Search results for "Security"

showing 10 items of 1693 documents

Are you a good employee or simply a good guy? Influence costs and contract design

2013

We develop a principal–agent model with a moral hazard problem in which the principal has access to a hard signal (the level of output) and a soft behavioral signal (the supervision signal) about the agent's level of effort. In our model, the agent can initiate influence activities and manipulate the behavioral signal. These activities are costly for the principal as they detract the agent from the productive task. We show that the agent's ability to manipulate the behavioral signal leads to low-powered incentives and increases the cost of implementing the efficient equilibrium as a result. Interestingly, the fact that manipulation activities entail productivity losses may lead to the desig…

MicroeconomicsOrganizational Behavior and Human Resource ManagementEconomics and EconometricsLevel of EffortIncentiveMoral hazardSIGNAL (programming language)Principal (computer security)EconomicsProductivityTask (project management)Journal of Economic Behavior & Organization
researchProduct

Security Management of University Campuses

2017

Abstract The paper is approaching a sensitive topic which the whole society is facing, namely the security at a macro and micro-economic level. In this context, increasing the level of terrorism at all levels requires important measures to prevent the acts of terrorism and of providing a security that allows the development of all entities in the society. University offsets represent areas of agglomeration of young students living together, susceptible to challenging actions and to acts of terrorism that may occur at any time. The paper approaches a systemic and systematic thinking of untried actions to be taken for these structures, components of the university.

Military policyPolitical scienceSecurity managementPublic administrationBusiness managementInternational conference KNOWLEDGE-BASED ORGANIZATION
researchProduct

Vulnerabilities and Threats to Human Security Generated by an Ineffective Educational System

2017

Abstract The present trend towards globalization has led to people changing their views on possible threats to their existence. Nowadays, we witness a diversification of vulnerabilities and threats to human security, as well as a progressive reduction of our resilience. The article attempts to correlate the 5 dimensions of national security, as identified by the Copenhagen School of Security, with the problems of the Romanian educational system, explaining how these problems can become threats to the security of Romanian citizens. It offers an overview of the problems of the Romanian educational system, and the threats and vulnerabilities derived from them towards human security. It also su…

Military policySecurity through obscurityBusinessComputer securitycomputer.software_genreBusiness managementcomputerSecure codingHuman securityEducational systemsInternational conference KNOWLEDGE-BASED ORGANIZATION
researchProduct

LynxNet: Wild Animal Monitoring Using Sensor Networks

2010

Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In this work we describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines, however it can be extended to other animal species. The LynxNet system is based on tracking collars, built around TMote Mini sensor nodes, s…

Modality (human–computer interaction)business.industryReal-time computingComputer securitycomputer.software_genreAnimal monitoringGeneralLiterature_MISCELLANEOUSKey distribution in wireless sensor networksBase stationSensor nodeGlobal Positioning SystemMobile wireless sensor networkbusinesscomputerWireless sensor network
researchProduct

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther

2016

Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…

Model checkingAuthenticationTheoretical computer scienceComputer sciencebusiness.industry020206 networking & telecommunicationsCryptography02 engineering and technologyMutual authenticationCryptographic protocolComputer securitycomputer.software_genreKey authenticationDiscrete logarithmAuthentication protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputer2016 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP)
researchProduct

Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles

2017

International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…

Model checkingComputer scienceDistributed computingAutomotive industryContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)computer.programming_languageMQTTbusiness.industryVolume (computing)020206 networking & telecommunications020207 software engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationPromela[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessMessage queuecomputerComputer network
researchProduct

Survey of Formal Verification Methods for Smart Contracts on Blockchain

2019

Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…

Model checkingSmart contractExploitComputer science020206 networking & telecommunications02 engineering and technologyFormal methodsComputer securitycomputer.software_genreSyntax (logic)Automated theorem provingOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFormal verificationcomputer2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Speciation of vanadium in urban, industrial and volcanic soils by a modified Tessier method

2016

Vanadium (V) concentrations in industrial, urban and volcanic soils were sequentially extracted using a modified Tessier's method. The voltammetric technique was used to determine V concentrations in solutions obtained from the various extraction steps. At the reference stations, the V concentrations (sum of four individual fractions) in soils ranged from 0.72 to 0.24 g kg(-1) dry weight (d.w.) with a mean value of 0.18 g kg(-1) d.w. V concentrations in soils of the Palermo urban area ranged from 0.34 to 2.1 g kg(-1) d.w., in the Milazzo (industrial) area between 0.26 and 5.4 g kg(-1) d.w. and in the volcanic area near Mt. Etna from 0.91 to 2.9 g kg(-1) d.w. When the V concentrations around…

Monitoringmedia_common.quotation_subject0211 other engineering and technologiesVanadiumchemistry.chemical_elementVolcanic Eruptions02 engineering and technologyChemical Fractionation010501 environmental sciencesManagement Monitoring Policy and Law01 natural sciencesManagement Monitoring Policy and Law.Dry weightIndustrySoil PollutantsEnvironmental ChemistryCities0105 earth and related environmental sciencesmedia_common021110 strategic defence & security studiesgeographygeography.geographical_feature_categoryPolicy and LawMean valueChemical fractionationExtraction (chemistry)Environmental and Occupational HealthPublic Health Environmental and Occupational HealthVanadiumElectrochemical TechniquesGeneral MedicineManagementSpeciationItalychemistryVolcanoEnvironmental chemistryPolicy and Law.Soil waterEnvironmental sciencePublic HealthEnvironmental Monitoring
researchProduct

Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity

2017

Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…

Multi-modal data collectionEngineeringNutrition and DiseasePopulationPrivacy laws of the United StatesData securityWearable computer050109 social psychology02 engineering and technologycomputer.software_genreActivity recognitionBeverage consumption logging020204 information systemsVoeding en Ziekte0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesAccelerometer dataeducationSensory Science and Eating BehaviourVLAGConsumption (economics)education.field_of_studyMultimediabusiness.industryBarcode scanning05 social sciencesLocale (computer hardware)PresentationData scienceSensoriek en eetgedragActivity recognitionbusinesscomputer
researchProduct

Designing disease-resistant crops : from basic knowledge to biotechnology

2020

Ancient records describe how plant diseases were attributed to many causes which included divine power, religious belief, and superstition. Far from these days, we now have detailed knowledge about how plant immunity is executed. Plants employ two types of sensors to perceive and defeat the litany of pathogenic organisms that attack them, whilst microbes deploy a myriad of specialized weapons to suppress immunity and promote infection. This opens a path to exploiting these insights to increase crop resistance. Here we describe novel biotechnological approaches for designing superior disease-resistant crops to fight agricultural losses in the field while reducing chemical inputs, towards a m…

MultidisciplinaryFood securitybusiness.industryfungiPlant Immunityfood and beveragesReligious beliefCropBasic knowledgeHistory and Philosophy of ScienceRisk analysis (engineering)AgricultureSustainable agriculturebusinessDisease resistant
researchProduct