Search results for "Security"

showing 10 items of 1693 documents

A multisite-cooperative research programme on risk assessment of transgenic crops

1999

Genetically modified plants are now being commercialised in several countries as regulatory authorities consider that the balance of risk versus benefit is beneficial. However, numerous questions remain unanswered, especially the impact of these plants when used over large areas and under a range of variable environmental conditions. Some issues need to be re-evaluated [1, 2]. Risk/safety analysis, as well as prospects of transgenic crops depend on the scale which is to be considered. Extrapolation of methods, and laboratory and greenhouse results, to large-scale farmers’ fields, may provide useful preliminary data, but is not a sound approach to the study of the consequences of the commerc…

0106 biological sciences[SDE] Environmental SciencesAgrochemicalCooperative research[SDV]Life Sciences [q-bio]0211 other engineering and technologiesGreenhouse02 engineering and technologyGenetically modified cropsHazard analysis01 natural sciencesAgricultural economicsAgricultural scienceCOLZA2. Zero hunger021110 strategic defence & security studiesbusiness.industryfood and beverages[SDV] Life Sciences [q-bio]Geography13. Climate actionAgricultureScale (social sciences)[SDE]Environmental SciencesbusinessRisk assessment010606 plant biology & botany
researchProduct

Improving scientific rigour in conservation evaluations and a plea deal for transparency on potential biases

2020

Abstract The delivery of rigorous and unbiased evidence on the effects of interventions lay at the heart of the scientific method. Here we examine scientific papers evaluating agri‐environment schemes, the principal instrument to mitigate farmland biodiversity declines worldwide. Despite previous warnings about rudimentary study designs in this field, we found that the majority of studies published between 2008 and 2017 still lack robust study designs to strictly evaluate intervention effects. Potential sources of bias that arise from the correlative nature are rarely mentioned, and results are still promoted by using a causal language. This lack of robust study designs likely results from …

0106 biological sciencesagri‐environment schemelcsh:QH1-199.5Psychological interventionIntervention effectlcsh:General. Including nature conservation geographical distribution010603 evolutionary biology01 natural sciencesRigourPleaorganic farmingbefore after control impactVDP::Matematikk og Naturvitenskap: 400::Basale biofag: 470Ecology Evolution Behavior and SystematicsNature and Landscape ConservationEcology010604 marine biology & hydrobiologyClinical study designevaluation of conservation interventionsPrincipal (computer security)biodiversity | causal languageRisk analysis (engineering)meta‐analysisMeta-analysisTransparency (graphic)PsychologyConservation Letters
researchProduct

Reviewing research priorities in weed ecology, evolution and management: a horizon scan.

2018

Weedy plants pose a major threat to food security, biodiversity, ecosystem services and consequently to human health and wellbeing. However, many currently used weed management approaches are increasingly unsustainable. To address this knowledge and practice gap, in June 2014, 35 weed and invasion ecologists, weed scientists, evolutionary biologists and social scientists convened a workshop to explore current and future perspectives and approaches in weed ecology and management. A horizon scanning exercise ranked a list of 124 pre-submitted questions to identify a priority list of 30 questions. These questions are discussed under seven themed headings that represent areas for renewed and em…

0106 biological sciencesagroecologyCrop and Pasture ProductionLife on LandEcology (disciplines)Molecular Plant PhysiologyPlant Scienceweed adaptation01 natural sciencesEcosystem servicesEcogenomicsTransdisciplinarityPolitical scienceinvasive plantsAgroecologyReview PapersEcology Evolution Behavior and Systematics2. Zero hungerReview PaperFood securityEcologybusiness.industrytransdisciplinary researchAgronomy & Agriculture04 agricultural and veterinary sciences15. Life on land13. Climate actionAgricultureintegrated weed managementEcological Applications040103 agronomy & agriculture0401 agriculture forestry and fisheriesWeedbusinessAgronomy and Crop ScienceDisciplineOT Team Schimmels Onkr. en Plagen010606 plant biology & botany
researchProduct

