834 resultados para security, usability, identity management, authentication, authorization


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Variability management is one of the major challenges in software product line adoption, since it needs to be efficiently managed at various levels of the software product line development process (e.g., requirement analysis, design, implementation, etc.). One of the main challenges within variability management is the handling and effective visualization of large-scale (industry-size) models, which in many projects, can reach the order of thousands, along with the dependency relationships that exist among them. These have raised many concerns regarding the scalability of current variability management tools and techniques and their lack of industrial adoption. To address the scalability issues, this work employed a combination of quantitative and qualitative research methods to identify the reasons behind the limited scalability of existing variability management tools and techniques. In addition to producing a comprehensive catalogue of existing tools, the outcome form this stage helped understand the major limitations of existing tools. Based on the findings, a novel approach was created for managing variability that employed two main principles for supporting scalability. First, the separation-of-concerns principle was employed by creating multiple views of variability models to alleviate information overload. Second, hyperbolic trees were used to visualise models (compared to Euclidian space trees traditionally used). The result was an approach that can represent models encompassing hundreds of variability points and complex relationships. These concepts were demonstrated by implementing them in an existing variability management tool and using it to model a real-life product line with over a thousand variability points. Finally, in order to assess the work, an evaluation framework was designed based on various established usability assessment best practices and standards. The framework was then used with several case studies to benchmark the performance of this work against other existing tools.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Indigenous communities have actively managed their environments for millennia using a diversity of resource use and conservation strategies. Clam gardens, ancient rock-walled intertidal beach terraces, represent one example of an early mariculture technology that may have been used to improve food security and confer resilience to coupled human-ocean systems. We surveyed a coastal landscape for evidence of past resource use and management to gain insight into ancient resource stewardship practices on the central coast of British Columbia, Canada. We found that clam gardens are embedded within a diverse portfolio of resource use and management strategies and were likely one component of a larger, complex resource management system. We compared clam diversity, density, recruitment, and biomass in three clam gardens and three unmodified nonwalled beaches. Evidence suggests that butter clams (Saxidomus gigantea) had 1.96 times the biomass and 2.44 times the density in clam gardens relative to unmodified beaches. This was due to a reduction in beach slope and thus an increase in the optimal tidal range where clams grow and survive best. The most pronounced differences in butter clam density between nonwalled beaches and clam gardens were found at high tidal elevations at the top of the beach. Finally, clam recruits (0.5-2 mm in length) tended to be greater in clam gardens compared to nonwalled beaches and may be attributed to the addition of shell hash by ancient people, which remains on the landscape today. As part of a broader social-ecological system, clam garden sites were among several modifications made by humans that collectively may have conferred resilience to past communities by providing reliable and diverse access to food resources.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hospitals from ancient Seville had an important heritage for survival of the institution and its patients. In order to keep this heritage, the officialdom settled down several control mechanisms that would serve to manage a profitable management of their income and rights. For this purpose, they developed devising instruments able to preserve their possessions and put them into operation. This article attempts to identify the defining elements of these books, called “protocolos de bienes” (protocols goods), indicating their characteristics and evolution from archaic models until the final form. This final form was reached late sixteenth and early seventeenth century, at which time devoted use main codex of hospitality. To do this, we used the documentary collec-tions of Seville, preserved in different archives of the city, from where they have taken several significant examples showing the changes that occurred in both its internal structure and its mate-rials manufacturing, underlining the participation of official, booksellers, illuminators and calligraphers. Similarly, it has high-lighted the multifaceted and multifunctional character of this ins-titutions that became also a corporate identity. The multiplicity of hospitals in Sevilla had different types and features of protocols, which were modificated according to the different needs of each institution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cette thèse se penche sur la rationalité sécuritaire qui organise les villes de Douala et Yaoundé. En effet, l’insécurité urbaine devient une question très préoccupante, encore plus dans les villes des pays du Sud notamment les villes camerounaises où la recrudescence