952 resultados para security development
Resumo:
L’objectif de cette thèse était de contribuer à l’avancement des connaissances quant aux circonstances permettant une transmission intergénérationnelle du risque émanant de l’adversité maternelle et aux mécanismes sous-tendant cette transmission, dans quatre articles empiriques. Le premier visait à explorer la relation entre un historique d’adversité maternelle, la sécurité d’attachement mère-enfant et le tempérament de l’enfant. Les mères ont complété une entrevue semi-structurée portant sur leurs représentations d’attachement avec leurs parents, à 6 mois, et ont évalué le tempérament de leur enfant à 2 ans. La sécurité d’attachement fut également évaluée à 2 ans. Les résultats ont démontré que les enfants dont les mères rapportaient des niveaux supérieurs d’adversité présentaient de moins bons niveaux d’activité comportementale, uniquement lorsqu’ils avaient un attachement sécurisant avec leur mère. Ces résultats suggèrent une transmission intergénérationnelle des effets d’un historique d’adversité maternelle sur le tempérament des enfants. Le deuxième article visait à investiguer si le transporteur de sérotonine (5-HTTLPR) module la transmission de risque intergénérationnelle de l’adversité maternelle sur le tempérament des enfants. L’historique d’adversité maternelle fut évalué en combinant deux mesures auto-rapportées. Les mères ont également évalué le tempérament de leur enfant à 18 et à 36 mois. Le génotype des enfants fut extrait à 36 mois. Les résultats ont révélé un effet d’interaction entre l’adversité maternelle et le génotype de l’enfant sur le tempérament, suggérant une transmission intergénérationnelle des effets de l’adversité maternelle sur le fonctionnement émotionnel des enfants. Le troisième article visait à explorer la relation entre les difficultés d’adaptation psychosociale des mères, la sensibilité maternelle et les symptômes intériorisés de leurs enfants. Les mères ont complété plusieurs questionnaires desquels un score composite de difficultés d’adaptation psychosociale fut extrait. La sensibilité maternelle fut observée à 12 mois. Les symptômes intériorisés des enfants furent évalués par les deux parents à 2 et à 3 ans. Les résultats ont démontré qu’une augmentation des difficultés maternelles d’adaptation psychosociale étaient associée à davantage de symptômes intériorisés chez les enfants, mais seulement chez ceux dont les mères étaient moins sensibles. Ces résultats ont été observés par les mères à 2 ans et par les deux parents à 3 ans. Ces résultats suggèrent que les enfants peuvent être différemment affectés par l’adaptation émotionnelle de leur mère tout en mettant l’emphase sur le rôle protecteur de la sensibilité maternelle. Le quatrième article visait à investiguer les rôles médiateurs de la dépression et de la sensibilité maternelle dans la relation entre un historique d’adversité maternelle et le tempérament de l’enfant. L’historique d’adversité maternelle fut évalué en combinant deux mesures auto-rapportées. Les mères ont également rapporté leurs symptômes dépressifs à 6 mois. La sensibilité maternelle fut évaluée de façon concomitante. Les mères ont évalué le tempérament de leur enfant à 36 mois. Les résultats ont révélé une transmission intergénérationnelle des effets d’un historique d’adversité maternelle à la génération suivante suivant une médiation séquentielle passant d’abord par la dépression maternelle et ensuite par la sensibilité maternelle. Finalement, les résultats des quatre articles ont été intégrés dans la conclusion générale.
Resumo:
Doutoramento em Estudos de Desenvolvimento
Resumo:
This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the benefits of information security standards in e-entrepreneurship. It details and discusses the ISO 27001 and PCI-DSS information security standards that can be used to differentiate security initiatives to achieve competitive advantage, while preserving information leadership as a critical resource for online business success. Based on the literature review, a theoretical research model is presented and research hypotheses are discussed. This model believes that information security affects information leadership and that information leadership, as a unique resource in e-business, contributes to e-entrepreneurship success. The adoption of information security standards affects customer’s trust in e-business, which also benefits e-entrepreneurial strategy.
Resumo:
In recent years, security of industrial control systems has been the main research focus due to the potential cyber-attacks that can impact the physical operations. As a result of these risks, there has been an urgent need to establish a stronger security protection against these threats. Conventional firewalls with stateful rules can be implemented in the critical cyberinfrastructure environment which might require constant updates. Despite the ongoing effort to maintain the rules, the protection mechanism does not restrict malicious data flows and it poses the greater risk of potential intrusion occurrence. The contributions of this thesis are motivated by the aforementioned issues which include a systematic investigation of attack-related scenarios within a substation network in a reliable sense. The proposed work is two-fold: (i) system architecture evaluation and (ii) construction of attack tree for a substation network. Cyber-system reliability remains one of the important factors in determining the system bottleneck for investment planning and maintenance. It determines the longevity of the system operational period with or without any disruption. First, a complete enumeration of existing implementation is exhaustively identified with existing communication architectures (bidirectional) and new ones with strictly unidirectional. A detailed modeling of the extended 10 system architectures has been evaluated. Next, attack tree modeling for potential substation threats is formulated. This quantifies the potential risks for possible attack scenarios within a network or from the external networks. The analytical models proposed in this thesis can serve as a fundamental development that can be further researched.
