Search results for "Computer security"

showing 10 items of 433 documents

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct

Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems

2022

Internet of Things (IoT) with deep learning (DL) is drastically growing and plays a significant role in many applications, including medical and healthcare systems. It can help users in this field get an advantage in terms of enhanced touchless authentication, especially in spreading infectious diseases like coronavirus disease 2019 (COVID-19). Even though there is a number of available security systems, they suffer from one or more of issues, such as identity fraud, loss of keys and passwords, or spreading diseases through touch authentication tools. To overcome these issues, IoT-based intelligent control medical authentication systems using DL models are proposed to enhance the security f…

Support Vector MachineGeneral Immunology and MicrobiologyArticle SubjectDatabases FactualSARS-CoV-2Applied MathematicsAutomated Facial RecognitionInternet of ThingsCOVID-19General MedicineEquipment DesignVDP::Teknologi: 500::Industri- og produktdesign: 640General Biochemistry Genetics and Molecular BiologyPattern Recognition AutomatedDeep LearningVDP::Teknologi: 500::Bioteknologi: 590VDP::Teknologi: 500::Medisinsk teknologi: 620Modeling and SimulationHumansComputer SimulationAlgorithmsComputer Security
researchProduct

Measuring the Sustainability of Transportation Infrastructures Through Comparative Life Cycle and Energy Assessment

2020

The 2030 Agenda for Sustainable Development was adopted at the United Nations Sustainable Development Summit on 25 September 2015. It addresses people, planet and prosperity needs and particularly focuses on transport systems that must be 1) Sustainable. 2) Quality and resilient. 3) Safe. 4) Affordable and accessible. The Research Project PRIN USR342 focuses on similar concepts and the expected outputs are 3 paving solutions (made with recycled materials and sustainable technologies), 4 sets of modules (software), and 2 platforms. In this view, the objective of this study is the identification of the best pavement technology in terms of energy and environmental performance. To this aim a LC…

Sustainable developmentgeographySummitgeography.geographical_feature_categorymedia_common.quotation_subjectPrincipal (computer security)Environmental economicsSustainabilityProduction (economics)Quality (business)BusinessProsperityLife-cycle assessmentmedia_common
researchProduct

Infrastructure and system programming for digital ecosystems used in natural disaster management

2009

Researchers in most fields of activity must concentrate their efforts to eradicate or at least to mitigate the negative effects of “global warming”, which affect the entire planet. Within this context, we strongly believe that IT&C specialists should also approach the issue. Therefore, this paper presents the results and solutions obtained during the development of a research contract dealing on the one hand with real-time data collection and data centralization in a decision making system, and on the other with the dissemination of information among the people exposed to the effects of natural disasters such as: floods, storms, tsunamis, or other natural disasters which may destroy propert…

System programmingData collectionFlood mythGlobal warmingInformation DisseminationContext (language use)BusinessNatural disasterComputer securitycomputer.software_genreDisseminationEnvironmental planningcomputer2009 3rd IEEE International Conference on Digital Ecosystems and Technologies
researchProduct

An analytical model of a new packet marking algorithm for TCP flows

2005

In Differentiated Services networks, packets may receive a different treatment according to their Differentiateo Services Code Point (DSCP) label. As a consequence, packet marking schemes can also be devised to differentiate packets belonging to a same TCP flow, with the goal of improving the performance experienced. This paper presents an analytical model for an adaptive packet marking scheme proposed in our previous work. The model combines three specific sub-models aimed at describing (i) the TCP sources aggregate, (ii) the marker, and (iii) the network status. Preliminary simulation results show quite accurate predictions for throughput and average queue occupancy. Besides, the research…

TCP accelerationComputer Networks and CommunicationsComputer scienceTransmission Control ProtocolTCP tuningThroughputRandom early detectionRound-trip delay timeH-TCPActive queue managementTCP sequence prediction attackComputer securitycomputer.software_genrelaw.inventionTCP Westwood plusTCP Friendly Rate ControlPacket switchinglawInternet ProtocolZeta-TCPQueueNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSToken bucketTelecommunications networkTCP global synchronizationDifferentiated servicesNetwork servicebusinesscomputerComputer network
researchProduct

The principal as a key actor in promoting teachers’ innovativeness – analyzing the innovativeness of teaching staff with variance-based partial least…

2018

The study examines the correlation between collective innovativeness of the teaching staff and the principal’s leadership style as well as additional school structure characteristics. The construct...

