807 resultados para Security systems
Resumo:
Objective: To assess differences in mortality rates between social security statuses in two independent samples of Belgian and Spanish male workers. Methods: Study of two retrospective cohorts (Belgium, n = 23,607; Spain, n = 44,385) of 50-60 year old male employees with 4 years of follow-up. Mortality rate ratios (MRR) were estimated using Poisson regression models. Results: Mortality for subjects with permanent disability was higher than for the employed, for both Belgium [MRR = 4.56 (95% CI: 2.88-7.21)] and Spain [MRR = 7.15 (95% CI: 5.37-9.51)]. For the unemployed/early retirees, mortality was higher in Spain [MRR = 1.64 (95% CI: 1.24-2.17)] than in Belgium [MRR = 0.88 (95% CI: 0.46-1.71)]. Conclusion: MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.
Resumo:
1.1 Background What is renewable energy education and training? A cursory exploration of the International Solar Energy Society website (www.ises.org) reveals numerous references to education and training, referring collectively to concepts of the transfer and exchange of information and good practices, awareness raising and skills development. The purposes of such education and training relate to changing policy, stimulating industry, improving quality control and promoting the wider use of renewable energy sources. The primary objective appears to be to accelerate a transition to a better world for everyone (ISEE), as the greater use of renewable energy is seen as key to climate recovery; world poverty alleviation; advances in energy security, access and equality; improved human and environmental health; and a stabilized society. The Solar Cities project – Habitats of Tomorrow – aims at promoting the greater use of renewable energy within the context of long term planning for sustainable urban development. The focus is on cities or communities as complete systems; each one a unique laboratory allowing for the study of urban sustainability within the context of a low carbon lifestyle. The purpose of this paper is to report on an evaluation of a Solar Community in Australia, focusing specifically on the implications (i) for our understandings and practices in renewable energy education and training and (ii) for sustainability outcomes. 1.2 Methodology The physical context is a residential Ecovillage (a Solar Community) in sub-tropical Queensland, Australia (latitude 28o south). An extensive Architectural and Landscape Code (A&LC) ‘premised on the interconnectedness of all things’ and embracing ‘both local and global concerns’ governs the design and construction of housing in the estate: all houses are constructed off-ground (i.e. on stumps or stilts) and incorporate a hybrid approach to the building envelope (mixed use of thermal mass and light-weight materials). Passive solar design, gas boosted solar water heaters and a minimum 1kWp photovoltaic system (grid connected) are all mandatory, whilst high energy use appliances such as air conditioners and clothes driers are not permitted. Eight families participated in an extended case study that encompassed both quantitative and qualitative approaches to better understand sustainable housing (perceived as a single complex technology) through its phases of design, construction and occupation. 1.3 Results The results revealed that the level of sustainability (i.e. the performance outcomes in terms of a low-carbon lifestyle) was impacted on by numerous ‘players’ in the supply chain, such as architects, engineers and subcontractors, the housing market, the developer, product manufacturers / suppliers / installers and regulators. Three key factors were complicit in the level of success: (i) systems thinking; (ii) informed decision making; and (iii) environmental ethics and business practices. 1.4 Discussion The experiences of these families bring into question our understandings and practices with regard to education and training. Whilst increasing and transferring knowledge and skills is essential, the results appear to indicate that there is a strong need for expanding our education efforts to incorporate foundational skills in complex systems and decision making processes, combined with an understanding of how our individual and collective values and beliefs impact on these systems and processes.
