Search results for "Security"

showing 10 items of 1693 documents

The idea of international solidarity at UNESCO is dwingling

2015

UNESCO’s role to building solidarity, peace and security internationally seems to be threatened and weakened. In 1946, UNESCO made a social contract to use culture, education and science as a tool for buiding international solidarity, peace and security. Its trajectory presents challenges related to vopice, representation, power and hegemony which often result in conflict in most parts of the globe. For instance, the recent acceptance of Palestine to UNESCO has increased tensions amongst states because of Palestine’s positioning in global peace processes. This research surfaces some of these challenges and recomends further research on how to ensure the independents of UNESCO in fulfilling …

PalestineUNESCOinternational solidarityrauhasecurity
researchProduct

Cómo diseñar talleres para promover la salud en grupos comunitarios

2014

ResumenUna de las estrategias de promoción de la salud es el desarrollo de habilidades para la vida considerando a las propias personas como principal recurso para la salud. Un taller ha de conseguir que sus participantes se conviertan en «activos» para tomar decisiones y generar salud, centrándose en el desarrollo y adquisición de habilidades en grupo de una manera motivadora y con la finalidad de alcanzar unos objetivos. Los conceptos que fundamentan el diseño de un taller y que han de plantearse como etapa 0 son: planificación participativa, capacitar, aprendizaje significativo, aprender en grupo y técnicas participativas.Las etapas que se deben seguir para diseñar un taller y facilitar …

Participatory planningGrupos de poblaciónLife skillsAsset (computer security)Meaningful learningGroup learningPopulation groupsLearningEducación en saludMedicine(all)Medical educationlcsh:R5-920AprendizajeParticipationPromoción de saludCitizen journalismGeneral MedicineHealth resourcePlanningHealth promotionParticipaciónHealth educationHealth promotionPsychologyFamily Practicelcsh:Medicine (General)PlanificaciónAtención Primaria
researchProduct

SAFEPASS - Presenting a Convenient, Portable and Secure Password Manager

2018

Password managerComputer scienceComputer securitycomputer.software_genrecomputerProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Embedded access points for trusted data and resources access in HPC systems

2010

Biometric authentication systems represent a valid alternative to the conventional username-password based approach for user authentication. However, authentication systems composed of a biometric reader, a smartcard reader, and a networked workstation which perform user authentication via software algorithms have been found to be vulnerable in two areas: firstly in their communication channels between readers and workstation (communication attacks) and secondly through their processing algorithms and/or matching results overriding (replay attacks, confidentiality and integrity threats related to the stored information of the networked workstation). In this paper, a full hardware access poi…

PasswordAuthenticationBiometricsbusiness.industryComputer scienceAccess controlInformation SystemFingerprint recognitionTrusted authenticationTheoretical Computer ScienceSoftwareHardware and ArchitectureEmbedded systemEmbedded biometric authentication systemSmart cardSecurity solutions for user authenticationbusinessReplay attackSoftwareInformation SystemsThe Journal of Supercomputing
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct

Secure integration of multiprotocol instant messenger

2017

Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…

PasswordCode reviewPidginbusiness.industryComputer scienceComputer securitycomputer.software_genreEncryptionWorld Wide WebIdentifierServerPlug-inbusinesscomputerProtocol (object-oriented programming)2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

A secure architecture for P2PSIP-based communication systems

2009

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer networkProceedings of the 2nd international conference on Security of information and networks - SIN '09
researchProduct

Osteoporosis: Economic Burden of Disease in Italy.

2020

Background and Objective: Today, osteoporosis is the most common bone disease and an important public health problem in all developed countries. The objective of this study was to estimate the costs associated with the management and treatment of osteoporosis in order to assess the economic burden in Italy for 2017, in terms of direct medical costs and social security costs. Methods: A cost of illness model was developed to estimate the average cost per year sustained by the NHS (National Health Service) and Social Security System in Italy. A systematic literature review was performed to obtain epidemiological, direct and indirect costs parameters where available. Hospitalisation costs were…

Patient Discharge.Malemedicine.medical_specialtySettore SECS-P/06accountingalliedhealth030204 cardiovascular system & hematology030226 pharmacology & pharmacyState MedicineServizio Sanitario Nazionale03 medical and health sciencesIndirect costs0302 clinical medicineCost of IllnessInternational Classification of DiseasesEnvironmental healthEpidemiologyInternational Classification of DiseasemedicineHumansPharmacology (medical)health care economics and organizationsAverage costAgedPensionbusiness.industryPublic healthOsteoporosieconomicsAged; Female; Health Care Costs; Hospitalization; Humans; International Classification of Diseases; Italy; Male; Middle Aged; Osteoporosis; Patient Discharge; State Medicine; Cost of IllnessGeneral MedicineHealth Care Costsosteoporosi Italia Servizio Sanitario NazionaleMiddle AgedItaliaPatient DischargeHealth Care CostSocial securityHospitalizationSystematic reviewItalySettore MED/42OsteoporosisFemalebusinessDeveloped countryHumanClinical drug investigation
researchProduct