173,983 research outputs found
Assured information sharing for ad-hoc collaboration
Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment.
This dissertation outlines a Role-based Access Management for Ad-hoc Resource Shar- ing framework (RAMARS) to enable secure and selective information sharing in the het- erogeneous ad-hoc collaborative environment. Our framework incorporates a role-based approach to addressing originator control, delegation and dissemination control. A special trust-aware feature is incorporated to deal with dynamic user and trust management, and a novel resource modeling scheme is proposed to support fine-grained selective sharing of composite data. As a policy-driven approach, we formally specify the necessary pol- icy components in our framework and develop access control policies using standardized eXtensible Access Control Markup Language (XACML). The feasibility of our approach is evaluated in two emerging collaborative information sharing infrastructures: peer-to- peer networking (P2P) and Grid computing. As a potential application domain, RAMARS framework is further extended and adopted in secure healthcare services, with a unified patient-centric access control scheme being proposed to enable selective and authorized sharing of Electronic Health Records (EHRs), accommodating various privacy protection requirements at different levels of granularity
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control
the operation of many critical infrastructures that our society depend on, such
as power grids. Since SCADA systems become a target for cyber attacks and the
potential impact of a successful attack could lead to disastrous consequences
in the physical world, ensuring the security of these systems is of vital
importance. A fundamental prerequisite to securing a SCADA system is a clear
understanding and a consistent view of its architecture. However, because of
the complexity and scale of SCADA systems, this is challenging to acquire. In
this paper, we propose a layered architectural view for SCADA systems, which
aims at building a common ground among stakeholders and supporting the
implementation of security analysis. In order to manage the complexity and
scale, we define four interrelated architectural layers, and uses the concept
of viewpoints to focus on a subset of the system. We indicate the applicability
of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure
Recommended from our members
Isolated Voices: Perspectives of Teachers, School Nurses, and Administrators Regarding Implementation of Sexual Health Education Policy.
BackgroundComprehensive sexual health education (SHE) reduces risky sexual behavior and increases protective behavior in adolescents. It is important to understand how professionals responsible for implementing SHE policy interpret state and local policy and what influences their commitment to formal SHE policy implementation.MethodsThis descriptive study explored content and delivery of SHE policy in a rural, southwestern state with high levels of poverty, unintended adolescent pregnancy, and sexually transmitted infections. The social ecological model (SEM) was used to better understand levels of influence on the implementation of SHE policy.ResultsWe conducted telephone surveys with 38 teachers, 63 nurses, and 21 administrators in public secondary schools. There was substantial local variability in the scope and content of SHE curricula. Respondents identified significant barriers to the delivery of SHE content and minimal evaluation of whether educational objectives were met. Based on participant responses, community and organizational SEM levels had the greatest influence on SHE policy implementation, although examples of all SEM levels were identified.ConclusionsGiven perceived challenges regarding subject matter, successful SHE implementation at the local level requires committed stakeholders working in concert at the school and community levels, backed by strong policy commitment at the state level
Measuring Sustainable Development: The Use of Computable General Equilibrium Models
This paper advocates computable general equilibrium models as a methodological tool that is particularly suitable for measuring the impacts of policy interference on the three dimensions of sustainable development, i.e. environmental quality, economic performance (gross efficiency) and equity. These dimensions are inherently intertwined and subject to trade-offs. Computable general equilibrium models can incorporate various important sustainable development indicators in a single consistent framework and allow for a systematic quantitative trade-off analysis. --computable general equilibrium modeling (CGE),sustainability impact assessment (SIA),sustainable development (SD)
Improving water resource management in Bangladesh
As populations expand and make various uses of water, its growing scarcity becomes a serious issue in developing countries such as Bangladesh. Water can no longer be considered a totally free resource and plans must be developed for its efficient use through better management and rules that preserve everybody's access to it and interest in its development. Because it is a common resource, its development and management should involve all beneficiaries. The government's role in this process is to establish the ground rules for water use and conservation through a policy and legal framework and a monitoring system that ensure its continued safety of supply to--and responsible water use by--every sector and user in the economy. National water policy must set the ground rules for allocation to different users, water rights, pricing, and environmental safety. Bangladesh's water strategy should start with a national water policy that spells out key objectives such as priority of use by critical economic sectors, approaches to water pricing and cost recovery for development, and shared public- and private-sector water management. An apex public planning organization is needed to perform overall planning for water resources and to advise the National Water Counsel on policy and legislation. Also needed are agencies to implement public water plans for the development of infrastructure, the monitoring of water regimes, and the enforcement of regulations.Water Conservation,Water Resources Law,Water and Industry,Environmental Economics&Policies,Decentralization,Water Supply and Sanitation Governance and Institutions,Town Water Supply and Sanitation,Water and Industry,Water Conservation,Environmental Economics&Policies
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST
- …