952 resultados para user-driven security adaptation


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In its Conclusions of 26-27 June 2014, the European Council has adopted the new “Strategic Guidelines for Legislative and Operational Planning for the coming years within the EU’s Area of Freedom, Security and Justice (AFSJ)”. These Guidelines reveal a pre-Lisbon Treaty mindset among the EU member states and the Justice and Home Affairs Council. This essay argues that the Guidelines are mainly driven by the interests and agendas of national Ministries of Interior and Justice and are only “strategic” to the extent that they aim at first, re-injecting ‘intergovernmentalism’ or bringing back the old EU Third Pillar ways of working to the new EU institutional setting of the AFSJ and second, at sidelining the EU Charter of Fundamental Rights and rule of law in the AFSJ. The paper argues that the European Council Guidelines seek to prevent the advances in Justice and Home Affairs cooperation as envisaged in the Treaty of Lisbon, particularly its emphasis on supranational democratic, legal and judicial accountability. As a consequence of this move to ‘de-Lisbonise’ JHA cooperation, fundamental rights and rule of law-related initiatives will be neglected and the interest of the individual will be displaced from the centre of gravity in the coming AFSJ 2020 policy agenda.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This policy paper focuses on the sustainable management of some key natural resources in southern and eastern Mediterranean countries (SEMCs) under climate change and anthropogenic pressures. In a business-as-usual and even more so in a failed cooperation scenario, water resources, ecosystems and biodiversity in the region are under stress, with negative consequences for agriculture, food security, tourism and development. However, proper adaptation strategies are shown to be effective in reconciling resource conservation with GDP, trade and population growth. These need be implemented in different ways: technological, institutional, behavioural; and at different levels: regional, national and international. There is ample room for fruitful cooperation between the EU and SEMCs in this area, which can take the form of EU direct financial and technical support when resources in SEMCs are scarce, and of multilateral and bilateral cooperation programmes to improve resource efficiency. The EU could also take on the role of coordinating these different bilateral actions and, at the same time, support SEMCs to establish a structured programme focused on the communication and dissemination of emerging best practices.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

From the Introduction. The past year has pushed energy security high on the EU agenda, and with it, the need for stronger cooperation on a common energy policy. For years the EU member states have been driven by different reasons to – or not to – collaborate. The internal energy market's economic benefits have not have not provided a sufficient driver for cooperation. The first climate and energy targets were an achievement, but in reality action has been undermined by concerns over competitiveness. Being a global leader in setting targets has not translated in cross-border collaboration in meeting them. National interests and bilateral energy deals have weakened EU's common voice vis-à-vis supplier countries. Whether the recognition of EU's energy vulnerability will become a real driver for creating an Energy Union worth its name remains to be seen. The need for action could not be stronger.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This guide provides examples of juvenile and adult arrest fingerprint cards with instructions and additional record forms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

All public school districts, vocational centers, charter schools and special education cooperatives must submit the Annual Claim for Pupil Transportation Reimbursement (ISBE 50-23) electronically online through a web-based system named, "Pupil Transportation Claim Reimbursement System" or "PTCRS."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

ECLAC advocates that the Caribbean’s high debt dilemma was not principally driven by policy missteps, or the international financial crisis. Rather, it finds its roots in external shocks, compounded by the inherent structural weaknesses and vulnerabilities confronting Caribbean SIDS and their limited capacity to respond. A major factor has been the underperformance of the export sector, partly due to a decline in competitiveness and a slowdown in economic activity especially among the tourism-dependent economies. Caribbean countries have also accumulated debt as a consequence of increased expenditures to address the impact of extreme events and climate change attendant difficulties. Most Caribbean countries are located in the hurricane belt and are also prone to earthquakes and other hazards. Indeed, a disaster resulting in damage and losses in excess of 5 per cent of GDP can be expected to hit any Caribbean country every few years. Moreover, over the period 2000-2014, it is estimated that the economic cost of natural disasters in Caribbean countries was in excess of US$30.7 billion. The English Speaking Caribbean countries are extremely vulnerable to natural disasters.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of increasingly powerful computers, which has enabled the use of windowing software, has also opened the way for the computer study, via simulation, of very complex physical systems. In this study, the main issues related to the implementation of interactive simulations of complex systems are identified and discussed. Most existing simulators are closed in the sense that there is no access to the source code and, even if it were available, adaptation to interaction with other systems would require extensive code re-writing. This work aims to increase the flexibility of such software by developing a set of object-oriented simulation classes, which can be extended, by subclassing, at any level, i.e., at the problem domain, presentation or interaction levels. A strategy, which involves the use of an object-oriented framework, concurrent execution of several simulation modules, use of a networked windowing system and the re-use of existing software written in procedural languages, is proposed. A prototype tool which combines these techniques has been implemented and is presented. It allows the on-line definition of the configuration of the physical system and generates the appropriate graphical user interface. Simulation routines have been developed for the chemical recovery cycle of a paper pulp mill. The application, by creation of new classes, of the prototype to the interactive simulation of this physical system is described. Besides providing visual feedback, the resulting graphical user interface greatly simplifies the interaction with this set of simulation modules. This study shows that considerable benefits can be obtained by application of computer science concepts to the engineering domain, by helping domain experts to tailor interactive tools to suit their needs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

