173,983 research outputs found

    Assured information sharing for ad-hoc collaboration

    Get PDF
    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation outlines a Role-based Access Management for Ad-hoc Resource Shar- ing framework (RAMARS) to enable secure and selective information sharing in the het- erogeneous ad-hoc collaborative environment. Our framework incorporates a role-based approach to addressing originator control, delegation and dissemination control. A special trust-aware feature is incorporated to deal with dynamic user and trust management, and a novel resource modeling scheme is proposed to support fine-grained selective sharing of composite data. As a policy-driven approach, we formally specify the necessary pol- icy components in our framework and develop access control policies using standardized eXtensible Access Control Markup Language (XACML). The feasibility of our approach is evaluated in two emerging collaborative information sharing infrastructures: peer-to- peer networking (P2P) and Grid computing. As a potential application domain, RAMARS framework is further extended and adopted in secure healthcare services, with a unified patient-centric access control scheme being proposed to enable selective and authorized sharing of Electronic Health Records (EHRs), accommodating various privacy protection requirements at different levels of granularity

    Towards a Layered Architectural View for Security Analysis in SCADA Systems

    Full text link
    Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of a successful attack could lead to disastrous consequences in the physical world, ensuring the security of these systems is of vital importance. A fundamental prerequisite to securing a SCADA system is a clear understanding and a consistent view of its architecture. However, because of the complexity and scale of SCADA systems, this is challenging to acquire. In this paper, we propose a layered architectural view for SCADA systems, which aims at building a common ground among stakeholders and supporting the implementation of security analysis. In order to manage the complexity and scale, we define four interrelated architectural layers, and uses the concept of viewpoints to focus on a subset of the system. We indicate the applicability of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure

    Measuring Sustainable Development: The Use of Computable General Equilibrium Models

    Get PDF
    This paper advocates computable general equilibrium models as a methodological tool that is particularly suitable for measuring the impacts of policy interference on the three dimensions of sustainable development, i.e. environmental quality, economic performance (gross efficiency) and equity. These dimensions are inherently intertwined and subject to trade-offs. Computable general equilibrium models can incorporate various important sustainable development indicators in a single consistent framework and allow for a systematic quantitative trade-off analysis. --computable general equilibrium modeling (CGE),sustainability impact assessment (SIA),sustainable development (SD)

    Improving water resource management in Bangladesh

    Get PDF
    As populations expand and make various uses of water, its growing scarcity becomes a serious issue in developing countries such as Bangladesh. Water can no longer be considered a totally free resource and plans must be developed for its efficient use through better management and rules that preserve everybody's access to it and interest in its development. Because it is a common resource, its development and management should involve all beneficiaries. The government's role in this process is to establish the ground rules for water use and conservation through a policy and legal framework and a monitoring system that ensure its continued safety of supply to--and responsible water use by--every sector and user in the economy. National water policy must set the ground rules for allocation to different users, water rights, pricing, and environmental safety. Bangladesh's water strategy should start with a national water policy that spells out key objectives such as priority of use by critical economic sectors, approaches to water pricing and cost recovery for development, and shared public- and private-sector water management. An apex public planning organization is needed to perform overall planning for water resources and to advise the National Water Counsel on policy and legislation. Also needed are agencies to implement public water plans for the development of infrastructure, the monitoring of water regimes, and the enforcement of regulations.Water Conservation,Water Resources Law,Water and Industry,Environmental Economics&Policies,Decentralization,Water Supply and Sanitation Governance and Institutions,Town Water Supply and Sanitation,Water and Industry,Water Conservation,Environmental Economics&Policies

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST
    • …
    corecore