Resumo:
With significant population growth experienced in South East Queensland over the past two decades and a high rate of growth expected to continue in coming decades, the Queensland Government is promoting urban consolidation planning policies to manage growth sustainably. Multi-residential buildings will play an important role in facilitating the increased densities which urban consolidation policies imply. However, a major flood event in January 2011 has brought to light the vulnerability of certain types of multi-residential typologies to power outages. The crisis conditions exposed how contemporary building design and construction practices, coupled with regulatory and planning issues, appear to have compromised the resilience and habitability of multi-storey residential buildings. In the greater urban area of Brisbane, Queensland, the debilitating dependence that certain types of apartment buildings have on mains electricity was highlighted by residents’ experiences of the Brisbane River flood disaster, before, during and after the event. This research examined high density residential buildings in West End, Brisbane, an inner city suburb which was severely affected by the flood and is earmarked for significant urban densification under the Brisbane City Plan. Medium-to-high-density residential buildings in the suburb were mapped in flooded and non-flooded locations and a database containing information about the buildings was created. Parameters included date of construction, number of storeys, systems of access and circulation, and potential for access to natural light and ventilation for habitable areas. A series of semi-structured interviews were conducted with residents involved in the owners’ management committees of several buildings to verify information the mapping could not provide. The interviews identified a number of critical systems failures due to power outage which had a significant impact on residents’ wellbeing, comfort and safety. Building services such as lifts, running water, fire alarms, security systems and air-conditioning ceased to operate when power was disconnected to neighbourhoods and buildings in anticipation of rising flood waters. Lack of access to buildings and dwellings, lack of safety, lack of building security, and lack of thermal comfort affected many residents whether or not their buildings were actually subjected to inundation, with some buildings rendered uninhabitable for a prolonged period. The extent of the impact on residents was dramatically influenced by the scale and type of building inhabited, with those dwelling in buildings under a 25m height limit, with a single lift, found to be most affected. The energy-dependency and strong trend of increasing power demands of high-rise buildings is well-documented. Extended electricity outages such as the one brought about by the 2011 flood in Queensland are likely to happen more frequently than the 50-year average of the flood event itself. Electricity blackouts can result from a number of man-made or natural causes, including shortages caused by demand exceeding supply. This paper highlights the vulnerability of energy-dependent buildings to power outages and investigates options for energy security for occupants of multi-storey buildings and makes recommendations to increase resilience and general liveability in multi-residential buildings in the subtropics through design modifications.
Resumo:
Modular arithmetic has often been regarded as something of a mathematical curiosity, at least by those unfamiliar with its importance to both abstract algebra and number theory, and with its numerous applications. However, with the ubiquity of fast digital computers, and the need for reliable digital security systems such as RSA, this important branch of mathematics is now considered essential knowledge for many professionals. Indeed, computer arithmetic itself is, ipso facto, modular. This chapter describes how the modern graphical spreadsheet may be used to clearly illustrate the basics of modular arithmetic, and to solve certain classes of problems. Students may then gain structural insight and the foundations laid for applications to such areas as hashing, random number generation, and public-key cryptography.
Resumo:
Due to extension of using CCTVs and the other video security systems in all areas, these sorts of devices have been introduced as the most important digital evidences to search and seizure crimes. Video forensics tools are developed as a part of digital forensics tools to analyze digital evidences and clear vague points of them for presenting in the courts Existing video forensics tools have been facilitated the investigation process by providing different features based on various video editing techniques. In this paper, some of the most popular video forensics tools are discussed and the strengths and shortages of them are compared and consequently, an alternative framework which includes the strengths of existing popular tools is introduced.
