Search results for "Security"
showing 10 items of 1693 documents
Construction of pseudo-random sequences from chaos
2002
Evaluación de las tarifas de las pensiones de accidentes de trabajo y enfermedades profesionales (2011-2015)
2017
Este trabajo analiza si las tarifas que se aplican para la determinación del denominado capital coste de pensiones derivadas de los accidentes de trabajo y enfermedades profesionales son las adecuadas. A partir de los datos de la Muestra Continua de Vidas Laborales y de la evolución de la longevidad de la población general en España, se estiman tablas de mortalidad para las contingencias de viudedad e invalidez que, combinadas con los parámetros económicos y financieros apropiados, permiten construir las bases técnicas actuarialmente justas para cada uno de los años objeto de análisis. Los resultados obtenidos sugieren que las tarifas aplicadas en el periodo 2011- 2014 han sido muy superior…
Credit card incidents and control systems
2012
Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.
Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification
2019
Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…
The emergence of Vibrio pathogens in Europe : ecology, evolution, and pathogenesis (Paris, 11-12th March 2015)
2015
Global change has caused a worldwide increase in reports of Vibrio-associated diseases with ecosystem-wide impacts on humans and marine animals. In Europe, higher prevalence of human infections followed regional climatic trends with outbreaks occurring during episodes of unusually warm weather. Similar patterns were also observed in Vibrio-associated diseases affecting marine organisms such as fish, bivalves and corals. Basic knowledge is still lacking on the ecology and evolutionary biology of these bacteria as well as on their virulence mechanisms. Current limitations in experimental systems to study infection and the lack of diagnostic tools still prevent a better understanding of Vibrio…
The transformation of the Russian defence industry
1995
TRADITIONALLY, THE DEFENCE INDUSTRY constituted the most powerful industrial lobby in the USSR, with an administrative structure at all the organisational levels where its interests could be affected. With a hierarchical and pyramidal structure, the different entities of the sector remained isolated from strictly civilian bodies. The strategic part it played within the organisation of the Soviet Union enabled the defence industry to manage a growing and important volume of resources; on the one hand, it had a special supply system which guaranteed regular high-quality provision of the most advanced technology in the country, as well as highly qualified human resources. On the other hand, th…
Mutual entity authentication for LTE
2011
In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.
Combating Illicit Trade in Cultural Objects to Defend Peace and Security
2022
This chapter analyzes the emergence of the heritage-security nexus as a new priority in the international protection and security agenda with a focus on the threats associated with the illicit trade of cultural objects originating from conflict-ridden territories. First, it offers an overview of the existing legal framework protecting cultural objects from looting during armed conflict. It then considers how the protection of cultural property has evolved from a humanitarian law issue to one that is tied to the maintenance of international peace and security. In this latter regard, it outlines the growing concern and activity of the UN Security Council in respect of cultural heritage, inclu…
Capitolo VIII della Carta dell’ONU e modelli di azione militare regionale
2019
This contribution deals with relations between regional organizations and the UN Security Council under Chapter VIII of the UN Charter. In this respect, the most recent trends are a shift from subsidiarity to a more equal partnership between these two subjects. The two models of action by delegation or authorization of the Security Council are in fact autonomous. This is demonstrated by the preparatory works of the UN Charter and subsequent practice. The model of authorized regional action enriches the range of instruments that the United Nations Charter provides for the maintenance of peace and collective security.
A Comprehensive Survey on Signcryption Security Mechanisms in Wireless Body Area Networks
2022
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The la…