Search results for "Security"

showing 10 items of 1693 documents

Lampedusa humanitarian emergency in 2011: the case of unaccompanied migrant minors

2012

The purporse of this paper is to highlight the situation of the unaccompanied foreign minors in the Italian legal system, paying special attention to the Lampedusa humanitarian emergency in 2011. The paper examines the legal measures regulating the status of unaccompanied foreign minors in the Italian legal system, in order to understand if they are efficient in giving protection and offering integration to these minors. The papers offers insights into the most vulnerable category of illegal immigrants Purpose - The purpose of this paper is to highlight the situation on the unaccompanied foreign minors in the Italian legal system, paying special attention to the Lampedusa humanitarian emerg…

biologyMigrant workermedia_common.quotation_subjectImmigrationControl (management)Host stateImmigrationbiology.organism_classificationMinorItalyOrder (exchange)LawPolitical sciencePublic securityImmigration lawLampedusaGeneral Economics Econometrics and FinanceWelfareLawmedia_commonImmigrant
researchProduct

Biometric Features for Mobile Agents Ownership

2005

Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …

biometric authentication systemsmulti-agent systems security.ComputingMilieux_LEGALASPECTSOFCOMPUTINGagent ownershipComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

Initial Coin Offering (ICO) as a Fundraising Strategy : A Multiple Case Study on Success Factors

2019

Cryptocurrencies and Initial Coin Offerings (ICO) are some of the more prominent examples of currently used blockchain technology applications. Especially software startups have leveraged ICOs to gain funding early on in their lifecycles, going on to develop and create new blockchain based applications. Recently, larger companies such as Facebook have also begun to show interest in cryptocurrency, although thus far not for funding purposes in the form of ICOs. In this paper, we investigate factors that positively affect the abilities of companies to meet their fundraising goals via ICOs. We first identify a set of factors from extant literature and then seek to further confirm the effect of…

blockchainCryptocurrencyinitial coin offeringKnowledge managementcrowd salelohkoketjutSecurity tokenstartup-yrityksetExtant taxontoken0502 economics and businessfundraisingSet (psychology)menestystekijät050208 financebusiness.industry05 social sciencessuccess factorSuccess factorscomputer.file_formatvarainhankintacryptocurrencyvirtuaalivaluuttaICOMultiple casebusinesscomputer050203 business & management
researchProduct

Aggregation and remuneration in Demand-Response with a blockchain-based framework

2020

This paper describes the possibility to use the blockchain technology for load and generation aggregation in a new distributed Demand Response (DR) service and customers remuneration system. The blockchain technology and the use of smart contracts for DR allow the creation of a distributed system in which customers can communicate directly, in a transparent, secure and traceable way, with the grid operator to provide their flexibility. In this paper, the DR problem formulation takes into account several aspects, which are periodically executed. First, the blockchain records customers’ energy consumption or production, then, the smart contract starts calculating the baseline and the potentia…

blockchaintransactive energyBlockchainSmart contractComputer science020209 energy02 engineering and technologyComputer securitycomputer.software_genreLoad profileIndustrial and Manufacturing EngineeringDemand responseLoad managementenergy market0202 electrical engineering electronic engineering information engineeringRemunerationElectrical and Electronic Engineeringpeer to peerMultitenancySettore INF/01 - InformaticaSettore ING-INF/03 - Telecomunicazioni020208 electrical & electronic engineeringGridSettore ING-IND/33 - Sistemi Elettrici Per L'Energiamicrogriddemand responseControl and Systems Engineeringsmart contractcomputerIEEE Transactions on Industry Applications
researchProduct

Izdegšanas, darba nedrošības izjūtas, uztvertā organizācijas atbalsta un amata pārslodzes saistība māsu profesijā

2022

Pētījuma mērķis bija noskaidrot saistības starp izdegšanu, darba nedrošības izjūtu, uztverto organizācijas atbalstu un amata pārslodzi māsu profesijā. Pētījumā piedalījās 279 respondenti vecumā no 19 – 73 gadiem, ar vidējo vecumu 42,53 gadi. Pētījuma ietvaros tika izmantotas četras aptaujas: Maslakas izdegšanas aptauja – vispārīgā aptauja (Maslach Burnout Inventory – General Survey, MBI – GS, Maslach C., Jackson S.E. & Leiter M.P., 1996), Darba nedrošības izjūtas aptauja (Job Insecurity Scale - O´Neill and Sevastos’,2013, Uztvertā organizācijas atbalsta skala (Perceived Organizational Support Scale - Eisenberger, Huntington, Hutchinson, & Sowa, 1986) un Darba pārslodzes skala (Work Overlo…

burnoutexhaustioncynismjob insecurityprofessional efficacyPsiholoģija
researchProduct

A Power Sector in Transition Understanding Transition Towards a Cleaner Grid and how Distributed Energy Resources Affect the Design and Operation of …

2018

Important changes in the supply and the demand side of electricity apparatus are now underway, triggered by a combination of drivers dramatically affecting the transmission sector of power systems: greenhouse gas emissions, distributed generation, energy efficiency and the full integration of the European energy market. A variety of accelerating factors - including active consumer, aggregators, energy storage, e-vehicles, etc..- are creating a new era for the many stakeholders, incl. system operators, regional entities, industry and consumer organizations, producers or their trade bodies, Regulators, public decision makers and the society at large. Entraining this background, ENTSO-E and th…

business.industry020209 energyDigital transformation02 engineering and technologyEnergy transitionEnvironmental economicsEnergy storageDynamic Thermal rating (DTR)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaElectric power systemDemand-Side Management (DSM)Distributed generation0202 electrical engineering electronic engineering information engineeringRegional Operational Center (ROC)Energy marketBusinessElectricityAncillary ServiceRegional Security Coordinator (RSC)Efficient energy use2018 IEEE International Conference on Environment and Electrical Engineering and 2018 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe)
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct