908 resultados para Security-critical software
Resumo:
3rd Workshop on High-performance and Real-time Embedded Systems (HIRES 2015). 21, Jan, 2015. Amsterdam, Netherlands.
Resumo:
O crescimento dos sistemas de informação e a sua utilização massiva criou uma nova realidade no acesso a experiências remotas que se encontram geograficamente distribuídas. Nestes últimos tempos, a temática dos laboratórios remotos apareceu nos mais diversos campos como o do ensino ou o de sistemas industriais de controlo e monitorização. Como o acesso aos laboratórios é efectuado através de um meio permissivo como é o caso da Internet, a informação pode estar à mercê de qualquer atacante. Assim, é necessário garantir a segurança do acesso, de forma a criar condições para que não se verifique a adulteração dos valores obtidos, bem como a existência de acessos não permitidos. Os mecanismos de segurança adoptados devem ter em consideração a necessidade de autenticação e autorização, sendo estes pontos críticos no que respeita à segurança, pois estes laboratórios podem estar a controlar equipamentos sensíveis e dispendiosos, podendo até eventualmente comprometer em certos casos o controlo e a monotorização de sistemas industriais. Este trabalho teve como objectivo a análise da segurança em redes, tendo sido realizado um estudo sobre os vários conceitos e mecanismos de segurança necessários para garantir a segurança nas comunicações entre laboratórios remotos. Dele resultam as três soluções apresentadas de comunicação segura para laboratórios remotos distribuídos geograficamente, recorrendo às tecnologias IPSec, OpenVPN e PPTP. De forma a minimizar custos, toda a implementação foi assente em software de código aberto e na utilização de um computador de baixo custo. No que respeita à criação das VPNs, estas foram configuradas de modo a permitir obter os resultados pretendidos na criação de uma ligação segura para laboratórios remotos. O pfSense mostrou-se a escolha acertada visto que suporta nativamente quaisquer das tecnologias que foram estudadas e implementadas, sem necessidade de usar recursos físicos muito caros, permitindo o uso de tecnologias de código aberto sem comprometer a segurança no funcionamento das soluções que suportam a segurança nas comunicações dos laboratórios remotos.
Resumo:
O presente relatório de estágio mostra-nos um percurso realizado no ano letivo 2014/2015, referente à Prática de Ensino Supervisionada no âmbito do Mestrado em Ensino de Música, ramo de Formação Musical. O mesmo não reflete única e exclusivamente a Prática de Ensino Supervisionada do ano transato mas sim, todo um percurso académico realizado em que foram efetuadas reflexões, tomadas decisões, criadas novas ideias pedagógicas, que num todo foi essencial para uma melhoria da prática pedagógica como também na construção de um ser mais crítico e investigativo. Este documento é composto por duas partes. Na primeira parte é apresentado o capítulo I e II, sendo o primeiro uma abordagem à instituição de ensino em que foi realizada a prática de ensino supervisionada, e o segundo, uma reflexão aprofundada da mesma. A segunda parte do relatório prende-se a um Projeto de Investigação realizado no decorrer do ano letivo 2014/2015, direcionado para as Novas Tecnologias de Informação e Comunicação na Educação em geral e na Educação no Ensino Vocacional da Música mais especificamente, “O software EarMaster como ferramenta pedagógica na disciplina de Formação Musical”, tentando perceber se este tipo de software informáticos poderão ser uma mais-valia para o estudo da disciplina da Formação Musical e se trará melhores resultados para o aluno aquando da sua utilização. A metodologia utilizada no projeto de investigação prende-se a uma lógica quantitativa e qualitativa. O estudo não é, de todo, conclusivo devido ao tamanho da amostra obtida, tendo alguns alunos optado por não utilizar o software EarMaster, formando assim um pequeno grupo de amostra não suficiente para obter os melhores resultados, ficando em aberto possíveis investigações sobre esta temática. Serão, as Novas Tecnologias de Informação uma mais-valia para a Educação no nosso país? Será possível a utilização destas na sala de aula, sem que sejam pensadas como algo para “entreter” o aluno por momentos?
Resumo:
The “CMS Safety Closing Sensors System” (SCSS, or CSS for brevity) is a remote monitoring system design to control safety clearance and tight mechanical movements of parts of the CMS detector, especially during CMS assembly phases. We present the different systems that makes SCSS: its sensor technologies, the readout system, the data acquisition and control software. We also report on calibration and installation details, which determine the resolution and limits of the system. We present as well our experience from the operation of the system and the analysis of the data collected since 2008. Special emphasis is given to study positioning reproducibility during detector assembly and understanding how the magnetic fields influence the detector structure.
