5,309 research outputs found

    Towards a Layered Architectural View for Security Analysis in SCADA Systems

    Full text link
    Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of a successful attack could lead to disastrous consequences in the physical world, ensuring the security of these systems is of vital importance. A fundamental prerequisite to securing a SCADA system is a clear understanding and a consistent view of its architecture. However, because of the complexity and scale of SCADA systems, this is challenging to acquire. In this paper, we propose a layered architectural view for SCADA systems, which aims at building a common ground among stakeholders and supporting the implementation of security analysis. In order to manage the complexity and scale, we define four interrelated architectural layers, and uses the concept of viewpoints to focus on a subset of the system. We indicate the applicability of our approach in the context of SCADA system security analysis.Comment: 7 pages, 4 figure

    State of The Art and Hot Aspects in Cloud Data Storage Security

    Get PDF
    Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storage security and its different aspects, as well as enumerate the main vec- tors of attack on cloud storage. The reviewed papers present techniques for key management and controlled disclosure of encrypted data in cloud storage, while novel ideas regarding secure operations on encrypted data and methods for pro- tection of data in fully virtualized environments provide a glimpse of the toolbox available for securing cloud storage. Finally, new challenges such as emergent government regulation call for solutions to problems that did not receive enough attention in earlier stages of cloud computing, such as for example geographical location of data. The methods presented in the papers selected for this review represent only a small fraction of the wide research effort within cloud storage security. Nevertheless, they serve as an indication of the diversity of problems that are being addressed

    The political economy of Hong Kong's "open skies" legal regime: an empirical and theoretical exploration

    Get PDF
    Copyright 2009 San Diego International Law Journal. Reprinted with the permission of the San Diego International Law Journal.The article presents an empirical and theoretical research which describes the functions of the international legal regime through powerful economic forces in Hong Kong, China. The government applied aviation policies with respect to open skies platform to provide a basis for a thorough understanding of government's legitimacy based on neoclassical logic and analysis. Conceptual perspectives of realists, liberals and cognitivists were acknowledged by the economically-inspired nationalists

    Governing the Irish Economy : A Triple Crisis

    Get PDF
    The international economic crisis hit Ireland hard from 2007 on. Ireland’s membership of the Euro had a significant effect on the policy configuration in the run-up to the crisis, as this had shaped credit availability, bank incentives, fiscal priorities, and wage bargaining practices in a variety of ways. But domestic political choices shaped the terms on which Ireland experienced the crisis. The prior configuration of domestic policy choices, the structure of decision-making, and the influence of organized interests over government, all play a vital role in explaining the scale and severity of crisis. Indeed, this paper argues that Ireland has had to manage not one economic crisis but three – financial, fiscal, and competitiveness. Initial recourse to the orthodox strategies of spending cuts and cost containment did not contain the spread of the crisis, and in November 2010 Ireland entered an EU-IMF loan agreement. This paper outlines the pathways to this outcome

    Ruptured pseudoaneurysm as a cause of spontaneous intracerebral bleed in a 3-month old infant

    Get PDF
    Ruptured intracranial aneurysms in infants are very rare but if missed can lead to poor outcomes. Spontaneously dissecting false aneurysms have been described only in a handful of cases. We report a case of a three-month old girl with deteriorating neurological function due to a ruptured distal middle cerebral artery pseudoaneurysm
    • …
    corecore