de la criminalité et de la violence ont donné lieu à des initiatives de sécurisation de la part de l’État et de la population. Sur le plan de la théorie, plusieurs approches nous permettent de nous projeter dans l’environnement sécuritaire des villes à l’étude. Nous considérons les villes de Douala et Yaoundé comme des lieux de production culturelle où se construisent à la faveur des migrations, à partir de diverses cultures et de comportements issus des villages d’origine, des formes d’identités hybrides et des territoires urbains diversifiés. Cela donne donc à réfléchir sur les modes de gouvernance locale, à l’échelle des quartiers, dans le but de comprendre les modalités d’encadrement de cette dynamique culturelle urbaine. Dans le même ordre d’idées, la gouvernance locale fait appel aux acteurs, dans leurs rôles et leurs logiques. Ces logiques s’observent dans leurs dimensions cognitives et leurs rapports avec l’espace. Les dimensions cognitives évoquent les perceptions, le vécu et les représentations subjectives qui sont associées à l’insécurité. Ainsi, le sentiment d’insécurité, la peur, la marginalisation, la violence et la criminalisation sont des phénomènes qui laissent entrevoir des populations défavorisées, victimes d’insécurité. C’est à côté de ces dernières que se manifestent les logiques d’acteurs associées à l’espace, qui ouvrent l’observation sur l’informalité et la ségrégation non seulement comme instruments de contrôle de l’espace urbain, mais également comme cadres de production d’espaces sécurisés. L’informalité et la ségrégation sont aussi favorables au développement des identités, à la construction d’utopies, ces visions mélioratives qui motivent et transforment les acteurs. Ce sont ces logiques d’acteurs dans leurs rapports avec l’espace qui justifient les initiatives de sécurisation. Finalement, c’est dans cette dynamique de transformation que les acteurs entrent en processus de subjectivation pour se produire comme sujets. Sur le plan méthodologique, cette thèse repose sur une ethnographie critique et comparative de la sécurité et sur l’approche de l’action sociale, qui invite à s’attarder aux interactions sociales, pour rendre compte de la rationalité sécuritaire. Étudier la sécurité requiert de s’attarder à l’échelle des quartiers, objets principaux de la sécurisation et espaces d’expression de l’informalité. Les quartiers sont encadrés par les chefferies urbaines, dont les systèmes de gestion constituent la gouvernance locale. Face à la question de la sécurité, cette gouvernance se prononce entre autres en fonction de son identité, de sa culture et de ses représentations. Elle côtoie les logiques étatiques dont les techniques et les stratégies d’organisation matérialisent les politiques de sécurité. Douala et Yaoundé présentent des approches populaires de sécurisation qui diffèrent sur le plan de l’organisation locale des quartiers et du tempérament populaire. Elles se rapprochent par les logiques d’acteurs et la motivation que ces derniers ont à se produire en sujets. La recherche a permis de constater qu’une forme de rationalité régit l’ensemble des dynamiques et des stratégies de production de la sécurité qui ont cours à Douala et Yaoundé. Cette rationalité passe par une pluralité de logiques de sécurité, elles-mêmes tributaires de nombreux phénomènes qui contribuent à la production de l’insécurité, mais aussi à celle de la sécurité. En effet, les migrations de la campagne vers la ville, l’informalité, la ségrégation et la présence de gangs locaux sont des réalités urbaines qui donnent une forme particulière à l’insécurité, mais invitent également à une réadaptation des techniques et des groupes d’acteurs impliqués dans la production de la sécurité. Il ressort que la rationalité sécuritaire, cette intelligence de gouvernement qui s’organise dans les dispositifs de l’offre publique de sécurité, suscite aussi dans les procédés des acteurs populaires, des techniques d’identification aux forces de l’ordre. Dans son processus, elle aboutit à la production de sujets sécurisés et de sécurité. En saisissant les productions humaines comme des activités innovantes, nous comprenons que la sécurisation procède par rapprochement entre les forces de l’ordre et les populations, par la mise en oeuvre de mécanismes mis en place pour répondre à la menace mais aussi par la « confiscation de la sécurité » pour les besoins d’une élite. Ensuite, elle représente une instance de subjectivation où l’innovation se matérialise et où les acteurs se réalisent, créent la sécurité et recréent la ville. Finalement, cette thèse révèle une pluralité de logiques de sécurité construites autour d’une même rationalité sécuritaire.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The evolution and maturation of Cloud Computing created an opportunity for the emergence of new Cloud applications. High-performance Computing, a complex problem solving class, arises as a new business consumer by taking advantage of the Cloud premises and leaving the expensive datacenter management and difficult grid development. Standing on an advanced maturing phase, today’s Cloud discarded many of its drawbacks, becoming more and more efficient and widespread. Performance enhancements, prices drops due to massification and customizable services on demand triggered an emphasized attention from other markets. HPC, regardless of being a very well established field, traditionally has a narrow frontier concerning its deployment and runs on dedicated datacenters or large grid computing. The problem with common placement is mainly the initial cost and the inability to fully use resources which not all research labs can afford. The main objective of this work was to investigate new