Wyniki wyszukiwania dla: SECURITY REQUIREMENTS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURITY REQUIREMENTS

Wyniki wyszukiwania dla: SECURITY REQUIREMENTS

  • WIKI-WS as a C2 NIWA Web Service Management Platform

    Publikacja

    - TASK Quarterly - Rok 2015

    The Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...

    Pełny tekst do pobrania w portalu

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publikacja
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Pełny tekst do pobrania w portalu

  • AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES

    Problems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...

    Pełny tekst do pobrania w portalu

  • Security and Anonymity in Agent Systems

    Publikacja

    - Rok 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publikacja

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Signatures and acoustic images of objects moving in water

    Publikacja

    Observation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...

  • Modelling the malware propagation in mobile computer devices

    Publikacja

    - COMPUTERS & SECURITY - Rok 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol

    The industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...

    Pełny tekst do pobrania w portalu

  • ENISA Study: Challenges in Securing Industrial Control Systems

    Publikacja

    - Rok 2013

    In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics

    Publikacja
    • C. Busch
    • F. Deravi
    • D. Frings
    • E. Kindt
    • R. Lessmann
    • A. Nouak
    • J. Salomon
    • M. Achcar
    • F. Alonso-Fernandez
    • D. Bachenheimer... i 38 innych

    - IET Biometrics - Rok 2023

    Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...

    Pełny tekst do pobrania w portalu

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras

    The study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.

  • Trust Management Method for Wireless Sensor Networks

    Publikacja

    - Rok 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Pełny tekst do pobrania w portalu

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Pełny tekst do pobrania w portalu

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publikacja

    - Rok 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Pełny tekst do pobrania w portalu

  • Validation of a virtual test environment for C2X communication under radio jamming conditions

    Publikacja

    - Rok 2020

    In this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...

    Pełny tekst do pobrania w portalu

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Pełny tekst do pobrania w portalu

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review

    Publikacja
    • S. A. Siddiqui
    • Ö. Süfer
    • G. Çalışkan Koç
    • H. Lutuf
    • T. Rahayu
    • R. Castro Munoz
    • I. Fernando

    - ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY - Rok 2024

    Food security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...

    Pełny tekst do pobrania w portalu

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publikacja

    - Rok 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Self-organizing wireless monitoring system for cargo containers

    This paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...

    Pełny tekst do pobrania w portalu

  • A place of school in the idea of the sustainable development

    Publikacja

    Well designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Self-Organizing Wireless Monitoring System for Containers

    This paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...

  • Further developments of parameterization methods of audio stream analysis for secuirty purposes

    Publikacja

    - Rok 2009

    The paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publikacja

    - CMC-Computers Materials & Continua - Rok 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Pełny tekst do pobrania w portalu

  • Implementing decisional trust: a first approach for smart reliable systems

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Pełny tekst do pobrania w portalu

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system

    Publikacja

    Motivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.

    Pełny tekst do pobrania w portalu

  • Towards Cognitive and Perceptive Video Systems

    Publikacja
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Rok 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Pełny tekst do pobrania w portalu

  • Resolving conflicts in object tracking for automatic detection of events in video

    An algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19

    Publikacja

    - Knowledge and Process Management - Rok 2022

    Abstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...

    Pełny tekst do pobrania w portalu

  • A Paradigm for HV, MV, LV Distribution Grid Development Planning

    Publikacja

    In the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...

    Pełny tekst do pobrania w portalu

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Pełny tekst do pobrania w portalu

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

    Pełny tekst do pobrania w portalu

  • IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA

    34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...

    Pełny tekst do pobrania w portalu

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publikacja

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Pełny tekst do pobrania w portalu

  • Safety integrity level verification for safety-related functions with security aspects

    The article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Current risk analysis and management issues in technical systems.

    Dealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...

    Pełny tekst do pobrania w portalu

  • Bezpieczeństwo transmisji danych w systemie KNX

    Publikacja

    - Rok 2014

    W artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.

  • Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea

    The paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...

  • Bezpieczeństwo transmisji danych w systemie KNX

    Publikacja

    - Rok 2015

    W artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.