Search results for "Security"

showing 10 items of 1693 documents

Security Wireless Solution for Semantic Smart SCADA/DCS

2015

Journal spécialisé das industrie du gaz; International audience; We present the ability to detect and infiltrate semantic attacks a wireless radio network used in semantic (SCADA/DCS) systems, these attacks deny operators and automated systems the ability to safely and reliably monitor and control semantic sensors, semantic actuators, relays, and breakers. We presented in this work new security semantic wireless protocols as a secure communication support for these modern semantic wireless systems and a global security solution for interconnected (IT-SCADA) platforms.

SECURITY[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]SCADAWIRELESS NETWORKDCS[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Joint retirement behaviour and pension reform in the Netherlands

2022

We examine the effects of a major pension reform in 2015 on the joint retirement decisions of working couples in the Netherlands. The reform abolished the partner allowance, a state pension supplement for a nonworking partner below the state pension age. At the same time, actuarially generous early retirement arrangements were made less attractive. Using rich administrative data, we estimate a multivariate mixed proportional hazards model that distinguishes between several sources of joint retirement: financial incentives, other causal mecha-nisms that make retirement of one spouse more likely when the other spouse retires (e.g., due to complemen-tarities in leisure or social norms) and cor…

SOCIAL-SECURITYEconomics and EconometricsAGEpartner allowanceageinghousehold labour supplyUNESCO::CIENCIAS ECONÓMICASearly retirementLife-span and Life-course StudiesRESPONSESCOUPLESThe Journal of the Economics of Ageing
researchProduct

Effects of prison work programmes on the employability of ex-prisoners

2014

This paper presents the results of a study that links information from the prison system with information from the Spanish Social Security System in order to study the employability of former inmates of prisons in Catalonia, Spain. Few studies of this type have been carried out in the world and this is the first in Spain. The results show that 43.6 percent of ex-prisoners find a job after serving their sentence, but their integration in the labour market tends to be fragile, confirming that it is a very vulnerable group. It was also found that prison work has a favourable effect on employability and that vocational training has a lesser or no effect. Fil: Alós, Ramon. Universitat Autònoma d…

SPAINmedia_common.quotation_subjectDESISTANCEPrisonEmployabilityPRISONERSCIENCIAS SOCIALESSocial securityWork (electrical)EMPLOYABILITYTópicos SocialesOrder (business)Vocational educationPRISON WORKPedagogyJAILSociologySociologíaLawmedia_commonEuropean Journal of Criminology
researchProduct

Deploying harmonized ITS services in the framework of EasyWay project

2012

In the last decade, the use of new technologies in the transportation domain has made possible the development of the Intelligent Transport System (ITS). However, the ITS services were deployed isolated. The purpose of the EasyWay Project is to involve all the European countries to deploy harmonized ITS services taking into account the European citizen as final In this paper, an introduction of EasyWay project is done, including the ITS concept services and the Deployment Guidelines. A deployment guideline for traffic management and corridors is presented. Using this guideline, a real Spanish Traffic management Plan is analyzed.

STREAMS Integrated Intelligent Transport SystemEngineering managementTraffic managementComputer scienceEmerging technologiesSoftware deploymentGuidelinePlan (drawing)Computer securitycomputer.software_genreIntelligent transportation systemcomputerAdvanced Traffic Management SystemProceedings of the 6th Euro American Conference on Telematics and Information Systems
researchProduct

"Waiting for Godot?" : Lithuania and the European Security Order in the 21-century

2000

Lietuvos užsienio ir saugumo politikos principai, kryptys ir pagrindiniai tikslai liko iš esmės nepakitę nuo pat valstybingumo atkūrimo, tačiau politinių sprendimų priėmimo kontekstas per tą laiką gerokai pasikeitė ir keičiasi toliau. Vidurio ir Rytų Europoje žlugus komunistiniams režimams, Šaltojo karo tvarka žlugo neįtikėtinai greitai. 2000 m. aiškėja, kad strateginė aplinka ir mūsų saugumo suvokimas taip pat pakito. Nors Vidurio ir Rytų Europos lyderiai nepamiršta sovietinės praeities, pastarieji dešimt metų leidžia tikėtis, kad šioms valstybėms pavyks sėkmingai integruotis į Vakarų Europos struktūras. 1999 m. Kosovo kampanija privertė peržiūrėti tarptautinio saugumo sampratą, Europos Są…

Saugumo esmėCold warSecurity policySecurity orderEuropinio saugumo tvarkaNature of securityTarptautinis saugumas / International securitySaugumo politikaŠaltasis karasSaugumo tvarkaEuropean Security Order
researchProduct

Morphological Enhancement and Triangular Matching for Fingerprint Recognition

2008

Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…

ScannerMatching (graph theory)business.industryComputer scienceFingerprint (computing)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFingerprint Verification CompetitionPattern recognitionFingerprint recognitionAutomated Fingerprint Identification System (AFIS)Tree (data structure)Computer Science::Computer Vision and Pattern RecognitionArtificial intelligenceAutomated fingerprint identificationbusinessRotation (mathematics)ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct

Serial In-network Processing for Large Stationary Wireless Sensor Networks

2017

International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…

ScheduleVisual sensor networkbusiness.industryComputer science020206 networking & telecommunications02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation020202 computer hardware & architectureSerial memory processing[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingKey distribution in wireless sensor networks[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor nodeScalability0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

A Learning Automata Based Solution to Service Selection in Stochastic Environments

2010

Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …

Scheme (programming language)Computational complexity theoryComputer sciencemedia_common.quotation_subject0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genreComputer security01 natural sciences0202 electrical engineering electronic engineering information engineeringQuality (business)Simplicitymedia_commoncomputer.programming_languageService qualityLearning automatabusiness.industryVDP::Technology: 500::Information and communication technology: 550VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425010201 computation theory & mathematics020201 artificial intelligence & image processingStochastic optimizationArtificial intelligencebusinesscomputerReputation
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct