Search results for "Security"

showing 10 items of 1693 documents

Construction of pseudo-random sequences from chaos

2002

CHAOS (operating system)Pseudorandom number generatorTheoretical computer scienceRandom number generationbusiness.industryTelecommunication securityCryptographybusinessMathematics2000 2nd International Conference. Control of Oscillations and Chaos. Proceedings (Cat. No.00TH8521)
researchProduct

Evaluación de las tarifas de las pensiones de accidentes de trabajo y enfermedades profesionales (2011-2015)

2017

Este trabajo analiza si las tarifas que se aplican para la determinación del denominado capital coste de pensiones derivadas de los accidentes de trabajo y enfermedades profesionales son las adecuadas. A partir de los datos de la Muestra Continua de Vidas Laborales y de la evolución de la longevidad de la población general en España, se estiman tablas de mortalidad para las contingencias de viudedad e invalidez que, combinadas con los parámetros económicos y financieros apropiados, permiten construir las bases técnicas actuarialmente justas para cada uno de los años objeto de análisis. Los resultados obtenidos sugieren que las tarifas aplicadas en el periodo 2011- 2014 han sido muy superior…

CapitalizationPublic AdministrationSociology and Political Sciencerentas vitaliciasStrategy and ManagementSample (statistics)lcsh:Businessviudedad01 natural sciencesinvalidezmutuas de accidentes de trabajolcsh:Social Sciences010104 statistics & probabilityPensionsMutual Funds for work accidentsAccounting0502 economics and business3 Ciencias sociales / Social sciencesMalalties professionalsEconomicsCapital costwidowhoodannuities050207 economics0101 mathematicsRisk assessmentMarketinglcsh:CommerceWelfare economics05 social sciencesReview procedureIndustrial accidentscapitalizaciónTreasurySocial securitySpanish populationlcsh:Hlcsh:HF1-6182disabilityLife tableCovertOccupational diseasesAvaluació del riscAccidents de treballlcsh:HF5001-6182Innovar: Revista de Ciencias Administrativas y Sociales
researchProduct

Credit card incidents and control systems

2012

Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.

Card security codeComputer Networks and Communicationsmedia_common.quotation_subjectCredit card fraudLibrary and Information SciencesPaymentComputer securitycomputer.software_genreATM cardCredit cardBusinesscomputerMerchant servicesChargebackCredit card interestInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification

2019

Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…

Care processInteractive computer systemsMedical terminologyHealth information technologyText simplificationComputer sciencemedia_common.quotation_subjectKnowledge management02 engineering and technologyInformation technologyPatient safetyOrder (exchange)Computer securityPatient Empowerment; Health Information Seeking; User Requirements; Risk Management; IEC 80001-1; Medical Terminology Simplification;Machine learning0202 electrical engineering electronic engineering information engineeringInformation retrievalQuality (business)Risk managementComputer networksmedia_commonEstimationRisk ManagementSettore INF/01 - Informaticabusiness.industryCommunication020206 networking & telecommunications020207 software engineeringMedical Terminology SimplificationWorld Wide WebEducational technologyChronic diseaseRisk analysis (engineering)HealthbusinessIEC 80001-1Machine translating
researchProduct

The emergence of Vibrio pathogens in Europe : ecology, evolution, and pathogenesis (Paris, 11-12th March 2015)

2015

Global change has caused a worldwide increase in reports of Vibrio-associated diseases with ecosystem-wide impacts on humans and marine animals. In Europe, higher prevalence of human infections followed regional climatic trends with outbreaks occurring during episodes of unusually warm weather. Similar patterns were also observed in Vibrio-associated diseases affecting marine organisms such as fish, bivalves and corals. Basic knowledge is still lacking on the ecology and evolutionary biology of these bacteria as well as on their virulence mechanisms. Current limitations in experimental systems to study infection and the lack of diagnostic tools still prevent a better understanding of Vibrio…

