Search results for "Security"
showing 10 items of 1693 documents
A roadmap towards improving managed security services from a privacy perspective
2014
Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…
Secure Group Communication Using Fractional Public Keys
2010
Published version of a paper presented at the ARES '10 International Conference on Availability, Reliability, and Security (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/ARES.2010.13 In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement sc…
Managing Emerging Information Security Risks during Transitions to Integrated Operations
2010
Paper presented at the 2010 43rd Hawaii International Conference on System Sciences (HICSS). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/HICSS.2010.260 The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. Th…
Cyber-Physical Systems for Smart Water Networks: A Review
2021
Author's accepted manuscript. There is a growing demand to equip Smart Water Networks (SWN) with advanced sensing and computation capabilities in order to detect anomalies and apply autonomous event-triggered control. Cyber-Physical Systems (CPSs) have emerged as an important research area capable of intelligently sensing the state of SWN and reacting autonomously in scenarios of unexpected crisis development. Through computational algorithms, CPSs can integrate physical components of SWN, such as sensors and actuators, and provide technological frameworks for data analytics, pertinent decision making, and control. The development of CPSs in SWN requires the collaboration of diverse scienti…
Human security: an analytical tool for disaster perception research
2015
Purpose – The purpose of this paper is to examine the possible benefits arising from the application of the human security concept to analysing the disaster impacts. Design/methodology/approach – A three-piece human security analytical tool is synthesized by combining the discoveries in human security studies over the last two decades with the perspective of disaster studies focusing on the resilience and securitabilities of the affected societies. To illustrate the merit of the proposed analytical framework a specifically tailored social survey is used to measure the resilience of Ogre’s (Latvia) society after it faces major floods in 2013. It foresees that community’s resilience is inver…
A Personalist Ontological Approach to Synthetic Biology
2015
Although synthetic biology is a promising discipline, it also raises serious ethical questions that must be addressed in order to prevent unwanted consequences and to ensure that its progress leads toward the good of all. Questions arise about the role of this discipline in a possible redefinition of the concept of life and its creation. With regard to the products of synthetic biology, the moral status that they should be given as well as the ethically correct way to behave towards them are not clear. Moreover, risks that could result from a misuse of this technology or from an accidental release of synthetic organisms into the environment cannot be ignored; concerns about biosecurity and …
The development of work values during the transition to adulthood: A two-country study
2017
Abstract This study addresses the development of work values—the desired characteristics of one's current or future job—during young adulthood. Using two panel studies from Germany ( N = 2506) and Finland ( N = 1326), we investigated (a) mean-level and rank-order change and stability in work values across three biennial waves (age 20/21 to age 25/26); and (b) the influence of stable background characteristics as well as of major transitions in family and work roles on inter-individual differences and intra-individual changes in work values. Latent measurement models with three work value dimensions showed good fit in both countries: extrinsic (importance of job security and material rewar…
On the evolution of e-Government: The user imperative
2003
Published version of a chapter published in Lecture Notes in Computer Science, 2739, 139-143. Also available from the publisher at: http://dx.doi.org/10.1007/10929179_25 This paper focuses the need for more research on user involvement and the investigation of stakeholders in e-Government initiatives. An investigation of existing work revealed a lack of research on those topics. As e-Government evolves and users mature, the value of their input can increase. The paper discusses the need and potential benefits of this approach. Finally, we suggest that existing stakeholder theory is investigated for adaptation into e-Government settings in order to map the complex body of interrelated stakeh…
Privacy-preserving scheme for mobile ad hoc networks
2011
This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.
Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks
2010
Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…