Teaching staff05 social sciencesPrincipal (computer security)050301 educationRegression analysisVariance (accounting)Structural equation modelingEducation0502 economics and businessMathematics educationKey (cryptography)Leadership styleConstruct (philosophy)Psychology0503 education050203 business & managementSchool Effectiveness and School Improvement
researchProduct

Empowering team leadership and safety performance in nuclear power plants: A multilevel approach

2013

Abstract Despite the large body of work on team leadership, hardly any literature has dealt with team leadership in safety performance settings. The goal of the present study is to analyze how team leader behaviors influence team members’ safety performance in nuclear power plants. For this purpose, an empowering leadership approach was assessed. We consider a multilevel model in which safety performance is divided into three types of behaviors. The sample was composed of 479 workers in 54 groups from two Spanish nuclear power plants. The results suggested that leaders’ empowering behaviors generated higher safety compliance behaviors and higher safety participation behaviors by team member…

Team compositionEngineeringbusiness.industryApplied psychologyMultilevel modelPublic Health Environmental and Occupational HealthHuman factors and ergonomicsPoison controlPsychological safetyBuilding and ConstructionShared leadershipComputer securitycomputer.software_genreOccupational safety and healthEmpirical researchSafety Risk Reliability and QualitybusinessSafety ResearchcomputerSafety Science
researchProduct

ARCHITECTURAL SURVEY TECHNIQUES FOR DEGRADATION DIAGNOSTICS. AN APPLICATION FOR THE CULTURAL HERITAGE

2021

Abstract. The great technological development in recent years in the field of architectural survey has made possible increasingly expeditious and less invasive investigations with the aim of acquiring a series of data related to the asset and fundamental for the protection of cultural heritage. In addition, the synergy between the various techniques represents an added value able, not only, to fill possible gaps and lacks arising from application limits of the instruments, but also to enhance the peculiarities of the same. This paper presents an integrated survey activity (range-based, image-based and IR thermography techniques) aimed at applying the combination and collaboration of multipl…

Technologyerrestrial Laser Scanning Photogrammetry Non-Destructive Testing Infrared Thermography Data fusion Material degradation Historic structureComputer scienceTAsset (computer security)Engineering (General). Civil engineering (General)Construction engineeringTA1501-1820Cultural heritageSurvey methodologyPhotogrammetryDocumentationWork (electrical)Added valueSystematic processApplied optics. PhotonicsTA1-2040
researchProduct

RFID Technology for IoT-Based Personal Healthcare in Smart Spaces

2014

The current evolution of the traditional medical model toward the participatory medicine can be boosted by the Internet of Things (IoT) paradigm involving sensors (environmental, wearable, and implanted) spread inside domestic environments with the purpose to monitor the user’s health and activate remote assistance. RF identification (RFID) technology is now mature to provide part of the IoT physical layer for the personal healthcare in smart environments through low-cost, energy-autonomous, and disposable sensors. It is here presented a survey on the state-of-the-art of RFID for application to bodycentric systems and for gathering information (temperature, humidity, and other gases) about …

TelemedicineComputer Networks and Communicationsbusiness.industryComputer scienceProcess (engineering)Wearable computerSettore ING-INF/02 - Campi ElettromagneticiComputer securitycomputer.software_genreSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Computer Science ApplicationsIdentification (information)Hardware and ArchitectureSignal ProcessingHealth careSmart environmentInternet of ThingsbusinesscomputerRFID Internet of things human health monitoringInformation Systems
researchProduct

The Public-Key-Infrastructure of the Radiological Society of Germany.

2005

Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Rontgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These @GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys corre…

Teleradiologybusiness.industryPublic key infrastructureGeneral MedicineCertificationTrusted third partyComputer securitycomputer.software_genreElectronic signatureDigital signatureGermanyCertificate authorityMedicineHumansRadiology Nuclear Medicine and imagingThe InternetKey serverbusinessSocietiescomputerAlgorithmsComputer SecurityConfidentialitySoftwareEuropean journal of radiology
researchProduct