Search results for "424"

showing 6 items of 86 documents

Secure Group Communication Using Fractional Public Keys

2010

Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424TheoryofComputation_MISCELLANEOUSScheme (programming language)business.industryComputer scienceKey spaceTheoryofComputation_GENERALCryptographyPublic-key cryptographySymmetric-key algorithmCommunication in small groupsCollusionbusinessKey managementcomputerComputer networkcomputer.programming_language2010 International Conference on Availability, Reliability and Security
researchProduct

Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010

Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424business.industryControl (management)Information securityIntegrated operationsComputer securitycomputer.software_genreInvestment (macroeconomics)System dynamicsRisk analysis (engineering)Information and Communications TechnologybusinesscomputerRisk managementVulnerability (computing)2010 43rd Hawaii International Conference on System Sciences
researchProduct

La gestion des betteraves adventices résistantes à un herbicide: une approche par simulation

2007

National audience; Les variétés de betteraves sucrières génétiquement modifiées (GM) résistantes à un herbicide sont, a priori, intéressantes dans des champs fortement infestés par la betterave adventice. Cependant, la montée à fleurs de ces betteraves GM peut entraîner l’apparition d’individus résistants, via la dispersion de pollen. Nous avons développé et utilisé le modèle GENESYS-Betterave pour simuler, à l’échelle d’une petite région agricole, l’impact des pratiques culturales sur la dispersion du transgène. Il permet d'identifier des stratégies pour contrôler les adventices et limiter l'apparition de populations résistantes en zone de production de betterave sucrière. L’utilisation de…

[SDE] Environmental Scienceshttp://aims.fao.org/aos/agrovoc/c_24242http://aims.fao.org/aos/agrovoc/c_28744[SDV]Life Sciences [q-bio]Évaluation du risquehttp://aims.fao.org/aos/agrovoc/c_5728H60 - Mauvaises herbes et désherbageFlux de gènesPollution par l'agriculture[SHS]Humanities and Social SciencesMéthode de luttehttp://aims.fao.org/aos/agrovoc/c_33990http://aims.fao.org/aos/agrovoc/c_34285http://aims.fao.org/aos/agrovoc/c_37331http://aims.fao.org/aos/agrovoc/c_2018Variétéhttp://aims.fao.org/aos/agrovoc/c_3566http://aims.fao.org/aos/agrovoc/c_8157http://aims.fao.org/aos/agrovoc/c_37932Résistance aux pesticidesSaccharum officinarumU10 - Informatique mathématiques et statistiquesExpérimentation au champhttp://aims.fao.org/aos/agrovoc/c_6727Modèle de simulationhttp://aims.fao.org/aos/agrovoc/c_25427[SDV] Life Sciences [q-bio]Pratique culturalehttp://aims.fao.org/aos/agrovoc/c_8347Organisme génétiquement modifié[SDE]Environmental SciencesSystème de culture[SHS] Humanities and Social SciencesHerbicidehttp://aims.fao.org/aos/agrovoc/c_1971P02 - PollutionMauvaise herbe
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Privacy protection in a mobile biomedical information collection service

2006

Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad This report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, and proposes solutions to these issues. A framework using PKI to distribute digital certificates combined with strong encryption using the AES algorithm is described. Using this framework in combination with a RBAC model using location control we present some principles that will ensure privacy in a mobile wireless biomedical information collection service.

medical privacyAESRBACIKT590securitylocation controlVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

Sisäistyneet ristiriidat, tunnetyö ja tietotyöläissubjektiviteetin rakentuminen

2015

Yliopistotyö on esimerkki uuden työn muodoista, joissa työ kiinnittyy aiempaa vahvemmin yksilöön. Samalla vastuu työelämän vaatimuksiin yltämisestä siirtyy työntekijälle itselleen. Työyhteisön ristiriitatilanteissa organisaation ongelmat sisäistyvät työntekijän yksityisiksi ja tunne-elämän ongelmiksi.

työntekijät [http://www.yso.fi/onto/yso/p1075]tunne-elämä [http://www.yso.fi/onto/yso/p8353]subjektiviteettiGeneral MedicineGeneral Chemistryristiriidatyliopistot [http://www.yso.fi/onto/yso/p10895]tunnetyöpersoona [http://www.yso.fi/onto/yso/p7199]subjektiivisuus [http://www.yso.fi/onto/yso/p4242]kokemukset [http://www.yso.fi/onto/yso/p3209]työ [http://www.yso.fi/onto/yso/p1810]tietotyö [http://www.yso.fi/onto/yso/p12926]tietotyösubjektiussubjekti (filosofia) [http://www.yso.fi/onto/yso/p25021]Aikuiskasvatuksen vuoden tiedeartikkelitArtikkelitsopeutuminen [http://www.yso.fi/onto/yso/p6137]yliopistotristiriidat [http://www.yso.fi/onto/yso/p2187]affektiivisuus [http://www.yso.fi/onto/yso/p11268]Aikuiskasvatus
researchProduct