1,138 research outputs found

    Daytonian 1929-1930

    Get PDF
    University of Dayton student yearbook. Early yearbooks cover St. Mary\u27s Institute. Annual publication of the Daytonian began in 1923; it was not published in 1929, 1932-1934 and 1944. Short volumes highlighting the graduating class were published in 1930, 1931 and 1945 under different titles.https://ecommons.udayton.edu/daytonian/1011/thumbnail.jp

    No Truck with the Chilean Junta!

    Get PDF
    When lorry drivers in Northampton slapped stickers on their cabs declaring ā€˜No truck with the Chilean Junta!ā€™ they were doing more than threatening to boycott. They were asserting their own identity as proud unionists and proud internationalists. But what did trade unionists really know of what was happening in Chile? And how could someone elseā€™s oppression become a means to solidify your own identity? The labour movements of Britain and Australia used ā€˜Chileā€™ as an impetus for action and to give meaning to their own political expression, though it was not all smooth sailing. Throughout the 1970s, social movements and unions alternately clashed and melded, and those involved with ā€˜Chileā€™ were also caught within the unhappy marriage of the cross-cultural left. This book draws together the events and stories of these complex times

    The Ocean Dumping Dilemma

    Get PDF

    Internet of Things Strategic Research Roadmap

    Get PDF
    Internet of Things (IoT) is an integrated part of Future Internet including existing and evolving Internet and network developments and could be conceptually defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual ā€œthingsā€ have identities, physical attributes, and virtual personalities, use intelligent interfaces, and are seamlessly integrated into the information network

    Network Slicing Landscape: A holistic architectural approach, orchestration and management with applicability in mobile and fixed networks and clouds

    Get PDF
    Tutorial at IEEE NetSoft2018 - 29th June 2018 Montreal Abstract: A holistic architectural approach, orchestration and management with applicability in mobile and fixed networks and clouds Topics: Key Slicing concepts and history Slicing Key Characteristics & Usage scenarios & Value Chain Multi-Domain Network Function Virtualisation Review of Research projects and results in network and cloud slicing Open Source Orchestrators Standard Organization activities: NGMN, ITU-T, ONF, 3GPP, ETSI, BBF, IETF Industrial perspective on Network Slicing Review of industry Use Cases Network Slicing Challenges Concluding remarks of Network Slicing Acknowledgements & Reference

    Albuquerque Morning Journal, 11-28-1921

    Get PDF
    https://digitalrepository.unm.edu/abq_mj_news/1398/thumbnail.jp

    Atlantic Advocate, vol. 49, no. 08 (April 1959)

    Get PDF
    Range: vol. 47, no. 1 (September 1956) - vol. 82, no. 5 (January 1992) only.Running from September 1952 to January 1992, the Atlantic Advocate published news and other material about Atlantic Canada. By the end of the 1950s it had absorbed both the Atlantic Guardian and the Maritime Advocate and Busy East. (Christine M. Brown, "Atlantic Advocate," Encyclopedia of Newfoundland and Labrador, vol. 1, p. 86.

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizensā€™ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the projectā€™s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    A Dynamic Access Control Model Using Authorising Workfow and Task Role-based Access Control

    Get PDF
    Access control is fundamental and prerequisite to govern and safeguard information assets within an organisation. Organisations generally use Web enabled remote access coupled with applications access distributed across various networks. These networks face various challenges including increase operational burden and monitoring issues due to the dynamic and complex nature of security policies for access control. The increasingly dynamic nature of collaborations means that in one context a user should have access to sensitive information, whilst not being allowed access in other contexts. The current access control models are static and lack Dynamic Segregation of Duties (SoD), Task instance level of Segregation, and decision making in real time. This thesis addresses these limitations describes tools to support access management in borderless network environments with dynamic SoD capability and real time access control decision making and policy enforcement. This thesis makes three contributions: i) Defining an Authorising Workflow Task Role Based Access Control (AW-TRBAC) using existing task and workflow concepts. This new workflow integrates dynamic SoD, whilst considering task instance restriction to ensure overall access governance and accountability. It enhances existing access control models such as Role Based Access Control (RBAC) by dynamically granting users access rights and providing access governance. ii) Extension of the OASIS standard of XACML policy language to support dynamic access control requirements and enforce access control rules for real time decision making. This mitigates risks relating to access control, such as escalation of privilege in broken access control, and insucient logging and monitoring. iii) The AW-TRBAC model is implemented by extending the open source XACML (Balana) policy engine to demonstrate its applicability to a real industrial use case from a financial institution. The results show that AW-TRBAC is scalable, can process relatively large numbers of complex requests, and meets the requirements of real time access control decision making, governance and mitigating broken access control risk
    • ā€¦
    corecore