113,031 research outputs found

    Secure Cloud-Edge Deployments, with Trust

    Get PDF
    Assessing the security level of IoT applications to be deployed to heterogeneous Cloud-Edge infrastructures operated by different providers is a non-trivial task. In this article, we present a methodology that permits to express security requirements for IoT applications, as well as infrastructure security capabilities, in a simple and declarative manner, and to automatically obtain an explainable assessment of the security level of the possible application deployments. The methodology also considers the impact of trust relations among different stakeholders using or managing Cloud-Edge infrastructures. A lifelike example is used to showcase the prototyped implementation of the methodology

    Assessing Importance and Satisfaction Judgments of Intermodal Work Commuters with Electronic Survey Methodology, MTI Report WP 12-01

    Get PDF
    Recent advances in multivariate methodology provide an opportunity to further the assessment of service offerings in public transportation for work commuting. We offer methodologies that are alternative to direct rating scale and have advantages in the quality and precision of measurement. The alternative of methodology for adaptive conjoint analysis for the measurement of the importance of attributes in service offering is implemented. Rasch scaling methodology is used for the measurement of satisfaction with these attributes. Advantages that these methodologies introduce for assessment of the respective constructs and use of the assessment are discussed. In a first study, the conjoint derived weights were shown to have predictive capabilities in applications to respondent distributions of a fixed total budget to improve overall service offerings. Results with the Rasch model indicate that the attribute measures are reliable and can adequately constitute a composite measure of satisfaction. The Rasch items were also shown to provide a basis to discriminate between privately owned vehicles (POVs) and public transport commuters. Dissatisfaction with uncertainty in travel time and income level of respondents were the best predictors of POV commuting

    Advanced Cloud Privacy Threat Modeling

    Full text link
    Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system . This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design

    IWMI Strategic plan 2004-2008

    Get PDF
    Strategy planning / Research institutes / Assessment / Research priorities / Research projects / River basins / Water management / Irrigated farming / Land management / Environmental effects / Financial planning

    Gender Aware Approaches in Agricultural Programmes: International Literature Review

    Get PDF
    This document presents gender aware approaches in agricultural programmes. In response to the persistent inequalities of women in farming despite decades of development assistance, Team Agriculture, Forestry and Food Security at Sida headquarters has initiated a thematic evaluation of how gender issues are tackled in Sida-supported agricultural programmes. The purpose is to increase understanding of how Sida's development assistance in agriculture should be designed, implemented and funded to ensure that female farmers are reached, that their needs as producers are met, and that they are able to benefit from the support to achieve a positive impact on their livelihoods. As part of this, the study also aims to understand the ways in which particular aid modalities impact upon the ability of programmes to reach women farmers effectively. The ILR aims to address the following questions: * Which methodologies and instruments have been used by donors to widen the scope of women's agency in agricultural development programmes? * To what extent has the work of programmes on involving female farmers impacted upon overall agricultural outcomes? * What are the most important lessons? What is working well and what is working not so well (effectiveness, efficiency, impact and sustainability)? Below are recommendations to increase understanding of how Sida's development assistance in agriculture should be designed, implemented and funded to ensure that female farmers are reached, that their needs as producers are met, and that they are able to benefit from the support to achieve a positive impact on their livelihoods

    Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures

    Get PDF
    An IT risk assessment must deliver the best possible quality of results in a time-eļ¬€ective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements. In this paper we present the QualTD Model and method, which is meant to be employed together with standard risk assessment methods for the qualitative assessment of availability risks of IT architectures, or parts of them. The QualTD Model is based on our previous quantitative model, but geared to industrial practice since it does not require quantitative data which is often too costly to acquire. We validate the model and method in a real-world case by performing a risk assessment on the authentication and authorisation system of a large multinational company and by evaluating the results w.r.t. the goals of the stakeholders of the system. We also perform a review of the most popular standard risk assessment methods and an analysis of which one can be actually integrated with our QualTD Model
    • ā€¦
    corecore