Search results for "Security"

showing 10 items of 1693 documents

TECNOLOGICAL PARAMETERS OF SUSTAINABILITY: FACTORS OF DECAY AND PREVENTION MEASURES

2006

This is the age of the"global knowledge", of the "local inadequacies", of the specialist enterprises and of the management difficulties. Today is necessary to create new perspectives to limit the rissk both material (structural decay / phisical obsolescence/ security needs/ static disease) and cultural and environmental (funtion degradations - inattentive environmental conditions) and to realize the right living conditions and protection for the development of guidelines for the 21st century construction. This research aims at the creation of new tools for developing a history of building technologies as they relate to their pathologies.

architectural technology building decay obsolescence security needsSettore ICAR/12 - Tecnologia Dell'Architettura
researchProduct

Bezpieczeństwo w zakładach karnych i aresztach śledczych : uwagi dotyczące unormowań i praktyki

2018

areszty śledczeporządek i bezpieczeństwo publicznepre-trial detention centreszakłady karnesecurity and public orderprisons
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Distributed denial-of-service attacks in the Internet

2005

automated intrusion agentInternetclassificationdenial-of-serviceconcept definitionstietoturvatietoverkotcomputer security
researchProduct

Avoimen lähdekoodin alustojen sopivuus älykotiin

2017

Internet of Things kasvaa jatkuvasti ja sen eräs suurimmista sovelluskohteista on älykoti. IoT:n ongelmana on kuitenkin ollut keskimäärin erittäin huono tietoturva ja tämä on heijastunut myös älykoteihin esimerkiksi hakkeroituina kameroina ja itkuhälyttiminä. Toinen, älykodissa erityisen suuri ongelma on kerätyn tiedon yksityisyys. Tässä tutkielmassa kartoitetaan, kuinka hyvin avoimen lähdekoodin ohjelmistot soveltuvat toimivan ja turvallisen älykodin toteuttamiseen. Turvallisuuden osalta painopisteenä on erityisesti etäyhteys. Tutkimus toteutettiin konstruktiivisena tutkimuksena. Se ei käsittele yksittäisiä ohjelmistoja kovin syvällisesti, vaan sen tarkoituksena oli saada kattavahko yleisk…

avoin lähdekoodismart homecyber securitykodintekniikkaälytekniikkaesineiden internetkyberturvallisuusinternet of thingsKonstruktiivinen tutkimus
researchProduct

Quality, Reliability, Security and Robustness in Heterogeneous Systems

2020

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.

bandwidthartificial intelligenceinternetmobiledevicesrouterstelecommunication networksdata communication systemscomputing mobileWorld Wide Webroutingsensorcomputer networkstelecommunication trafficdata securitysignal processingwireless sensor networksnetworks sensorswireless telecommunication systems
researchProduct

A study on The Factors Affecting Merger and Acquisition Decision In Nepalese Banking Sector

2016

Master's thesis Business Administration BE501 - University of Agder 2016 The main purpose of this study is to find out the factors that would lead to making decision regarding going for merger and acquisition among the banks in Nepalese banking sector. This thesis finds out various factors that would affect merger and acquisition decision in banking sector based upon previous studies, and tries to check whether these are significant in case of Nepalese banking sector or not. Four theories: neo-classical, agency, behavioral and resource dependency; have been taken into consideration for purpose of finding out factors affecting decision to go for merger and acquisition. Based upon the previou…

behavioralcapitalVDP::Samfunnsvitenskap: 200::Økonomi: 210::Bedriftsøkonomi: 213descriptive analysisbankingacquisitionfactor analysisbrandingsecuritydecisionregression analysispositionincomeNepalregulationscorrelationneo-classicalagencycostresource dependencyreliability analysisBE501SPSSmerger
researchProduct

Beyond economic and financial analyses : A revelatory study of IT security investment decision-making process

2022

Information Technology (IT) security breaches and the extent of damage they may cause to an organization are inherently uncertain. Therefore, managers’ decisions about whether to make IT security investment (ITSI) and how much, depend upon a subjective assessment of the economic value of the investment and the likelihood of the damage to the organization. When managers delay or fail to decide on whether and how much to invest in IT security, it can make organizations vulnerable to operational and strategic perils. Based upon interviews, document reviews, and observations in three organizations in Finland that made ITSI decisions to acquire a secure email application system, we examined the …

behavioraljohtaminencybersecuritypäätöksentekorevelatory studyIT securitytietoturvatietotekniikkakyberturvallisuusdecision makinginvestoinnityrityksettietojärjestelmät
researchProduct

Kan brist i alarmkjeden unngås? : Delphistudie med funn av faktorer som er viktige for kvalitetssikring i et velferdsteknologisk responssenter

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 The future brings with it an increased number of elderly in need of aid or assistance. One way of meeting these challenges is an increased usage of healthcare technological solutions. Through media, it is illustrated that there have been several unfortunate incidents related to the handling of personal alarm systems. This has happened not only when receiving an alarm at the responsecenter, but also with the turn-out at the place of emergency. The goal with this study is to identify important factors that are necessary to secure the quality at the responsecenters when the alarms are received and how they are forwarded a…

beslutningsstøttevelferdsteknologitelehealth callsenterresponssenterHSI500social security alarmsVDP::Technology: 500::Information and communication technology: 550trygghetsalarmhealth technology
researchProduct

Sieci społecznościowe w ukraińskiej edukacji: blaski i cienie

2018

W artykule przedstawiono koncepcyjne podstawy bezpieczeństwa w zakresie korzystania z sieci społecznościowych w edukacji na Ukrainie. Potwierdzono stanowisko, że tylko z wystarczającym stopniem kształcenia w tym wymiarze, edukacja nabywa nieprzerwanej formy i może skutecznie pełnić funkcję rozwoju aktualnych wartości dla narodu ukraińskiego i innych nacji. Podkreślono ideę potencjalnego wpływu sieci społecznych jako innowacyjnego narzędzia edukacyjnego wpływającego bezpośrednio lub pośrednio na bezpieczeństwo humanitarne państwa ukraińskiego. Wykazano, że wpływ ten jest spowodowany szybkim i dyskretnym rozpowszechnianiem informacji za pośrednictwem sieci społecznościowych, realizowanym zaró…

bezpieczeństwo informacyjneinformation spheresocial networkseducationinformation securityvirtual realitysfera informacyjnaportale społecznościowerzeczywistość wirtualnaZeszyty Naukowe Politechniki Śląskiej. Organizacja i Zarządzanie
researchProduct