950 resultados para Attachment security
Resumo:
Future emerging market trends head towards positioning based services placing a new perspective on the way we obtain and exploit positioning information. On one hand, innovations in information technology and wireless communication systems enabled the development of numerous location based applications such as vehicle navigation and tracking, sensor networks applications, home automation, asset management, security and context aware location services. On the other hand, wireless networks themselves may bene t from localization information to improve the performances of di erent network layers. Location based routing, synchronization, interference cancellation are prime examples of applications where location information can be useful. Typical positioning solutions rely on measurements and exploitation of distance dependent signal metrics, such as the received signal strength, time of arrival or angle of arrival. They are cheaper and easier to implement than the dedicated positioning systems based on ngerprinting, but at the cost of accuracy. Therefore intelligent localization algorithms and signal processing techniques have to be applied to mitigate the lack of accuracy in distance estimates. Cooperation between nodes is used in cases where conventional positioning techniques do not perform well due to lack of existing infrastructure, or obstructed indoor environment. The objective is to concentrate on hybrid architecture where some nodes have points of attachment to an infrastructure, and simultaneously are interconnected via short-range ad hoc links. The availability of more capable handsets enables more innovative scenarios that take advantage of multiple radio access networks as well as peer-to-peer links for positioning. Link selection is used to optimize the tradeo between the power consumption of participating nodes and the quality of target localization. The Geometric Dilution of Precision and the Cramer-Rao Lower Bound can be used as criteria for choosing the appropriate set of anchor nodes and corresponding measurements before attempting location estimation itself. This work analyzes the existing solutions for node selection in order to improve localization performance, and proposes a novel method based on utility functions. The proposed method is then extended to mobile and heterogeneous environments. Simulations have been carried out, as well as evaluation with real measurement data. In addition, some speci c cases have been considered, such as localization in ill-conditioned scenarios and the use of negative information. The proposed approaches have shown to enhance estimation accuracy, whilst signi cantly reducing complexity, power consumption and signalling overhead.
Resumo:
Although security plays an important role in the development of multiagent systems, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. One of the reasons is the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. The integration of security concerns during the whole range of the development stages can help towards the development of more secure multiagent systems. In this paper we introduce extensions to the Tropos methodology to enable it to model security concerns throughout the whole development process. A description of the new concepts and modelling activities is given along with a discussion on how these concepts and modelling activities are integrated to the current stages of Tropos. A real life case study from the health and social care sector is used to illustrate the approach.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.
Resumo:
Building secure systems is difficult for many reasons. This paper deals with two of the main challenges: (i) the lack of security expertise in development teams, and (ii) the inadequacy of existing methodologies to support developers who are not security experts. The security standard ISO 14508 (Common Criteria) together with secure design techniques such as UMLsec can provide the security expertise, knowledge, and guidelines that are needed. However, security expertise and guidelines are not stated explicitly in the Common Criteria. They are rather phrased in security domain terminology and difficult to understand for developers. This means that some general security and secure design expertise are required to fully take advantage of the Common Criteria and UMLsec. In addition, there is the problem of tracing security requirements and objectives into solution design,which is needed for proof of requirements fulfilment. This paper describes a security requirements engineering methodology called SecReq. SecReq combines three techniques: the Common Criteria, the heuristic requirements editorHeRA, andUMLsec. SecReqmakes systematic use of the security engineering knowledge contained in the Common Criteria and UMLsec, as well as security-related heuristics in the HeRA tool. The integrated SecReq method supports early detection of security-related issues (HeRA), their systematic refinement guided by the Common Criteria, and the ability to trace security requirements into UML design models. A feedback loop helps reusing experiencewithin SecReq and turns the approach into an iterative process for the secure system life-cycle, also in the presence of system evolution.