University students encounter difficulties with academic English because of its vocabulary, phraseology, and variability, and also because academic English differs in many respects from general English, the language which they have experienced before starting their university studies. Although students have been provided with many dictionaries that contain some helpful information on words used in academic English, these dictionaries remain focused on the uses of words in general English. There is therefore a gap in the dictionary market for a dictionary for university students, and this thesis provides a proposal for such a dictionary (called the Dictionary of Academic English; DOAE) in the form of a model which depicts how the dictionary should be designed, compiled, and offered to students. The model draws on state-of-the-art techniques in lexicography, dictionary-use research, and corpus linguistics. The model demanded the creation of a completely new corpus of academic language (Corpus of Academic Journal Articles; CAJA). The main advantages of the corpus are its large size (83.5 million words) and balance. Having access to a large corpus of academic language was essential for a corpus-driven approach to data analysis. A good corpus balance in terms of domains enabled a detailed domain-labelling of senses, patterns, collocates, etc. in the dictionary database, which was then used to tailor the output according to the needs of different types of student. The model proposes an online dictionary that is designed as an online dictionary from the outset. The proposed dictionary is revolutionary in the way it addresses the needs of different types of student. It presents students with a dynamic dictionary whose contents can be customised according to the user's native language, subject of study, variant spelling preferences, and/or visual preferences (e.g. black and white).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using the resistance literature as an underpinning theoretical framework, this chapter analyzes how Web designers through their daily practices, (i) adopt recursive, adaptive, and resisting behavior regarding the inclusion of social cues online and (ii) shape the socio-technical power relationship between designers and other stakeholders. Five vignettes in the form of case studies with expert individual Web designers are used. Findings point out at three types of emerging resistance namely: market driven resistance, ideological resistance, and functional resistance. In addition, a series of propositions are provided linking the various themes. Furthermore, the authors suggest that stratification in Web designers’ type is occurring and that resistance offers a novel lens to analyze the debate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Constructing and executing distributed systems that can adapt to their operating context in order to sustain provided services and the service qualities are complex tasks. Managing adaptation of multiple, interacting services is particularly difficult since these services tend to be distributed across the system, interdependent and sometimes tangled with other services. Furthermore, the exponential growth of the number of potential system configurations derived from the variabilities of each service need to be handled. Current practices of writing low-level reconfiguration scripts as part of the system code to handle run time adaptation are both error prone and time consuming and make adaptive systems difficult to validate and evolve. In this paper, we propose to combine model driven and aspect oriented techniques to better cope with the complexities of adaptive systems construction and execution, and to handle the problem of exponential growth of the number of possible configurations. Combining these techniques allows us to use high level domain abstractions, simplify the representation of variants and limit the problem pertaining to the combinatorial explosion of possible configurations. In our approach we also use models at runtime to generate the adaptation logic by comparing the current configuration of the system to a composed model representing the configuration we want to reach. © 2008 Springer-Verlag Berlin Heidelberg.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Engineering adaptive software is an increasingly complex task. Here, we demonstrate Genie, a tool that supports the modelling, generation, and operation of highly reconfigurable, component-based systems. We showcase how Genie is used in two case-studies: i) the development and operation of an adaptive flood warning system, and ii) a service discovery application. In this context, adaptation is enabled by the Gridkit reflective middleware platform.