technical solutions to allow the deployment of HPC applications on the Cloud, with particular emphasis on the private on-premise resources – the lower end of the chain which reduces costs. The work includes many experiments and analysis to identify obstacles and technology limitations. The feasibility of the objective was tested with new modeling, architecture and several applications migration. The final application integrates a simplified incorporation of both public and private Cloud resources, as well as HPC applications scheduling, deployment and management. It uses a well-defined user role strategy, based on federated authentication and a seamless procedure to daily usage with balanced low cost and performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Public Lightning is an important part of municipality’s nighttime landscape. Lighting can be used to enhance public safety and security while improving the aesthetic appeal of the surrounding properties but with the current global financial crisis, such lighting systems must also be sustainable. Most climate policy efforts focus on the state and international level, however national governments won’t be able to meet their international commitments without local action. In Portugal, the Public Lighting is responsible for 3% of energy consumption. The problem is that the trend is to increase (about 4-5% per year) which represents very high costs for the municipal authorities. In terms of numbers are analyzed in this thesis 45 of 278 existent in Continental Portugal what represents only 16,2 % of the counties. This where the local authorities in Portugal that had a Sustainable Energy Action Plan (SEAP) that had been accepted and made available in the Covenant of Mayors website until the end of year 2013. It is important that the Covenant of Mayors will increase the local authorities awareness for energy efficiency and especially to public lighting because there is still a long way to go in terms of energy consumption reduction. In future works it would be interesting to see the payback of the EolGreen post in a real scenario due to lack of energy consumption from the grid it would allow to have a pretty high initial investment even with the maintenance that those technologies need.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In recent years, the EU and its member states have experienced a number of changes, as well as challenges, in the areas of politics, economics, security and law. As these areas are interconnected, changes and challenges to any of them have implications for the others, as well as implications for the populations and institutions of the EU or those coming into contact with its international power and influence. This edited collection focuses primarily on security and law, particularly the EU’s internal security strategy. The EU’s Internal Security Strategy, adopted by the Spanish presidency early in 2010, followed the Lisbon Treaty in 2009, building on previous developments within the EU in the Area of Freedom Security and Justice (AFSJ) policy. The focus of the EU Internal Security Strategy is to prevent and combat “serious and organised crime, terrorism and cybercrime, in strengthening the management of our external borders and in building resilience to natural and man-made disasters”. The Internal Security strategy intersects and overlaps with the European Union’s Counter-terrorism strategy, the Strategy for the External Dimension of JHA, and the EU’s Security Strategy. The role of and interaction between these strategies, their supplementing documents, and their implications for crime, victims, the law, political relations, democracy and human rights, form the backdrop against which the chapters in this collection are written. Building on original research by its contributors, this collection comprises work by authors from a wide variety of academic and professional areas and perspectives, as well as different countries, on a variety of areas and issues related to or raised by the EU’s Internal Security Strategy, from intelligence-led policing to human trafficking and port security. This book examines, from a wide variety of disciplinary perspectives including law, geography, politics and practice, both this further refinement of existing internal provisions on cross-border crime, and the increasing external relations of the EU in the AFSJ.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fisheries are very important to Uganda's economy. The sector provides a vital source of food, recreation, trade and socioeconomic well being for the people and community globally. The fisheries of small lakes are important for producing fish for local populations who are not near the large lakes. These satellite lakes support important fisheries and other economic activities like fishing, water for domestic purposes and tourism, besides socio-cultural values. A number-of fish;- species, some of which were found only in Lake Victoria have been depleted through over-exploitation, introduction of exotics especiaily Nile perch and environmental degradation. Some of these fishes have been observed to survive in satellite lakes in the Victoria and Kyoga Lake basins. The Nabugabo satellite lakes (Manywa, Kayugi and Kayanja) contain endemic Cichlid fish species acting as reservoirs and therefore very important for conservation of fish biodiversity. Despite the socio-economic importance and uniqueness of these satellite lakes little research on socio-economic studies has been carried out. The sustainability of the lake is being threatened by increasing human activities. The fish stocks and species diversity are declining and this poses a threat to the livelihood of the people who depend on