997 resultados para Collaborative security
Resumo:
The project started in 2009 with the support of DAAD in Germany and CRUP in Portugal under the “Collaborative German-Portuguese University Actions” programme. One central goal is the further development of a theory of technology assessment applied to robotics and autonomous systems in general that reflects in its methodology the changing conditions of knowledge production in modern societies and the emergence of new robotic technologies and of associated disruptive changes. Relevant topics here are handling broadened future horizons and new clusters of science and technology (medicine, engineering, interfaces, industrial automation, micro-devices, security and safety), as well as new governance structures in policy decision making concerning research and development (R
Resumo:
Address sustainability in all efforts. Sustainability should be at the core of all levels of homeland security and emergency management effort in Iowa. Capabilities need to be built for the long term, and without a sustainability plan in place, projects can quickly deplete uncertain levels of funding. Utilize an all-hazards methodology. Developing capabilities that are effective during a variety of disaster and emergency scenarios represents sound planning and resource management. Enhance capabilities through joint planning, training and exercise. Effective capabilities developed through coordinated planning efforts and an ongoing joint training and exercising program to ensure sustainment of prepared response. Utilize a collaborative approach to build capability. We will utilize whatever partnerships are necessary to build capability in the most effective manner possible. Regional partnerships have been, and will continue to be, in the forefront of the State of Iowa’s efforts to build and enhance capability. Enhance statewide capabilities. Whenever possible, we will identify and augment existing resources to provide statewide capability during a disaster or terrorist attack. Awareness, outreach and education. Open communication is critical to the success of any initiative. All projects implemented will have awareness, education and outreach components to ensure that all stakeholders are informed as to their responsibilities, capabilities and access. Information sharing and a common operating picture. The timely exchange of critical/actionable information is imperative to the success of every operation. The identification of a common operating picture allows decision makers to make informed decisions based on a unified understanding of the events around them.
Resumo:
Address sustainability in all efforts. Sustainability should be at the core of all levels of homeland security and emergency management effort in Iowa. Capabilities need to be built for the long term, and without a sustainability plan in place, projects can quickly deplete uncertain levels of funding. Utilize an all-hazards methodology. Developing capabilities that are effective during a variety of disaster and emergency scenarios represents sound planning and resource management. Enhance capabilities through joint planning, training and exercise. Effective capabilities developed through coordinated planning efforts and an ongoing joint training and exercising program to ensure substantiate of prepared response. Utilize a collaborative approach to build capability. We will utilize whatever partnerships are necessary to build capability in the most effective manner possible. Regional partnerships have been, and will continue to be, in the forefront of the State of Iowa’s efforts to build and enhance capability. Enhance statewide capabilities. Whenever possible, we will identify and augment existing resources to provide statewide capability during a disaster or terrorist attack. Awareness, outreach and education. Open communication is critical to the success of any initiative. All projects implemented will have awareness, education and outreach components to ensure that all stakeholders are informed as to their responsibilities, capabilities and access. Information sharing and a common operating picture. The timely exchange of critical/actionable information is imperative to the success of every operation. The identification of a common operating picture allows decision makers to make informed decisions based on a unified understanding of the events around them.
Resumo:
The integrated system of design for manufacturing and assembly (DFMA) and internet based collaborative design are presented to support product design, manufacturing process, and assembly planning for axial eccentric oil-pump design. The presented system manages and schedules group oriented collaborative activities. The design guidelines of internet based collaborative design & DFMA are expressed. The components and the manufacturing stages of axial eccentric oil-pump are expressed in detail. The file formats of the presented system include the data types of collaborative design of the product, assembly design, assembly planning and assembly system design. Product design and assembly planning can be operated synchronously and intelligently and they are integrated under the condition of internet based collaborative design and DFMA. The technologies of collaborative modelling, collaborative manufacturing, and internet based collaborative assembly for the specific pump construction are developed. A seven-security level is presented to ensure the security of the internet based collaborative design system.
Resumo:
Peer-reviewed
Resumo:
The quality of the mother-child relationship was examined in relation to joint planning, maternal teaching strategies, maternal emotional support, mutual positive affect and attachment security. Fifty-five grade five children and their mothers participated in a laboratory session comprised of various activities and completed questionnaires to evaluate attachment security. Joint planning and social problem solving were assessed observationally during an origami task. Problem solving effectiveness was unrelated to maternal teaching strategies, maternal encouragement and mutual positive affect. A marginally significant relationship was found between maternal encouragement and active child participation. Attachment security was found to be significantly related to sharing of responsibility during local planning, but only for child autonomous performance. An examination of conditional probabilities revealed that mutual positive affect did not increase the likelihood of subsequent mother-child dyadic regulation. However, mutual positive affect was found to be significantly related to both active child participation and dyadic regulation. The hypothesis predicting a mediational model was not supported. The implications of these findings in the theoretical and empirical literature were considered and suggestions for future research were made.
Resumo:
Cybersecurity is a complex challenge that has emerged alongside the evolving global socio-technical environment of social networks that feature connectivity across time and space in ways unimaginable even a decade ago. This paper reports on the preliminary findings of a NATO funded project that investigates the nature of innovation in open collaborative communities and its implications for cyber security. In this paper, the authors describe the framing of relevant issues, the articulation of the research questions, and the derivation of a conceptual framework based on open collaborative innovation that has emerged from preliminary field research in Russia and the UK.
Resumo:
The paper presents how workflow-oriented, single-user Grid portals could be extended to meet the requirements of users with collaborative needs. Through collaborative Grid portals different research and engineering teams would be able to share knowledge and resources. At the same time the workflow concept assures that the shared knowledge and computational capacity is aggregated to achieve the high-level goals of the group. The paper discusses the different issues collaborative support requires from Grid portal environments during the different phases of the workflow-oriented development work. While in the design period the most important task of the portal is to provide consistent and fault tolerant data management, during the workflow execution it must act upon the security framework its back-end Grids are built on.
Resumo:
This paper describes a prototype grid infrastructure, called the eMinerals minigrid, for molecular simulation scientists. which is based on an integration of shared compute and data resources. We describe the key components, namely the use of Condor pools, Linux/Unix clusters with PBS and IBM's LoadLeveller job handling tools, the use of Globus for security handling, the use of Condor-G tools for wrapping globus job submit commands, Condor's DAGman tool for handling workflow, the Storage Resource Broker for handling data, and the CCLRC dataportal and associated tools for both archiving data with metadata and making data available to other workers.
Resumo:
Security intrusions in large systems is a problem due to its lack of scalability with the current IDS-based approaches. This paper describes the RECLAMO project, where an architecture for an Automated Intrusion Response System (AIRS) is being proposed. This system will infer the most appropriate response for a given attack, taking into account the attack type, context information, and the trust and reputation of the reporting IDSs. RECLAMO is proposing a novel approach: diverting the attack to a specific honeynet that has been dynamically built based on the attack information. Among all components forming the RECLAMO's architecture, this paper is mainly focused on defining a trust and reputation management model, essential to recognize if IDSs are exposing an honest behavior in order to accept their alerts as true. Experimental results confirm that our model helps to encourage or discourage the launch of the automatic reaction process.
Resumo:
Aims: To determine if general practitioners' (GPs) experience of education on alcohol, support in their working environment for intervening with alcohol problems, and their attitudes have an impact on the number of patients they manage with alcohol problems. Methods: 1300 GPs from nine countries were surveyed with a postal questionnaire as part of a World Health Organization (WHO) collaborative study. Results: GPs who received more education on alcohol (OR = 1.5; 95% CI, 1.3-1.7), who perceived that they were working in a supportive environment (OR = 1.6; 95% CI, 1.4-1.9), who expressed higher role security in working with alcohol problems (OR = 2.0; 95% CI, 1.5-2.5) and who reported greater therapeutic commitment to working with alcohol problems (OR = 1.4: 95% CI, 1.1-1.7) were more likely to manage patients with alcohol-related harm. Conclusion: Both education and support in the working environment need to be provided to enhance the involvement of GPs in the management of alcohol problems.
Resumo:
Mediation techniques provide interoperability and support integrated query processing among heterogeneous databases. While such techniques help data sharing among different sources, they increase the risk for data security, such as violating access control rules. Successful protection of information by an effective access control mechanism is a basic requirement for interoperation among heterogeneous data sources. ^ This dissertation first identified the challenges in the mediation system in order to achieve both interoperability and security in the interconnected and collaborative computing environment, which includes: (1) context-awareness, (2) semantic heterogeneity, and (3) multiple security policy specification. Currently few existing approaches address all three security challenges in mediation system. This dissertation provides a modeling and architectural solution to the problem of mediation security that addresses the aforementioned security challenges. A context-aware flexible authorization framework was developed in the dissertation to deal with security challenges faced by mediation system. The authorization framework consists of two major tasks, specifying security policies and enforcing security policies. Firstly, the security policy specification provides a generic and extensible method to model the security policies with respect to the challenges posed by the mediation system. The security policies in this study are specified by 5-tuples followed by a series of authorization constraints, which are identified based on the relationship of the different security components in the mediation system. Two essential features of mediation systems, i. e., relationship among authorization components and interoperability among heterogeneous data sources, are the focus of this investigation. Secondly, this dissertation supports effective access control on mediation systems while providing uniform access for heterogeneous data sources. The dynamic security constraints are handled in the authorization phase instead of the authentication phase, thus the maintenance cost of security specification can be reduced compared with related solutions. ^
Resumo:
A Mediation System utilizes a central security mediator that is primarily concerned with securing the internal structure of the Mediation System. The current problem is that clients are unable to have authority and administrative rights over the security of their data during a transaction. In addition, this Mediation System is unsuited in presenting a metric that measures the level of confidence of security access rights. This creates a black-box perspective from the client towards the Mediation System and also gives no assurance to these clients that they have assigned the proper security access rights that reflect the current environment of the mediation system. This dissertation presents a Collaborative Information System (CIS) that uses an agent based approach to encapsulate collaborative information and security policies within the Mediation System which are under the control of the clients of the Mediation System. In conjunction with the CIS's Stochastic Security Framework it is possible to take a probabilistic approach in modeling the security access rights of a collaboration transaction. The research results showed that it is feasible to construct a Mediation System utilizing agents and stochastic equations to establish an environment where the client has authority and administrative control in assigning security access rights to their collaborative data that can establish a metric that measures the level of confidence of these assigned rights.
Resumo:
Part 1: Introduction
Resumo:
The purpose of this study was to evaluate the presence of myofibroblasts, frequently associated with a more aggressive neoplastic behavior, in oral tongue squamous cell carcinoma (TSCC) of young patients and to compare with the distribution observed in older patients. Tumor samples from 29 patients younger than 40 years old affected by TSCC were retrieved and investigated for the presence of stromal myofibroblasts by immunohistochemical reactions against α smooth muscle actin, and the results obtained were compared to TSCC cases affecting older patients. No positive reaction could be found in the stromal areas devoid of neoplastic tissue, whereas myofibroblasts were present in 58.6% of the lesions in young patients and in 75.9% of the older ones. No significant difference was found when comparing the invasive front and the overall stroma of both groups, and no correlation could be obtained with stromal α smooth muscle actin expression, higher tumor grades or clinical stage (P > .05). There was no significant difference between the presence of stromal myofibroblasts of TSCC affecting young and old individuals.