785 resultados para Governance of security


Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, a new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream. As a result, it is not necessary to fully decode a compressed video stream both in the embedding and extracting processes. The method also presents an inexpensive spatiotemporal analysis that selects the appropriate submacroblocks for embedding, increasing watermark robustness while reducing its impact on visual quality. Meanwhile, the proposed method prevents bit-rate increase and restricts it within an acceptable limit by selecting appropriate quantized residuals for watermark insertion. Regarding watermarking demands such as imperceptibility, bit-rate control, and appropriate level of security, a priority matrix is defined which can be adjusted based on the application requirements. The resulted flexibility expands the usability of the proposed method.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper challenges the recent suggestion that a new financial elite has evolved which is able to capture substantial profit shares for itself. Specifically, it questions the assumption that new groups of financial intermediaries have increased in significance primarily because there is evidence that various types of financial speculators have played a similarly extensive role at several junctures of economic development. The paper then develops the alternative hypothesis that, rather than being a recent development, the rise of these financial intermediaries is a cyclical phenomenon which is linked to specific regimes of capital accumulation. The hypothesis is underpinned by historical data from the US National Income and Product Accounts for the period from 1930 to 2000, which suggest that the activities of `mainstream' financial intermediaries have been accompanied by the frequently countercyclical activities of a `speculative' sector of security and commodity brokers. Based on the combination of this qualitative and quantitative evidence, the paper concludes that the rise of a speculative financial sector is a potentially recurrent phenomenon which is linked to periods of economic restructuring and turmoil.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper assesses the impact of UK devolution on social housing policy in Northern Ireland from 1999 until 2011, with a particular focus on the administration from May 2007 until April 2011, the first in which the elected elements of the process functioned for the entire period. Housing is one of the responsibilities of the Minister for Social Development. Northern Ireland has had a political commitment to the provision of good quality social housing for many years, both before and after the 1998 Good Friday/ Belfast Agreement and the establishment of the Northern Ireland Assembly and Executive in 1999.
The paper begins with an analysis of factors contributing to policy difference within the United Kingdom under the 1999 devolution settlement, noting that these factors may contribute either to policy convergence or divergence between the four UK jurisdictions. There follow reflections on the concept of ‘policy ownership’ in multi-level states and the benefits of this analytical approach for consideration of housing policy under UK devolution. A review of social housing policy since 1999 is followed by discussion of three key issues from the 2007-11 administration: the governance of social housing; the procurement of new social housing; and improving access to shared space and a shared future. The paper concludes that, in Northern Ireland, the 2007-11 administration marked a transition between a technocratic past and the future policy ownership of the social housing policy field by locally elected politicians. Reflections on wider implications for UK social policy, for UK devolution, and for the complex governance structures of devolved and federal states are also included.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present a novel approach to network security against passive eavesdroppers by employing a configurable beam-forming technique to create tightly defined regions of coverage for targeted users. In contrast to conventional encryption methods, our security scheme is developed at the physical layer by configuring antenna array beam patterns to transmit the data to specific regions. It is shown that this technique can effectively reduce vulnerability of the physical regions to eavesdropping by adapting the antenna configuration according to the intended user's channel state information. In this paper we present the application of our concept to 802.11n networks where an antenna array is employed at the access point, and consider the issue of minimizing the coverage area of the region surrounding the targeted user. A metric termed the exposure region is formally defined and used to evaluate the level of security offered by this technique. A range of antenna array configurations are examined through analysis and simulation, and these are subsequently used to obtain the optimum array configuration for a user traversing a coverage area.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The availability of electricity is fundamental to modern society. It is at the top of the list of critical infrastructures and its interruption can have severe consequences. This highly important system is now evolving to become more reliable, efficient, and clean. This evolving infrastructure has become known as the smart grid; and these future smart grid systems will rely heavily on ICT. This infrastructure will require many servers and due to the nature of the grid, many of these systems will be geographically diverse requiring communication links. At the heart of this ICT infrastructure will be security. At each level of the smart grid from smart metering right through to remote sensing and control networks, security will be a key factor for system design consideration. With an increased number of ICT systems in place the security risk also increases. In this paper the authors discuss the changing nature of security in relation to the smart grid by looking at the move from legacy systems to more modern smart grid systems. The potential planes of attack for future smart grid systems are identified, and the general anatomy of a cyber-attack is presented. The authors then introduce the various threat levels of different types of attack and the mitigation techniques that could be put in place for each. Finally, the authors' introduce a Phasor Measurement Unit (PMU) communication system (operated by the authors) that can be used as a test-bed for some of the proposed future security research.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect’s further actions towards critical assets. However, in the literature, these three issues are seldomly considered together in a sensor network based intelligent surveillance framework. To address
this problem, in this paper, we propose a multi-level decision support framework for in-time reaction in intelligent surveillance. More specifically, based on a multi-criteria event modeling framework, we design a method to predict the most plausible intention of a suspect. Following this, a decision support model is proposed to rank each suspect based on their threat severity and to determine resource allocation strategies. Finally, formal properties are discussed to justify our framework.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The management of public sector risk is increasingly seen as a priority area of UK government policy. This has been highlighted recently by the Prime Minister Gordon Brown who stated that “the issue of public risk is one of the most challenging areas of policy-making for any government” (Strategic Risk, 2008). In response to these challenges, the UK Prime Minister has appointed a new body - the Risk and Regulation Advisory Council (RRAC) which is tasked with improving the way risk to the public is understood and managed. One area of particular concern with regard to the governance of public sector risks involves projects procured via the Private Finance Initiative (PFI). These projects involve long-term contracts, complex multi-party interactions and thus create various risks to public sector clients. Today, most PFI actors acknowledge the potentially adverse effects of these risks and make an effort to prevent or mitigate undesirable results. As a consequence, issues of risk allocation, risk transfer and risk management have become central to the PFI procurement process. This paper provides an overview of the risk categories and risk types which are relevant to the public sector in PFI projects. It analyses risk as a feature of uncertain future project-related events and examines potential pitfalls which can be associated with PFI risk management on the basis of a case study of a high-profile PFI hospital in Scotland. The paper concludes that, despite the trend towards diminished risk profiles during the operational phase, the public sector continues to be exposed to significant risks when engaging in PFI-based procurement.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A importância económica, social e política do setor do turismo é uma realidade inquestionável. A sua expressão e capacidade de induzir o desenvolvimento económico em termos de outros setores, é cada vez mais importante. Apesar da dinâmica demonstrada, o setor do turismo enfrenta uma série de problemas estruturais que devem ser resolvidos. Nos últimos anos, o turismo em Portugal tem vindo a crescer em quantidade, mas às vezes sem muita qualidade. O desempenho económico do setor deve ser devidamente analisado, desde a análise do número de entradas de visitantes até questões como o volume de receitas obtido. Para além disso, é possível observar a existência de casos de concentração espacial excessiva em certas áreas do território. A política de turismo precisa de dimensão, de ser forte, bem estruturada e orientada. "Esta política deve promover sinergias entre redes de diferentes atores para criar uma base sólida de segurança e confiança para o investimento privado." (Costa, 2000) É importante avaliar o investimento e o sistema de financiamento no setor do turismo, para entender a filosofia e os objetivos que norteiam todo o sistema (política estratégica) e as dinâmicas territoriais e setoriais das empresas do turismo.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

