Search results for "Security"
showing 10 items of 1693 documents
The Place of Energy Security in the National Security Framework: An Assessment Approach
2022
The term “energy security” is used almost everywhere in economic and political discussions related to energy supply. However, different authors use different meanings to express the concept of energy security. Quite often, this term is used to give more importance or relevance to issues that are often not inherently related to energy security. Attempts to define the essence of the concept of “energy security” have hitherto not been systematic and are characterized by a variety of approaches, and some insufficient justification especially in the aspect of state national security is notable. Our contribution to the discourse development is the consideration of energy s…
Toxicity of binary mixtures of Cu, Cr and As to the earthworm Eisenia andrei
2020
AbstractChromated copper arsenate (CCA) mixtures were used in the past for wood preservation, leading to large scale soil contamination. This study aimed at contributing to the risk assessment of CCA-contaminated soils by assessing the toxicity of binary mixtures of copper, chromium and arsenic to the earthworm Eisenia andrei in OECD artificial soil. Mixture effects were related to reference models of Concentration Addition (CA) and Independent Action (IA) using the MIXTOX model, with effects being related to total and available (H2O and 0.01 M CaCl2 extractable) concentrations in the soil. Since only in mixtures with arsenic dose-related mortality occurred (LC50 92.5 mg/kg dry soil), it wa…
Towards Next Generation System Architecture for Emergency Services
2011
European Union has decided that all emergencies can be reported to authorities by European citizens by calling 112 or sending a text message to 112. Distributing warnings and alerts of authorities to citizens currently happens through national TV and radio channels, but telecom networks are also used now in some countries for this purpose. During the last ten years there have been attempts to develop new system architectures for various emergency service provision phases. Some of them are already deployed in special cases, like in ambulance services. Multimedia emergency alert messages can be delivered to citizens over fixed and mobile telecom networks and commercial systems are already in …
Supporting Dispute Handling in E-Commerce Transactions, a Framework and Related Methodologies
2004
An E-commerce transaction is a means to conduct particular commercial activities using the global digital E-commerce infrastructure. We concentrate here on business to customer (B-to-C) E-commerce transactions. These transactions are based on protocols offered by the global infrastructure, primarily the Internet. Using electronic means to do business can greatly improve the efficiency of the business transactions. It, however, poses some problems that were rarely considered to be important before. One class of problems is caused by the behavior of untrusted participants. For reasons such as dishonesty, disputes may arise. In the general case, when a dispute arises an untrustworthy participa…
Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing
2013
Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Human-centered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for real-time crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages a…
A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection
2001
Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…
Using Cloud Computing to Implement a Security Overlay Network
2012
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Comparative analysis of architectures for monitoring cloud computing infrastructures
2015
The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…
Distributing Storage in Cloud Environments
2013
Cloud computing has a major impact on today's IT strategies. Outsourcing applications from IT departments to the cloud relieves users from building big infrastructures as well as from building the corresponding expertise, and allows them to focus on their main competences and businesses. One of the main hurdles of cloud computing is that not only the application, but also the data has to be moved to the cloud. Networking speed severely limits the amount of data that can travel between the cloud and the user, between different sites of the same cloud provider, or indeed between different cloud providers. It is therefore important to keep applications near the data itself. This paper investig…
Cloud Computing Adoption Factors and Processes for Enterprises - A Systematic Literature Review
2014
Cloud computing has received an increasing interest from enterprises since its inception. With its innovative Information Technology (IT) services delivery model, cloud computing could add technical and strategic business values to enterprises. However, it poses highly concerning, internal and external, issues. This paper presents a systematic literature review to explore cloud computing adoption processes in the context of enterprise users and the factors that affect these processes. This is achieved by reviewing 37 articles published about cloud computing adoption. Using the grounded theory approach, articles are classified into eight main categories: internal, external, evaluation, proof…