Resumo:
Modern power networks incorporate communications and information technology infrastructure into the electrical power system to create a smart grid in terms of control and operation. The smart grid enables real-time communication and control between consumers and utility companies allowing suppliers to optimize energy usage based on price preference and system technical issues. The smart grid design aims to provide overall power system monitoring, create protection and control strategies to maintain system performance, stability and security. This dissertation contributed to the development of a unique and novel smart grid test-bed laboratory with integrated monitoring, protection and control systems. This test-bed was used as a platform to test the smart grid operational ideas developed here. The implementation of this system in the real-time software creates an environment for studying, implementing and verifying novel control and protection schemes developed in this dissertation. Phasor measurement techniques were developed using the available Data Acquisition (DAQ) devices in order to monitor all points in the power system in real time. This provides a practical view of system parameter changes, system abnormal conditions and its stability and security information system. These developments provide valuable measurements for technical power system operators in the energy control centers. Phasor Measurement technology is an excellent solution for improving system planning, operation and energy trading in addition to enabling advanced applications in Wide Area Monitoring, Protection and Control (WAMPAC). Moreover, a virtual protection system was developed and implemented in the smart grid laboratory with integrated functionality for wide area applications. Experiments and procedures were developed in the system in order to detect the system abnormal conditions and apply proper remedies to heal the system. A design for DC microgrid was developed to integrate it to the AC system with appropriate control capability. This system represents realistic hybrid AC/DC microgrids connectivity to the AC side to study the use of such architecture in system operation to help remedy system abnormal conditions. In addition, this dissertation explored the challenges and feasibility of the implementation of real-time system analysis features in order to monitor the system security and stability measures. These indices are measured experimentally during the operation of the developed hybrid AC/DC microgrids. Furthermore, a real-time optimal power flow system was implemented to optimally manage the power sharing between AC generators and DC side resources. A study relating to real-time energy management algorithm in hybrid microgrids was performed to evaluate the effects of using energy storage resources and their use in mitigating heavy load impacts on system stability and operational security.
Resumo:
Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a large number of vulnerabilities that can remain, despite these measures. Some vulnerabilities stay in a system from one release to the next one because they cannot be easily reproduced through testing. These vulnerabilities endanger the security of the systems. We propose vulnerability classification and prediction frameworks based on vulnerability reproducibility. The frameworks are effective to identify the types and locations of vulnerabilities in the earlier stage, and improve the security of software in the next versions (referred to as releases). We expand an existing concept of software bug classification to vulnerability classification (easily reproducible and hard to reproduce) to develop a classification framework for differentiating between these vulnerabilities based on code fixes and textual reports. We then investigate the potential correlations between the vulnerability categories and the classical software metrics and some other runtime environmental factors of reproducibility to develop a vulnerability prediction framework. The classification and prediction frameworks help developers adopt corresponding mitigation or elimination actions and develop appropriate test cases. Also, the vulnerability prediction framework is of great help for security experts focus their effort on the top-ranked vulnerability-prone files. As a result, the frameworks decrease the number of attacks that exploit security vulnerabilities in the next versions of the software. To build the classification and prediction frameworks, different machine learning techniques (C4.5 Decision Tree, Random Forest, Logistic Regression, and Naive Bayes) are employed. The effectiveness of the proposed frameworks is assessed based on collected software security defects of Mozilla Firefox.
Resumo:
The article analyses the viability of promoting crop-specific programs as a mean to improve smallholder net farm income and food security. The case study explores the relevance of European Union Stabilisation of Export Earnings (STABEX) funds in supporting Sierra Leone’s agricultural development agenda. By analysing the drivers of food security for a number of targeted smallholders in the two most important agricultural zones of Sierra Leone, it is possible to compare the suitability of crop-specific support (in rice, cocoa and coffee) versus general aid programs (public infrastructure, on and off farm diversification opportunities, sustainable practices, access to productive assets, etc.). The results indicate that crop diversification strategies are widespread and closely related to risk minimisation and enhanced food security among smallholders. Similarly, crop-specific programs mainly focusing on commercialisation tend to overlook important constraints associated to self-consumption and productivity.
Resumo:
2012
Resumo:
Network monitoring is of paramount importance for effective network management: it allows to constantly observe the network’s behavior to ensure it is working as intended and can trigger both automated and manual remediation procedures in case of failures and anomalies. The concept of SDN decouples the control logic from legacy network infrastructure to perform centralized control on multiple switches in the network, and in this context, the responsibility of switches is only to forward packets according to the flow control instructions provided by controller. However, as current SDN switches only expose simple per-port and per-flow counters, the controller has to do almost all the processing to determine the network state, which causes significant communication overhead and excessive latency for monitoring purposes. The absence of programmability in the data plane of SDN prompted the advent of programmable switches, which allow developers to customize the data-plane pipeline and implement novel programs operating directly in the switches. This means that we can offload certain monitoring tasks to programmable data planes, to perform fine-grained monitoring even at very high packet processing speeds. Given the central importance of network monitoring exploiting programmable data planes, the goal of this thesis is to enable a wide range of monitoring tasks in programmable switches, with a specific focus on the ones equipped with programmable ASICs. Indeed, most network monitoring solutions available in literature do not take computational and memory constraints of programmable switches into due account, preventing, de facto, their successful implementation in commodity switches. This claims that network monitoring tasks can be executed in programmable switches. Our evaluations show that the contributions in this thesis could be used by network administrators as well as network security engineers, to better understand the network status depending on different monitoring metrics, and thus prevent network infrastructure and service outages.
