828 resultados para Language-based security
Resumo:
Tese de Doutoramento em Engenharia de Eletrónica e de Computadores
Resumo:
Architectural (bad) smells are design decisions found in software architectures that degrade the ability of systems to evolve. This paper presents an approach to verify that a software architecture is smellfree using the Archery architectural description language. The language provides a core for modelling software architectures and an extension for specifying constraints. The approach consists in precisely specifying architectural smells as constraints, and then verifying that software architectures do not satisfy any of them. The constraint language is based on a propositional modal logic with recursion that includes: a converse operator for relations among architectural concepts, graded modalities for describing the cardinality in such relations, and nominals referencing architectural elements. Four architectural smells illustrate the approach.
Resumo:
Software reconfigurability became increasingly relevant to the architectural process due to the crescent dependency of modern societies on reliable and adaptable systems. Such systems are supposed to adapt themselves to surrounding environmental changes with minimal service disruption, if any. This paper introduces an engine that statically applies reconfigurations to (formal) models of software architectures. Reconfigurations are specified using a domain specific language— ReCooPLa—which targets the manipulation of software coordinationstructures,typicallyusedinservice-orientedarchitectures(soa).Theengine is responsible for the compilation of ReCooPLa instances and their application to the relevant coordination structures. The resulting configurations are amenable to formal analysis of qualitative and quantitative (probabilistic) properties.
Resumo:
The main purpose of the poster is to present how the Unified Modeling Language (UML) can be used for diagnosing and optimizing real industrial production systems. By using a car radios production line as a case study, the poster shows the modeling process that can be followed during the analysis phase of complex control applications. In order to guarantee the continuity mapping of the models, the authors propose some guidelines to transform the use cases diagrams into a single object diagram, which is the main diagram for the next phases of the development.
Resumo:
Dissertação de Mestrado em Estratégia
Resumo:
Driven by concerns about rising energy costs, security of supply and climate change a new wave of Sustainable Energy Technologies (SET’s) have been embraced by the Irish consumer. Such systems as solar collectors, heat pumps and biomass boilers have become common due to government backed financial incentives and revisions of the building regulations. However, there is a deficit of knowledge and understanding of how these technologies operate and perform under Ireland’s maritime climate. This AQ-WBL project was designed to address both these needs by developing a Data Acquisition (DAQ) system to monitor the performance of such technologies and a web-based learning environment to disseminate performance characteristics and supplementary information about these systems. A DAQ system consisting of 108 sensors was developed as part of Galway-Mayo Institute of Technology’s (GMIT’s) Centre for the Integration of Sustainable EnergyTechnologies (CiSET) in an effort to benchmark the performance of solar thermal collectors and Ground Source Heat Pumps (GSHP’s) under Irish maritime climate, research new methods of integrating these systems within the built environment and raise awareness of SET’s. It has operated reliably for over 2 years and has acquired over 25 million data points. Raising awareness of these SET’s is carried out through the dissemination of the performance data through an online learning environment. A learning environment was created to provide different user groups with a basic understanding of a SET’s with the support of performance data, through a novel 5 step learning process and two examples were developed for the solar thermal collectors and the weather station which can be viewed at http://www.kdp 1 .aquaculture.ie/index.aspx. This online learning environment has been demonstrated to and well received by different groups of GMIT’s undergraduate students and plans have been made to develop it further to support education, awareness, research and regional development.
Resumo:
Although the ASP model has been around for over a decade, it has not achieved the expected high level of market uptake. This research project examines the past and present state of ASP adoption and identifies security as a primary factor influencing the uptake of the model. The early chapters of this document examine the ASP model and ASP security in particular. Specifically, the literature and technology review chapter analyses ASP literature, security technologies and best practices with respect to system security in general. Based on this investigation, a prototype to illustrate the range and types of technologies that encompass a security framework was developed and is described in detail. The latter chapters of this document evaluate the practical implementation of system security in an ASP environment. Finally, this document outlines the research outputs, including the conclusions drawn and recommendations with respect to system security in an ASP environment. The primary research output is the recommendation that by following best practices with respect to security, an ASP application can provide the same level of security one would expect from any other n-tier client-server application. In addition, a security evaluation matrix, which could be used to evaluate not only the security of ASP applications but the security of any n-tier application, was developed by the author. This thesis shows that perceptions with regard to fears of inadequate security of ASP solutions and solution data are misguided. Finally, based on the research conducted, the author recommends that ASP solutions should be developed and deployed on tried, tested and trusted infrastructure. Existing Application Programming Interfaces (APIs) should be used where possible and security best practices should be adhered to where feasible.
