Search results for "Security"

showing 10 items of 1693 documents

Joint Border of Ukraine and the European Union: Political and Legal Aspects of Cooperation in the Field of Integrated Border Management

2020

W artykule przeanalizowano polityczne i prawne aspekty oraz dynamikę stosunków Ukrainy z UE i jej państwami członkowskimi w zakresie zintegrowanego zarządzania granicami w celu usprawnienia współpracy międzyagencyjnej i międzynarodowej, ustanowienia wspólnej kontroli celnej i przejść granicznych, organizacji wspólnych patroli, zwiększenia bezpieczeństwa i otwartości granic państwowych oraz poprawy ich funkcji integracyjnej. Zbadano zagadnienia związane ze stworzeniem i modernizacją przejść granicznych, wprowadzaniem europejskich standardów ochrony granic, kontroli celnej i innych rodzajów kontroli na granicy państwowej Ukrainy i krajów UE. Zarysowano perspektywy przystąpienia Ukrainy do sys…

granicaUkrainaUnia Europejskacheckpointprzejście granicznezintegrowane zarządzanie granicamiinternational cooperationborderintegrated border managementEuropean Unionwspółpraca międzynarodowaUkraineborder securityStudia Regionalne i Lokalne
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture

2021

To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…

hajautetut järjestelmätComputer scienceDistributed computingtietovarastotData platform architectureDistributed data management02 engineering and technologydata warehousingAsset (computer security)Competitive advantageDecentralizationdistributed data managementkeskittäminen020204 information systems0202 electrical engineering electronic engineering information engineeringDigitizationtietojärjestelmäthajautusbusiness.industrytiedonhallinta020207 software engineeringData decentralizationtiedonhallintajärjestelmät113 Computer and information sciencesData warehousedata decentralizationyrityksetData warehousingdatadata platform architectureComputer data storageScalabilitytietohallintoKey (cryptography)business
researchProduct

Terveydenhuolto ja kyberuhkat

2019

Kyberturvallisuusstrategian vision mukaan Suomen tulee kyetä suojaamaan elintärkeät toimintonsa kyberuhkaa vastaan kaikissa tilanteissa. Terveydenhuolto on yksi elintärkeistä toiminnoista. Terveystoimiala on kyberhyökkäysten top-5-listalla ensimmäisenä. Hyökkäysten keskeisin motivaatio on potilastietojen arvo pimeillä markkinoilla. Vuonna 2015 varastettiin yli satamiljoonaa potilastietoa, jotka sisältävät rikollisille arvokkaita tietoja, kuten luottokorttinumeroita, työnantajatietoja ja sairaushistoriatietoja. Tässä artikkelissa kuvataan terveydenhuoltoon liittyviä kyberuhkia, kyberhaavoittuvuuksia ja toteutuneita kyberhyökkäyksiä kybermaailman eri ulottuvuudet kattaen. Tarkastelussa käytet…

health care [http://www.yso.fi/onto/yso/p2641]kyberturvallisuus [http://www.yso.fi/onto/yso/p26189]cyber threatcritical infrastructurekyberuhkaterveydenhuoltoterveydenhoitocyber security [http://www.yso.fi/onto/yso/p26189]kyberturvallisuusMuut artikkelit / Other articleskriittinen infrastruktuuriterveydenhuolto [http://www.yso.fi/onto/yso/p2658]Finnish Journal of eHealth and eWelfare
researchProduct

Indicadores para la Evaluación de las Instituciones Universitarias: Validación a través del Método Delphi

2012

Artículo distribuido bajo una licencia de uso y distribución “Creative Commons Reconocimiento-No Comercial 3.0 España”.

higher education institutionsKnowledge managementHigher educationProcess (engineering)Delphi methodDelphi methodUniversitatsLibrary and Information SciencesBibliography. Library science. Information resourcesindicator systemsProfessional literaturemétodo DelphiEvaluationMétodo delphievaluationEvaluaciónbusiness.industryHigher education institutionsPrincipal (computer security)instituciones de educación superiorevaluaciónsistemas de indicadoreslcsh:ZManagementlcsh:Bibliography. Library science. Information resourcesIdentification (information)Sistemas de indicadoresIndicator systemsAvaluació educativabusinessPsychologyKnowledge transferInstituciones de educación superiorZ
researchProduct