Resumo:
In most European countries Social Security (SS) systems are characterized as Pay-asyou- go systems. Their sustainability is being challenged with demographic changes, namely population ageing. Portugal’s population is ageing rapidly being one of the countries where this problem is more critical. With the growing debate on this topic several public choice models have been developed so as to explain SS size. In this work project there is an attempt to understand whether these models contribute to better explain Social security expenditure with pensions (SSEP) and to establish the need of finding ways to reduce present commitment with pension expenditure in Portugal.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.
Resumo:
Dissertação de mestrado integrado em Engenharia Biomédica (área de especialização em Informática Médica)
Resumo:
Identificación y caracterización del problema. Uno de los problemas más importantes asociados con la construcción de software es la corrección del mismo. En busca de proveer garantías del correcto funcionamiento del software, han surgido una variedad de técnicas de desarrollo con sólidas bases matemáticas y lógicas conocidas como métodos formales. Debido a su naturaleza, la aplicación de métodos formales requiere gran experiencia y conocimientos, sobre todo en lo concerniente a matemáticas y lógica, por lo cual su aplicación resulta costosa en la práctica. Esto ha provocado que su principal aplicación se limite a sistemas críticos, es decir, sistemas cuyo mal funcionamiento puede causar daños de magnitud, aunque los beneficios que sus técnicas proveen son relevantes a todo tipo de software. Poder trasladar los beneficios de los métodos formales a contextos de desarrollo de software más amplios que los sistemas críticos tendría un alto impacto en la productividad en tales contextos. Hipótesis. Contar con herramientas de análisis automático es un elemento de gran importancia. Ejemplos de esto son varias herramientas potentes de análisis basadas en métodos formales, cuya aplicación apunta directamente a código fuente. En la amplia mayoría de estas herramientas, la brecha entre las nociones a las cuales están acostumbrados los desarrolladores y aquellas necesarias para la aplicación de estas herramientas de análisis formal sigue siendo demasiado amplia. Muchas herramientas utilizan lenguajes de aserciones que escapan a los conocimientos y las costumbres usuales de los desarrolladores. Además, en muchos casos la salida brindada por la herramienta de análisis requiere cierto manejo del método formal subyacente. Este problema puede aliviarse mediante la producción de herramientas adecuadas. Otro problema intrínseco a las técnicas automáticas de análisis es cómo se comportan las mismas a medida que el tamaño y complejidad de los elementos a analizar crece (escalabilidad). Esta limitación es ampliamente conocida y es considerada crítica en la aplicabilidad de métodos formales de análisis en la práctica. Una forma de atacar este problema es el aprovechamiento de información y características de dominios específicos de aplicación. Planteo de objetivos. Este proyecto apunta a la construcción de herramientas de análisis formal para contribuir a la calidad, en cuanto a su corrección funcional, de especificaciones, modelos o código, en el contexto del desarrollo de software. Más precisamente, se busca, por un lado, identificar ambientes específicos en los cuales ciertas técnicas de análisis automático, como el análisis basado en SMT o SAT solving, o el model checking, puedan llevarse a niveles de escalabilidad superiores a los conocidos para estas técnicas en ámbitos generales. Se intentará implementar las adaptaciones a las técnicas elegidas en herramientas que permitan su uso a desarrolladores familiarizados con el contexto de aplicación, pero no necesariamente conocedores de los métodos o técnicas subyacentes. Materiales y métodos a utilizar. Los materiales a emplear serán bibliografía relevante al área y equipamiento informático. Métodos. Se emplearán los métodos propios de la matemática discreta, la lógica y la ingeniería de software. Resultados esperados. Uno de los resultados esperados del proyecto es la individualización de ámbitos específicos de aplicación de métodos formales de análisis. Se espera que como resultado del desarrollo del proyecto surjan herramientas de análisis cuyo nivel de usabilidad sea adecuado para su aplicación por parte de desarrolladores sin formación específica en los métodos formales utilizados. Importancia del proyecto. El principal impacto de este proyecto será la contribución a la aplicación práctica de técnicas formales de análisis en diferentes etapas del desarrollo de software, con la finalidad de incrementar su calidad y confiabilidad. A crucial factor for software quality is correcteness. Traditionally, formal approaches to software development concentrate on functional correctness, and tackle this problem basically by being based on well defined notations founded on solid mathematical grounds. This makes formal methods better suited for analysis, due to their precise semantics, but they are usually more complex, and require familiarity and experience with the manipulation of mathematical definitions. So, their acceptance by software engineers is rather restricted, and formal methods applications have been confined to critical systems. Nevertheless, it is obvious that the advantages that formal methods provide apply to any kind of software system. It is accepted that appropriate software tool support for formal analysis is essential, if one seeks providing support for software development based on formal methods. Indeed, some of the relatively recent sucesses of formal methods are accompanied by good quality tools that automate powerful analysis mechanisms, and are even integrated in widely used development environments. Still, most of these tools either concentrate on code analysis, and in many cases are still far from being simple enough to be employed by software engineers without experience in formal methods. Another important problem for the adoption of tool support for formal methods is scalability. Automated software analysis is intrinsically complex, and thus techniques do not scale well in the general case. In this project, we will attempt to identify particular modelling, design, specification or coding activities in software development processes where to apply automated formal analysis techniques. By focusing in very specific application domains, we expect to find characteristics that might be exploited to increase the scalability of the corresponding analyses, compared to the general case.