Resumo:
This thesis is a combination of research questions in development economics and economics of culture, with an emphasis on the role of ancestry, gender and language policies in shaping inequality of opportunities and socio-economic outcomes across different segments of a society. The first chapter shows both theoretically and empirically that heterogeneity in risk attitudes can be traced to the ethnic origins and ancestral way of living. In particular, I construct a measure of historical nomadism at the ethnicity level and link it to contemporary individual-level data on various proxies of risk attitudes. I exploit exogenous variation in biodiversity to build a novel instrument for nomadism: distance to domestication points. I find that descendants of ethnic groups that historically practiced nomadism (i) are more willing to take risks, (ii) value security less, and (iii) have riskier health behavior. The second chapter evaluates the nature of a trade-off between the advantages of female labor participation and the positive effects of female education. This work exploits a triple difference identification strategy relying on exogenous spike in cotton price and spatial variation in suitability for cotton, and split sample analyses based on the exogenous allocation of land contracts. Results show that gender differences in parental investments in patriarchal societies can be reinforced by the type of agricultural activity, while positive economic shocks may further exacerbate this bias, additionally crowding out higher possibilities to invest in female education. The third chapter brings novel evidence of the role of the language policy in building national sentiments, affecting educational and occupational choices. Here I focus on the case of Uzbekistan and estimate the effects of exposure to the Latin alphabet on informational literacy, education and career choices. I show that alphabet change affects people's informational literacy and the formation of certain educational and labour market trends.
Resumo:
Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.
Resumo:
Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.
Resumo:
To verify whether fluorescence in situ hybridization (FISH) of cells from the buccal epithelium could be employed to detect cryptomosaicism with a 45,X lineage in 46,XY patients. Samples of nineteen 46,XY healthy young men and five patients with disorders of sex development (DSD), four 45,X/46,XY and one 46,XY were used. FISH analysis with X and Y specific probes on interphase nuclei from blood lymphocytes and buccal epithelium were analyzed to investigate the proportion of nuclei containing only the signal of the X chromosome. The frequency of nuclei containing only the X signal in the two tissues of healthy men did not differ (p = 0.69). In all patients with DSD this frequency was significantly higher, and there was no difference between the two tissues (p = 0.38), either. Investigation of mosaicism with a 45,X cell line in patients with 46,XY DSD or sterility can be done by FISH directly using cells from the buccal epithelium.
Resumo:
Most epidemiological studies concerning differentiated thyroid cancers (DTC) indicate an increasing incidence over the last two decades. This increase might be partially explained by the better access to health services worldwide, but clinicopathological analyses do not fully support this hypothesis, indicating that there are carcinogenetic factors behind this noticeable increasing incidence. Although we have undoubtedly understood the biology and molecular pathways underlying thyroid carcinogenesis in a better way, we have made very little progresses in identifying a risk profile for DTC, and our knowledge of risk factors is very similar to what we knew 30-40 years ago. In addition to ionizing radiation exposure, the most documented and established risk factor for DTC, we also investigated the role of other factors, including eating habits, tobacco smoking, living in a volcanic area, xenobiotics, and viruses, which could be involved in thyroid carcinogenesis, thus, contributing to the increase in DTC incidence rates observed.
Resumo:
The segment of the world population showing permanent or temporary lactose intolerance is quite significant. Because milk is a widely consumed food with an high nutritional value, technological alternatives have been sought to overcome this dilemma. Microfiltration combined with pasteurization can not only extend the shelf life of milk but can also maintain the sensory, functional, and nutritional properties of the product. This studied developed a pasteurized, microfiltered, lactose hydrolyzed (delactosed) skim milk (PMLHSM). Hydrolysis was performed using β-galactosidase at a concentration of 0.4mL/L and incubation for approximately 21h at 10±1°C. During these procedures, the degree of hydrolysis obtained (>90%) was accompanied by evaluation of freezing point depression, and the remaining quantity of lactose was confirmed by HPLC. Milk was processed using a microfiltration pilot unit equipped with uniform transmembrane pressure (UTP) ceramic membranes with a mean pore size of 1.4 μm and UTP of 60 kPa. The product was submitted to physicochemical, microbiological, and sensory evaluations, and its shelf life was estimated. Microfiltration reduced the aerobic mesophilic count by more than 4 log cycles. We were able to produce high-quality PMLHSM with a shelf life of 21 to 27d when stored at 5±1°C in terms of sensory analysis and proteolysis index and a shelf life of 50d in regard to total aerobic mesophile count and titratable acidity.