Search results for "Security"
showing 10 items of 1693 documents
Security Wireless Solution for Semantic Smart SCADA/DCS
2015
Journal spécialisé das industrie du gaz; International audience; We present the ability to detect and infiltrate semantic attacks a wireless radio network used in semantic (SCADA/DCS) systems, these attacks deny operators and automated systems the ability to safely and reliably monitor and control semantic sensors, semantic actuators, relays, and breakers. We presented in this work new security semantic wireless protocols as a secure communication support for these modern semantic wireless systems and a global security solution for interconnected (IT-SCADA) platforms.
Joint retirement behaviour and pension reform in the Netherlands
2022
We examine the effects of a major pension reform in 2015 on the joint retirement decisions of working couples in the Netherlands. The reform abolished the partner allowance, a state pension supplement for a nonworking partner below the state pension age. At the same time, actuarially generous early retirement arrangements were made less attractive. Using rich administrative data, we estimate a multivariate mixed proportional hazards model that distinguishes between several sources of joint retirement: financial incentives, other causal mecha-nisms that make retirement of one spouse more likely when the other spouse retires (e.g., due to complemen-tarities in leisure or social norms) and cor…
Effects of prison work programmes on the employability of ex-prisoners
2014
This paper presents the results of a study that links information from the prison system with information from the Spanish Social Security System in order to study the employability of former inmates of prisons in Catalonia, Spain. Few studies of this type have been carried out in the world and this is the first in Spain. The results show that 43.6 percent of ex-prisoners find a job after serving their sentence, but their integration in the labour market tends to be fragile, confirming that it is a very vulnerable group. It was also found that prison work has a favourable effect on employability and that vocational training has a lesser or no effect. Fil: Alós, Ramon. Universitat Autònoma d…
Deploying harmonized ITS services in the framework of EasyWay project
2012
In the last decade, the use of new technologies in the transportation domain has made possible the development of the Intelligent Transport System (ITS). However, the ITS services were deployed isolated. The purpose of the EasyWay Project is to involve all the European countries to deploy harmonized ITS services taking into account the European citizen as final In this paper, an introduction of EasyWay project is done, including the ITS concept services and the Deployment Guidelines. A deployment guideline for traffic management and corridors is presented. Using this guideline, a real Spanish Traffic management Plan is analyzed.
"Waiting for Godot?" : Lithuania and the European Security Order in the 21-century
2000
Lietuvos užsienio ir saugumo politikos principai, kryptys ir pagrindiniai tikslai liko iš esmės nepakitę nuo pat valstybingumo atkūrimo, tačiau politinių sprendimų priėmimo kontekstas per tą laiką gerokai pasikeitė ir keičiasi toliau. Vidurio ir Rytų Europoje žlugus komunistiniams režimams, Šaltojo karo tvarka žlugo neįtikėtinai greitai. 2000 m. aiškėja, kad strateginė aplinka ir mūsų saugumo suvokimas taip pat pakito. Nors Vidurio ir Rytų Europos lyderiai nepamiršta sovietinės praeities, pastarieji dešimt metų leidžia tikėtis, kad šioms valstybėms pavyks sėkmingai integruotis į Vakarų Europos struktūras. 1999 m. Kosovo kampanija privertė peržiūrėti tarptautinio saugumo sampratą, Europos Są…
Morphological Enhancement and Triangular Matching for Fingerprint Recognition
2008
Among the principal problems for realizing a robust Automated Fingerprint Identification System (AFIS) there are the images quality and matching algorithms. In this paper a fingerprint enhancement algorithm based on morphological filter and a triangular matching are introduced. The enhancement phase is based on tree steps: directional decomposition, morphological filter and composition. For the matching phase a global transformation to overcame the effects of rotation, displacement and deformation between acquired and stored fingerprint is performed using the number of similar triangular, having fingerprint minutiae as vertexes. The performance of the proposed approach has been evaluated on…
Checkpointing Workflows for Fail-Stop Errors
2017
International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…
Serial In-network Processing for Large Stationary Wireless Sensor Networks
2017
International audience; In wireless sensor networks, a serial processing algorithm browses nodes one by one and can perform different tasks such as: creating a schedule among nodes, querying or gathering data from nodes, supplying nodes with data, etc. Apart from the fact thatserial algorithms totally avoid collisions, numerous recent works have confirmed that these algorithms reduce communications andconsiderably save energy and time in large-dense networks. Yet, due to the path construction complexity, the proposed algorithmsare not optimal and their performances can be further enhanced. To do so, in the present paper, we propose a new serial processing algorithm that, in most of the case…
A Learning Automata Based Solution to Service Selection in Stochastic Environments
2010
Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
2019
We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.