Resumo:
Adolescence is a time of developmental transition that for one in five young people is characterised by feelings of oppositionality, rebellion, and negativism. Despite the prevalent experience of teen turbulence and despite its significance within the phenomenological framework provided by reversal theory (RT), the childhood antecedents of rebelliousness in adolescence and adulthood have not been given extensive empirical attention within RT, although such work has been carried out using other constructs and theories. We examined recalled parenting style, childhood adversity, and attachment style in adulthood as correlates of proactive and reactive rebelliousness in a sample of 80 participants, aged 18 to 50 years. Each participant responded to a questionnaire package containing the revised Adult Attachment Scale, the Parental Bonding Instrument, the Childhood Experience of Care and Abuse Questionnaire, and the Negativism Dominance Scale. We found that paternal abusive parenting, followed by paternal parenting style, paternal neglect, and paternal antipathy were independently predictive of scores on proactive rebelliousness, the sensation-seeking form. Maternal and paternal indifferent parenting styles each were found to equivalently and independently predict scores on reactive rebelliousness, the interpersonal disaffection form. The results of this study suggest these two forms of rebelliousness may have distinctly different antecedents. A longitudinal study is needed to examine the potentially causal pathways that are suggested by the results of this cross-sectional research. We consider reversal theory explanations of these results and contrast them with complementary theoretical frameworks.
Resumo:
This paper investigates the paradoxes inherent in Thai and Vietnamese drug policies. The two countries have much in common. Both are ultra-prohibitionist states which employ repressive policies to contain drug markets. Their policies have, however, diverged in two key areas: opium suppression and harm reduction. Thailand implemented an effective intervention to suppress opium farming centred upon alternative development, whereas Vietnam suppressed opium production through coercive negotiation with nominal alternative development. Vietnam has embraced elements of harm reduction, whereas Thailand has been slow to implement harm reduction policies. This paper hypothesises that these two differences are largely a product of their perceived relationship to security. The two cases demonstrate how once an issue is securitized the ultra-prohibitionist rules of the game can be broken to allow for more humane and pragmatic policies.
Resumo:
As the number of pensioners in Europe rises relative to the number of people in employment, the gap between the contributions and the benefit levels increases, and consequently ensuring adequate pensions on a sustainable basis has become a major challenge. This study aims to explore the potential of using the Data Envelopment Analysis (DEA) technique in order to access the efficiency of the income protection in old age, one of the most important branches of Social Security. To this effect, we collected data from the 27 European Union Member States regarding this branch. Our results show important differences among the Member States and stress the importance of identifying best practices to achieve more adequate, sustainable and modernised pension systems. Our results also highlight the importance of using DEA as a decision support tool for policy makers.
What Attitude Changes Are Needed to Cause SMEs to Take a Strategic Approach to Information Security?
Resumo:
Spending on security in an SME usually has to compete with demands for hardware, infrastructure, and strategic applications. In this paper, the authors seek to explore the reasons why smaller SMEs in particular have consistently failed to see securing information as strategic year-on-year spending, and just regard as part of an overall tight IT budget. The authors scrutinise the typical SMEs reasoning for choosing to see non-spending on security as an acceptable strategic risk. They look particularly at possible reasons why SMEs tend not to take much notice of "scare stories" in the media based on research showing they are increasingly at risk, whilst larger businesses are taking greater precautions and become more difficult to penetrate. The results and their analysis provide useful pointers towards broader business environment changes that would cause SMEs to be more risk-averse and ethical in their approach to securing their own and their clients’ information.
Resumo:
This paper explores the prospects and challenges of achieving human security through United Nations (UN) human rights law. The paper does not aim to pronounce definitively on the achievement of human security by way of UN human rights law that is, to assess the achievement of human security per se 'as a future end state'. Rather the focus of the paper is firmly placed on the capacity of UN human rights law to achieve human security. The paper departs from the premise that if human rights define human security, international human rights law and UN human rights law in particular should have something to say about the achievement of human security.