Cell- och molekylärbiologilcsh:QR1-502NetworkPACIFIC OYSTERS[ SDV.MP.BAC ] Life Sciences [q-bio]/Microbiology and Parasitology/Bacteriologyglobal warminghuman healthgenome plasticityHORIZONTAL GENE-TRANSFERlcsh:Microbiologyeuropean network/dk/atira/pure/sustainabledevelopmentgoals/zero_hungerOYSTERS CRASSOSTREA-GIGASApplied researchFood securitybiologyEcologyGenome plasticityMARINE PHOTOBACTERIUMHuman health risksaquacultureSECRETION SYSTEMPerspective/dk/atira/pure/sustainabledevelopmentgoals/good_health_and_well_beingVibrio-host interactionVIRULENCE FACTORSMicrobiology (medical)570Ecology (disciplines)Social issuesMicrobiology/dk/atira/pure/sustainabledevelopmentgoals/life_below_waterSDG 3 - Good Health and Well-being[SDV.BID.EVO] Life Sciences [q-bio]/Biodiversity/Populations and Evolution [q-bio.PE]14. Life underwaterSDG 14 - Life Below WaterSDG 2 - Zero HungerBacterial diseaseanimal modelGlobal warmingOutbreakBiology and Life Sciencesgenome asticityD-AMINO ACIDSAnimal model; Aquaculture; Bacterial disease; Biotic-abiotic interactions; Genome plasticity; Global warming; Human health; Network; Vibrio-host interaction; Microbiology; Microbiology (medical)interactionsbiology.organism_classificationCLINICAL SOURCES[SDV.MP.BAC]Life Sciences [q-bio]/Microbiology and Parasitology/Bacteriologybacterial diseaseBiotic-abiotic interactionsVibrioDAMSELAE SUBSP DAMSELAE13. Climate actionnetworksCell and Molecular BiologyPHOTOBACTERIUM-DAMSELAE
researchProduct

The transformation of the Russian defence industry

1995

TRADITIONALLY, THE DEFENCE INDUSTRY constituted the most powerful industrial lobby in the USSR, with an administrative structure at all the organisational levels where its interests could be affected. With a hierarchical and pyramidal structure, the different entities of the sector remained isolated from strictly civilian bodies. The strategic part it played within the organisation of the Soviet Union enabled the defence industry to manage a growing and important volume of resources; on the one hand, it had a special supply system which guaranteed regular high-quality provision of the most advanced technology in the country, as well as highly qualified human resources. On the other hand, th…

CentralisationEconomics and EconometricsHistoryEconomic growthNational securitySociology and Political Sciencebusiness.industryProcess (engineering)Geography Planning and DevelopmentFace (sociological concept)Defence industryDecentralizationMarket economyEconomicsProduction (economics)businessHuman resourcesEurope-Asia Studies
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

Combating Illicit Trade in Cultural Objects to Defend Peace and Security

2022

This chapter analyzes the emergence of the heritage-security nexus as a new priority in the international protection and security agenda with a focus on the threats associated with the illicit trade of cultural objects originating from conflict-ridden territories. First, it offers an overview of the existing legal framework protecting cultural objects from looting during armed conflict. It then considers how the protection of cultural property has evolved from a humanitarian law issue to one that is tied to the maintenance of international peace and security. In this latter regard, it outlines the growing concern and activity of the UN Security Council in respect of cultural heritage, inclu…

Chapter VII1954 Hague Convention1970 UNESCO Convention1995 UNIDROIT ConventionUNTOCResolution 2347cultural heritage securityHeritage-security nexusUN CharterResolution 1483
researchProduct

Capitolo VIII della Carta dell’ONU e modelli di azione militare regionale

2019

This contribution deals with relations between regional organizations and the UN Security Council under Chapter VIII of the UN Charter. In this respect, the most recent trends are a shift from subsidiarity to a more equal partnership between these two subjects. The two models of action by delegation or authorization of the Security Council are in fact autonomous. This is demonstrated by the preparatory works of the UN Charter and subsequent practice. The model of authorized regional action enriches the range of instruments that the United Nations Charter provides for the maintenance of peace and collective security.

Chapter VIII of the UN Charter regional organizations use of force collective self-defense UN Security CouncilSettore IUS/13 - Diritto InternazionaleComputingMilieux_MISCELLANEOUS[SHS]Humanities and Social Sciences
researchProduct

A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks

2022

WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…

Chemical technologyhealthcareTP1-1185BiochemistryAtomic and Molecular Physics and OpticsAnalytical Chemistrywireless body area networkssigncryptionHumansElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Wireless TechnologyInstrumentationAlgorithmsComputer SecurityConfidentialitySensors
researchProduct