Resumo:
OBJECTIVE: To assess whether formatting the medical order sheet has an effect on the accuracy and security of antibiotics prescription. DESIGN: Prospective assessment of antibiotics prescription over time, before and after the intervention, in comparison with a control ward. SETTING: The medical and surgical intensive care unit (ICU) of a university hospital. PATIENTS: All patients hospitalized in the medical or surgical ICU between February 1 and April 30, 1997, and July 1 and August 31, 2000, for whom antibiotics were prescribed. INTERVENTION: Formatting of the medical order sheet in the surgical ICU in 1998. MEASUREMENTS AND MAIN RESULTS: Compliance with the American Society of Hospital Pharmacists' criteria for prescription safety was measured. The proportion of safe orders increased in both units, but the increase was 4.6 times greater in the surgical ICU (66% vs. 74% in the medical ICU and 48% vs. 74% in the surgical ICU). For unsafe orders, the proportion of ambiguous orders decreased by half in the medical ICU (9% vs. 17%) and nearly disappeared in the surgical ICU (1% vs. 30%). The only missing criterion remaining in the surgical ICU was the drug dose unit, which could not be preformatted. The aim of antibiotics prescription (either prophylactic or therapeutic) was indicated only in 51% of the order sheets. CONCLUSIONS: Formatting of the order sheet markedly increased security of antibiotics prescription. These findings must be confirmed in other settings and with different drug classes. Formatting the medical order sheet decreases the potential for prescribing errors before full computerized prescription is available.
Resumo:
Critical limb ischemia in diabetic patients is associated with high rates of morbidity and mortality. Suboptimal responses to the available medical and surgical treatments are common in these patients, who also demonstrate limited vascular homeostasis. Neovasculogenesis induced by stem cell therapy could be a useful approach for these patients. Neovasculogenesis and clinical improvement were compared at baseline and at 3 and 12 months after autologous bone marrow-derived mononuclear cell (BMMNC) transplantation in diabetic patients with peripheral artery disease. We conducted a prospective study to evaluate the safety and efficacy of intra-arterial administration of autologous BMMNCs (100-400 × 10(6) cells) in 20 diabetic patients with severe below-the-knee arterial ischemia. Although the time course of clinical effects differed among patients, after 12 months of follow-up all patients presented a notable improvement in the Rutherford-Becker classification, the University of Texas diabetic wound scales, and the Ankle-Brachial Index in the target limb. The clinical outcome was consistent with neovasculogenesis, which was assessed at 3 months by digital subtraction angiography and quantified by MetaMorph software. Unfortunately, local cell therapy in the target limb had no beneficial effect on the high mortality rate in these patients. In diabetic patients with critical limb ischemia, intra-arterial perfusion of BMMNCs is a safe procedure that generates a significant increase in the vascular network in ischemic areas and promotes remarkable clinical improvement.
Resumo:
Critical limb ischemia in diabetic patients is associated with high rates of morbidity and mortality. Suboptimal responses to the available medical and surgical treatments are common in these patients, who also demonstrate limited vascular homeostasis. Neovasculogenesis induced by stem cell therapy could be a useful approach for these patients. Neovasculogenesis and clinical improvement were compared at baseline and at 3 and 12 months after autologous bone marrow-derived mononuclear cell (BMMNC) transplantation in diabetic patients with peripheral artery disease. We conducted a prospective study to evaluate the safety and efficacy of intra-arterial administration of autologous BMMNCs (100-400 × 10(6) cells) in 20 diabetic patients with severe below-the-knee arterial ischemia. Although the time course of clinical effects differed among patients, after 12 months of follow-up all patients presented a notable improvement in the Rutherford-Becker classification, the University of Texas diabetic wound scales, and the Ankle-Brachial Index in the target limb. The clinical outcome was consistent with neovasculogenesis, which was assessed at 3 months by digital subtraction angiography and quantified by MetaMorph software. Unfortunately, local cell therapy in the target limb had no beneficial effect on the high mortality rate in these patients. In diabetic patients with critical limb ischemia, intra-arterial perfusion of BMMNCs is a safe procedure that generates a significant increase in the vascular network in ischemic areas and promotes remarkable clinical improvement.
