Search results for "424"
showing 6 items of 86 documents
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…
La gestion des betteraves adventices résistantes à un herbicide: une approche par simulation
2007
National audience; Les variétés de betteraves sucrières génétiquement modifiées (GM) résistantes à un herbicide sont, a priori, intéressantes dans des champs fortement infestés par la betterave adventice. Cependant, la montée à fleurs de ces betteraves GM peut entraîner l’apparition d’individus résistants, via la dispersion de pollen. Nous avons développé et utilisé le modèle GENESYS-Betterave pour simuler, à l’échelle d’une petite région agricole, l’impact des pratiques culturales sur la dispersion du transgène. Il permet d'identifier des stratégies pour contrôler les adventices et limiter l'apparition de populations résistantes en zone de production de betterave sucrière. L’utilisation de…
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Privacy protection in a mobile biomedical information collection service
2006
Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, Grimstad This report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, and proposes solutions to these issues. A framework using PKI to distribute digital certificates combined with strong encryption using the AES algorithm is described. Using this framework in combination with a RBAC model using location control we present some principles that will ensure privacy in a mobile wireless biomedical information collection service.
Sisäistyneet ristiriidat, tunnetyö ja tietotyöläissubjektiviteetin rakentuminen
2015
Yliopistotyö on esimerkki uuden työn muodoista, joissa työ kiinnittyy aiempaa vahvemmin yksilöön. Samalla vastuu työelämän vaatimuksiin yltämisestä siirtyy työntekijälle itselleen. Työyhteisön ristiriitatilanteissa organisaation ongelmat sisäistyvät työntekijän yksityisiksi ja tunne-elämän ongelmiksi.