Search results for "Security"
showing 10 items of 1693 documents
A multisite-cooperative research programme on risk assessment of transgenic crops
1999
Genetically modified plants are now being commercialised in several countries as regulatory authorities consider that the balance of risk versus benefit is beneficial. However, numerous questions remain unanswered, especially the impact of these plants when used over large areas and under a range of variable environmental conditions. Some issues need to be re-evaluated [1, 2]. Risk/safety analysis, as well as prospects of transgenic crops depend on the scale which is to be considered. Extrapolation of methods, and laboratory and greenhouse results, to large-scale farmers’ fields, may provide useful preliminary data, but is not a sound approach to the study of the consequences of the commerc…
Improving scientific rigour in conservation evaluations and a plea deal for transparency on potential biases
2020
Abstract The delivery of rigorous and unbiased evidence on the effects of interventions lay at the heart of the scientific method. Here we examine scientific papers evaluating agri‐environment schemes, the principal instrument to mitigate farmland biodiversity declines worldwide. Despite previous warnings about rudimentary study designs in this field, we found that the majority of studies published between 2008 and 2017 still lack robust study designs to strictly evaluate intervention effects. Potential sources of bias that arise from the correlative nature are rarely mentioned, and results are still promoted by using a causal language. This lack of robust study designs likely results from …
Reviewing research priorities in weed ecology, evolution and management: a horizon scan.
2018
Weedy plants pose a major threat to food security, biodiversity, ecosystem services and consequently to human health and wellbeing. However, many currently used weed management approaches are increasingly unsustainable. To address this knowledge and practice gap, in June 2014, 35 weed and invasion ecologists, weed scientists, evolutionary biologists and social scientists convened a workshop to explore current and future perspectives and approaches in weed ecology and management. A horizon scanning exercise ranked a list of 124 pre-submitted questions to identify a priority list of 30 questions. These questions are discussed under seven themed headings that represent areas for renewed and em…
Editorial: Legumes for global food security
2020
descripción no proporcionada por scopus
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct
2020
Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…
Security and Privacy in Wireless IoT
2018
The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing
2016
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
2017
Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…