Search results for "Security"
showing 10 items of 1693 documents
Are you a good employee or simply a good guy? Influence costs and contract design
2013
We develop a principal–agent model with a moral hazard problem in which the principal has access to a hard signal (the level of output) and a soft behavioral signal (the supervision signal) about the agent's level of effort. In our model, the agent can initiate influence activities and manipulate the behavioral signal. These activities are costly for the principal as they detract the agent from the productive task. We show that the agent's ability to manipulate the behavioral signal leads to low-powered incentives and increases the cost of implementing the efficient equilibrium as a result. Interestingly, the fact that manipulation activities entail productivity losses may lead to the desig…
Security Management of University Campuses
2017
Abstract The paper is approaching a sensitive topic which the whole society is facing, namely the security at a macro and micro-economic level. In this context, increasing the level of terrorism at all levels requires important measures to prevent the acts of terrorism and of providing a security that allows the development of all entities in the society. University offsets represent areas of agglomeration of young students living together, susceptible to challenging actions and to acts of terrorism that may occur at any time. The paper approaches a systemic and systematic thinking of untried actions to be taken for these structures, components of the university.
Vulnerabilities and Threats to Human Security Generated by an Ineffective Educational System
2017
Abstract The present trend towards globalization has led to people changing their views on possible threats to their existence. Nowadays, we witness a diversification of vulnerabilities and threats to human security, as well as a progressive reduction of our resilience. The article attempts to correlate the 5 dimensions of national security, as identified by the Copenhagen School of Security, with the problems of the Romanian educational system, explaining how these problems can become threats to the security of Romanian citizens. It offers an overview of the problems of the Romanian educational system, and the threats and vulnerabilities derived from them towards human security. It also su…
LynxNet: Wild Animal Monitoring Using Sensor Networks
2010
Monitoring wild animals, especially those that are becoming endangered (for example, lynxes and wolves) is important for biology researchers. Solutions for the monitoring already exist; however, they all have drawbacks, such as limited range or lifetime, sensing modality, reporting delays, unreliability of operation. In this work we describe our experiences in designing an improved animal monitoring sensor system and low-level software for sensor node control and communication. The target animals for this particular research are wild lynxes or canines, however it can be extended to other animal species. The LynxNet system is based on tracking collars, built around TMote Mini sensor nodes, s…
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
2016
Scyther [1] is designed to check the security and vulnerabilities of security protocols. In this paper, we use Scyther to analyze two discrete logarithm problem (DLP) based group authentication protocols proposed in [2]. These two protocols are claimed to satisfy several security requirements, but only part of them have been checked because of the properties and limitations of Scyther. Some positive results have been gained and show that the protocols provide mutual authentication and implicit key authentication and are secure against impersonation attack. An important innovation in this paper is that we have extended the expressing ability of Scyther by giving some reasonable assumption du…
Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles
2017
International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…
Survey of Formal Verification Methods for Smart Contracts on Blockchain
2019
Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…
Speciation of vanadium in urban, industrial and volcanic soils by a modified Tessier method
2016
Vanadium (V) concentrations in industrial, urban and volcanic soils were sequentially extracted using a modified Tessier's method. The voltammetric technique was used to determine V concentrations in solutions obtained from the various extraction steps. At the reference stations, the V concentrations (sum of four individual fractions) in soils ranged from 0.72 to 0.24 g kg(-1) dry weight (d.w.) with a mean value of 0.18 g kg(-1) d.w. V concentrations in soils of the Palermo urban area ranged from 0.34 to 2.1 g kg(-1) d.w., in the Milazzo (industrial) area between 0.26 and 5.4 g kg(-1) d.w. and in the volcanic area near Mt. Etna from 0.91 to 2.9 g kg(-1) d.w. When the V concentrations around…
Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity
2017
Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…
Designing disease-resistant crops : from basic knowledge to biotechnology
2020
Ancient records describe how plant diseases were attributed to many causes which included divine power, religious belief, and superstition. Far from these days, we now have detailed knowledge about how plant immunity is executed. Plants employ two types of sensors to perceive and defeat the litany of pathogenic organisms that attack them, whilst microbes deploy a myriad of specialized weapons to suppress immunity and promote infection. This opens a path to exploiting these insights to increase crop resistance. Here we describe novel biotechnological approaches for designing superior disease-resistant crops to fight agricultural losses in the field while reducing chemical inputs, towards a m…