Search results for "Computer Security"
showing 10 items of 433 documents
Traceable hierarchical attribute-based authentication for the cloud
2015
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …
Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems
2022
Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role in many applications, including medical and healthcare systems. It can help users in this field get an advantage in terms of enhanced touchless authentication, especially in spreading infectious diseases like coronavirus disease 2019 (COVID-19). Even though there is a number of available security systems, they suffer from one or more of issues, such as identity fraud, loss of keys and passwords, or spreading diseases through touch authentication tools. To overcome these issues, IoT-based intelligent control medical authentication systems using DL models are proposed to enhance the security f…
Measuring the Sustainability of Transportation Infrastructures Through Comparative Life Cycle and Energy Assessment
2020
The 2030 Agenda for Sustainable Development was adopted at the United Nations Sustainable Development Summit on 25 September 2015. It addresses people, planet and prosperity needs and particularly focuses on transport systems that must be 1) Sustainable. 2) Quality and resilient. 3) Safe. 4) Affordable and accessible. The Research Project PRIN USR342 focuses on similar concepts and the expected outputs are 3 paving solutions (made with recycled materials and sustainable technologies), 4 sets of modules (software), and 2 platforms. In this view, the objective of this study is the identification of the best pavement technology in terms of energy and environmental performance. To this aim a LC…
Infrastructure and system programming for digital ecosystems used in natural disaster management
2009
Researchers in most fields of activity must concentrate their efforts to eradicate or at least to mitigate the negative effects of “global warming”, which affect the entire planet. Within this context, we strongly believe that IT&C specialists should also approach the issue. Therefore, this paper presents the results and solutions obtained during the development of a research contract dealing on the one hand with real-time data collection and data centralization in a decision making system, and on the other with the dissemination of information among the people exposed to the effects of natural disasters such as: floods, storms, tsunamis, or other natural disasters which may destroy propert…
An analytical model of a new packet marking algorithm for TCP flows
2005
In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…
The principal as a key actor in promoting teachers’ innovativeness – analyzing the innovativeness of teaching staff with variance-based partial least…
2018
The study examines the correlation between collective innovativeness of the teaching staff and the principal’s leadership style as well as additional school structure characteristics. The construct...
Empowering team leadership and safety performance in nuclear power plants: A multilevel approach
2013
Abstract Despite the large body of work on team leadership, hardly any literature has dealt with team leadership in safety performance settings. The goal of the present study is to analyze how team leader behaviors influence team members’ safety performance in nuclear power plants. For this purpose, an empowering leadership approach was assessed. We consider a multilevel model in which safety performance is divided into three types of behaviors. The sample was composed of 479 workers in 54 groups from two Spanish nuclear power plants. The results suggested that leaders’ empowering behaviors generated higher safety compliance behaviors and higher safety participation behaviors by team member…
ARCHITECTURAL SURVEY TECHNIQUES FOR DEGRADATION DIAGNOSTICS. AN APPLICATION FOR THE CULTURAL HERITAGE
2021
Abstract. The great technological development in recent years in the field of architectural survey has made possible increasingly expeditious and less invasive investigations with the aim of acquiring a series of data related to the asset and fundamental for the protection of cultural heritage. In addition, the synergy between the various techniques represents an added value able, not only, to fill possible gaps and lacks arising from application limits of the instruments, but also to enhance the peculiarities of the same. This paper presents an integrated survey activity (range-based, image-based and IR thermography techniques) aimed at applying the combination and collaboration of multipl…
RFID Technology for IoT-Based Personal Healthcare in Smart Spaces
2014
The current evolution of the traditional medical model toward the participatory medicine can be boosted by the Internet of Things (IoT) paradigm involving sensors (environmental, wearable, and implanted) spread inside domestic environments with the purpose to monitor the user’s health and activate remote assistance. RF identification (RFID) technology is now mature to provide part of the IoT physical layer for the personal healthcare in smart environments through low-cost, energy-autonomous, and disposable sensors. It is here presented a survey on the state-of-the-art of RFID for application to bodycentric systems and for gathering information (temperature, humidity, and other gases) about …
The Public-Key-Infrastructure of the Radiological Society of Germany.
2005
Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…