Search results for "Computer security"
showing 10 items of 433 documents
Public-Private Partnership: Transaction Costs of Tendering
2016
Abstract What are the transaction costs of participating in a public-private partnership (PPP) tender? Prior research indicate that there is a significant amount of resources required. However, few researchers seem to measure transaction costs directly. The purpose of this paper is therefore to fill this knowledge gap by presenting estimated transaction costs from both public and private actors. The underlying approach for this research was a case study of a new primary school in Norway. This case was chosen because of the expedient access to detailed information of the tendering process. The main source of data was documents and estimated figures obtained from public and private actors inv…
Cómo diseñar talleres para promover la salud en grupos comunitarios
2014
ResumenUna de las estrategias de promoción de la salud es el desarrollo de habilidades para la vida considerando a las propias personas como principal recurso para la salud. Un taller ha de conseguir que sus participantes se conviertan en «activos» para tomar decisiones y generar salud, centrándose en el desarrollo y adquisición de habilidades en grupo de una manera motivadora y con la finalidad de alcanzar unos objetivos. Los conceptos que fundamentan el diseño de un taller y que han de plantearse como etapa 0 son: planificación participativa, capacitar, aprendizaje significativo, aprender en grupo y técnicas participativas.Las etapas que se deben seguir para diseñar un taller y facilitar …
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
2018
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Timing and Side Channel Attacks
2015
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…
The Origin of Life: More Questions Than Answers
1988
AbstractMore than 30 years of experimentation on the origin of life in the fields of chemical and molecular evolution have led to a better perception of the immensity of the problem of the origin of life on Earth rather than to its solution. At present all discussions on principal theories and experiments in the field either end in stalemate or in a confession of ignorance. New lines of thinking and experimentation must be tried. The continued exploration of our solar system, especially a better knowledge of Mars and Venus, of comets and carbonaceous meteorites may also lead to a better understanding of the prebiotic environment on Earth and will thus help us to design more appropriate preb…
Information processing in nuclear magnetic resonance imaging.
1988
An extended image analysis and classification system is presented to discuss the principal composition of the components as well as the methods of its realization in the field of reference based NMR diagnostics and tissue characterization.
Search for excited leptons in Z0 decay
1990
Due to the severity of system-wide power outages, though their probability of occurrence is slight, regulatory authorities require that a system restoration plan be drawn up and kept up to date at all times. The power outage that affected northeastern North America in 2003 proved the need for such a requirement. The particular structure of Hydro-Quebec's power system requires the use of a highly specific system restoration procedure. The daily preparation of the system restoration plan is based on a strategy whose application requires that a restoration sequence be drawn up that uses available equipment, the electrical behavior of which has been validated using appropriate studies. Over the…