Search results for "Computer security"
showing 10 items of 433 documents
Vom Sinn des Verfahrenskonzepts und der Verfahrensvielfalt – und warum das Baukasten-System in der Psychotherapie nicht funktioniert
2019
Why the concept of distinct psychotherapeutic approaches is indispensable - and why the tool box concept of psychotherapy cannot work Background: In Germany, the official psychotherapy guidelines are oriented towards the model of distinct psychotherapeutic approaches. Within the German health care system this also applies to the training in psychotherapy. Some critics, however, are presently pleading in favour of abolishing the model of distinct psychotherapeutic approaches, which also implies to abolish the concept of the so called "Richtlinienverfahren" in Germany - approaches of psychotherapy which proved to be efficacious and whose costs are reimbursed by the insurance companies. Object…
Threats to State Security in the Aspect of Disinformation
2021
Information in the aspect of security plays a significant role in influencing the spectrum of the functioning of the state. In today’s information chaos, information has become a tool of manipulation and disinformation, also used in the implementation of strategic goals of a given country. States can thus achieve their strategic goals because it is less costly, more difficult to detect, and allows some sort of manipulation of the rationale behind such actions. Such countries include countries for which democracy is only a concept. It can be indicated that information is a raw material that, in the process of manipulation and disinformation, becomes a kind of a tool that can be used in a tar…
A novel scheme for privacy preserving in RBAC
2013
Role Based Access Control (RBAC) Model has been proved to be quite useful and has drawn a lot of research interest over the last fifteen years. In this paper we discuss general context-aware RBAC model. We analyze potential privacy threats associated with use of context-aware RBAC and propose a novel scheme that provides privacy-preserving for access models based on RBAC.
Financial Evaluation of SLA-based VM Scheduling Strategies for Cloud Federations
2017
In recent years, cloud federations have gained popularity. Small as well as big cloud service providers (CSPs) join federations to reduce their costs, and also cloud management software like OpenStack offers support for federations. In a federation, individual CSPs cooperate such that they can move load to partner clouds at high peaks and possibly offer a wider range of services to their customers. Research in this area addresses the organization of such federations and strategies that CSPs can apply to increase their profit.In this paper we present the latest extensions to the FederatedCloudSim framework that considerably improve the simulation and evaluation of cloud federations. These si…
Enterprise System Implementation in a Franchise Context: An Action Case Study
2015
Abstract This research paper reports on a study focusing on a franchise relationship that utilizes an enterprise system (ES) to optimize its supply chain. The ES is in its post-implementation phase; however, the franchisee has challenges with inventory management due to poor data quality, which causes problems with vendor analysis and revenue control. An action case study was carried out to identify and diagnose the source of the problem, and interventions were implemented and evaluated. The findings demonstrate that several of the challenges related to poor data quality in the supply chain were influenced by problems of a socio-technical character. These included a lack of understanding of…
Introduction to Software Product Lines: Engineering, Services, and Management Minitrack
2013
Software has become the key asset for competitive products and services in all industries. Thus, competiti¬veness in software development, maintenance, and related ser¬vices has become a concern for organiza¬tions. Competitiveness can be increased through (1) internal strategies such as the strategic crea¬tion and reuse of softwa¬re assets and (2) external strategies such as outsourcing software de¬velopment, maintenance, and/or services from third party service providers and acquiring off-the-shelf components from providers and open source communities. A viable third strategy is to enact both strategies in parallel. This minitrack focuses on the first and third strategy. The minitrack acce…
Privacy invasions
2006
Nowhere has technological progress been as dramatic as in the field of information and communication technology (ICT). Citizens of the developed world now live in an environment in which access to electronic information and communication is nearly ubiquitous—and we rely heavily on being surrounded by this technology. In fact, it is so omnipresent that we only recognize our dependence on ICT when a network server or a communications system fails, leaving us cut off from cyberspace. > …computers, mobile telephones, personal digital assistants, music players and all other types of electronic gadgets are further shrinking in size, and we will soon wear them as we do clothes or jewellery… The fi…
Prediction of ionic liquid's heat capacity by means of their in silico principal properties
2016
The in silico principal properties (PPs) of ionic liquids (ILs), derived by means of the VolSurf+ approach, were used to develop a Partial Least Squares (PLS) model able to find a quantitative correlation among IL descriptors (accounting for both cationic and anionic structural features) and heat capacity values, providing affordable predictions validated by experimental Cp measurements for an external set of ILs. In silico predictions allowed the selection of a limited number of structurally different ILs with similar Cp values, providing the possibility to select an optimal IL according to efficiency, as well as to environmental and economic sustainability. The present general procedure, …
An Integrated Architecture for Surveillance and Monitoring in an Archaeological Site
2005
This paper describes an on-going work aimed at designing and deploying a system for the surveillance and monitoring of an archaeological site, namely the "Valley of the Temples" in Agrigento, Italy. Given the relevance of the site from an artistical and historical point of view, it is important to protect the monuments from malicious or simply incautious behavior; however, the vastity of the area to be monitored and the vague definition of its boundaries make it unpractical to provide extensive coverage through traditional sensors or similar devices. We describe the design of an architecture for the surveillance of the site and for the monitoring of the visitors' behavior consisting in an i…
A Unified Approach to Measuring Accuracy of Error Indicators
2014
In this paper, we present a unified approach to error indication for elliptic boundary value problems. We introduce two different definitions of the accuracy (weak and strong) and show that various indicators result from one principal relation. In particular, this relation generates all the main types of error indicators, which have already gained high popularity in numerical practice. Also, we discuss some new forms of indicators that follow from a posteriori error majorants of the functional type and compare them with other indicators. Finally, we discuss another question related to accuracy of error indicators for problems with incompletely known data.