resumo:
El projecte ha de generar un seguit d'aplicacions per a que els usuaris i elsmetges puguin accedir a través d'una xarxa de comunicacions als historials clínicsmantenint sempre els requisits de seguretat.
Resumo:
Trabajo Final de Carrera en desarrollo .NET: Aplicación web ASP.NET MVC cliente de correo electrónico con cifrado PGP y servicio web WCF que brinda funcionalidades de cifrado PGP.
Resumo:
Dokuwiki es un wiki de uso sencillo y compatible con los estándares, orientado a crear documentación de cualquier tipo dentro de grupos de desarrolladores, grupos de trabajo y pequeñas empresas. Su sintaxis simple y potente facilita la creación de textos estructurados, permitiendo que los archivos generados sean legibles incluso fuera del wiki. Todos los datos se almacenan en archivos de texto plano, y no necesita de ninguna base de datos para su funcionamiento. La autenticación de usuarios es sencilla. El módulo desarrollado permite integrar DokuWiki con una infraestructura de autenticación y autorización basada en PAPI.
Resumo:
In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup computation and shared risk link group identification. A complete set of experiments proves the efficiency of the proposed methods in relation with previous ones, in terms of resources used to protect the network, the failure recovery time and the request rejection ratio
Resumo:
The EVS4CSCL project starts in the context of a Computer Supported Collaborative Learning environment (CSCL). Previous UOC projects created a CSCL generic platform (CLPL) to facilitate the development of CSCL applications. A discussion forum (DF) was the first application developed over the framework. This discussion forum was different from other products on the marketplace because of its focus on the learning process. The DF carried out the specification and elaboration phases from the discussion learning process but there was a lack in the consensus phase. The consensus phase in a learning environment is not something to be achieved but tested. Common tests are done by Electronic Voting System (EVS) tools, but consensus test is not an assessment test. We are not evaluating our students by their answers but by their discussion activity. Our educational EVS would be used as a discussion catalyst proposing a discussion about the results after an initial query or it would be used after a discussion period in order to manifest how the discussion changed the students mind (consensus). It should be also used by the teacher as a quick way to know where the student needs some reinforcement. That is important in a distance-learning environment where there is no direct contact between the teacher and the student and it is difficult to detect the learning lacks. In an educational environment, assessment it is a must and the EVS will provide direct assessment by peer usefulness evaluation, teacher marks on every query created and indirect assessment from statistics regarding the user activity.
Resumo:
The primary goal of this paper is to discuss how the leading position of Brazil in South America could contribute to boost security cooperation between the European Union and Mercosur. Both parties share common foreign and security policy concerns, including immigration, terrorism and drug trafficking. Through its great influence on the regional security agenda, Brazil could seek closer bilateral cooperation with Europe in tackling these global challenges, acting at the same time as a representative of regional interests.
Resumo:
This paper presents a pattern recognition method focused on paintings images. The purpose is construct a system able to recognize authors or art styles based on common elements of his work (here called patterns). The method is based on comparing images that contain the same or similar patterns. It uses different computer vision techniques, like SIFT and SURF, to describe the patterns in descriptors, K-Means to classify and simplify these descriptors, and RANSAC to determine and detect good results. The method are good to find patterns of known images but not so good if they are not.
Resumo:
We study the social, demographic and economic origins of social security. The data for the U.S. and for a cross section of countries suggest that urbanization and industrialization are associated with the rise of social insurance. We describe an OLG model in which demographics, technology, and social security are linked together in a political economy equilibrium. In the model economy, there are two locations (sectors), the farm (agricultural) and the city (industrial) and the decision to migrate from rural to urban locations is endogenous and linked to productivity differences between the two locations and survival probabilities. Farmers rely on land inheritance for their old age and do not support a pay-as-you-go social security system. With structural change, people migrate to the city, the land loses its importance and support for social security arises. We show that a calibrated version of this economy, where social security taxes are determined by majority voting, is consistent with the historical transformation in the United States.
Resumo:
Some of the elements that characterize the globalization of food and agriculture are industrialization and intensification of agriculture and liberalization of agricultural markets, that favours elongation of the food chain and homogenization of food habits (nutrition transition), among other impacts. As a result, the probability of food contamination has increased with the distance and the number of “hands" that may contact the food (critical points); the nutritional quality of food has been reduced because of increased transport and longer periods of time from collection to consumption; and the number of food-related diseases due to changes in eating patterns has increased. In this context, there exist different agencies and regulations intended to ensure food safety at different levels, e.g. at the international level, Codex Alimentarius develops standards and regulations for the marketing of food in a global market. Although governments determine the legal framework, the food industry manages the safety of their products, and thus, develops its own standards for their marketing, such as the Good Agricultural Practices (GAP) programs. The participation of the private sector in the creation of regulatory standards strengthens the free trade of food products, favouring mostly large agribusiness companies. These standards are in most cases unattainable for small producers and food safety regulations are favouring removal of the peasantry and increase concentration and control in the food system by industrial actors. Particularly women, who traditionally have been in charge of the artisanal transformation process, can be more affected by these norms than men. In this project I am analysing the impcact of food safety norms over small farms, based on the case of artisanal production made by women in Spain.