Search results for "cwe"
showing 3 items of 3 documents
A Semantic Web Approach for Geodata Discovery
2013
International audience; Currently, vast amounts of geospatial information are o ffered through OGC's services. However this information has limited formal semantics. The most common method to search for a dataset consists in matching keywords to metadata elements. By adding semantics to available descriptions we could use modern inference and reasoning mechanisms currently available in the SemanticWeb. In this paper we present a novel architecture currently in development in which we use state of the art triplestores as the backend of a CSW service. In our approach, each metadata record is considered an instance of a given class in a domain ontology. Our architecture also adds a spatial dat…
Dealing with rural-urban economic welfare challenges in the Nordic countries – a theory-based overview
2020
Abstract Geography has played an important part in creating the Nordic welfare states. This article discusses how the urban-rural dimension has been dealt with in the context of developing economic welfare. Four different policy interventions are presented: exogeneous shocks, buy out, palliative treatment and endogenous growth through innovation. Of these, the latter prevails in contemporary policy discussions. The application of policy measures varies substantially between the Nordic countries. We have different Nordic models rather than a single model. While in the aftermath of World War II economic development and welfare arguments combined to justify geographical centralisation, the pre…
Towards Practical Cybersecurity Mapping of STRIDE and CWE — a Multi-perspective Approach
2021
Software vulnerabilities are identified during their whole life-cycle; some vulnerabilities may be caused by flaws on the design while other appear due to advances on the technologies around the systems. Frameworks such as OWASP are well- known and are used for testing a systems security before or after implementation, and such testing is carried out against the existing system. Threat modeling however focuses on the early stages of the system design when it is feasible and easy to fix security-related flaws and prevent possible damage caused by them. For example, STRIDE is one very popular threat modeling framework. A STRIDE threat modelling specialist deals with abstract categorizations o…