Search results for "Vulnerability."
showing 10 items of 397 documents
Decision-cache based XACML authorisation and anonymisation for XML documents
2012
Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…
Field-Based Health-Related Physical Fitness Tests in Children and Adolescents: A Systematic Review
2021
Physical fitness (PF) is a multi-component construct and a biomarker of health. Worse PF is related to vulnerability and predicts worse academic achievements. Thus, assessing PF is important to monitor health in youth. This systematic review aimed to identify and inform physical education, health professionals and entities about existing PF batteries and field-tests that can be used in school settings. A comprehensive literature search was carried out in five electronic databases (Academic Search Complete, Education Resources Information Center, PubMed, Scopus, and Web of Science) to identify PF battery protocols that can be carried out in the school setting. Overall, 24 PF batteries were i…
<p>A Country Pandemic Risk Exposure Measurement Model</p>
2020
Purpose: The purpose of this study is to develop a Pandemic Risk Exposure Measurement (PREM) model to determine the factors that affect a country’s prospective vulnerability to a pandemic risk exposure also considering the current COVID-19 pandemic Methods: To develop the model, drew up an inventory of possible factor variables that might expose a country’s vulnerability to a pandemic such as COVID-19 This model was based on the analysis of existing literature and consultations with some experts and associa-tions To support the inventory of selected possible factor variables, we have conducted a survey with participants sampled from people working in a risk management environment carrying o…
Prepulse Inhibition and Vulnerability to Cocaine Addiction
2021
Masonry structures subjected to tsunami loads: Modeling issues and application to a case study
2020
Abstract Tsunamis are among the most dangerous natural disasters for coastal areas experiencing tsunami hazard. One of the major concerns in the assessment of strategies for the risk mitigation is to estimate vulnerability of structures and infrastructures. However, reliable approaches for the evaluation of the structural capacity under tsunami loads are nowadays not always available for all the types of structures, especially masonry. On this aim, the paper deals with the modeling issues of 3D masonry structures subjected to tsunami loads and the effect on the structural behavior of different modeling approaches. First, a brief state of the art on the available studies is presented regardi…
Digital Risks. Case Study on Digitization Projects of the LBUS Library
2019
Abstract Digital technologies changed all the social life domains in society, as we are now living in the digital era, in the information society or in an interconnected world. Besides the improvements in every day life, digital changes also brought inherent risks, from cyber-security, hacking, cyber-bullying, to the vulnerability of personal data, or the mental health consequences of information explosion. This article reviews the risks of the changes brought by the digital transformation on libraries in general, with examples of the LBUS Library, drawing from the last 10 years of development experience of informatic book management systems (electronic catalogue) and of the digital library…
Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned
2013
In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…
Acknowledging the relevance of empathy in clinical legal education. Some proposals from the experience of the University of Brescia (IT) and Valencia…
2018
Legal Clinical Education is experiencing a great development in the Spanish and the Italian university context. Nevertheless, it comes with new challenges that professors have not faced until now: students working in the field with people in situations of vulnerability or in complex realities. Given that one of the major goals of CLE is the preparation not only of professionals for the practice of law, but also people concerned about social justice and social diversity, this piece of research looks into the significance of working with students about the key role that empathy plays in the development of their relation with the people they assist. Moreover, we will suggest some activities to…