909 resultados para Notions of security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Resumen basado en el de la publicaci??n

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article aims to analyse how the meaning of the notions of ‘restrictions’ and ‘discrimination’ in EU free movement law has developed through the years, and to explore how the relationship between them has evolved. It is explained that the two concepts under examination had originally been closely intertwined, in the sense that one defined the other, the element holding them together being the aim of the relevant provisions to liberalise the inter-State movement of persons in the EU, as part of the process of establishing an internal market. Yet, more recently, the way that the Court has chosen to delimit their scope, illustrates that each of these notions can now have a life of its own, meaning that ‘discrimination’ can include discriminatory measures which do not lead to restrictions that are contrary to the free movement provisions, and ‘restriction’ can cover national measures that are not discriminatory.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the less desirable aftermaths of the so-called "Media Wars" - the intellectual debate over the role of cultural studies in the study of journalism - was reinforcement for some of the notion of fortress journalism: a Windschuttlian purist version of the Empire. This paper uses the alleged confrontation between the forces of that Empire (that is, proponents of pure journalism) and the forces of the Dark (that is, critics from a cultural studies tradition) as a means of examining the teaching of journalism in universities. The paper questions how the discipline of journalism should interface with others within the academy and asks what notion of journalism underpins our pedagogy and our epistemology. It is argued that it is time to discard an outdated craft model with its associations of authenticity and replace it with a model of synthetic professionalism.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper challenges notions of gendered game playing practice implicit in much research into young women's involvement with the computer gaming culture. It draws on a study of Australian teenagers playing The Sims Deluxe as part of an English curriculum unit and insights from feminist media studies to explore relationships between gender and game playing practices. Departing from a reliance on predetermined notions of “gender”, “domestic space”, and “successful game play”, it conceptualizes The Sims as a game in which the boundaries between gender and domestic space are disturbed. It argues that observing students' constructions of gender and domestic space through the act of game play itself provides a more productive insight into the gendered dimensions of game play for educators wishing to work computer games such as The Sims into curriculum development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Information security is portrayed as a global problem that impacts all countries that are considered as part of the Information Society. Recent surveys show that there are increased concerns about computer crime. The paper will focus upon recent national security surveys from Australia and New Zealand and the trends that this research shows. Is it fair to assume the security practices are the same all over the world? The paper looks at security practices from a number of different countries perspectives and shows that security practices are not generic and vary from country to country. The paper will also evaluate the worth that National Security Surveys have in the field of Information Security Surveys.