965 resultados para key management personnel


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este documento apresenta uma análise ao desenvolvimento de uma solução que pretende automatizar o processo de alocação de colaboradores a posições na estrutura organizacional de uma empresa. A solução destina-se a um cliente que utiliza o módulo de recursos humanos de um sistema SAP para gerir toda está informação. O cliente da Konkconsulting para o qual foi desenvolvida a solução possui um modelo organizacional de elevada complexidade, com mais de 180000 colaboradores dispersos em milhares de organizações em todo o mundo. A solução tem como objetivo melhorar a forma como a sua estrutura organizacional está a ser gerida, de modo a reduzir a quantidade de informação desnecessária que é constantemente criada pelos utilizadores sem qualquer critério. Para que tal fosse possível foram implementadas um conjunto de funcionalidades em SAP (mais concretamente no módulo de recursos humanos) com o objetivo de automatizar a alocação e a manutenção de todas as posições dentro da empresa. Estas funcionalidades foram diretamente integradas na aplicação do cliente que é responsável pela gestão de processos na área dos recursos humanos, de modo a garantir que todas as restruturações provocadas por novas contratações, realocações de colaboradores ou suspensões são automaticamente geridas por estas funcionalidades. O documento detalha a forma como as funcionalidades foram desenvolvidas e integradas nos diferentes componentes da aplicação de modo a garantir a alocação automática de colaboradores ao contexto organizacional pretendido. Todo este processo é inovador no que diz respeito a SAP e visa essencialmente uma necessidade do cliente que não se encontra satisfeita por nenhuma solução ou aplicação do sistema. A implementação desta solução permitiu automatizar um processo que era executado manualmente pelos administradores do sistema e que provocava inconsistências de dados frequentes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper uses a simplified model of the aid 'chain' to explore some causes and consequences of breakdown in communication. Although the rhetoric of Northern-based donors is awash with words such as 'partnership' and 'inclusion' when dealing with their Southern-based partners, the situation in practice is different. Unequal power relationships sometimes result in donor imposition of Perspectives and values. It is our contention, based on a collective experience of fifty-four years in a Nigerian-based non-governmental development organization (NGDO), the Diocesan Development Services (DDS), that much of the driving force behind the successes and problems faced by the institution was founded on relationships that evolved between individuals. In order to understand why things happened the way they did it is necessary to begin with the human element that cannot be condensed into objects or categories. While injudicious donor interference bad damaging repercussions, our experience suggests that care and consideration flow throughout the aid chain and actions are not malevolent. Breakdowns can be attributed to a number of factors, with the over-riding one being pressures operating at the personal level that emanate from within the institution itself and the larger community. The paper analyses three experiences using institutional ethnography theory and methodologies as a basis. Examples taken address the influence key donor personnel had in the function of DDS, and how these changed with time. The mission, policies and even procedures of the donor did not change markedly over thirty-two years, but each changing desk officer had their own philosophy and approach and a different interpretation of their own institutional policies. Hence while the 'macro' has an influence it is mediated via individual interpretation. In our view, the importance of people-people relationships is particularly understated in development literature where emphasis gravitates towards the aggregate and global.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to such processes is unclear. Using ten data sets, ranging from 3 to 14 years, we investigate the lag between restoration and the establishment of phytophagous beetle assemblages typical of species rich grasslands. We used traits and ecological characteristics to determine factors limiting beetle colonisation, and also considered how food-web structure changed during restoration. For sites where seed addition of host-plants occurred the success in replicating beetle assemblages increased over time following a negative exponential function. Extrapolation beyond the existing data set tentatively suggested that success would plateau after 20 years, representing a c. 60% increase in assemblage similarity to target grasslands. In the absence of seed addition, similarity to the target grasslands showed no increase over time. Where seed addition was used the connectance of plant-herbivore food webs decreased over time, approaching values typical of species rich grasslands after c. 7 years. This trend was, however, dependent on the inclusion of a single site containing data in excess of 6 years of restoration management. Beetles not capable of flight, those showing high degrees of host-plant specialisation and species feeding on nationally rare host plants take between 1 and 3 years longer to colonise. Successful grassland restoration is underpinned by the establishment of host-plants, although individual species traits compound the effects of poor host-plant establishment to slow colonisation. The use of pro-active grassland restoration to mitigate against future environmental change should account for lag periods in excess of 10 years if the value of these habitats is to be fully realised.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to the successful enhancement of native biodiversity is unclear. Using two long term data sets, we investigate differences in successional trajectories during the establishment of butterfly (11 years) and phytophagous beetle (13 years) communities during the recreation of calcareous grassland. Overall restoration success was higher for the butterflies than the beetles. However, both shared a general pattern of rapidly increasing restoration success over the first five years, awhich approached an asymptote after c. 10 years. The use of pro-active grassland restoration to mitigate against future environmental change therefore needs to account for such time lag if the value of these habitats is to be fully realised.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This essay aims to understand and interrogate the use of Colour Separation Overlay (CSO) as a mode of experimental production and aesthetic innovation in television drama in the 1970s. It sets out to do this by describing, accounting for and evaluating CSO as a production technique, considering the role of key production personnel, and analysing four specific BBC productions. Deploying methodologies of archival research, practitioner interview, and close textual analysis, the essay also delivers a significant reassessment of the role of the producer and designer in the conceptualisation and realisation of small-screen dramatic fiction.