33,036 research outputs found
Regional Priority Setting in Queensland: A multi-criteria evaluation framework.
Consultancy report for the Queensland Department of Natural Resources and Mines.audit;Australia;Queensland;natural resources; mines
Confidentiality-Preserving Publish/Subscribe: A Survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for
large-scale distributed applications running across multiple administrative
domains. Pub/sub allows event-based information dissemination based on
constraints on the nature of the data rather than on pre-established
communication channels. It is a natural fit for deployment in untrusted
environments such as public clouds linking applications across multiple sites.
However, pub/sub in untrusted environments lead to major confidentiality
concerns stemming from the content-centric nature of the communications. This
survey classifies and analyzes different approaches to confidentiality
preservation for pub/sub, from applications of trust and access control models
to novel encryption techniques. It provides an overview of the current
challenges posed by confidentiality concerns and points to future research
directions in this promising field
Model-based dependability analysis : state-of-the-art, challenges and future outlook
Abstract: Over the past two decades, the study of model-based dependability analysis has gathered significant research interest. Different approaches have been developed to automate and address various limitations of classical dependability techniques to contend with the increasing complexity and challenges of modern safety-critical system. Two leading paradigms have emerged, one which constructs predictive system failure models from component failure models compositionally using the topology of the system. The other utilizes design models - typically state automata - to explore system behaviour through fault injection. This paper reviews a number of prominent techniques under these two paradigms, and provides an insight into their working mechanism, applicability, strengths and challenges, as well as recent developments within these fields. We also discuss the emerging trends on integrated approaches and advanced analysis capabilities. Lastly, we outline the future outlook for model-based dependability analysis
Blockchain and Cryptocurrencies: a Classification and Comparison of Architecture Drivers
Blockchain is a decentralized transaction and data management solution, the
technological leap behind the success of Bitcoin and other cryptocurrencies. As
the variety of existing blockchains and distributed ledgers continues to
increase, adopters should focus on selecting the solution that best fits their
needs and the requirements of their decentralized applications, rather than
developing yet another blockchain from scratch. In this paper we present a
conceptual framework to aid software architects, developers, and decision
makers to adopt the right blockchain technology. The framework exposes the
interrelation between technological decisions and architectural features,
capturing the knowledge from existing academic literature, industrial products,
technical forums/blogs, and experts' feedback. We empirically show the
applicability of our framework by dissecting the platforms behind Bitcoin and
other top 10 cryptocurrencies, aided by a focus group with researchers and
industry practitioners. Then, we leverage the framework together with key
notions of the Architectural Tradeoff Analysis Method (ATAM) to analyze four
real-world blockchain case studies from industry and academia. Results shown
that applying our framework leads to a deeper understanding of the
architectural tradeoffs, allowing to assess technologies more objectively and
select the one that best fit developers needs, ultimately cutting costs,
reducing time-to-market and accelerating return on investment.Comment: Accepted for publication at journal Concurrency and Computation:
Practice and Experience. Special Issue on distributed large scale
applications and environment
An overview of decision table literature 1982-1995.
This report gives an overview of the literature on decision tables over the past 15 years. As much as possible, for each reference, an author supplied abstract, a number of keywords and a classification are provided. In some cases own comments are added. The purpose of these comments is to show where, how and why decision tables are used. The literature is classified according to application area, theoretical versus practical character, year of publication, country or origin (not necessarily country of publication) and the language of the document. After a description of the scope of the interview, classification results and the classification by topic are presented. The main body of the paper is the ordered list of publications with abstract, classification and comments.
Ecosystem Approach to Fisheries and Aquaculture: Implementing the FAO Code of Conduct for Responsible Fisheries
This publication provides guidance on how to implement the FAO Code of Conduct for Responsible Fisheries (CCRF) using an ecosystem approach to fisheries and aquaculture. The CCRF is a voluntary code covering all aspects of the management and development of fisheries and is designed to ensure sustainable development without adversely affecting the livelihoods of local communities that share the same resources as the fisheries. The authors outline the basic principles of the CCRF, describe concrete steps to be taken to use the ecosystem approach effectively, and recommend certain institutional changes and reforms that will be necessary if the potential of the ecosystem approach is to be realized in the Asia-Pacific region. The most significant reform needed is a paradigm shift in policy from one that is production oriented to one that is benefits oriented (social and economic). There is evidence that this is already being undertaken in the region with efforts being made to limit access, reduce the number of fishing vessels and introduce community-based rights systems. Stakeholder participation is essential and existing legal instruments and practices that interact with or impact fisheries may also need to be reconsidered, and adjustments made where necessary. In the future, it may even be necessary to regulate the inter-sectoral interactions and impacts through primary legislation. To promote broader adoption and implementation of the ecosystem approach by member countries, a wide range of regional activities is suggested by the authors including a media campaign, the building of fishery alliances among countries and capacity building in fishery agencies
Towards a Reliable Comparison and Evaluation of Network Intrusion Detection Systems Based on Machine Learning Approaches
Presently, we are living in a hyper-connected world where millions of heterogeneous devices are continuously sharing information in different application contexts for wellness, improving communications, digital businesses, etc. However, the bigger the number of devices and connections are, the higher the risk of security threats in this scenario. To counteract against malicious behaviours and preserve essential security services, Network Intrusion Detection Systems (NIDSs) are the most widely used defence line in communications networks. Nevertheless, there is no standard methodology to evaluate and fairly compare NIDSs. Most of the proposals elude mentioning crucial steps regarding NIDSs validation that make their comparison hard or even impossible. This work firstly includes a comprehensive study of recent NIDSs based on machine learning approaches, concluding that almost all of them do not accomplish with what authors of this paper consider mandatory steps for a reliable comparison and evaluation of NIDSs. Secondly, a structured methodology is proposed and assessed on the UGR'16 dataset to test its suitability for addressing network attack detection problems. The guideline and steps recommended will definitively help the research community to fairly assess NIDSs, although the definitive framework is not a trivial task and, therefore, some extra effort should still be made to improve its understandability and usability further
Recommended from our members
Evaluating the resilience and security of boundaryless, evolving socio-technical Systems of Systems
- …