Search results for "Security"
showing 10 items of 1693 documents
The idea of international solidarity at UNESCO is dwingling
2015
UNESCO’s role to building solidarity, peace and security internationally seems to be threatened and weakened. In 1946, UNESCO made a social contract to use culture, education and science as a tool for buiding international solidarity, peace and security. Its trajectory presents challenges related to vopice, representation, power and hegemony which often result in conflict in most parts of the globe. For instance, the recent acceptance of Palestine to UNESCO has increased tensions amongst states because of Palestine’s positioning in global peace processes. This research surfaces some of these challenges and recomends further research on how to ensure the independents of UNESCO in fulfilling …
Cómo diseñar talleres para promover la salud en grupos comunitarios
2014
ResumenUna de las estrategias de promoción de la salud es el desarrollo de habilidades para la vida considerando a las propias personas como principal recurso para la salud. Un taller ha de conseguir que sus participantes se conviertan en «activos» para tomar decisiones y generar salud, centrándose en el desarrollo y adquisición de habilidades en grupo de una manera motivadora y con la finalidad de alcanzar unos objetivos. Los conceptos que fundamentan el diseño de un taller y que han de plantearse como etapa 0 son: planificación participativa, capacitar, aprendizaje significativo, aprender en grupo y técnicas participativas.Las etapas que se deben seguir para diseñar un taller y facilitar …
SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager
2018
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Embedded access points for trusted data and resources access in HPC systems
2010
Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Osteoporosis: Economic Burden of Disease in Italy.
2020
Background and Objective: Today, osteoporosis is the most common bone disease and an important public health problem in all developed countries. The objective of this study was to estimate the costs associated with the management and treatment of osteoporosis in order to assess the economic burden in Italy for 2017, in terms of direct medical costs and social security costs. Methods: A cost of illness model was developed to estimate the average cost per year sustained by the NHS (National Health Service) and Social Security System in Italy. A systematic literature review was performed to obtain epidemiological, direct and indirect costs parameters where available. Hospitalisation costs were…