1000 resultados para security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of RFID (Radio Frequency Identification) technology can be employed for tracking and detecting each container, pallet, case, and product uniquely in the supply chain. It connects the supply chain stakeholders (i.e.; suppliers, manufacturers, wholesalers/distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, security issues are the key factor in the deployment of a RFID-enabled system in the global supply chain. This paper proposes a hybrid approach to secure RFID transmission in Supply Chain Management (SCM) systems using modified Wired Equivalent Encryption (WEP) and Rivest, Shamir and Adleman (RSA) cryptosystem. The proposed system also addresses the common loop hole of WEP key algorithm and makes it more secure compare to the existing modified WEP key process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved in such operations. One of the main obstacles to the widespread deployment and adoption of RFID systems is the security issues inherent in them. This is compounded by a noticeable lack of literature on how to identify the vulnerabilities of a RFID system and then effectively identify and develop counter measures to combat the threats posed by those vulnerabilities. In this chapter, the authors develop a conceptual framework for analysing the threats, attacks, and security requirements pertaining to networked RFID systems. The vulnerabilities of, and the threats to, the system are identified using the threat model. The security framework itself consists of two main concepts: (1) the attack model, which identifies and classifies the possible attacks, and (2) the system model, which identifies the security requirements. The framework gives readers a method with which to analyse the threats any given system faces. Those threats can then be used to identify the attacks possible on that system and get a better understanding of those attacks. It also allows the reader to easily identify all the security requirements of that system and identify how those requirements can be met.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since 1997, the Australian Federal Liberal Government has introduced policies which have sought to reduce rates of unemployment, particularly long-term unemployment. The policy, known as Mutual Obligation, increased the expectations on unemployed people in return for their social security payment. At the same time, previous labour market programmes and government assistance schemes were scrapped or privatised. This article explores the justification of the term 'Mutual Obligation' by examining both the language and the underlying principles of the policy. By defining the problem of unemployment in terms of flaws in the previous social security system, the stage is set for the government to introduce policies which remedy those flaws by emphasising self- reliance in favour of government assistance. Further, by invoking notions of fairness and mutuality, the article argues that the term 'Mutual Obligation' masks both the extent and the strength of the obligations imposed on unemployed people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The role of religious leaders in promoting social cohesion and ‘shared security’ is increasingly being examined by scholars, as is the growing multifaith movement. The VIIIth World Assembly of Religions for Peace first proposed the notion of ‘shared security’ and the importance of religious leaders’ role in advancing such a concept in Kyoto 2006. A recent study, Managing the Impact of Global Crisis Events on Community Relations in Multicultural Australia (Bouma et al. 2007) has documented the impacts of international crisis events and discourses of exclusion on religiously diverse communities in Australia, in particular rising Islamophobia, migrantophobia and attacks on multiculturalism. Religious communities have been far from passive in their responses to the impact of these events initiating dialogue and educational activities to dispel negative stereotypes and attitudes. State actors, including police, have prioritized engagement with religious leaders resulting in a rise of state supported multifaith and secular-religious peacebuilding activities. This paper argues that, in response to global risks of terror and exclusion, secular-religious networks including religious leaders, state actors, educators and the media have the potential to advance ‘shared security’ in multifaith societies, by drawing on Australian experiences documented in the Global Crisis Events study.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent thinking on globalization places risk at the centre of contemporary life. Yet what if our perception of risk is misplaced? What if the greatest risk is not terrorism itself but the conditions that allow terrorism to flourish? This fascinating book illustrates that elevated perceptions of terrorism-related risks are having a deleterious impact on many societies, exacerbating feelings of exclusion among individuals and groups. Via their exploration of various societies, the expert contributors show that as a causal factor of terrorism, social exclusion can be remedied by inclusive, participatory and deliberative measures. They prescribe a recalibration of counter-terrorism policies to unite rather than divide multicultural societies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 2010 devastating floods in Pakistan have starkly reminded the world of the two critical, interrelated challenges confronting Pakistan: economic development and security. And whilst the Pakistan government's capacity to deal with these two issues before the flood was already shaky at best, its position now is even more precarious given the enormity of the task of rebuilding the infrastructure that has been destroyed in this latest natural disaster. Nuclear-armed Pakistan is a large and strategically important country, critically located on one of the world's most important geopolitical crossroads. It is a pivotal player in a region—covering the Middle East, Central Asia and South Asia—which has much potential, but which also has unresolved conflicts and various degrees of instability. Accordingly, because Pakistan is so important to the stability of the region and the world at large, it is vital that it be able to address successfully these twin challenges.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network security in three major Victorian cities, Melbourne, Geelong and Mornington, in Australia. By War Driving these suburbs, actual data was gathered to indicate the security status of wireless networks and give a representation of modern attitudes towards wireless security for the sample population. Preliminary results are presented to demonstrate the extent to which commercial or residential suburbs address wireless security. At this stage in the research further work is required to completely analyse the results. It is anticipated that the results will be useful for providing input into a defence and attack methodology for improving the security of both residential and commercial use of wireless networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents experimental results devoted to a new application of the novel clustering technique introduced by the authors recently. Our aim is to facilitate the application of robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time, as it is required, for example, for intrusion detection. Here we concentrate on the particular case of application to profiling of phishing websites. First, we apply several independent clustering algorithms to a randomized sample of data to obtain independent initial clusterings. Silhouette index is used to determine the number of clusters. Second, we use a consensus function to combine these independent clusterings into one consensus clustering . Feature ranking is used to select a subset of features for the consensus function. Third, we train fast supervised classification algorithms on the resulting consensus clustering in order to enable them to process the whole large data set as well as new data. The precision and recall of classifiers at the final stage of this scheme are critical for effectiveness of the whole procedure. We investigated various combinations of three consensus functions, Cluster-Based Graph Formulation (CBGF), Hybrid Bipartite Graph Formulation (HBGF), and Instance-Based Graph Formulation (IBGF) and a variety of supervised classification algorithms. The best precision and recall have been obtained by the combination of the HBGF consensus function and the SMO classifier with the polynomial kernel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a proposal for personal e-learning system (vPELS) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject, say, VLSI and share resources with peers. Our system architecture defines organization and management of personal learning environment that aids in creating, verifying and sharing learning artifacts and making money at the same time. We also focus on in our research one of the most interesting arenas in digital content or document management called Digital Right Management (DRAM) and its application to eLearning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The design of multiple classification and clustering systems for the detection of malware is an important problem in internet security. Grobner-Shirshov bases have been used recently by Dazeley et al. [15] to develop an algorithm for constructions with certain restrictions on the sandwich-matrices. We develop a new Grobner Shirshov algorithm which applies to a larger variety of constructions based on combinatorial Rees matrix semigroups without any restrictions on the sandwich matrices.