Search results for "Computer security"

showing 10 items of 433 documents

Emotions and Digital Delivery Platforms

2021

From the global spread of the infectious disease COVID-19, in Argentina as in other states worldwide, health measures, social emergency, economic and public order measures were taken. One of the main and earliest measures of social order in the face of this disease was the delimitation of a period of population isolation, known as preventive and obligatory social isolation. The compulsory social isolation generated unprecedented growth in the demand for services to the platform economies in Argentina in general and in Buenos Aires in particular, causing the platform delivery activity to be conceived as an essential activity. The purpose of the writing is to explore the configuration of a ce…

010104 statistics & probabilityHistoryCoronavirus disease 2019 (COVID-19)Isolation (health care)0502 economics and business05 social sciencesPandemic0101 mathematicsComputer securitycomputer.software_genre01 natural sciencescomputer050205 econometrics
researchProduct

Improving scientific rigour in conservation evaluations and a plea deal for transparency on potential biases

2020

Abstract The delivery of rigorous and unbiased evidence on the effects of interventions lay at the heart of the scientific method. Here we examine scientific papers evaluating agri‐environment schemes, the principal instrument to mitigate farmland biodiversity declines worldwide. Despite previous warnings about rudimentary study designs in this field, we found that the majority of studies published between 2008 and 2017 still lack robust study designs to strictly evaluate intervention effects. Potential sources of bias that arise from the correlative nature are rarely mentioned, and results are still promoted by using a causal language. This lack of robust study designs likely results from …

0106 biological sciencesagri‐environment schemelcsh:QH1-199.5Psychological interventionIntervention effectlcsh:General. Including nature conservation geographical distribution010603 evolutionary biology01 natural sciencesRigourPleaorganic farmingbefore after control impactVDP::Matematikk og Naturvitenskap: 400::Basale biofag: 470Ecology Evolution Behavior and SystematicsNature and Landscape ConservationEcology010604 marine biology & hydrobiologyClinical study designevaluation of conservation interventionsPrincipal (computer security)biodiversity | causal languageRisk analysis (engineering)meta‐analysisMeta-analysisTransparency (graphic)PsychologyConservation Letters
researchProduct

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct

2020

Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…

020203 distributed computingComputer sciencemedia_common.quotation_subject02 engineering and technologyConstruct (python library)RedactionComputer securitycomputer.software_genreDigital signatureOrder (exchange)020204 information systemsVoting0202 electrical engineering electronic engineering information engineeringFork (file system)Protocol (object-oriented programming)computerPrivate information retrievalmedia_common
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records

2017

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…

020205 medical informaticsRevocationbusiness.industryComputer scienceInternet privacyCloud computingAccess controlHealth information exchange02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingScalability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAttribute-based encryptionbusinesscomputerProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
researchProduct

Privacy in Modern Healthcare Communications: The Lesson of Alan Turing

2016

020205 medical informaticsSettore MED/27 - Neurochirurgiabusiness.industryInternet privacy02 engineering and technologyTelemedicine03 medical and health sciences0302 clinical medicineSurgery Neurology (clinical)Confidentiality Telemedicine Humans Computer Security SmartphoneHealth care0202 electrical engineering electronic engineering information engineeringHumansMedicineSurgerySmartphoneNeurology (clinical)businessTuringcomputerComputer SecurityConfidentiality030217 neurology & neurosurgerycomputer.programming_languageWorld Neurosurgery
researchProduct

Security Assessment of a Distributed, Modbus-based Building Automation System

2017

Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target organization or even the residents of the building. This work presents an approach to apply a method of data flow recognition and environment analysis to building automation through a case study on a distributed building automation system utilizing the Modbus protocol at the sites and presents s…

0209 industrial biotechnologyComputer scienceTotally integrated automationprotocols02 engineering and technologysecurityComputer securitycomputer.software_genre020901 industrial engineering & automationHome automationrakennusautomaatio0202 electrical engineering electronic engineering information engineeringtietoturvaProtocol (object-oriented programming)ModbusBuilding automationBuilding management systemta113ta213business.industry020208 electrical & electronic engineeringprotokollatbuilding automation systemsISA100.11aThe Internetbusinesscomputer
researchProduct

Measuring Social Responsibility: A Multicriteria Approach

2016

In this chapter we present a portfolio selection model for Socially Responsible Investment. The model, following the spirit of Socially Responsible Investment, consists of two different steps. Firstly, a social screening is applied in order to obtain the feasible set of assets accomplishing the socially responsible investment policy of the assets’ manager. In this step, an indicator is obtained for the measurement of the social responsibility degree of an asset. Assets are then ranked using this indicator from the most socially responsible to the less socially responsible. In a second step, once the feasible set is obtained, composed of those socially responsible assets verifying the screen…

021103 operations researchManagement scienceFeasible region0211 other engineering and technologies02 engineering and technologyAsset (computer security)MicroeconomicsSocially responsible investmentOrder (exchange)0202 electrical engineering electronic engineering information engineeringPortfolio020201 artificial intelligence & image processingBusinessSocial responsibilitySelection (genetic algorithm)
researchProduct

Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems

2018

Air traffic control systems based on the ADS-B standard have been widely adopted in civil aviation to the point that they are now considered the de facto standard. ADS-B provides major benefits to airports and airlines by increasing the safety of air traffic management and control and allowing more flights to travel near busy airports. However, the ADS-B technology lacks sufficient security measures. The ADS-B system is vulnerable and exposed to cyberattacks. We survey the potential known threats and attacks against ADS-B and assess the potential cybersecurity threats to air traffic management and control. The widespread use of ADS-B and the lack of security features in it, i.e., all the AD…

021110 strategic defence & security studies020301 aerospace & aeronauticsComputer sciencebusiness.industryAir traffic managementControl (management)0211 other engineering and technologiesCivil aviationComputerApplications_COMPUTERSINOTHERSYSTEMSJamming02 engineering and technologyAir traffic controlCommunications systemComputer securitycomputer.software_genre0203 mechanical engineeringWirelessbusinesscomputerDe facto standard
researchProduct