922 resultados para secure interoperation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, two fast selective encryption methods for context-adaptive variable length coding and context-adaptive binary arithmetic coding in H.264/AVC were proposed by Shahid et al. In this paper, it was demonstrated that these two methods are not as efficient as only encrypting the sign bits of nonzero coefficients. Experimental results showed that without encrypting the sign bits of nonzero coefficients, these two methods can not provide a perceptual scrambling effect. If a much stronger scrambling effect is required, intra prediction modes, and the sign bits of motion vectors can be encrypted together with the sign bits of nonzero coefficients. For practical applications, the required encryption scheme should be customized according to a user's specified requirement on the perceptual scrambling effect and the computational cost. Thus, a tunable encryption scheme combining these three methods is proposed for H.264/AVC. To simplify its implementation and reduce the computational cost, a simple control mechanism is proposed to adjust the control factors. Experimental results show that this scheme can provide different scrambling levels by adjusting three control factors with no or very little impact on the compression performance. The proposed scheme can run in real-time and its computational cost is minimal. The security of the proposed scheme is also discussed. It is secure against the replacement attack when all three control factors are set to one.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge-intensive firms (KIFs) have been the subject of growing interest from researchers. However, investigations into the comparative experiences of men and women in KIFs remain sparse, and little is known about women's participation in the processes of innovation and knowledge exchange and combination that are core features of KIFs. The article reports on the findings of a study in the UK and Ireland involving 498 male and female knowledge workers in KIFs. Despite equal levels of qualification and experience, women are more likely to be in lower status and less secure jobs. They also predominantly occupy roles featuring less variety and autonomy than men and, despite comparable levels of knowledge exchange and combination, are less likely to be in a position to translate this into the innovative work behaviours necessary for career advancement. The findings suggest that women's experiences of and participation in knowledge processes within KIFs differ fundamentally from men's. © The Author(s) 2012.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Frequency stability has not necessarily been a major problem for the majority of power systems in the past. However, for economic and environmental reasons, power systems are now operated closer to stability limits to maximise the use of the existing networks. Therefore, introduction of new, more efficient and renewable generation technologies, and their effect on the power system must be fully understood if a reliable and secure electricity supply is to be maintained. Using the Northern Ireland, and interconnected Republic of Ireland electricity networks as a case study, this paper addresses some of the issues regarding integration and modelling of combined cycle gas turbines (CCGT), and wind turbine generator (WTG) technology on a small islanded power system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Physical Access Control Systems are commonly used to secure doors in buildings such as airports, hospitals, government buildings and offices. These systems are designed primarily to provide an authentication mechanism, but they also log each door access as a transaction in a database. Unsupervised learning techniques can be used to detect inconsistencies or anomalies in the mobility data, such as a cloned or forged Access Badge, or unusual behaviour by staff members. In this paper, we present an overview of our method of inferring directed graphs to represent a physical building network and the flows of mobility within it. We demonstrate how the graphs can be used for Visual Data Exploration, and outline how to apply algorithms based on Information Theory to the graph data in order to detect inconsistent or abnormal behaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Directional modulation (DM) is a recently introduced technique for secure wireless transmission using direct physical layer wave-front manipulation. This paper provides a bit error rate (BER)-based DM array synthesis method. It is shown for the first time that the standard constellation mappings in In-phase and Quadrature (IQ) space to a pre-specified BER can be exactly achieved along a given specified spatial direction. Different receiver capabilities are investigated and different assessment metrics for each case are discussed. The approach is validated for a 1 × 4 element dipole array operating at 1 GHz.