A integração de serviços na perspetiva dos cidadãos e empresas e a necessidade de garantir algumas características da Administração Pública como a versatilidade e a competitividade colocam alguns constrangimentos na conceção das arquiteturas de integração de serviços. Para que seja possível integrar serviços de forma a que se garanta a mutabilidade da Administração Pública, é necessário criar dinamicamente workflows. No entanto, a criação de dinâmica de workflows suscita algumas preocupações ao nível da segurança, nomeadamente em relação à privacidade dos resultados produzidos durante a execução de um workflow e em relação à aplicação de políticas de controlo de participação no workflow pelos diversos executores do mesmo. Neste trabalho apresentamos um conjunto de princípios e regras (arquitetura) que permitem a criação e execução de workflows dinâmicos resolvendo, através de um modelo de segurança, as questões referidas. A arquitetura utiliza a composição de serviços para dessa forma construir serviços complexos a que poderá estar inerente um workflow dinâmico. A arquitetura usa ainda um paradigma de troca de mensagens-padrão entre os prestadores de serviços envolvidos num workflow dinâmico. O modelo de segurança proposto está intimamente ligado ao conjunto de mensagens definido na arquitetura. No âmbito do trabalho foram identificadas e analisadas várias arquiteturas e/ou plataformas de integração de serviços. A análise realizada teve como objetivo identificar as arquiteturas que permitem a criação de workflows dinâmicos e, destas, aquelas que utilizam mecanismos de privacidade para os resultados e de controlo de participação dos executores desses workflows. A arquitetura de integração que apresentamos é versátil, escalável, permite a prestação concorrente de serviços entre prestadores de serviços e permite criar workflows dinâmicos. A arquitetura permite que as entidades executoras do workflow decidam sobre a sua participação, decidam sobre a participação de terceiros (a quem delegam serviços) e decidam a quem entregam os resultados. Os participantes são acreditados por entidades certificadores reconhecidas pelos demais participantes. As credenciais fornecidas pelas entidades certificadoras são o ponto de partida para a aplicação de políticas de segurança no âmbito da arquitetura. Para validar a arquitetura proposta foram identificados vários casos de uso que exemplificam a necessidade de construção de workflows dinâmicos para atender a serviços complexos (não prestados na íntegra por uma única entidade). Estes casos de uso foram implementados num protótipo da arquitetura desenvolvido para o efeito. Essa experimentação permitiu concluir que a arquitetura está adequada para prestar esses serviços usando workflows dinâmicos e que na execução desses workflows os executores dispõem dos mecanismos de segurança adequados para controlar a sua participação, a participação de terceiros e a privacidade dos resultados produzidos no âmbito dos mesmos.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação apresentada ao Instituto Superior de Contabilidade para a obtenção do Grau de Mestre em Assessoria de Administração

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação de Mestrado apresentada ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Marketing Digital, sob orientação de Mestre António da Silva Vieira.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Trabalho Final de Mestrado para obtenção do grau de Mestre em Engenharia de Electrónica e Telecomunicações

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação de natureza científica realizada para obtenção do grau de Mestre em Engenharia de Redes de Computadores e Multimédia

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação apresentada na Escola Superior de Educação de Lisboa, para obtenção do grau de Mestre em Ciências da Educação - Especialidade Intervenção Precoce