Editorial: Legumes for global food security

2020

descripción no proporcionada por scopus

0106 biological sciencesenvironmental stresses and physiology[SDV]Life Sciences [q-bio]legumesclimate resilienceLibrary sciencePlant Sciencelcsh:Plant culture01 natural sciencesMarie curieLegume breedingGenetic resourcesPolitical scienceSustainable agriculturelcsh:SB1-1110Genetic resourcesComputingMilieux_MISCELLANEOUS2. Zero hungerClimate resilienceFood securitylegume breedingEnvironmental stresses and physiologyEuropean researchSustainable agriculture04 agricultural and veterinary sciencesfood securityFood securityLegumessustainable agriculturegenetic resources040103 agronomy & agriculture0401 agriculture forestry and fisheries010606 plant biology & botany
researchProduct

Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct

2020

Blockchain is a multiparty protocol to reach agreement on the order of events, and to record them consistently and immutably without centralized trust. In some cases, however, the blockchain can benefit from some controlled mutability. Examples include removing private information or unlawful content, and correcting protocol vulnerabilities which would otherwise require a hard fork. Two approaches to control the mutability are: moderation, where one or more designated administrators can use their private keys to approve a redaction, and voting, where miners can vote to endorse a suggested redaction. In this paper, we first present several attacks against existing redactable blockchain solut…

020203 distributed computingComputer sciencemedia_common.quotation_subject02 engineering and technologyConstruct (python library)RedactionComputer securitycomputer.software_genreDigital signatureOrder (exchange)020204 information systemsVoting0202 electrical engineering electronic engineering information engineeringFork (file system)Protocol (object-oriented programming)computerPrivate information retrievalmedia_common
researchProduct

Security and Privacy in Wireless IoT

2018

The 13 articles in this special section focus on security and privacy in wireless Internet of Things (IoT). IoT is a paradigm that involves networked physical objects with embedded technologies to collect, communicate, sense, and interact with the external environment through wireless or wired connections. With rapid advancements in IoT technology, the number of IoT devices is expected to surpass 50 billion by 2020, which has also drawn the attention of attackers who seek to exploit the merits of this new technology for their own benefits. There are many potential security and privacy threats to IoT, such as attacks against IoT systems and unauthorized access to private information of end u…

020203 distributed computingExploitEnd userbusiness.industryWireless networkComputer scienceNetwork security020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreComputer Science Applications0202 electrical engineering electronic engineering information engineeringWirelessEnergy supplyElectrical and Electronic EngineeringInternet of ThingsbusinessPrivate information retrievalcomputerIEEE Wireless Communications
researchProduct

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records

2017

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently manage their health data. Typically, PHRs are outsourced and stored in third-party cloud platforms. Although, outsourcing private health data to third-party platforms is an appealing solution for PHR owners, it may lead to significant privacy concerns, because there is a higher risk of leaking private data to unauthorized parties. As a way of ensuring PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mechanisms have been considered due to the fact that such schemes facilitate a mechanism of sharing encrypted data among a set of intende…

020205 medical informaticsRevocationbusiness.industryComputer scienceInternet privacyCloud computingAccess controlHealth information exchange02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingScalability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAttribute-based encryptionbusinesscomputerProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
researchProduct

Privacy in Modern Healthcare Communications: The Lesson of Alan Turing

2016

020205 medical informaticsSettore MED/27 - Neurochirurgiabusiness.industryInternet privacy02 engineering and technologyTelemedicine03 medical and health sciences0302 clinical medicineSurgery Neurology (clinical)Confidentiality Telemedicine Humans Computer Security SmartphoneHealth care0202 electrical engineering electronic engineering information engineeringHumansMedicineSurgerySmartphoneNeurology (clinical)businessTuringcomputerComputer SecurityConfidentiality030217 neurology & neurosurgerycomputer.programming_languageWorld Neurosurgery
researchProduct