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper metrics for assessing the performance of directional modulation (DM) physical-layer secure wireless systems are discussed. In the paper DM systems are shown to be categorized as static or dynamic. The behavior of each type of system is discussed for QPSK modulation. Besides EVM-like and BER metrics, secrecy rate as used in information theory community is also derived for the purpose of this QPSK DM system evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Financial and cultural aspects of corporate giving by UK and non-UK companies in response to the December 2004 South Asia Tsunami disaster are explored in this article. Literatures on corporate giving rationales, concepts of disaster and donor activity in disasters provide an underpinning. The article seeks to make connections between this high profile if short-lived business giving and the funding of the arts that is sought from business; and to draw tentative lessons for arts funding when seeking business support. The giving accounts in the wake of the Tsunami from a non-probability sample of 56 UK companies and 16 non-UK companies were examined. Reported online to the UK charity Business in the Community, these accounts were accessed in February 2005 and scrutinized thematically. Concurrently, company financial profiles to accompany giving figures were constructed. Although linkages between donation levels and financial performance were lacking, emerging themes included the role of employees, influencing company giving and creating a climate of expectation of firms' contributions. These developments may have important implications for business funding for the arts, where leading philanthropists are prominent as individuals in the giving landscapes; but employees' collective involvement is not marked. Alternatively, cultivation of employees as would-be donors, indirectly via their firms, may be a more secure, if lower level route to funding for some arts organizations than dependence on high profile business leaders. The article considers alternative scenarios for company giving in disaster contexts, including as a sustained and lasting giving theme or as company support as a ‘one-off’ event, rock-star style. The likely development of employee power as a key element in company giving is explored; and its wider meanings for funding in arts settings, (where the giver as rock star heroine/hero is also prominent) are considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The EU is considered to be one of the main proponents of what has been called the deep trade agenda—that is, the push for further trade liberalization with an emphasis on the removal of domestic non-tariff regulatory measures affecting trade, as opposed to the traditional focus on the removal of trade barriers at borders. As negotiations on the Doha Development Round have stalled, the EU has attempted to achieve these aims by entering into comprehensive free trade agreements (FTAs) that are not only limited exclusively to tariffs but also extend to non-tariff barriers, including services, intellectual property rights (IPRs), competition, and investment. These FTAs place great emphasis on regulatory convergence as a means to secure greater market openings. The paper examines the EU's current external trade policy in the area of IP, particularly its attempts to promote its own regulatory model for the protection of IP rights through trade agreements. By looking at the IP enforcement provisions of such agreements, the article also examines how the divisive issues that are currently hindering the progress of negotiations at WTO level, including the demands from developing countries to maintain a degree of autonomy in the area of IP regulation as well as the need to balance IP protection with human rights protection, are being dealt with in recent EU FTAs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The paper examines the role of shared spaces in divided cities in promoting future sustainable communities and spaces described as inclusive to all. It addresses the current challenges that prevent such inclusiveness and suggests future trends of its development to be of benefit to the wider city community. It explains how spaces in divided cities are carved up into perceived ownerships and territorialized areas, which increases tension on the shared space between territories; the control of which can often lead to inter-community disputes. The paper reports that common shared space in-between conflicting communities takes on increased importance since the nature of the conflict places emphasis on communities’ confidence, politically and socially, while also highlighting the necessity for confidence in inclusion and feeling secure in the public domain. In order to achieve sustainable environments, strategies to promote shared spaces require further focus on the significance of everyday dynamics as essential aspects for future integration and conflict resolution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fully homomorphic encryption (FHE) scheme is envisioned as a key cryptographic tool in building a secure and reliable cloud computing environment, as it allows arbitrary evaluation of a ciphertext without revealing the plaintext. However, existing FHE implementations remain impractical due to very high time and resource costs. To the authors’ knowledge, this paper presents the first hardware implementation of a full encryption primitive for FHE over the integers using FPGA technology. A large-integer multiplier architecture utilising Integer-FFT multiplication is proposed, and a large-integer Barrett modular reduction module is designed incorporating the proposed multiplier. The encryption primitive used in the integer-based FHE scheme is designed employing the proposed multiplier and modular reduction modules. The designs are verified using the Xilinx Virtex-7 FPGA platform. Experimental results show that a speed improvement factor of up to 44 is achievable for the hardware implementation of the FHE encryption scheme when compared to its corresponding software implementation. Moreover, performance analysis shows further speed improvements of the integer-based FHE encryption primitives may still be possible, for example through further optimisations or by targeting an ASIC platform.