Search results for "Vulnerability."

showing 10 items of 397 documents

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

Field-Based Health-Related Physical Fitness Tests in Children and Adolescents: A Systematic Review

2021

Physical fitness (PF) is a multi-component construct and a biomarker of health. Worse PF is related to vulnerability and predicts worse academic achievements. Thus, assessing PF is important to monitor health in youth. This systematic review aimed to identify and inform physical education, health professionals and entities about existing PF batteries and field-tests that can be used in school settings. A comprehensive literature search was carried out in five electronic databases (Academic Search Complete, Education Resources Information Center, PubMed, Scopus, and Web of Science) to identify PF battery protocols that can be carried out in the school setting. Overall, 24 PF batteries were i…

body compositionmusculoskeletalphysical educationfitness testingvulnerabilitylcsh:RJ1-570lcsh:Pediatricscardiorespirarory fitnessFrontiers in Pediatrics
researchProduct

<p>A Country Pandemic Risk Exposure Measurement Model</p>

2020

Purpose: The purpose of this study is to develop a Pandemic Risk Exposure Measurement (PREM) model to determine the factors that affect a country’s prospective vulnerability to a pandemic risk exposure also considering the current COVID-19 pandemic Methods: To develop the model, drew up an inventory of possible factor variables that might expose a country’s vulnerability to a pandemic such as COVID-19 This model was based on the analysis of existing literature and consultations with some experts and associa-tions To support the inventory of selected possible factor variables, we have conducted a survey with participants sampled from people working in a risk management environment carrying o…

business.industry030503 health policy & servicesHealth PolicyMultilevel modelPublic Health Environmental and Occupational HealthVulnerabilityVariance (accounting)HazardExploratory factor analysis03 medical and health sciences0302 clinical medicineCronbach's alphaEnvironmental healthPandemic030212 general & internal medicine0305 other medical sciencePsychologybusinessRisk managementRisk Management and Healthcare Policy
researchProduct

Prepulse Inhibition and Vulnerability to Cocaine Addiction

2021

business.industryAddictionmedia_common.quotation_subjectVulnerabilityMedicinebusinessNeurosciencePrepulse inhibitionmedia_common
researchProduct

Masonry structures subjected to tsunami loads: Modeling issues and application to a case study

2020

Abstract Tsunamis are among the most dangerous natural disasters for coastal areas experiencing tsunami hazard. One of the major concerns in the assessment of strategies for the risk mitigation is to estimate vulnerability of structures and infrastructures. However, reliable approaches for the evaluation of the structural capacity under tsunami loads are nowadays not always available for all the types of structures, especially masonry. On this aim, the paper deals with the modeling issues of 3D masonry structures subjected to tsunami loads and the effect on the structural behavior of different modeling approaches. First, a brief state of the art on the available studies is presented regardi…

business.industryComputer scienceBuilding and ConstructionStructural engineeringMasonryFinite element methodSeismic analysisSettore ICAR/09 - Tecnica Delle CostruzioniTsunami loadsTsunami hazardArchitectureTsunami modelingAnalysis softwareFinite element modelingMasonryMasonry structureSafety Risk Reliability and QualitybusinessNatural disasterRisk managementCivil and Structural EngineeringVulnerability (computing)Structures
researchProduct

Digital Risks. Case Study on Digitization Projects of the LBUS Library

2019

Abstract Digital technologies changed all the social life domains in society, as we are now living in the digital era, in the information society or in an interconnected world. Besides the improvements in every day life, digital changes also brought inherent risks, from cyber-security, hacking, cyber-bullying, to the vulnerability of personal data, or the mental health consequences of information explosion. This article reviews the risks of the changes brought by the digital transformation on libraries in general, with examples of the LBUS Library, drawing from the last 10 years of development experience of informatic book management systems (electronic catalogue) and of the digital library…

business.industryComputer scienceManagement systemDigital transformationVulnerabilityInformation societyPublic relationsbusinessMental healthDigitizationInformation explosionHackerInternational Journal of Advanced Statistics and IT&C for Economics and Life Sciences
researchProduct

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct

Acknowledging the relevance of empathy in clinical legal education. Some proposals from the experience of the University of Brescia (IT) and Valencia…

2018

Legal Clinical Education is experiencing a great development in the Spanish and the Italian university context. Nevertheless, it comes with new challenges that professors have not faced until now: students working in the field with people in situations of vulnerability or in complex realities. Given that one of the major goals of CLE is the preparation not only of professionals for the practice of law, but also people concerned about social justice and social diversity, this piece of research looks into the significance of working with students about the key role that empathy plays in the development of their relation with the people they assist. Moreover, we will suggest some activities to…

business.industryMaterials Science (miscellaneous)media_common.quotation_subjectVulnerabilityContext (language use)EmpathyPlan (drawing)Public relationsRelevance (law)Legal educationPractice of lawSociologyConstruct (philosophy)businessJustícia Administraciómedia_commonInternational Journal of Clinical Legal Education
researchProduct

Current and/ or life time use of cannabis as a factor of vulnerability in psychotic disorders

2014

cannabivulnerabilitySettore MED/48 -Scienze Infermierist. e Tecn. Neuro-Psichiatriche e Riabilitat.psychosiSettore MED/25 - Psichiatria
researchProduct

IN-UTERO Δ9-TETRAHYDROCANNABINOL EXPOSURE IMPINGES ON BRAIN EXECUTIVE PROCESSES TOWARDS EMOTIONAL, COGNITIVE IMPAIRMENT, AND ALCOHOL VULNERABILITY IN…

2022

cannabidiolprenatalexecutive functionalcohol vulnerabilitySettore BIO/09 - Fisiologiaemotional and cognitive impairmentΔ9-TETRAHYDROCANNABINOL
researchProduct