fish for food and income. Arising from this need a study was carried out to establish the socio-economic aspects of Nabugabo fisheries and implications for management, on which basis resource users would be made aware of the impacts of their activities. It was hoped that this would go further to ensure wise use and management of the resources by the users. The specific objectives were identifying activities around the lake, establishing socioeconomic values attached to the lake, identifying problems of the lake and resource users and examining existing local based management institutions. Results show that the activities taking place around the lakes include fishing, farming, watering of animals, deforestation and charcoal burning, brick making, resort beach development and food and refreshment. The major problem facing the lake was found to be encroachment of Hippo grass (Vossia) on the lake, which is decreasing the size of the lake, and limiting open waters for fishing (this only applied to Lake Nabugabo). Other important problems include use of illegal fishing methods, declining fish stocks and loss of cultural identity. The resource users are most pressed by the low incomes resulting from poor fish catches, theft of gears and lack of market. On examining the resource base for the lakes, it was only Lake Nabugabo that had a Landing Management Committee. The other three lakes did not have leadership institutions in place except the local councils for the respective villages. This was probably due to observed limited fisheries activities. Majority of the respondents agreed that Government and other service providers should work jointly to supplement local beach management committees in the management of the lakes resources. This is a good gesture because with increase in fishing effort and rampant use of illegal fishing methods, there is need to strengthen management institutions present on the lake. This would require Government, local community and other service providers to work together in a participatory way to control environment-degrading activities and stop the use of illegal fishing methods. Burning of vegetation on the lake should be stopped since it enhances growth of this grass. Finally, traditional taboos; which are present on some of the Nabugabo lakes, should be enhanced, as away of preserving them.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fisheries plays a significant and important part in the economy of the country contributing to foreign exchange, food security and employment creation. Lake Victoria contributes over 50% of the total annual fish catch. The purpose of fisheries management is to ensure conservation, protection, proper use, economic efficiency and equitable distribution of the fisheries resources both for the present and future generations through sustainable utilization. The earliest fisheries were mainly at the subsistence level. Fishing gear consisted of locally made basket traps, hooks and seine nets of papyrus. Fishing effort begun to increase with the introduction of more efficient flax gillnets in 1905. Fisheries management in Uganda started in 1914. Before then, the fishery was under some form of traditional management based on the do and don'ts. History shows that the Baganda had strong spiritual beliefs in respect of "god Mukasa" (god of the Lake) and these indirectly contributed to sustainable management of the lake. If a fisherman neglected to comply witt'l any of the ceremonies related to fishing he was expected to encounter a bad omen (Rev. Roscoe, 1965) However, with the introduction of the nylon gill nets, which could catch more fish, traditional management regime broke down. By 1955 the indigenous fish species like Oreochromis variabilis and Oreochromis esculentus had greatly declined in catches. Decline in catches led to introduction of poor fishing methods because of competition for fish. Government in an attempt to regulate the fishing irldustry enacted the first Fisheries Ordinance in 1951 and recruited Fisheries Officers to enforce them. The government put in place minimum net mesh-sizes and Fisheries Officers arrested fishermen without explaining the reason. This led to continued poor fishing practices. The development of government centred management systems led to increased alienation of resource users and to wilful disregard of specific regulations. The realisation of the problems faced by the central management system led to the recognition that user groups need to be actively involved in fisheries management if the systems are to be consistent with sustainable fisheries and be legitimate. Community participation in fisheries management under the Comanagement approach has been adopted in Lake Victoria including other water bodies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We outline a philosophical approach to Grand Challenge projects, with particular reference to our experience in our food security project involving the protection of stored grain from insect attack in two countries on different continents. A key consideration throughout has been the management of resistance in these pests to the valuable fumigant phosphine. Emphasis is given to the chain of research issues that required solution and the assembly of a well-integrated team, overlapping in skills for effective communication, in each country to solve the problems identified along that chain. A crucial aspect to maintaining direction is the inclusion of key end users in all deliberations, as well as the establishment and maintenance of effective outlets for the dissemination of practical recommendations. We finish with a summary of our achievements with respect to our approach to this food security Grand Challenge.