Resumo:
A Breakthrough of Welfare State. The inter-relationships of the civic movement, political transformation, and eroding of a hegemony based on small scale farming in the Finnish society in the late 1950's. The unusually rapid and powerful structural change; the non-parliamentary civic movements of 1956 - 1963; and the left majority in the Finnish parliament between 1958 - 1962 all took place as the Finnish welfare state started to develop. The aim of my research is to analyse the inter-relationships of these processes. The research describes the way the former semi self-sufficient, semi-proletarian and labour-intensive form of production - a simple and discriminatory system in itself - made it possible for the majority of the population to survive through hard work. For some it even provided a possibility to prosper. The waning vitality of semi self-sufficiency and small scale agriculture triggered a political ferment and started a period of searching for something new. The process was so intense that it broke up most of the parties and tore down the old consensus that was based on the power of economic and political elite. The most crucial battle of the great transformation was waged over the nature of the state: Should we build a welfare state and construct social security systems, or should we revert to the old night watchman state and, for example, cancel the modest forms of redistribution of income carried out in the 1950's? The people joining the civic movements were either cottagers of the impoverishing countryside or, quite often, people who had come from the countryside and thus had grown up under conditions of some form of solidarity that included taking care of one's own family. The Finnish social insurance developed in the midst of a change in the structure of production of the society, and it became a compromise to satisfy the needs of both the waning society of small scale agriculture and the rising proletarian society based on wage labour. The hodgepodge of political schemes and use of power became a battle between different notions of the economy and the state; the distribution of national income; and the position of Finland in the international context. This battle created a shape of an interregnum - a period of transformation including two notions of society, two alternative paths for the future and the logic of a correctional move. The transformation of Finland from a poor developing country into a prosperous society has been praised as a success story. In 1956 - 1959, when the old form of governance based on the interests of small scale agriculture and wood processing industry was in decay, and when the future seemed uncertain, the projects to reduce social benefits and efforts to distribute national income even more unequally than before led to a powerful counter-movement by citizens and started an hegemonic change and a equal socia development.
Análisis de consecuencias de un escape de metanol en un establecimiento afectado por el RD 1254/1999
Resumo:
[ES]El presente trabajo se centra en el RD 1254/1999, decreto que obliga a aquellos establecimientos que trabajan con sustancias peligrosas y pueden ocasionar accidentes graves con consecuencias en el exterior (nube tóxica, explosión, incendio, radiación, etc.) a hacer un análisis de riesgo de los mencionados accidentes. En base a este análisis se programan los planes de autoprotección así como los planes de emergencia exterior y se establecen los sistemas de gestión de la seguridad. Se estudia un caso práctico en el que se elabora el Análisis de Riesgo de una planta en la que se almacena metanol, y se calculan las distancias a las que llegarían las consecuencias dañinas en caso de accidentes con el metanol.
Resumo:
O processo de envelhecimento populacional, ainda que amplamente reconhecido como uma das principais conquistas do século XX engendra o desafio de assegurar que o processo de desenvolvimento ocorra com base em princípios capazes de garantir a dignidade humana e a equidade entre os grupos etários na partilha dos recursos, direitos e responsabilidades sociais. Além dos desafios impostos aos já tradicionais programas constantes dos atuais sistemas de seguridade social, o envelhecimento populacional acrescenta uma nova questão ou risco social: os cuidados de longa duração, demandados pelos idosos com perda de capacidade instrumental e/ou funcional para lidar com as atividades do cotidiano. Por capacidade instrumental pode-se entender a capacidade para a realização de atividades relacionadas a, por exemplo: preparar refeições, fazer compras no mercado, ir ao banco, cuidar da casa etc. Capacidade funcional, por sua vez, refere-se às seguintes atividades: alimentar-se, banhar-se, caminhar distâncias curtas, vestir-se etc. A preocupação com os cuidados de longa duração dos idosos nos países desenvolvidos, onde o processo de envelhecimento populacional já se encontra mais avançado, surgiu como uma necessidade de se separar os custos crescentes com o tratamento dos idosos dos demais gastos com saúde. Os custos, tangíveis ou não, envolvidos na atividade de cuidar/assistir aos idosos tendem a aumentar em função da entrada maciça das mulheres no mercado de trabalho e das mudanças nos contratos de gênero, sugerindo crescentes dificuldades para que as famílias arquem com a responsabilidade pelo cuidado de seus idosos. Em países em desenvolvimento, como o Brasil, essa questão é agravada por se somar a uma ampla lista a ser respondida pelos sistemas de seguridade social, tais como a pobreza, a exclusão de crescentes contingentes da população e o nível de desigualdade vigente. No Brasil, para que se possa avançar no debate sobre os cuidados de longa duração voltados para uma população idosa crescente, faz-se necessário rediscutir e redefinir uma série de parâmetros do atual sistema de seguridade social, em especial, a expressiva parcela de trabalhadores informais alijados do mesmo. O precário equilíbrio, ou resultado, do sistema de seguridade social brasileiro precisa ser revisto e analisado a luz das tendências demográficas, sociais e econômicas que se vislumbram para os próximos 20 ou 30 anos. Somente após o reequacionamento do sistema é possível pensar a incorporação desta nova e latente demanda da sociedade brasileira.