Resumo:
Purpose/Objective(s): To implement a carotid dose sparing protocol using helical Tomotherapy in T1N0 squamous cell laryngeal carcinoma.Materials/Methods: Between July and August 2010, 7 men with stage T1N0 laryngeal carcinoma were included in this study. Age ranged from 47 - 74 years. Staging included endoscopic examination, CT-scan and MRI when indicated. Planned irradiation dose was 70 Gy in 35 fractions over 7 weeks. A simple treatment planning algorithm for carotid sparing was used: maximum point dose to the carotids 35 Gy, to the spinal cord 30 Gy, and 100% PTV volume to be covered with 95% of the prescribed dose. Carotid volume of interest extended to 1 cm above and below of the PTV. Doses to the carotid arteries, to the critical organs, and to the planned target volume (PTV) with our standard laryngeal irradiation protocol was compared. Daily megavoltage scans were obtained before each fraction. When necessary, the Planned Adaptive software (TomoTherapy Inc., Madison, WI) was used to evaluatethe need for a re-planning, which has never been indicated. Dose data were extracted using the VelocityAI software (Atlanta, GA), and data normalization and dose-volume histogram (DVH) interpolation were realized using the Igor Pro software (Portland, OR).Results:A significant (p\0.05) carotid dose sparing compared to our standard protocol with an average maximum point dose of 38.3 Gy (standard deviation [SD] 4.05 Gy), average mean dose of 18.59 Gy (SD 0.83 Gy) was achieved. In all patients, 95% of the carotid volume received less than 28.4 Gy (SD 0.98 Gy). The average maximum point dose to the spinal cord was 25.8 Gy (SD 3.24 Gy). PTV was fully covered with more than 95% of the prescribed dose for all patients with an average maximum point dose of 74.1 Gy and the absolute maximum dose in a single patient of 75.2 Gy. To date, the clinical outcomes have been excellent. Three patients (42%) developed stage 1 mucositis that was conservatively managed, and all the patients presented a mild to moderate dysphonia. All adverse effects resolved spontaneously in the month following the end of treatment. Early local control rate is 100% considering a 4 - 5 months post treatment follow-up.Conclusions: Helical Tomotherapy allows a clinically significant decrease of carotid irradiation dose compared to standard irradiation protocols with an acceptable spinal cord dose tradeoff. Moreover, this technique allows the PTV to be homogenously covered with a curative irradiation dose. Daily control imaging brings added security margins especially when working with high dose gradients. Further investigations and follow-up are underway to better evaluate the late clinical outcomes especially the local control rate, late laryngeal and vascular toxicity, and expected potential impact on cerebrovascular events.
Resumo:
Usability is critical to consider an interactive software system successful. Usability testing and evaluation during product development have gained wide acceptance as a strategy to improve product quality. Early introduction of usability perspectives in a product is very important in order to provide a clear visibility of the quality aspects not only for the developers, but also for the testing users as well. However, usability evaluation and testing are not commonly taken into consideration as an essential element of the software development process. Then, this paper exposes a proposal to introduce usability evaluation and testing within a software development through reuse of software artifacts. Additionally, it suggests the introduction of an auditor within the classification of actors for usability tests. It also proposes an improvement of checklists used for heuristics evaluation, adding quantitative and qualitative aspects to them
Resumo:
Some of the elements that characterize the globalization of food and agriculture are industrialization and intensification of agriculture and liberalization of agricultural markets, that favours elongation of the food chain and homogenization of food habits (nutrition transition), among other impacts. As a result, the probability of food contamination has increased with the distance and the number of “hands" that may contact the food (critical points); the nutritional quality of food has been reduced because of increased transport and longer periods of time from collection to consumption; and the number of food-related diseases due to changes in eating patterns has increased. In this context, there exist different agencies and regulations intended to ensure food safety at different levels, e.g. at the international level, Codex Alimentarius develops standards and regulations for the marketing of food in a global market. Although governments determine the legal framework, the food industry manages the safety of their products, and thus, develops its own standards for their marketing, such as the Good Agricultural Practices (GAP) programs. The participation of the private sector in the creation of regulatory standards strengthens the free trade of food products, favouring mostly large agribusiness companies. These standards are in most cases unattainable for small producers and food safety regulations are favouring removal of the peasantry and increase concentration and control in the food system by industrial actors. Particularly women, who traditionally have been in charge of the artisanal transformation process, can be more affected by these norms than men. In this project I am analysing the impcact of food safety norms over small farms, based on the case of artisanal production made by women in Spain.