Resumo:
This programme of research used a developmental psychopathology approach to investigate females across the adolescent period. A two-sided story is presented; first, a study of neuroendocrine and psychosocial parameters in a group of healthy female adolescents (N = 63), followed by a parallel study of female adolescents with anorexia nervosa (AN) (N = 8). A biopsychosocial, multi-method measurement approach was taken, which utilised self-report, interview and hypothalamic-pituitary-adrenocortical (HPA) axis measures. Saliva samples for the measurement of cortisol and DHEA were collected using the best-recommended methodology: multiple samples over the day, strict reference to time of awakening, and two consecutive sampling weekdays. The research was adolescent-orientated: specifically, by using creative and ageappropriate strategies to ensure participant adherence to protocol, as well as more generally by adopting various procedures to facilitate engagement with the research process. In the healthy females mean (± SD) age 13.9 (± 2.7) years, cortisol and DHEA secretion exhibited typical adult-like diurnal patterns. Developmental markers of chronological age, menarche status and body mass index (BMI) had differential associations with cortisol and DHEA secretory activity. The pattern of the cortisol awakening response (CAR) was sensitive to whether participants had experienced first menses, but not to chronological age or BMI. Those who were post-menarche generally reached their peak point of cortisol secretion at 45 minutes post-awakening, in contrast to the pre-menarche group who were more evenly spread. Subsequent daytime cortisol levels were also higher in post-menarche females, and this effect was also noted for increasing age and BMI. Both morning and evening DHEA were positively associated with developmental markers. None of the situational or self-report psychosocial variables that were measured modulated any of the key findings regarding cortisol and DHEA secretion. The healthy group of girls were within age-appropriate norms for all the self-report measures used, however just under half of this group were insecurely attached (as assessed by interview). Only attachment style was associated with neuroendocrine parameters. In particular, those with an anxious insecure style exhibited a higher awakening sample (levels were 7.16 nmol/l, 10.40 nmol/l and 7.93 nmol/l for secure, anxious and avoidant groups, respectively) and a flatter CAR (mean increases over the awakening period were 6.38 nmol/l, 2.32 nmol/l and 8.61 nmol/l for secure, anxious and avoidant groups, respectively). The afore-mentioned pattern is similar to that consistently associated with psychological disorder in adults, and so this may be a pre-clinical vulnerability factor for subsequent mental health problems. A group of females with AN, mean (± SD) age 15.1 (± 1.6) years, were recruited from a specialist residential clinic and compared to the above group of healthy control (HC) female adolescents. A general picture of cortisol and DHEA hypersecretion was revealed in those with AN. The mean (± SD) change exhibited in cortisol levels over the 30 minute post-awakening period was 7.05 nmol/l (± 5.99) and 8.33 nmol/l (± 6.41) for HC and AN groups, respectively. The mean (± SD) evening cortisol level for the HC girls was 1.95 nmol/l (± 2.11), in comparison to 6.42 nmol/l (± 11.10) for the AN group. Mean (± SD) morning DHEA concentrations were 1.47 nmol/l (± 0.85) and 2.25 nmol/l (± 0.88) for HC and AN groups, respectively. The HC group’s mean (± SD) concentration of 12 hour DHEA was 0.55 nmol/l (± 0.46) and the AN group’s mean level was 0.89 nmol/l (± 0.90). This adrenal steroid hypersecretion evidenced by the AN group was not associated with BMI or eating disorder symptomatology. Insecure attachment characterised by fearfulness and anger was most apparent; a style which was unparalleled in the healthy group of female adolescents. The causal directions of the AN group findings remain unclear. Examining some of the participants with AN as case studies one year post-discharge from the clinic illustrated that for one participant who was recovered, in terms of returning to ordinary school life and no longer exhibiting clinical levels of eating disorder symptomatology, her CARs were no longer inconsistent over sampling days and her DHEA levels were also now generally comparable to the healthy control group. For another participant who had not recovered from her AN one year later, the profile of her CAR continued to be inconsistent over sampling days and her DHEA concentrations over the diurnal period were significantly higher in comparison to the healthy control group. In its entirety, this work’s unique contribution lies in its consideration of methodological and developmental issues specifically pertaining to adolescents. Findings also contribute to knowledge of AN and understanding of vulnerability factors, and how these may be used to develop interventions dedicated to improving adolescent health.