Resumo:
Esta tese parte da demonstração da existência de um conceito genérico de seguridade social incorporado ao ordenamento jurídico internacional - a ser interpretado conforme sua função socioeconômica e construção histórica no direito comparado o qual garante direitos subjetivos a medidas protetivas. Passa a averiguar então o desenvolvimento de um padrão ou receituário rudimentar previsto naquele ordenamento para implementação progressiva de sistemas de seguridade social com contornos protetivos cada vez mais precisos e abrangentes, inclusive no tocante ao tratamento do problema das migrações. Detecta então as insuficiências desse aparato normativo para oferecer atualmente uma cobertura efetiva à maioria da população mundial e aponta estratégias jurídicas internacionalizadas empregadas para fomentar ao menos a expansão imediata de uma cobertura mínima em seguridade social às populações mais vulneráveis do globo. Enfoca, por fim, a cooperação financeira internacional como solução viável para suprir as carências emergenciais das populações dos países em situação de maior déficit de cobertura em seguridade social, notadamente quanto a prestações de saúde. Expõe, em seu conjunto, caminhos para estruturação de sistemas de seguridade social harmônicos, coordenados e eficazes em prol da segurança econômica de todos.
Resumo:
IEEE; IEEE Computer Society; IEEE Technical Committee on Scalable Computing (TCSC)
Resumo:
分布式系统安全是多域协作场景下的重要研究领域,近年来得到大力发展.在大多数实际的多域协作过程中,无论开发者还是管理者都不想完全摈弃已有的权限管理和访问控制体系,希望在授权开放性和系统改造代价间保持平衡和兼顾.域间授权互操作正是在这一背景下逐渐成为该领域具有代表性的研究方法.着力对域间互操作理论和技术的整体进展与演化进行细致梳理与剖析,从多维视角下对其进行归类比较,例如:根据域间协作架构划分,可分为松耦合协作模式和联邦式协作模式;根据安全检测实施方式划分,可分为基于协调中心的检测模式和无协调中心模式;根据互操作建模方式划分,主要包括基于管理行为的预前建立模式和基于请求驱动的实时建立模式;根据建立互操作采用的辅助技术划分,主要涉及基于信任、基于风险和基于语义等;根据策略整合所处的层面划分,可分为面向授权管理的策略集成和面向资源聚合的策略集成.针对若干典型方案,阐述其基本原理、适用场景,对技术特点和局限性给出较为深入的对比分析,在大量现有研究工作的基础上综述授权互操作发展的基本特点,归结展望了今后可能的研究趋势.
Resumo:
The world’s population is rapidly aging, which affects healthcare budgets, resources, pensions and social security systems. Although most older adults prefer to live independently in their own home as long as possible, smart living solutions to support elderly people at home did not reach mass adoption, yet. To support people age-in-place a Living Lab is established in one of the metropolitan areas in the Netherlands. The main goal of the Living Lab is to develop an online health and wellbeing platform that matches service providers, caretakers and users and to implement that platform in one particular city district. In this paper we describe the narrative of the action design research process that will give researchers insight how to deal with complex multi-stakeholder design projects as well as cooperation issues to develop an artifact in a real-life setting.