Search results for "Security"
showing 10 items of 1693 documents
Lampedusa humanitarian emergency in 2011: the case of unaccompanied migrant minors
2012
The purporse of this paper is to highlight the situation of the unaccompanied foreign minors in the Italian legal system, paying special attention to the Lampedusa humanitarian emergency in 2011. The paper examines the legal measures regulating the status of unaccompanied foreign minors in the Italian legal system, in order to understand if they are efficient in giving protection and offering integration to these minors. The papers offers insights into the most vulnerable category of illegal immigrants Purpose - The purpose of this paper is to highlight the situation on the unaccompanied foreign minors in the Italian legal system, paying special attention to the Lampedusa humanitarian emerg…
Biometric Features for Mobile Agents Ownership
2005
Multi-Agent System (MAS) architectures can be used for e-Business application due their flexibility, scalability and interoperability. Agent ownership implies that a specific person or organization (the owner) is responsible for the agent's actions. Agents, whose ownership was certainly fixed, could operate on behalf of their owner to make transactions, to buy or sell products. Security requirements in the agent ownership setting process are the identification of the owner and the protection of the identification information carried by an agent. In this paper, we investigate the possibility of using biometrics in mobile agent systems for owner authentication. Biometric features can be used …
Initial Coin Offering (ICO) as a Fundraising Strategy : A Multiple Case Study on Success Factors
2019
Cryptocurrencies and Initial Coin Offerings (ICO) are some of the more prominent examples of currently used blockchain technology applications. Especially software startups have leveraged ICOs to gain funding early on in their lifecycles, going on to develop and create new blockchain based applications. Recently, larger companies such as Facebook have also begun to show interest in cryptocurrency, although thus far not for funding purposes in the form of ICOs. In this paper, we investigate factors that positively affect the abilities of companies to meet their fundraising goals via ICOs. We first identify a set of factors from extant literature and then seek to further confirm the effect of…
Aggregation and remuneration in Demand-Response with a blockchain-based framework
2020
This paper describes the possibility to use the blockchain technology for load and generation aggregation in a new distributed Demand Response (DR) service and customers remuneration system. The blockchain technology and the use of smart contracts for DR allow the creation of a distributed system in which customers can communicate directly, in a transparent, secure and traceable way, with the grid operator to provide their flexibility. In this paper, the DR problem formulation takes into account several aspects, which are periodically executed. First, the blockchain records customers’ energy consumption or production, then, the smart contract starts calculating the baseline and the potentia…
Izdegšanas, darba nedrošības izjūtas, uztvertā organizācijas atbalsta un amata pārslodzes saistība māsu profesijā
2022
Pētījuma mērķis bija noskaidrot saistības starp izdegšanu, darba nedrošības izjūtu, uztverto organizācijas atbalstu un amata pārslodzi māsu profesijā. Pētījumā piedalījās 279 respondenti vecumā no 19 – 73 gadiem, ar vidējo vecumu 42,53 gadi. Pētījuma ietvaros tika izmantotas četras aptaujas: Maslakas izdegšanas aptauja – vispārīgā aptauja (Maslach Burnout Inventory – General Survey, MBI – GS, Maslach C., Jackson S.E. & Leiter M.P., 1996), Darba nedrošības izjūtas aptauja (Job Insecurity Scale - O´Neill and Sevastos’,2013, Uztvertā organizācijas atbalsta skala (Perceived Organizational Support Scale - Eisenberger, Huntington, Hutchinson, & Sowa, 1986) un Darba pārslodzes skala (Work Overlo…
A Power Sector in Transition Understanding Transition Towards a Cleaner Grid and how Distributed Energy Resources Affect the Design and Operation of …
2018
Important changes in the supply and the demand side of electricity apparatus are now underway, triggered by a combination of drivers dramatically affecting the transmission sector of power systems: greenhouse gas emissions, distributed generation, energy efficiency and the full integration of the European energy market. A variety of accelerating factors - including active consumer, aggregators, energy storage, e-vehicles, etc..- are creating a new era for the many stakeholders, incl. system operators, regional entities, industry and consumer organizations, producers or their trade bodies, Regulators, public decision makers and the society at large. Entraining this background, ENTSO-E and th…
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
Review of web-based information security threats in smart grid
2017
The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…