Search results for "Computer security"

showing 10 items of 433 documents

Public-Private Partnership: Transaction Costs of Tendering

2016

Abstract What are the transaction costs of participating in a public-private partnership (PPP) tender? Prior research indicate that there is a significant amount of resources required. However, few researchers seem to measure transaction costs directly. The purpose of this paper is therefore to fill this knowledge gap by presenting estimated transaction costs from both public and private actors. The underlying approach for this research was a case study of a new primary school in Norway. This case was chosen because of the expedient access to detailed information of the tendering process. The main source of data was documents and estimated figures obtained from public and private actors inv…

PPPComputer scienceProcess (engineering)tendering0211 other engineering and technologiesCost accounting02 engineering and technologyComputer securitycomputer.software_genretransaction costscost managementProcurement021105 building & construction0502 economics and businessGeneral Environmental ScienceFinanceTransaction costCall for bidsbusiness.industry05 social sciencesPublic–private partnershipGeneral partnershipGeneral Earth and Planetary SciencesbusinesscomputerPublic-private partnership050203 business & managementProcedia Computer Science
researchProduct

Cómo diseñar talleres para promover la salud en grupos comunitarios

2014

ResumenUna de las estrategias de promoción de la salud es el desarrollo de habilidades para la vida considerando a las propias personas como principal recurso para la salud. Un taller ha de conseguir que sus participantes se conviertan en «activos» para tomar decisiones y generar salud, centrándose en el desarrollo y adquisición de habilidades en grupo de una manera motivadora y con la finalidad de alcanzar unos objetivos. Los conceptos que fundamentan el diseño de un taller y que han de plantearse como etapa 0 son: planificación participativa, capacitar, aprendizaje significativo, aprender en grupo y técnicas participativas.Las etapas que se deben seguir para diseñar un taller y facilitar …

Participatory planningGrupos de poblaciónLife skillsAsset (computer security)Meaningful learningGroup learningPopulation groupsLearningEducación en saludMedicine(all)Medical educationlcsh:R5-920AprendizajeParticipationPromoción de saludCitizen journalismGeneral MedicineHealth resourcePlanningHealth promotionParticipaciónHealth educationHealth promotionPsychologyFamily Practicelcsh:Medicine (General)PlanificaciónAtención Primaria
researchProduct

SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager

2018

Password managerComputer scienceComputer securitycomputer.software_genrecomputerProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Timing and Side Channel Attacks

2015

How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza a…

PentagonMemory cycleBusinessSide channel attackComputer securitycomputer.software_genreCloud servercomputer
researchProduct

The Origin of Life: More Questions Than Answers

1988

AbstractMore than 30 years of experimentation on the origin of life in the fields of chemical and molecular evolution have led to a better perception of the immensity of the problem of the origin of life on Earth rather than to its solution. At present all discussions on principal theories and experiments in the field either end in stalemate or in a confession of ignorance. New lines of thinking and experimentation must be tried. The continued exploration of our solar system, especially a better knowledge of Mars and Venus, of comets and carbonaceous meteorites may also lead to a better understanding of the prebiotic environment on Earth and will thus help us to design more appropriate preb…

PhysicsConfession (law)media_common.quotation_subjectPrincipal (computer security)IgnoranceMars Exploration ProgramStalemateEpistemologyAstrobiologyLead (geology)History and Philosophy of ScienceAbiogenesisSocial Sciences (miscellaneous)media_commonInterdisciplinary Science Reviews
researchProduct

Information processing in nuclear magnetic resonance imaging.

1988

An extended image analysis and classification system is presented to discuss the principal composition of the components as well as the methods of its realization in the field of reference based NMR diagnostics and tissue characterization.

PhysicsField (physics)Principal (computer security)Biomedical EngineeringBiophysicsInformation processingSpin–lattice relaxationElectron Spin Resonance SpectroscopyBrainModels TheoreticalImage EnhancementMagnetic Resonance ImagingCharacterization (materials science)Spin–spin relaxationNuclear magnetic resonancePattern recognition (psychology)Data DisplayImage Processing Computer-AssistedHumansRadiology Nuclear Medicine and imagingRealization (systems)HydrogenMagnetic resonance imaging
researchProduct

Search for excited leptons in Z0 decay

1990

Due to the severity of system-wide power outages, though their probability of occurrence is slight, regulatory authorities require that a system restoration plan be drawn up and kept up to date at all times. The power outage that affected northeastern North America in 2003 proved the need for such a requirement. The particular structure of Hydro-Quebec's power system requires the use of a highly specific system restoration procedure. The daily preparation of the system restoration plan is based on a strategy whose application requires that a restoration sequence be drawn up that uses available equipment, the electrical behavior of which has been validated using appropriate studies. Over the…

PhysicsNuclear and High Energy PhysicsParticle physicsOperations researchbusiness.industryKnowledge engineeringPlan (drawing)Asset (computer security)Electric power systemSoftwareKnowledge baseCase-based reasoningUnavailabilitybusinessParticle Physics - Experiment
researchProduct