Search results for "Security"
showing 10 items of 1693 documents
A negotiation protocol to improve long distance truck parking
2017
IoT-MAAC: Multiple Attribute Access Control for IoT environments
2020
Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…
Trust-enhanced data integrity model
2012
In this paper we propose an enhancement of data integrity model. The proposed model is based on the idea of Biba integrity model but uses more elaborated integrity measurements. Since integrity can be seen as “trustworthiness of data and resources”, we propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness.
A method to optimize a typology-based classification system
2014
This study sought to provide guidelines for implementing typology-based qualitative analysis of human movement patterns.Fifteen participant-analysts were instructed how to classify treading water behaviours into eight different categories using a training set of videos. They were later provided with two additional sets of videos called validation, and test sets. Results first identified reliable (n=9), and not reliable (n=6) analysts. A decision study outlined that one analyst was sufficient to reliably categorize the behaviours in the ‘reliable’ analyst group, whereas up to four were necessary in the ‘unreliable’ group. These data provided new insights into more objective qualitative analy…
Seismic Behavior of Lisbon Mixed Masonry-RC Buildings With Historical Value: A Contribution for the Practical Assessment
2018
The fact that linear analysis is still the most used procedure in the design engineering offices, studies which addresses issues associated to the estimation of the structural behavior factor values are relevant. In this study, the behavior factor of a particular type of mixed masonry-reinforced concrete buildings in Lisbon is estimated. The typology chosen in this study represents 30% of building stock in Lisbon; these buildings were built between 1930 and 1960 and thus were designed without considering the seismic-design requirements proposed in current codes. The evaluation of the behavior factors was based on the use of nonlinear static analyses, performed in the form of the sensitivity…
Determination of priority groups of indicators for threats identification to the financial security of insurance market
2017
The object of research is economic processes in insurance market of Ukraine. Generally there is no methodology for financial security assessment of the individual insurer and the insurance market in Ukraine, approved within the regulatory impact and determining financial security is not considered that hinders the practice of providing threats identification. To achieve the objectives author used the following methods: analysis and synthesis, logic synthesis, hierarchy analysis method. Methodological basis of the study is insurance theory and insurance concepts.As a result the aim of research was achieved, namely the priority groups of indicators for threats identification to the financial …
Terrorism as a threat to international tourism: world trends
2018
Current world trends in the development of tourism industry are studied in the article. The essence and types of terrorism have been determined; their classification has been provided. The influence of terrorist acts on the development of tourism in different regions has been analyzed. The efforts made by the international community to neutralize this new challenge for the tourism business have been examined.
A Security Framework for Smart Ubiquitous Industrial Resources
2007
Conventional approaches to manage and control security seem to have reached their limits in new complex environments. These environments are open, dynamic, heterogeneous, distributed, self-managing, collaborative, international, nomadic, and ubiquitous. We are currently working on a middleware platform focused on the industrial needs, UBIWARE. UBIWARE integrates Ubiquitous Computing with Semantic Web, Distributed AI, Security and Privacy, and Enterprise Application Integration. In this paper, we describe our long-term vision for the security and privacy management in complex multi-agent systems like UBIWARE, SURPAS. The security infrastructure has to become pervasive, interoperable and inte…
Transformation of the European security system in the context of current geopolitical challenges
2017
W artykule rozważa się problem modernizacji europejskiego systemu bezpieczeństwa w kontekście współczesnych wyzwań geopolitycznych, zwłaszcza agresywnej polityki Federacji Rosyjskiej. Przeprowadzono analizę kształtowania systemu europejskiego bezpieczeństwa, biorąc pod uwagę wielowymiarowość i zdolność systemu, wyznaczono czynniki zagrożenia i wyzwania, które decydują obecnie o jego funkcjonowaniu. Autorzy zwracają uwagę na nieefektywność europejskiego systemu bezpieczeństwa, jego problemy i możliwe sposoby jego reformowania. Przeanalizowane główne instytucje europejskiego systemu bezpieczeństwa: NATO (szczególny wkład tej struktury w gwarantowanie pokoju i bezpieczeństwa na kontynencie eur…