Search results for "Security"

showing 10 items of 1693 documents

A negotiation protocol to improve long distance truck parking

2017

Truck050210 logistics & transportationComputer sciencemedia_common.quotation_subject05 social sciences020101 civil engineering02 engineering and technologyComputer securitycomputer.software_genre0201 civil engineeringComputer Science ApplicationsTheoretical Computer ScienceNegotiationComputational Theory and MathematicsArtificial Intelligence0502 economics and businessProtocol (object-oriented programming)computerSoftwaremedia_commonIntegrated Computer-Aided Engineering
researchProduct

IoT-MAAC: Multiple Attribute Access Control for IoT environments

2020

Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…

Trust levelService Level Agreements[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryReliability (computer networking)Access ControlIoT environments020206 networking & telecommunicationsAccess control02 engineering and technology[INFO] Computer Science [cs]Security service0202 electrical engineering electronic engineering information engineeringSecurity020201 artificial intelligence & image processingInternet of ThingsbusinessComputer networkMultiple attribute
researchProduct

Trust-enhanced data integrity model

2012

In this paper we propose an enhancement of data integrity model. The proposed model is based on the idea of Biba integrity model but uses more elaborated integrity measurements. Since integrity can be seen as “trustworthiness of data and resources”, we propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness.

TrustworthinessComputer scienceData integrityTrusted ComputingSubjective logicComputer securitycomputer.software_genrecomputer2012 IEEE 1st International Symposium on Wireless Systems (IDAACS-SWS)
researchProduct

A method to optimize a typology-based classification system

2014

This study sought to provide guidelines for implementing typology-based qualitative analysis of human movement patterns.Fifteen participant-analysts were instructed how to classify treading water behaviours into eight different categories using a training set of videos. They were later provided with two additional sets of videos called validation, and test sets. Results first identified reliable (n=9), and not reliable (n=6) analysts. A decision study outlined that one analyst was sufficient to reliably categorize the behaviours in the ‘reliable’ analyst group, whereas up to four were necessary in the ‘unreliable’ group. These data provided new insights into more objective qualitative analy…

TypologyEngineeringTraining setbusiness.industryGeneralizability theoryPoison controlGeneral Medicinegeneralizability theoryComputer securitycomputer.software_genreMachine learningTest (assessment)Qualitative analysisCategorizationclinical educationexpertiseGeneralizability theoryArtificial intelligenceClinical educationbusinessta315computerEngineering(all)asiantuntijuus
researchProduct

Seismic Behavior of Lisbon Mixed Masonry-RC Buildings With Historical Value: A Contribution for the Practical Assessment

2018

The fact that linear analysis is still the most used procedure in the design engineering offices, studies which addresses issues associated to the estimation of the structural behavior factor values are relevant. In this study, the behavior factor of a particular type of mixed masonry-reinforced concrete buildings in Lisbon is estimated. The typology chosen in this study represents 30% of building stock in Lisbon; these buildings were built between 1930 and 1960 and thus were designed without considering the seismic-design requirements proposed in current codes. The evaluation of the behavior factors was based on the use of nonlinear static analyses, performed in the form of the sensitivity…

TypologyStructural typenonlinear static analysesComputer scienceGeography Planning and Development0211 other engineering and technologiesmixed masonry-RC buildings020101 civil engineering02 engineering and technologyLinear analysisCivil engineering0201 civil engineeringlcsh:HT165.5-169.9021110 strategic defence & security studiesbusiness.industryseismic behaviorbehavior factorBuilding and ConstructionMasonrypractical assessmentlcsh:City planninguncertaintiesUrban StudiesNonlinear systemlcsh:TA1-2040businesslcsh:Engineering (General). Civil engineering (General)Frontiers in Built Environment
researchProduct

Determination of priority groups of indicators for threats identification to the financial security of insurance market

2017

The object of research is economic processes in insurance market of Ukraine. Generally there is no methodology for financial security assessment of the individual insurer and the insurance market in Ukraine, approved within the regulatory impact and determining financial security is not considered that hinders the practice of providing threats identification. To achieve the objectives author used the following methods: analysis and synthesis, logic synthesis, hierarchy analysis method. Methodological basis of the study is insurance theory and insurance concepts.As a result the aim of research was achieved, namely the priority groups of indicators for threats identification to the financial …

UDC 368:351:232національний страховий ринок; групи індикаторів; загрози фінансовій безпеці; регуляторний вплив; пруденційний наглядnational insurance market; groups of indicators; threats to the financial security; regulatory impact; prudential supervisionнациональный страховой рынок; группы индикаторов; угрозы финансовой безопасности; регуляторное влияние; пруденциальный надзорTechnology audit and production reserves
researchProduct

Terrorism as a threat to international tourism: world trends

2018

Current world trends in the development of tourism industry are studied in the article. The essence and types of terrorism have been determined; their classification has been provided. The influence of terrorist acts on the development of tourism in different regions has been analyzed. The efforts made by the international community to neutralize this new challenge for the tourism business have been examined.

UNWTOeconomyUnited Nationsinternational tourimstourism infrastructuresecurityterrorismworld tourist regionsArchives of Tourism, Hospitality and Sport Science
researchProduct

A Security Framework for Smart Ubiquitous Industrial Resources

2007

Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and inte…

Ubiquitous robotUbiquitous computingbusiness.industryComputer scienceInteroperabilityProvisioningWeb application securitycomputer.software_genreComputer securityWorld Wide WebMiddleware (distributed applications)Enterprise application integrationbusinessSemantic Webcomputer
researchProduct

Transformation of the European security system in the context of current geopolitical challenges

2017

W artykule rozważa się problem modernizacji europejskiego systemu bezpieczeństwa w kontekście współczesnych wyzwań geopolitycznych, zwłaszcza agresywnej polityki Federacji Rosyjskiej. Przeprowadzono analizę kształtowania systemu europejskiego bezpieczeństwa, biorąc pod uwagę wielowymiarowość i zdolność systemu, wyznaczono czynniki zagrożenia i wyzwania, które decydują obecnie o jego funkcjonowaniu. Autorzy zwracają uwagę na nieefektywność europejskiego systemu bezpieczeństwa, jego problemy i możliwe sposoby jego reformowania. Przeanalizowane główne instytucje europejskiego systemu bezpieczeństwa: NATO (szczególny wkład tej struktury w gwarantowanie pokoju i bezpieczeństwa na kontynencie eur…

UkrainaCommon Foreign and Defence PolicyNATOUnia Europejskaeuropejski system bezpieczeństwaRussian Federationthe European UnionFederacja RosyjskaOBWEUkrainethe OSCEEuropean security systemWspólna Polityka Zagraniczna i BezpieczeństwaUR JOURNAL OF HUMANITIES AND SOCIAL SCIENCES
researchProduct

Interoperacyjność unijnych systemów informacyjnych w zakresie bezpieczeństwa, ochrony granic i zarządzania migracjami

2019

Unia Europejskaprzestrzeń wolnościochrona granic zewnętrznychsystemy informacyjneinteroperacyjnośćarea of freedomsecurity and justiceInformation systemsprotection of external bordersinteroperabilityEuropean Unionbezpieczeństwa i sprawiedliwościKWARTALNIK KOLEGIUM EKONOMICZNO-SPOŁECZNEGO STUDIA I PRACE
researchProduct