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This research was undertaken to explore the effectiveness of an already established community of practice among staff at a small rurally-based training organisation as a vehicle through which to develop innovative practice in online collaboration and learning. The research was situated within that ongoing innovation, and used interview and observational techniques to generate the research data from staff and management personnel. Substantial limitations to using an already existing community of practice to develop innovative practice were shown in the research. Development of new behaviours was substantially inhibited by the power of already established behaviours and practices. Additionally, lack of sufficient experience among community members in online technologies was a further barrier to effective and orderly development. The research indicates that the achievement of innovative practice through communities of practice within existing workplaces may best be served by the strategic development of members of those communities, focusing on change from already established behaviours, and by ensuring a mix of skill and experience to support and lead less experienced participants.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Australia's globalising universities many support staff and teaching staff now work with international women postgraduate students. But are they aware of the issues facing these women, and is their understanding of them adequate? Indeed, how do they represent them? In this paper we draw on a small-scale pilot study involving key university personnel. We argue that the ways in which such staff represent this group of students is problematic. Focusing primarily on academic issues and on the literature on learning styles, we analyse these staff members' representations of international women postgraduate students from a postcolonial perspective. We explore the extent to which such representations, and the learning styles literature that reflects and informs them, are what Edward Said calls 'Orientalist'. In so doing, we point to both the constitution of the international woman student as postcolonial female subject and show how this situates her in relation to the prevalent learning styles discourse. Further we argue that such representations of the students differ in crucial ways from the students' self-representations, suggesting that in certain subtle ways such staff members are engaging with 'imagined' rather than 'real' women.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, I examine some of the key management literature of the neoliberal 1990s to make a series of wider observations about contemporary ideology. Post-structuralist or post-modernist theory is often presented as the arch-enemy of neoliberal capitalism, as the orthodoxy of late capitalism. However, adding to work by Frederic Jameson, Thomas Frank and others, this paper examines uncanny proximity between neoliberal ideas about disaggregating, outsourcing, networking, etc. and the learning motifs of postmodernist theory. Its guiding hypothesis is that postmodernism in the academy, despite its own self-misrecognition as "racial", is a further ideological expression of the samr neoliberal drive to overcome "Fordist", "authoritarian" ways of organising producation and social regulation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Through extensive laboratory and field based analysis of soil chemical and physical processes, this research identified and addressed key management issues associated with the sustainable irrigation of municipal wastewater onto sandy water repellent soils, overlaying a shallow aquifer, in an environmentally significant coastal system.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper traces the development of children’s multiplatform commissioning at the Australian Broadcasting Corporation (ABC) in the context of the digitalisation of Australian television. Whilst recent scholarship has focussed on ‘post-broadcast’ or ‘second-shift’ industrial practices, designed to engage view(s)ers with proprietary media brands, less attention has been focussed on children’s and young adults’ television in a public service context. Further, although multiplatform projects in the United States and Britain have been the subject of considerable analysis, less work has attempted to contextualise cultural production in smaller media markets. The paper explores two recent multiplatform projects through textual analysis, empirical research (consisting of interviews with key industry personnel) and an investigation of recent policy documents. The authors argue that the ABC’s mixed diet of children’s programming, featuring an educative or social developmental agenda, is complemented by its appeals to audience ‘participation’, with the Corporation maintaining public service values alongside the need to expand audience reach and the legitimacy of its brand. It finds that the ABC’s historical platform infrastructure, across radio, television and online, have allowed it to move beyond a market failure model to exploit multiplatform synergies competitively in the distribution of Australian children’s content to audiences on-demand.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) is an emerging wireless object identification technology with many potential applications such as supply chain management, personnel tracking and healthcare. However, security vulnerabilities of the RFID system have been a serious concern for its wide adoption in many applications. Although much work has been done to provide privacy and anonymity, little focus has been given to ensure RFID data confidentiality, integrity and to address the tampered data recovery problem. To this end, we propose a lightweight stenographic-based approach to ensure RFID data confidentiality and integrity as well as the recovery of tampered RFID data.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In dynamic peer to peer (P2P) e-commerce, it is an important and difficult problem to promote online businesses without sacrificing the desired trust to secure transactions. In this paper, we address malicious threats in order to guarantee secrecy and integrity of recommendations exchanged among peers in P2P e-commerce. In addition to trust, secret keys are required to be established between each peer and its neighbors. Further, we propose a key management approach gkeying to generate six types of keys. Our work mainly focuses on key generation for securing recommendations, and ensuring the integrity of recommendations. The proposed approach presented with a security and performance analysis, is more secure and more efficient in terms of communication cost, computation cost, storage cost, and feasibility. © 2012 IEEE.