46,860 research outputs found

    Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS - a collection of Technical Notes Part 1

    Get PDF
    This report provides an introduction and overview of the Technical Topic Notes (TTNs) produced in the Towards Identifying and closing Gaps in Assurance of autonomous Road vehicleS (Tigars) project. These notes aim to support the development and evaluation of autonomous vehicles. Part 1 addresses: Assurance-overview and issues, Resilience and Safety Requirements, Open Systems Perspective and Formal Verification and Static Analysis of ML Systems. Part 2: Simulation and Dynamic Testing, Defence in Depth and Diversity, Security-Informed Safety Analysis, Standards and Guidelines

    Human security: Concept and practice

    Get PDF
    In the era of multiplying and escalating risks, both at national and international level, security of individual –popularly known as human security- from pervasive threats and fears become an area of intellectual discourse and policy debate. This is especially significant after the end of cold war, emergence of multi-polarity and proliferation of global terrorism. However, there is no established concept of human security in mainstream social science debates across the world. In the absence of a theory of human security, there exist few quantitative indicators and hence few data base on human security. More recently political theorists tried to develop a concept of human security based on the concept of human development and human rights. Yet, social science theory has not yet come forward with a comprehensive view of what exactly constitute human security. The matter is further complicated by the process of globalization and the high social costs associated with it. Against this context, this article attempts to analyze the concept of human security and its implication in a global context threatened by multiple forces of fear and insecurity. Introductory section gives historical background of human security and its recent interpretations through institutional interventions. The institutional mechanisms include UNDP report of 1994, International Commission on intervention and state sovereignty etc. Section two analyzes theoretical contributions of Amartya Sen, Emma Rothschild, Thomas, King and Murray, Kanti Bajpai, Hampton, and Leaning in popularizing the concept of human security. Section three defines human security from different dimensions and highlights the relevance of broader and inclusive concept of human security in the post cold war era. Section four analyzes positive and negative approaches towards human security in application level. Positive human security is analyzed on the basis of initiatives of Canada, Norway and Japan towards Human Security centric governance and its impact on economic and social security. Negative Approach is evaluated in the context of USA and EU policy in Middle East and other countries.Human Security; Foreign Policy; Security

    Developing a distributed electronic health-record store for India

    Get PDF
    The DIGHT project is addressing the problem of building a scalable and highly available information store for the Electronic Health Records (EHRs) of the over one billion citizens of India

    The integration of hazard evaluation procedures and requirements engineering for safety-critical embedded systems

    Get PDF
    Although much work has been done on assessing safety requirements in programmable systems, one very important aspect, the integration of hazard evaluation procedures and requirements engineering, has been somewhat neglected. This thesis describes the derivation and application of a methodology, HAZAPS (HAZard Assessment in Programmable Systems). The methodology assists at the requirements stage in the development of safety-critical embedded systems. The objectives are to identify hazards in programmable systems, construct and model the associated safety requirements, and, finally, to assess these requirements. HAZAPS integrates safety engineering and software modelling techniques. The analysis of more than 300 computer related incidents provided the criteria used to identify, select and modify safety engineering techniques. [Continues.

    Institute for the Protection and Security of the Citizen Activity Report 2002.

    Get PDF
    Abstract not availableJRC.G-Institute for the Protection and the Security of the Citizen (Ispra
    • …
    corecore