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this research was to explore consumer perceptions of personalised nutrition and to compare these across three different levels of "medicalization": lifestyle assessment (no blood sampling); phenotypic assessment (blood sampling); genomic assessment (blood and buccal sampling). The protocol was developed from two pilot focus groups conducted in the UK. Two focus groups (one comprising only "older" individuals between 30 and 60 years old, the other of adults 18-65 yrs of age) were run in the UK, Spain, the Netherlands, Poland, Portugal, Ireland, Greece and Germany (N = 16). The analysis (guided using grounded theory) suggested that personalised nutrition was perceived in terms of benefit to health and fitness and that convenience was an important driver of uptake. Negative attitudes were associated with internet delivery but not with personalised nutrition per se. Barriers to uptake were linked to broader technological issues associated with data protection, trust in regulator and service providers. Services that required a fee were expected to be of better quality and more secure. An efficacious, transparent and trustworthy regulatory framework for personalised nutrition is required to alleviate consumer concern. In addition, developing trust in service providers is important if such services to be successful. (C) 2013 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tephrochronology, a key tool in the correlation of Quaternary sequences, relies on the extraction of tephra shards from sediments for visual identification and high-precision geochemical comparison. A prerequisite for the reliable correlation of tephra layers is that the geochemical composition of glass shards remains unaltered by natural processes (e.g. chemical exchange in the sedimentary environment) and/or by laboratory analytical procedures. However, natural glasses, particularly when in the form of small shards with a high surface to volume ratio, are prone to chemical alteration in both acidic and basic environments. Current techniques for the extraction of distal tephra from sediments involve the ‘cleaning’ of samples in precisely such environments and at elevated temperatures. The acid phase of the ‘cleaning’ process risks alteration of the geochemical signature of the shards, while the basic phase leads to considerable sample loss through dissolution of the silica network. Here, we illustrate the degree of alteration and loss to which distal tephras may be prone, and introduce a less destructive procedure for their extraction. This method is based on stepped heavy liquid flotation and which results in samples of sufficient quality for analysis while preserving their geochemical integrity. In trials, this method out-performed chemical extraction procedures in terms of the number of shards recovered and has resulted in the detection of new tephra layers with low shard concentrations. The implications of this study are highly significant because (i) the current database of distal tephra records and their corresponding geochemical signatures may require refinement and (ii) the record of distal tephras may be incomplete due to sample loss induced by corrosive laboratory procedures. It is therefore vital that less corrosive laboratory procedures are developed to make the detection and classification of distal glass tephra more secure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Asthma is now one of the most common long-term conditions in the UK. It is therefore important to develop a comprehensive appreciation of the healthcare and societal costs in order to inform decisions on care provision and planning. We plan to build on our earlier estimates of national prevalence and costs from asthma by filling the data gaps previously identified in relation to healthcare and broadening the field of enquiry to include societal costs. This work will provide the first UK-wide estimates of the costs of asthma. In the context of asthma for the UK and its member countries (ie, England, Northern Ireland, Scotland and Wales), we seek to: (1) produce a detailed overview of estimates of incidence, prevalence and healthcare utilisation; (2) estimate health and societal costs; (3) identify any remaining information gaps and explore the feasibility of filling these and (4) provide insights into future research that has the potential to inform changes in policy leading to the provision of more cost-effective care.

Methods and analysis Secondary analyses of data from national health surveys, primary care, prescribing, emergency care, hospital, mortality and administrative data sources will be undertaken to estimate prevalence, healthcare utilisation and outcomes from asthma. Data linkages and economic modelling will be undertaken in an attempt to populate data gaps and estimate costs. Separate prevalence and cost estimates will be calculated for each of the UK-member countries and these will then be aggregated to generate UK-wide estimates.

Ethics and dissemination Approvals have been obtained from the NHS Scotland Information Services Division's Privacy Advisory Committee, the Secure Anonymised Information Linkage Collaboration Review System, the NHS South-East Scotland Research Ethics Service and The University of Edinburgh's Centre for Population Health Sciences Research Ethics Committee. We will produce a report for Asthma-UK, submit papers to peer-reviewed journals and construct an interactive map.