70,587 research outputs found

    Modeling emergency management data by UML as an extension of geographic data sharing model: AST approach

    Get PDF
    Applying GIS functionality provides a powerful decision support in various application areas and the basis to integrate policies directed to citizens, business, and governments. The focus is changing toward integrating these functions to find optimal solutions to complex problems. As an integral part of this approach, geographic data sharing model for Turkey were developed as a new approach that enables using the data corporately and effectively. General features of this model are object-oriented model, based on ISO/TC211 standards and INSPIRE Data Specifications, describing nationwide unique object identifiers, and defining a mechanism to manage object changes through time. The model is fully described with Unified Modeling Language (UML) class diagram. This can be a starting point for geographic data providers in Turkey to create sector models like Emergency Management that has importance because of the increasing number of natural and man-made disasters. In emergency management, this sector model can provide the most appropriate data to many "Actors" that behave as emergency response organizations such as fire and medical departments. Actors work in "Sectors" such as fire department and urban security. Each sector is responsible for "Activities" such as traffic control, fighting dire, emission, and so on. "Tasks" such as registering incident, fire response, and evacuating area are performed by actors and part of activity. These tasks produce information for emergency response and require information based on the base data model. By this way, geographic data models of emergency response are designed and discussed with "Actor-Sector-Activity-Task" classes as an extension of the base model with some cases from Turkey

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    A multi-INT semantic reasoning framework for intelligence analysis support

    Get PDF
    Lockheed Martin Corp. has funded research to generate a framework and methodology for developing semantic reasoning applications to support the discipline oflntelligence Analysis. This chapter outlines that framework, discusses how it may be used to advance the information sharing and integrated analytic needs of the Intelligence Community, and suggests a system I software architecture for such applications

    Dynamic deployment of context-aware access control policies for constrained security devices

    Get PDF
    Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    The embeddedness of global production networks: The impact of crisis on Fiji's garment export sector

    Get PDF
    In this paper the author explores how changing geopolitical conditions reconfigure network embeddedness and theorises the conditions of network disconnection and transformation. Through a case study of the changes in interfirm relationships within the Fiji – Australia garment-production network after Fiji’s 2000 political coup d’état, the author develops a relational and dynamic view of embeddedness, highlighting its multifaceted and multiscalar character and emphasising the interrelationships between embeddedness, trust, and power
    • 

    corecore