Search results for "Security"

showing 10 items of 1693 documents

Introduction to Software Product Lines: Engineering, Services, and Management Minitrack

2013

Software has become the key asset for competitive products and services in all industries. Thus, competiti¬veness in software development, maintenance, and related ser¬vices has become a concern for organiza¬tions. Competitiveness can be increased through (1) internal strategies such as the strategic crea¬tion and reuse of softwa¬re assets and (2) external strategies such as outsourcing software de¬velopment, maintenance, and/or services from third party service providers and acquiring off-the-shelf components from providers and open source communities. A viable third strategy is to enact both strategies in parallel. This minitrack focuses on the first and third strategy. The minitrack acce…

Product (business)ta113Knowledge managementProcess managementbusiness.industrySoftware as a serviceInformation systemSoftware developmentContext (language use)Service providerbusinessAsset (computer security)Outsourcing2013 46th Hawaii International Conference on System Sciences
researchProduct

PROTOCOL: Organised crime groups: A systematic review of individual‐level risk factors related to recruitment

2019

Protocol (science)021110 strategic defence & security studiesorganized crimeSettore SPS/12 - SOCIOLOGIA GIURIDICA DELLA DEVIANZA E MUTAMENTO SOCIALE05 social sciencesApplied psychology0211 other engineering and technologiesGeneral Social SciencesSocial Sciences02 engineering and technologyIndividual levelH050501 criminologySociologyOrganised crime0505 lawCampbell Systematic Reviews
researchProduct

Interešu konflikts: Kipras un Piedņestras konfliktu salīdzinošā analīze.

2016

. Jau vairāk nekā četrdesmit gadus ilgā Kipras konflikta dēļ, salīdzinājumā ar Piedņestru Kiprai ir vairāk pieredzes mediācijā. Taču Kipras konfliktā gūtā pieredze var kalpot kā pozitīvu un negatīvu mediācijas piemēru kopums, jo abu konfliktu attīstības posmiem ir daudz kopīgu iezīmju. Abi konflikti ir piesaistījis daudzu valstu un starptautisko organizāciju uzmanību, tomēr ne vienmēr viņu iesaistīšanās ir palīdzējusi konflikta atrisināšanas procesā, dažreiz tā ir pat traucējusi konflikta risināšanā. Arī izmaiņas mediācijā dominējošo valstu lomās atspoguļo mainīgo starptautisko attiecību vidi. Konflikti Kiprā un Moldovā apdraud drošību Eiropaā, kas savukārt pierāda vajadzību pārskatīt pastā…

Protracted frozen conflictsregional securitydisintegrationEkonomikaCyprus and Transnistria disputesissue of identity
researchProduct

Quantum Security Proofs Using Semi-classical Oracles

2019

We present an improved version of the one-way to hiding (O2H) Theorem by Unruh, J ACM 2015. Our new O2H Theorem gives higher flexibility (arbitrary joint distributions of oracles and inputs, multiple reprogrammed points) as well as tighter bounds (removing square-root factors, taking parallelism into account). The improved O2H Theorem makes use of a new variant of quantum oracles, semi-classical oracles, where queries are partially measured. The new O2H Theorem allows us to get better security bounds in several public-key encryption schemes.

Provable securityFlexibility (engineering)Post-quantum cryptographyTheoretical computer scienceComputer sciencebusiness.industry0102 computer and information sciences02 engineering and technologyMathematical proofEncryption01 natural sciencesPublic-key cryptographyUnruh effect010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringParallelism (grammar)020201 artificial intelligence & image processingbusiness
researchProduct

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators

2018

International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…

Pseudorandom number generator020203 distributed computingSequenceFinite-state machineDynamical systems theoryComputer science010102 general mathematicsChaotic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]0101 mathematicsBoolean functionAlgorithmRandomnessGenerator (mathematics)2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

Informal Disaster Governance

2020

<p>Scholars and practitioners are increasingly questioning formal disaster governance (FDG) approaches as being too rigid, slow, and command-and-control driven. Too often, local realities and non-formal influences are sidelined or ignored to the extent that disaster governance can be harmed through the efforts to impose formal and/or political structures. A contrasting narrative emphasises so-called bottom-up, local, and/or participatory approaches which this article proposes to encapsulate as Informal Disaster Governance (IDG). This article theorises IDG and situates it within the long-standing albeit limited literature on the topic, paying particular attention to the literature’s fa…

Public AdministrationSociology and Political ScienceDisaster risk reductionCoronavirus disease 2019 (COVID-19)policy changeSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)0211 other engineering and technologies02 engineering and technologyEcology Environmentdisaster risk reductionÖkologie und UmweltPoliticslcsh:Political science (General)Political science050602 political science & public administrationarcticÖkologieNarrativeddc:577Arctic; climate change; disaster governance; disaster risk reduction; policy changelcsh:JA1-92021110 strategic defence & security studiesEcologybusiness.industryCorporate governance05 social sciencesCitizen journalismPublic relations0506 political scienceThe arcticdisaster governanceclimate changebusinessVDP::Samfunnsvitenskap: 200::Urbanisme og fysisk planlegging: 230Politics and Governance
researchProduct

Nordic Cooperation in the Nuclear Safety Sector: High, Low, or Differentiated Integration?

2020

Nordic cooperation has been depicted as eroding due to the increased importance of EU-related cooperation and integration. However, scholars propose that longstanding Nordic networks, grounded in professions and located in the state administration, may prove to be more robust toward external changes. This article discusses this proposal by looking at Nordic cooperation between the national radiation protection and nuclear safety authorities in Iceland, Denmark, Norway, Sweden, and Finland. The article maps behavioural perceptions of agency staff based on a dataset of 37 interviews to illustrate if the cooperation between the Nordic authorities is characterized by high integration, low integ…

Public AdministrationSociology and Political Sciencemedia_common.quotation_subjecthistorical institutionalismnordic cooperationintegrationInternationale BeziehungenVDP::Samfunnsvitenskap: 200::Statsvitenskap og organisasjonsteori: 240safeguardslcsh:Political science (General)Path dependencyState (polity)0502 economics and businessAgency (sociology)050602 political science & public administrationRegional scienceOrganizational theorylcsh:JA1-92media_commonNordic cooperation; historical institutionalism; integration; nuclear safety; nuclear security; organization theory; radiation protection; safeguardsEmergency managementbusiness.industry05 social sciencesnuclear securityorganization theoryInternational Relations International Politics Foreign Affairs Development Policy0506 political sciencePortfolioHistorical institutionalismBusinessInternational relationsinternationale Beziehungen Entwicklungspolitiknuclear safetyradiation protection050203 business & managementddc:327
researchProduct

Privacy invasions

2006

Nowhere has technological progress been as dramatic as in the field of information and communication technology (ICT). Citizens of the developed world now live in an environment in which access to electronic information and communication is nearly ubiquitous—and we rely heavily on being surrounded by this technology. In fact, it is so omnipresent that we only recognize our dependence on ICT when a network server or a communications system fails, leaving us cut off from cyberspace. > …computers, mobile telephones, personal digital assistants, music players and all other types of electronic gadgets are further shrinking in size, and we will soon wear them as we do clothes or jewellery… The fi…

Public SectorPatriot ActScience and Societybusiness.industryInternet privacyPublic sectorHomelandBiochemistryIdentification (information)Credit cardPrivacyInformation and Communications TechnologyGeneticsHumansPrivate SectorConfidentialityCyberspacebusinessMolecular BiologyComputer SecurityConfidentialityEMBO reports
researchProduct

Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks

2020

International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…

Quality managementComputer scienceComputer Networks and CommunicationsReal-time computingCorrectness proofs020206 networking & telecommunicationsEnergy consumption02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Distributed algorithmControl and Systems Engineering[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Data accuracy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkEfficient energy use
researchProduct

"Table 4" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."

2006

Measured value of SIG(C=LTP) as a function of the pion angle relative to the virtual photon direction.

Quantitative Biology::Neurons and CognitionElectron productionQuantitative Biology::Molecular NetworksNuclear TheoryIntegrated Cross SectionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCross SectionSIG7.950E-017.950E-01E- P --> E- PI0 PExclusiveNuclear Experiment1.221ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct