133,057 research outputs found

    Towards a Secure Smart Grid Storage Communications Gateway

    Full text link
    This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid. To do so, it defines security requirements for a communications gateway and gives detailed information and hands-on configuration advice on node and communication line security, data storage, coping with backend M2M communications protocols and examines privacy issues. The presented research paves the road for developing secure smart energy communications devices that allow enhancing energy efficiency. The described measures are implemented in an actual gateway device within the HORIZON 2020 project STORY, which aims at developing new ways to use storage and demonstrating these on six different demonstration sites.Comment: 6 pages, 2 figure

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Reviewing the Drivers and Challenges in RFID Implementation in the Pharmaceutical Supply Chain

    Get PDF
    Counterfeiting is a global phenomenon that poses a serious financial threat to the pharmaceutical industry and more importantly jeopardizes public safety and security. Different measures, including new laws and regulations, have been put in place to mitigate the threat and tighten control in the pharmaceuticals supply chain. However, it appears that the most promising countermeasure is track-and-trace technology such as electronic-pedigree (E-pedigree) with Radio Frequency Identification (RFID) technology. In this study we present a framework exploring the antecedents and consequences of RFID applications in the pharmaceutical supply chain. The framework proposes that counterfeiting and E-pedigree regulation will drive the implementation of RFID in the pharmaceutical supply chain, which in turn provides strategic and operational benefits that enable competitive advantage. Meanwhile, the implementation of RFID requires overcoming many operational, technical and financial challenges. The framework provides a springboard that future study can explore using empirical data

    The EU's dialogue on migration, mobility, and security with the Southern Mediterranean: filling the gaps in the global approach to migration. CEPS Liberty and Security in Europe, June 2011

    Get PDF
    Recent events in North Africa and the Mediterranean have had consequences in terms of human mobility, and are putting the foundations and components of EU’s migration policy under strain. The forthcoming European Council summit of 23-24 June 2011 is expected to determine ‘the orientations for further work’ under the Polish Presidency and the next JHA Trio Presidency Programme for the EU’s policies on crossborder migration in the Mediterranean and internal mobility within the scope of the Schengen regime. This paper constitutes a contribution to current and future EU policy discussions and responses on migration, mobility and security. It provides a synthesised selection of recommendations in these domains resulting from the research conducted by the Justice and Home Affairs (JHA) Section of the Centre for European Policy Studies (CEPS) during the last nine years of work. This Policy Brief argues that for the EU’s Global Approach to Migration to be able to satisfactorily address its unfinished elements and policy incoherencies, the Union needs to devise and develop common policy strategies focused on: first, new enforcement and independent evaluation mechanisms on the implementation of the European law on free movement, borders and migration, and the compatibility of EU member states and EU agencies’ actions with the EU Charter of Fundamental Rights. And second, the development of a kind of cooperation (dialogue) with third states that goes beyond security-centred priorities and that is solidly based on facilitating human mobility, consolidating fundamental rights and the general principles of the rule of law upon which the EU legal system is founded

    Online Personal Data Processing and EU Data Protection Reform. CEPS Task Force Report, April 2013

    Get PDF
    This report sheds light on the fundamental questions and underlying tensions between current policy objectives, compliance strategies and global trends in online personal data processing, assessing the existing and future framework in terms of effective regulation and public policy. Based on the discussions among the members of the CEPS Digital Forum and independent research carried out by the rapporteurs, policy conclusions are derived with the aim of making EU data protection policy more fit for purpose in today’s online technological context. This report constructively engages with the EU data protection framework, but does not provide a textual analysis of the EU data protection reform proposal as such
    corecore