Search results for "Computer security"

showing 10 items of 433 documents

Vom Sinn des Verfahrenskonzepts und der Verfahrensvielfalt – und warum das Baukasten-System in der Psychotherapie nicht funktioniert

2019

Why the concept of distinct psychotherapeutic approaches is indispensable - and why the tool box concept of psychotherapy cannot work Background: In Germany, the official psychotherapy guidelines are oriented towards the model of distinct psychotherapeutic approaches. Within the German health care system this also applies to the training in psychotherapy. Some critics, however, are presently pleading in favour of abolishing the model of distinct psychotherapeutic approaches, which also implies to abolish the concept of the so called "Richtlinienverfahren" in Germany - approaches of psychotherapy which proved to be efficacious and whose costs are reimbursed by the insurance companies. Object…

PleadingPsychotherapistbusiness.industry05 social sciencesPerspective (graphical)Principal (computer security)050108 psychoanalysislanguage.human_languageGermanHealth carelanguage0501 psychology and cognitive sciencesbusinessPsychologyZeitschrift für Psychosomatische Medizin und Psychotherapie
researchProduct

Threats to State Security in the Aspect of Disinformation

2021

Information in the aspect of security plays a significant role in influencing the spectrum of the functioning of the state. In today’s information chaos, information has become a tool of manipulation and disinformation, also used in the implementation of strategic goals of a given country. States can thus achieve their strategic goals because it is less costly, more difficult to detect, and allows some sort of manipulation of the rationale behind such actions. Such countries include countries for which democracy is only a concept. It can be indicated that information is a raw material that, in the process of manipulation and disinformation, becomes a kind of a tool that can be used in a tar…

Political scienceDisinformationComputer securitycomputer.software_genrecomputerState securitySecurity Dimensions
researchProduct

A novel scheme for privacy preserving in RBAC

2013

Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.

Privacy preservingScheme (programming language)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformation privacySoftware_OPERATINGSYSTEMSComputer scienceAuthorizationRole-based access controlComputer securitycomputer.software_genrecomputercomputer.programming_language2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)
researchProduct

Financial Evaluation of SLA-based VM Scheduling Strategies for Cloud Federations

2017

In recent years, cloud federations have gained popularity. Small as well as big cloud service providers (CSPs) join federations to reduce their costs, and also cloud management software like OpenStack offers support for federations. In a federation, individual CSPs cooperate such that they can move load to partner clouds at high peaks and possibly offer a wider range of services to their customers. Research in this area addresses the organization of such federations and strategies that CSPs can apply to increase their profit.In this paper we present the latest extensions to the FederatedCloudSim framework that considerably improve the simulation and evaluation of cloud federations. These si…

Process managementCloud managementComputer sciencebusiness.industry020206 networking & telecommunicationsCloud computingWorkload02 engineering and technologyComputer securitycomputer.software_genrePopularityScheduling (computing)Virtual machine0202 electrical engineering electronic engineering information engineeringRevenueCommon value auction020201 artificial intelligence & image processingbusinesscomputerProceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17
researchProduct

Enterprise System Implementation in a Franchise Context: An Action Case Study

2015

Abstract This research paper reports on a study focusing on a franchise relationship that utilizes an enterprise system (ES) to optimize its supply chain. The ES is in its post-implementation phase; however, the franchisee has challenges with inventory management due to poor data quality, which causes problems with vendor analysis and revenue control. An action case study was carried out to identify and diagnose the source of the problem, and interventions were implemented and evaluated. The findings demonstrate that several of the challenges related to poor data quality in the supply chain were influenced by problems of a socio-technical character. These included a lack of understanding of…

Process managementERP post-implementationVendorComputer scienceSupply chainControl (management)Enterprise systemsContext (language use)Computer securitycomputer.software_genreopportunismEnterprise systemOpportunismRevenuedata qualityAction researchGeneral Environmental ScienceWorkaroundinterorganizational challengesfranchiseretailaction caseSCMaction researchData qualityGeneral Earth and Planetary SciencescomputerProcedia Computer Science
researchProduct

Introduction to Software Product Lines: Engineering, Services, and Management Minitrack