Resumo:
This paper analyzes the role of traders' priors (proper versus improper) on the implications of market transparency by comparing a pre-trade transparent market with an opaque market in a set-up based on Madhavan (1996). We show that prices may be more informative in the opaque market, regardless of how priors are modelled. In contrast, the comparison of market liquidity and volatility in the two market structures are affected by prior specification. Key words: Market microstructure, Transparency, Prior information
Resumo:
Export activities are a major source of economic growth and are considered important both at the national level and for individual businesses. Moreover, in the case of SMEs, they gain particular relevance, exporting being the most common foreign market entry mode for these firms. The decision maker’s role in the export activity is crucial, particularly in the case of SMEs. However, the extant literature on internationalization is characterized by a lack of consensus among scholars as to what constitutes the managerial factor in determining exporting. Therefore, this study focuses on the following issue: Which are the decision maker’s characteristics and perceptions that may influence the export behaviour of Catalan SMEs? To address this question a multiple case study method is applied across four Catalan exporting SMEs. The methodology chosen for analysing the empirical data is relying on the proposition testing approach while the investigation is conducted including both within and cross-case analysis. The findings show that high educational level, language skills, high risk tolerance, innovativeness as well as strongly perceived export stimuli as compared to low and easy to overcome export barriers positively influence the export involvement and development of SMEs. The study provides further insights into the research topic by jointly studying managerial characteristics and perceptions. Additionally, the majority of research on exporting topics has been carried out in the USA, so there is a clear need of investigation in the field in other countries, moreover in Spain where the exporting activities have not been as widely studied.
Resumo:
As a consequence of the terrorist attacks of 9/11 and the US-led war against Iraq, WMD and their proliferation have become a central element of the EU security agenda. In December 2003, the European Council adopted even a EU Strategy against Proliferation of WMD. The approach adopted in this Strategy can be largely described as a ‘cooperative security provider’ approach and is based on effective multilateralism, the promotion of a stable international and regional environment and the cooperation with key partners. The principal objective of this paper is to examine in how far the EU has actually implemented the ‘cooperative security provider’ approach in the area which the Non-proliferation Strategy identifies as one of its priorities – the Mediterranean. Focusing on the concept of security interdependence, the paper analyses first the various WMD dangers with which the EU is confronted in the Mediterranean area. Afterwards, it examines how the EU has responded to these hazards in the framework of the Barcelona process and, in particular, the new European Neighbourhood Policy. It is argued that despite its relatively powerful rhetoric, the EU has largely failed, for a wide range of reasons, to apply effectively its non-proliferation approach in the Mediterranean area and, thus, to become a successful security provider.
Resumo:
Based on Lucas functions, an improved version of the Diffie-Hellman distribution key scheme and to the ElGamal public key cryptosystem scheme are proposed, together with an implementation and computational cost. The security relies on the difficulty of factoring an RSA integer and on the difficulty of computing the discrete logarithm.
Resumo:
Based on third order linear sequences, an improvement version of the Diffie-Hellman distribution key scheme and the ElGamal public key cryptosystem scheme are proposed, together with an implementation and computational cost. The security relies on the difficulty of factoring an RSA integer and on the difficulty of computing the discrete logarithm.
Resumo:
How far has English already spread? How much further can we expect it to go? In response to the first question, this chapter tries to identify the areas of life where English already serves as a lingua franca in the world (more or less) and those where the language faces sharp competition and does not threaten to marginalize the other major languages. The former areas of life are international safety, the internal business of international organizations, internal communication within the international news industry, international sports and science. The latter areas are the press, television, the internet, publishing and international trade. As to the second question, about the future prospects of English, the chapter argues that the advance of English will depend heavily on the motives to learn the other major languages in the world as well. Based on the empirical evidence, the same model applies to the incentives to learn English and these other languages. On the important topic of welfare, the cultural market is the single one where it is arguable that the progress of English has gone too far. English dominance in the song, the cinema and the best-seller is indeed extraordinary and difficult to reconcile with the evidence popular attachments to home languages, which is otherwise strong and apparent.
Resumo:
OBJECTIVE: To identify predictors of nonresponse to a self-report study of patients with orthopedic trauma hospitalized for vocational rehabilitation between November 15, 2003, and December 31, 2005. The role of biopsychosocial complexity, assessed using the INTERMED, was of particular interest. DESIGN: Cohort study. Questionnaires with quality of life, sociodemographic, and job-related questions were given to patients at hospitalization and 1 year after discharge. Sociodemographic data, biopsychosocial complexity, and presence of comorbidity were available at hospitalization (baseline) for all eligible patients. Logistic regression models were used to test a number of baseline variables as potential predictors of nonresponse to the questionnaires at each of the 2 time points. SETTING: Rehabilitation clinic. PARTICIPANTS: Patients (N=990) hospitalized for vocational rehabilitation over a period of 2 years. INTERVENTIONS: Not applicable. MAIN OUTCOME MEASURE: Nonresponse to the questionnaires was the binary dependent variable. RESULTS: Patients with high biopsychosocial complexity, foreign native language, or low educational level were less likely to respond at both time points. Younger patients were less likely to respond at 1 year. Those living in a stable partnership were less likely than singles to respond at hospitalization. Sex, psychiatric, and somatic comorbidity and alcoholism were never associated with nonresponse. CONCLUSIONS: We stress the importance of assessing biopsychosocial complexity to predict nonresponse. Furthermore, the factors we found to be predictive of nonresponse are also known to influence treatment outcome and vocational rehabilitation. Therefore, it is important to increase the response rate of the groups of concern in order to reduce selection bias in epidemiologic investigations.