Right to Food and Geoengineering

2023

AbstractClimate change poses grave risks to food security, and mitigation and adaptation actions have so far been insufficient to lessen the risk of climate-induced violations of the right to food. Could safeguarding the right to food, then, justify some forms of geoengineering? This article examines geoengineering through the analytical lens of the right to food. We look at the components of food security and consider how the acceptability of geoengineering relates to the right to food via its impacts on these components. Our examination shows that results vary greatly between different forms of geoengineering: while some forms of geoengineering fail to respect the right to food, certain o…

hiilidioksidiHistoryfood justiceelintarvikkeetfood securityilmastonmuutoksetglobal warminghuman rightsoikeudenmukaisuusAgricultural and Biological Sciences (miscellaneous)ilmastonmuokkausclimate emergencyruokaturvaihmisoikeudetclimate engineeringEnvironmental ChemistryilmastonsuojeluetiikkaauringonsäteilyGeneral Environmental ScienceJournal of Agricultural and Environmental Ethics
researchProduct

Prasa endecka wobec przejęcia władzy w Niemczech przez Adolfa Hitlera a kwestia bezpieczeństwa w Europie (styczeń-lipiec 1933)

2019

Wielki kryzys gospodarczy oraz rozgoryczenie społeczeństwa niemieckiego postanowieniami traktatu wersalskiego pomogły Adolfowi Hitlerowi w objęciu władzy w państwie, co skutkowało poważnymi zmianami w polityce wewnętrznej i zewnętrznej Rzeszy. Sytuacji w Niemczech bacznie przyglądała się również polska opinia publiczna. W artykule zbadane zostało zainteresowanie prasy endeckiej wydarzeniami, które miały miejsce bezpośrednio po upadku Republiki Weimarskiej.

history of polish pressprasa endeckabezpieczeństwo EuropyNational Democracy pressEurope’s securityAdolf Hitlerhistoria prasy polskiejBezpieczeństwo.Teoria i Praktyka
researchProduct

Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer

2014

Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…

hsi500Tilgangsstyring ; Tilgangskontroll Delphi ; Elektronisk pasientjournal ; Informasjonssikkerhet ; Spesialisthelsetjeneste ; Pasientsikkerhet ; Access Control ; Delphi ; Electronic Health Records ; Information security ; Patient safetyVDP::Technology: 500::Information and communication technology: 550
researchProduct

I diritti umani come tema conflittuale nel Consiglio di Sicurezza delle Nazioni Unite

2019

With the end of the Cold War and the expansion of the international liberal order, human rights have entered the UN Security Council agenda. However, this has become a divisive issue. In a context of greater influence of the US and its Western allies over the decision-making process of the most important multilateral institutions, the UN above all, the interpretation allowing intrusive practices by the Security Council promoted by the Western permanent members has clashed with the defense of sovereignty promoted by Russia and China. Analyzing divisive resolutions with reference to human rights in the period 2001-2017 (Lebanon, Myanmar, Zimbabwe, Libya and Syria) and the only thematic meetin…

human righthumanitarian interventionssovereigntyinternational liberal orderSettore SPS/04 - Scienza PoliticaUN Security Council
researchProduct

Sicurezza e populismo. I migranti alla frontiera del diritto penale

2023

Il presente lavoro di ricerca ha ad oggetto la criminalizzazione delle migrazioni nell'èra del cosiddetto populismo, e in particolare del populismo penale. Invero, negli ultimi anni si è assistito ad una espansione incontrollata del potere punitivo che, sotto la pressione di un bisogno collettivo di sicurezza, ha condotto ad una vera e propria disumanizzazione del diritto penale (e punitivo-amministrativo), nel duplice significato che quest’ultima espressione rivestiva secondo la giurispoeta Mireille Delmas-Marty: "quello di un diritto penale che si sta deumanizzando, e quindi deumanizzato, in quanto sempre più distante dai principi dell'umanesimo giuridico; e quello di un diritto penale de…

human rights.populismoSettore IUS/20 - Filosofia Del Dirittomigrantisécuritésolidaritésecuritysolidarietàpopulismepopulismfrontièresicurezzadroits humains.migrantfrontierebordersolidaritydiritti umani.Settore IUS/17 - Diritto Penale
researchProduct