2013

Software has become the key asset for competitive products and services in all industries. Thus, competiti¬veness in software development, maintenance, and related ser¬vices has become a concern for organiza¬tions. Competitiveness can be increased through (1) internal strategies such as the strategic crea¬tion and reuse of softwa¬re assets and (2) external strategies such as outsourcing software de¬velopment, maintenance, and/or services from third party service providers and acquiring off-the-shelf components from providers and open source communities. A viable third strategy is to enact both strategies in parallel. This minitrack focuses on the first and third strategy. The minitrack acce…

Product (business)ta113Knowledge managementProcess managementbusiness.industrySoftware as a serviceInformation systemSoftware developmentContext (language use)Service providerbusinessAsset (computer security)Outsourcing2013 46th Hawaii International Conference on System Sciences
researchProduct

Privacy invasions

2006

Nowhere has technological progress been as dramatic as in the field of information and communication technology (ICT). Citizens of the developed world now live in an environment in which access to electronic information and communication is nearly ubiquitous—and we rely heavily on being surrounded by this technology. In fact, it is so omnipresent that we only recognize our dependence on ICT when a network server or a communications system fails, leaving us cut off from cyberspace. > …computers, mobile telephones, personal digital assistants, music players and all other types of electronic gadgets are further shrinking in size, and we will soon wear them as we do clothes or jewellery… The fi…

Public SectorPatriot ActScience and Societybusiness.industryInternet privacyPublic sectorHomelandBiochemistryIdentification (information)Credit cardPrivacyInformation and Communications TechnologyGeneticsHumansPrivate SectorConfidentialityCyberspacebusinessMolecular BiologyComputer SecurityConfidentialityEMBO reports
researchProduct

Prediction of ionic liquid's heat capacity by means of their in silico principal properties

2016

The in silico principal properties (PPs) of ionic liquids (ILs), derived by means of the VolSurf+ approach, were used to develop a Partial Least Squares (PLS) model able to find a quantitative correlation among IL descriptors (accounting for both cationic and anionic structural features) and heat capacity values, providing affordable predictions validated by experimental Cp measurements for an external set of ILs. In silico predictions allowed the selection of a limited number of structurally different ILs with similar Cp values, providing the possibility to select an optimal IL according to efficiency, as well as to environmental and economic sustainability. The present general procedure, …

Quantitative structure–activity relationshipHeat capacity010405 organic chemistryGeneral Chemical EngineeringIn silicoPrincipal (computer security)Chemistry (all)General ChemistrySettore CHIM/06 - Chimica Organica010402 general chemistry01 natural sciencesHeat capacityQuantitative correlation0104 chemical sciencesIonic liquidschemistry.chemical_compoundEconomic sustainabilitychemistryIonic liquids; QSPR; Heat capacityQSPRPartial least squares regressionIonic liquidChemical Engineering (all)Biological systemMathematics
researchProduct

An Integrated Architecture for Surveillance and Monitoring in an Archaeological Site

2005

This paper describes an on-going work aimed at designing and deploying a system for the surveillance and monitoring of an archaeological site, namely the "Valley of the Temples" in Agrigento, Italy. Given the relevance of the site from an artistical and historical point of view, it is important to protect the monuments from malicious or simply incautious behavior; however, the vastity of the area to be monitored and the vague definition of its boundaries make it unpractical to provide extensive coverage through traditional sensors or similar devices. We describe the design of an architecture for the surveillance of the site and for the monitoring of the visitors' behavior consisting in an i…

Reasoning systemEngineeringVisual sensor networkbusiness.industryVideo surveillanceComputer securitycomputer.software_genreArchaeologyWireless site surveyKey distribution in wireless sensor networksMobile wireless sensor networkRelevance (information retrieval)Architecturebusinesswireless sensor networksWireless sensor networkcomputer
researchProduct

A Unified Approach to Measuring Accuracy of Error Indicators

2014

In this paper, we present a unified approach to error indication for elliptic boundary value problems. We introduce two different definitions of the accuracy (weak and strong) and show that various indicators result from one principal relation. In particular, this relation generates all the main types of error indicators, which have already gained high popularity in numerical practice. Also, we discuss some new forms of indicators that follow from a posteriori error majorants of the functional type and compare them with other indicators. Finally, we discuss another question related to accuracy of error indicators for problems with incompletely known data.

Relation (database)Computer sciencePrincipal (computer security)Functional typeA priori and a posterioriApplied mathematicsBoundary value problemPopularityType I and type II errors
researchProduct