925 resultados para Physical layer security
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
The emergence of mobile and ubiquitous computing has created what is referred to as a hybrid space – a virtual layer of digital information and interaction opportunities that sits on top and augments the physical environment. The increasing connectedness through such media, from anywhere to anybody at anytime, makes us less dependent on being physically present somewhere in particular. But, what is the role of ubiquitous computing in making physical presence at a particular place more attractive? Acknowledging historic context and identity as important attributes of place, this work embarks on a ‘global sense of place’ in which the cultural diversity, multiple identities, backgrounds, skills and experiences of people traversing a place are regarded as social assets of that place. The aim is to explore ways how physical architecture and infrastructure of a place can be mediated towards making invisible social assets visible, thus augmenting people’s situated social experience. Thereby, the focus is on embodied media, i.e. media that materialise digital information as observable and sometimes interactive parts of the physical environment hence amplify people’s real world experience, rather than substituting or moving it to virtual spaces.
Resumo:
Physical access control systems play a central role in the protection of critical infrastructures, where both the provision of timely access and preserving the security of sensitive areas are paramount. In this paper we discuss the shortcomings of existing approaches to the administration of physical access control in complex environments. At the heart of the problem is the current dependency on human administrators to reason about the implications of the provision or the revocation of staff access to an area within these facilities. We demonstrate how utilising Building Information Models (BIMs) and the capabilities they provide, including 3D representation of a facility and path-finding can reduce possible intentional or accidental errors made by security administrators.
Resumo:
Vertically-aligned carbon nanotube (VACNT) membranes show very high permeation fluxes due to the inherent smooth and frictionless nature of the interior of the nanotubes. However, the hydrogen selectivities are all in the Knudsen range and are quite low. In this study we grew molecular sieve zeolite imidazolate frameworks (ZIFs) via secondary seeded growth on the VACNT membranes as a gas selective layer. The ZIF layer has a thickness of 5–6 μm and shows good contact with the VACNT membrane surface. The VACNT supported ZIF membrane shows much higher H2 selectivity than Ar (7.0); O2 (13.6); N2 (15.1) and CH4 (9.8). We conclude that tailoring metal–organic frameworks on the membrane surface can be an effective route to improve the gas separation performance of the VACNT membrane.
Resumo:
Considerate amount of research has proposed optimization-based approaches employing various vibration parameters for structural damage diagnosis. The damage detection by these methods is in fact a result of updating the analytical structural model in line with the current physical model. The feasibility of these approaches has been proven. But most of the verification has been done on simple structures, such as beams or plates. In the application on a complex structure, like steel truss bridges, a traditional optimization process will cost massive computational resources and lengthy convergence. This study presents a multi-layer genetic algorithm (ML-GA) to overcome the problem. Unlike the tedious convergence process in a conventional damage optimization process, in each layer, the proposed algorithm divides the GA’s population into groups with a less number of damage candidates; then, the converged population in each group evolves as an initial population of the next layer, where the groups merge to larger groups. In a damage detection process featuring ML-GA, as parallel computation can be implemented, the optimization performance and computational efficiency can be enhanced. In order to assess the proposed algorithm, the modal strain energy correlation (MSEC) has been considered as the objective function. Several damage scenarios of a complex steel truss bridge’s finite element model have been employed to evaluate the effectiveness and performance of ML-GA, against a conventional GA. In both single- and multiple damage scenarios, the analytical and experimental study shows that the MSEC index has achieved excellent damage indication and efficiency using the proposed ML-GA, whereas the conventional GA only converges at a local solution.
Resumo:
The adsorption of carbon dioxide and nitrogen molecules on aluminum nitride (AlN) nanostructures has been explored using first-principle computational methods. Optimized configurations corresponding to physisorption and, subsequentially, chemisorption of CO2 are identified, in contrast to N2, for which only a physisorption structure is found. Transition-state searches imply a low energy barrier between the physisorption and chemisorption states for CO2 such that the latter is accessible and thermodynamically favored at room temperature. The effective binding energy of the optimized chemisorption structure is apparently larger than those for other CO2 adsorptive materials, suggesting the potential for application of aluminum nitride nanostructures for carbon dioxide capture and storage.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.
Resumo:
The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
The transfer of chemical vapor deposited graphene is a crucial process, which can affect the quality of the transferred films and compromise their application in devices. Finding a robust and intrinsically clean material capable of easing the transfer of graphene without interfering with its properties remains a challenge. We here propose the use of an organic compound, cyclododecane, as a transfer material. This material can be easily spin coated on graphene and assist the transfer, leaving no residues and requiring no further removal processes. The effectiveness of this transfer method for few-layer graphene on a large area was evaluated and confirmed by microscopy, Raman spectroscopy, x-ray photoemission spectroscopy, and four-point probe measurements. Schottky-barrier solar cells with few-layer graphene were fabricated on silicon wafers by using the cyclododecane transfer method and outperformed reference cells made by standard methods.
Resumo:
Objectives: Examine the association between food insecurity (FI) and physical activity (PA) in the U.S. population. Methods: Accelerometry (PAM) and self-report PA (PAQ) data from NHANES 2003-2006 were used. Those aged less than six years or were older than 65 years, pregnant, with physical limitations, or with family income above 350% of the poverty line were excluded. FI was measured by the USDA Household Food Security Survey Module. Crude and adjusted odd ratios were calculated from logistic regression to identify the association between FI and adherence to the PA recommendation. Crude and adjusted coefficients were calculated from linear regression to identify the association between FI and both sedentary and activity minutes. Results: In children, FI was not associated with adherence to PA recommendation measured via PAM or PAQ (p>0.05) but was significantly associated with sedentary minutes (adjusted coefficient=10.74, one-sided p<0.05). Food-insecure children did less moderate-to-vigorous PA than did food-secure children (adjusted coefficient = -5.31, p = 0.032). In adults, FI was significantly associated with PA (adjusted OR=0.722 for PAM and OR=0.839 for PAQ, one-sided p<0.05) but not associated with sedentary minutes (p>0.05) Conclusions: FI children were more sedentary and FI adults were less likely to adhere to the PA recommendation than those without FI.
Resumo:
Background Household food insecurity and physical activity are each important public-health concerns in the United States, but the relation between them was not investigated thoroughly. Objective We wanted to examine the association between food insecurity and physical activity in the U.S. population. Methods Physical activity measured by accelerometry (PAM) and physical activity measured by questionnaire (PAQ) data from the NHANES 2003–2006 were used. Individuals aged <6 y or >65 y, pregnant, with physical limitations, or with family income >350% of the poverty line were excluded. Food insecurity was measured by the USDA Household Food Security Survey Module. Adjusted ORs were calculated from logistic regression to identify the association between food insecurity and adherence to the physical-activity guidelines. Adjusted coefficients were obtained from linear regression to identify the association between food insecurity with sedentary/physical-activity minutes. Results In children, food insecurity was not associated with adherence to physical-activity guidelines measured via PAM or PAQ and with sedentary minutes (P > 0.05). Food-insecure children did less moderate to vigorous physical activity than food-secure children (adjusted coefficient = −5.24, P = 0.02). In adults, food insecurity was significantly associated with adherence to physical-activity guidelines (adjusted OR = 0.72, P = 0.03 for PAM; and OR = 0.84, P < 0.01 for PAQ) but was not associated with sedentary minutes (P > 0.05). Conclusion Food-insecure children did less moderate to vigorous physical activity, and food-insecure adults were less likely to adhere to the physical-activity guidelines than those without food insecurity.
Resumo:
The aim of the paper is to give a feasibility study on the material deposition of Nanoscale textured morphology of titanium and titanium oxide layers on titanium and glass substrates. As a recent development in nanoscale deposition, Physical Vapor Deposition (PVD) based DC magnetron sputtering has been the choice for the deposition process. The nanoscale morphology and surface roughness of the samples have been characterized using Atomic Force Microscope (AFM). The surface roughnesses obtained from AFM have been compared using surface profiler. From the results we can say that the roughness values are dependent on the surface roughness of the substrate. The glass substrate was relatively smoother than the titanium plate and hence lower layer roughness was obtained. From AFM a unique nano-pattern of a boomerang shaped titanium oxide layer on glass substrate have been obtained. The boomerang shaped nano-scale pattern was found to be smaller when the layer was deposited at higher sputtering power. This indicated that the morphology of the deposited titanium oxide layer has been influenced by the sputtering power.