5,309 research outputs found
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control
the operation of many critical infrastructures that our society depend on, such
as power grids. Since SCADA systems become a target for cyber attacks and the
potential impact of a successful attack could lead to disastrous consequences
in the physical world, ensuring the security of these systems is of vital
importance. A fundamental prerequisite to securing a SCADA system is a clear
understanding and a consistent view of its architecture. However, because of
the complexity and scale of SCADA systems, this is challenging to acquire. In
this paper, we propose a layered architectural view for SCADA systems, which
aims at building a common ground among stakeholders and supporting the
implementation of security analysis. In order to manage the complexity and
scale, we define four interrelated architectural layers, and uses the concept
of viewpoints to focus on a subset of the system. We indicate the applicability
of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure
State of The Art and Hot Aspects in Cloud Data Storage Security
Along with the evolution of cloud computing and cloud storage towards matu-
rity, researchers have analyzed an increasing range of cloud computing security
aspects, data security being an important topic in this area. In this paper, we
examine the state of the art in cloud storage security through an overview of
selected peer reviewed publications. We address the question of defining cloud
storage security and its different aspects, as well as enumerate the main vec-
tors of attack on cloud storage. The reviewed papers present techniques for key
management and controlled disclosure of encrypted data in cloud storage, while
novel ideas regarding secure operations on encrypted data and methods for pro-
tection of data in fully virtualized environments provide a glimpse of the toolbox
available for securing cloud storage. Finally, new challenges such as emergent
government regulation call for solutions to problems that did not receive enough
attention in earlier stages of cloud computing, such as for example geographical
location of data. The methods presented in the papers selected for this review
represent only a small fraction of the wide research effort within cloud storage
security. Nevertheless, they serve as an indication of the diversity of problems
that are being addressed
The political economy of Hong Kong's "open skies" legal regime: an empirical and theoretical exploration
Copyright 2009 San Diego International Law Journal. Reprinted with the permission of the San Diego International Law Journal.The article presents an empirical and theoretical research which describes the functions of the international legal regime through powerful economic forces in Hong Kong, China. The government applied aviation policies with respect to open skies platform to provide a basis for a thorough understanding of government's legitimacy based on neoclassical logic and analysis. Conceptual perspectives of realists, liberals and cognitivists were acknowledged by the economically-inspired nationalists
Governing the Irish Economy : A Triple Crisis
The international economic crisis hit Ireland hard from 2007 on. Ireland’s membership of the Euro had a significant effect on the policy configuration in the run-up to the crisis, as this had shaped credit availability, bank incentives, fiscal priorities, and wage bargaining practices in a variety of ways. But domestic political choices shaped the terms on which Ireland experienced the crisis. The prior configuration of domestic policy choices, the structure of decision-making, and the influence of organized interests over government, all play a vital role in explaining the scale and severity of crisis. Indeed, this paper argues that Ireland has had to manage not one economic crisis but three – financial, fiscal, and competitiveness. Initial recourse to the orthodox strategies of spending cuts and cost containment did not contain the spread of the crisis, and in November 2010 Ireland entered an EU-IMF loan agreement. This paper outlines the pathways to this outcome
Recommended from our members
The political economy of loose regulation: Modernity meets tradition in Hong Kong
Hong Kong is a fascinating social laboratory where one can observe the interplay between powerful forces of modernization and deeply-entrenched pre-industrial consumption patterns. For decades, the former had not encroached on the autonomy of grassroots-style forms of health care, but the enactment of the Chinese Medicine Ordinance in 1999 has brought the latter under the grip of the state, albeit in the weak sense of the term. This particular episode may offer insights into the dynamics of the two-way adjustment that takes place when the divergent paths of the mainstream and traditional sectors inevitably cross, prompting regulatory and developmental responses
Ruptured pseudoaneurysm as a cause of spontaneous intracerebral bleed in a 3-month old infant
Ruptured intracranial aneurysms in infants are very rare but if missed can
lead to poor outcomes. Spontaneously dissecting false aneurysms have been
described only in a handful of cases. We report a case of a three-month old
girl with deteriorating neurological function due to a ruptured distal middle
cerebral artery pseudoaneurysm
- …