124 resultados para infrastructure interdependency

em Deakin Research Online - Australia


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports on further research undertaken regarding systems modelling as applied to critical infrastructure systems and networks and builds upon the initial modelling research of Pye and Warren (2006a). We discuss system characteristics, inter-relationships, dynamics and modelling of similar systems and why modelling of a critical infrastructure is important. In overview we compare four modelling methods and techniques previously
used to model similar systems and discuss their potential transference to model critical infrastructure systems, before selecting the most promising and suitable for modelling critical infrastructure systems for further research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supply chains are complex adaptive systems for which final performance depends upon numerous interdependent decisions made by numerous firms which synthesise inputs from various resources systems.  The dynamic interdependent behaviour of social, economic, material and informational resource systems within eco-industrial settings that support the built environment life cycle supply chains can be studied at the supply chain level.  The impact of megaprojects is significant and holds promise to explore the impact of decisions on various systems as it combines project and system boundaries.  Megaoprojects considered as major events within systems can produce critical revolutionary impacts on the systems within which they are embedded.  The decisions that are made on megaprojects are central to risk management.  typically major infrastructure projects are procured through a form of public private partnership (PPP).  The core principle of PPP is value for money which refers to the best available outcome attempting to take account of all benefits, costs and risks over the whole life of the procurement.  In this paper the focus is on Australia where there has been considerable acitivity in the use of PPPs.  With recent national infrastucture packages proposed to stimulate the economy due to the global financial crisis, decision modelling on risks is a revelant and critical matter not only in practice but also in the research community.  PPPs encourage the whole-of-lifecycle approach in the procurement and management of public sector assets by transparently recognising the costs and risks associated with the whole life of the required service or facility, thus integrated whole of life supply chains can be considered.  By creating a single point of responsibility for an entire project from inception through operation, a strong incentive is created for thinking about the effects that a design or construction decision will have on the effectiveness and efficiency of managing and maintaining a facility during its operational life.  The decision to procure holistic supply chains becomes a much more viable commercial reality in the PPP environment than previously considered in the usual commercial construction spot transactional approach.  These types of decisions tend to be imprecise, approximate and complex requireing justification and reasoning logic rather than the classical 'truth' logic.  The purpose of this paper is to develop a theoretical decision framework which combines interdependency and multi-values logic for supply chain procurement modelling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent trends in grid computing development is moving towards a service-oriented architecture. With the momentum gaining for the service-oriented grid computing systems, the issue of deploying support for integrated scheduling and fault-tolerant approaches becomes paramount importance. To this end, we propose a scalable framework that loosely couples the dynamic job scheduling approach with the hybrid replications approach to schedule jobs efficiently while at the same time providing fault-tolerance. The novelty of the proposed framework is that it uses passive replication approach under high system load and active replication approach under low system loads. The switch between these two replication methods is also done dynamically and transparently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays Distributed Denial of Service (DDoS) attacks have made one of the most serious threats to the information infrastructure. In this paper we firstly present a new filtering approach, Mark-Aided Distributed Filtering (MADF), which is to find the network anomalies by using a back-propagation neural network, deploy the defense system at distributed routers, identify and filtering the attack packets before they can reach the victim; and secondly propose an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. According to the experimental results, we find that MADF can detect and filter DDoS attack packets with high sensitivity and accuracy, thus provide high legitimate traffic throughput and low attack traffic throughput. Through the comparison between experiments and numerical results, we also demonstrate the validity of the analytical model that can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose an architecture of accounting and payment services for service-oriented grid computing systems. The proposed accounting and payment services provide the mechanisms for service providers to be paid for authorized use of their resources. It supports the recording of usage data, secure storage of that data, analysis of that data for purposes of billing and so forth. It allows a variety of payment methods, it is scalable, secure, convenient, and reduce the overall cost of payment processing while taking into account requirements of Grid computing systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to owners and the government. Currently a high-level iriformation sharing collaboration between the government and business manages complex security issues, but critical irifrastructure protection also lacks a scalable model exhibiting the overall structure of critical infrastructure at various levels, sectors and sub-sectors. This research builds on the work of Marasea and Warren (2003) to establish a representative model of Australia's critical irifrastructure; discusses the boundaries between critical infrastructures, and considers the existence andpotential irifluence ofcritical irifrastructure relationships.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security is now recognised as critical factor within the healthcare industry. With the gradual move from paper -based to electronic information there is an even greater need for protection. However, financial and operational constraints often exist which influence the practicality of developing a secure system. A new baseline security standard, the Health Information Security Management Implementation Guide, has been drafted which applies specifically to the unique information security requirements of the healthcare industry. The aim of this paper is to look at the effectiveness of the health information security standard and the development of information security within the Australian healthcare industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research takes the form of a review and looks at the current advisories offered to informationl security professionals in Ihe area of critical information infrastructure protection A critical information infrastructure protection mode! is also presented along with a critical review of some of lhe recent formal guidance that has been offered. The Critical lnformation Infrastructure Protection - Risk Analysis-Methodology (CIlP-RAM) is then offered as a solution to the lack of information and advice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wilh the protection of critical information infrastructure becoming a priority for all levels of management. there is a need for a new security methodology to deal with the new and unique attack threats and vulnerabilities associated with the new information technology security paradigm. The fourth generation security risk analysis melhod which copes wilh the shift from computer/information security to critical information iinfrastructure protectionl is lhe next step toward handling security risk at all levels. The paper will present the methodology of
fourth generation models and their application to critical information infrastructure protection and the associated advantagess of this methodology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines an approach for collecting and integrating data useful for evidence based planning and decision making in the not-for-profit sector, in particular for local government policy and planning. Given the methodological advances in multi-level analysis and the nature of rigorous policy analysis, leading academics and practitioners are advocating that policy driven research to be undertaken at a number of levels of analysis. Recent years have brought an explosion of public domain data in many aspects of social, economic and cultural aspects of society (cites and examples) and with this comes the opportunity, as outlined here, to integrate relevant public domain data in order to construct community profiles for local government areas in Victoria.