36 resultados para Security and Defence

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Uusien mobiilien laitteiden ja palveluiden kehitys ovat herättäneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myötä myös mahdollisuuksien kirjo on laajentumassa, mikä johtaa erilaisten verkkojen ja laitteiden yhtenäiselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyessä soveltamaan uusia langattomia palveluita ja sovelluksia on myös huomioon otettavaa sovellusten sekä palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä sekä kyseisien teknologioiden käyttöä edistävät tekijät. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden käytölle ja siihen olennaisesti vaikuttavista tekijöistä. Viitekehystä on käytetty todelliseen esimerkkiin, liikkuva myyntihenkilö, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden näkökulmasta. Johtopäätöksinä on arvioitu mobiilien ja langattomien teknologioiden sekä palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niitä tulevaa ajatellen.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Living organisms manage their resources in well evolutionary-preserved manner to grow and reproduce. Plants are no exceptions, beginning from their seed stage they have to perceive environmental conditions to avoid germination at wrong time or rough soil. Under favourable conditions, plants invest photosynthetic end products in cell and organ growth to provide best possible conditions for generation of offspring. Under natural conditions, however, plants are exposed to a multitude of environmental stress factors, including high light and insufficient light, drought and flooding, various bacteria and viruses, herbivores, and other plants that compete for nutrients and light. To survive under environmental challenges, plants have evolved signaling mechanisms that recognise environmental changes and perform fine-tuned actions that maintain cellular homeostasis. Controlled phosphorylation and dephosphorylation of proteins plays an important role in maintaining balanced flow of information within cells. In this study, I examined the role of protein phosphatase 2A (PP2A) on plant growth and acclimation under optimal and stressful conditions. To this aim, I studied gene expression profiles, proteomes and protein interactions, and their impacts on plant health and survival, taking advantage of the model plant Arabidopsis thaliana and the mutant approach. Special emphasis was made on two highly similar PP2A-B regulatory subunits, B’γ and B’ζ. Promoters of B’γ and B’ζ were found to be similarly active in the developing tissues of the plant. In mature leaves, however, the promoter of B’γ was active in patches in leaf periphery, while the activity of B’ζ promoter was evident in leaf edges. The partially overlapping expression patterns, together with computational models of B’γ and B’ζ within trimeric PP2A holoenzymes suggested that B’γ and B’ζ may competitively bind into similar PP2A trimmers and thus influence each other’s actions. Arabidopsis thaliana pp2a-b’γ and pp2a-b’γζ double mutants showed dwarfish phenotypes, indicating that B’γ and B’ζ are needed for appropriate growth regulation under favorable conditions. However, while pp2a-b’γ displayed constitutive immune responses and appearance of premature yellowings on leaves, the pp2a-b’γζ double mutant supressed these yellowings. More detailed analysis of defense responses revealed that B’γ and B’ζ mediate counteracting effects on salicylic acid dependent defense signalling. Associated with this, B’γ and B’ζ were both found to interact in vivo with CALCIUM DEPENDENT PROTEIN KINASE 1 (CPK1), a crucial element of salicylic acid signalling pathway against pathogens in plants. In addition, B’γ was shown to modulate cellular reactive oxygen species (ROS) metabolism by controlling the abundance of ALTERNATIVE OXIDASE 1A and 1D in mitochondria. PP2A B’γ and B’ζ subunits turned out to play crucial roles in the optimization of plant choices during their development. Taken together, PP2A allows fluent responses to environmental changes, maintenance of plant homeostasis, and grant survivability with minimised cost of redirection of resources from growth to defence.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The political environment of security and defence has changed radically in the Western industrialised world since the Cold War. As a response to these changes, since the beginning of the twenty-first century, most Western countries have adopted a ‘capabilities-based approach’ to developing and operating their armed forces. More responsive and versatile military capabilities must be developed to meet the contemporary challenges. The systems approach is seen as a beneficial means of overcoming traps in resolving complex real -world issues by conventional thinking. The main objectives of this dissertation are to explore and assess the means to enhance the development of military capabilities both in concept development and experimentation (CD&E) and in national defence materiel collaboration issues. This research provides a unique perspective, a systems approach, to the development areas of concern in resolving complex real-world issues. This dissertation seeks to increase the understanding of the military capability concept both as a whole and with in its life cycle. The dissertation follows the generic functionalist systems methodology by Jackson. The methodology applies a comprehensive set of constitutive rules to examine the research objectives. This dissertation makes contribution to current studies about military capability. It presents two interdepen dent conceptual capability models: the comprehensive capability meta-model (CCMM) and the holistic capability life cycle model (HCLCM). These models holistically and systematically complement the existing, but still evolving, understanding of military capability and its life cycle. In addition, this dissertation contributes to the scientific discussion of defence procurement in its broad meaning by introducing the holistic model about the national defence materiel collaboration between the defence forces, defence industry and academia. The model connects the key collaborative mechanisms, which currently work in isolation from each other, and take into consideration the unique needs of each partner. This dissertation contributes empirical evidence regarding the benefits of enterprise architectures (EA) to CD&E. The EA approach may add value to traditional concept development by increasing the clarity, consistency and completeness of the concept. The most important use considered for EA in CD&E is that it enables further utilisation of the concept created in the case project.