6,764 research outputs found

    Balanced Innovation Management

    Get PDF
    The Department of Defense has demonstrated success in managing innovation. The military’s approach to innovation management extends beyond traditional distinctions between internal and external innovation modes. Summarizing specific innovation strategies available to managers develops recognition of this growing reality. The article concludes with resulting lessons that can be more widely adopted by managers

    nanoSTAIR: a new strategic proposal to impulse standardization in nanotechnology research

    Get PDF
    Nanotechnology is considered one of the key technologies of the 21st century within Europe and a Key-Enabling Technology (KET) by Horizon 2020. Standardization has been identified in H2020 as one of the innovation-support measures by bridging the gap between research and the market, and helping the fast and easy transfer of research results to the European and international market. The development of new and improved standards requires high quality technical information, creating a fundamental interdependency between the standardization and research communities. In the frame of project nanoSTAIR (GA 319092), the present paper describes the European scenario on research and standardization in nanotechnology and presents a proposal of a European strategy (nanoSTAIR) to impulse direct "pipelines" between research and standardization. In addition, strategic actions focused on integration of standardization in the R&D projects, from the early stages of the design of a future business (Project Proposal), are also described.European Commission, through the Seventh Framework Programme (GA 319092)

    A User-centered Design of Patient Safety Event Reporting Systems

    Get PDF

    Access and information flow control to secure mobile web service compositions in resource constrained environments

    Get PDF
    The growing use of mobile web services such as electronic health records systems and applications like twitter, Facebook has increased interest in robust mechanisms for ensuring security for such information sharing services. Common security mechanisms such as access control and information flow control are either restrictive or weak in that they prevent applications from sharing data usefully, and/or allow private information leaks when used independently. Typically, when services are composed there is a resource that some or all of the services involved in the composition need to share. However, during service composition security problems arise because the resulting service is made up of different services from different security domains. A key issue that arises and that we address in this thesis is that of enforcing secure information flow control during service composition to prevent illegal access and propagation of information between the participating services. This thesis describes a model that combines access control and information flow control in one framework. We specifically consider a case study of an e-health service application, and consider how constraints like location and context dependencies impact on authentication and authorization. Furthermore, we consider how data sharing applications such as the e-health service application handle issues of unauthorized users and insecure propagation of information in resource constrained environments¹. Our framework addresses this issue of illegitimate information access and propagation by making use of the concept of program dependence graphs (PDGs). Program dependence graphs use path conditions as necessary conditions for secure information flow control. The advantage of this approach to securing information sharing is that, information is only propagated if the criteria for data sharing are verified. Our solution proposes or offers good performance, fast authentication taking into account bandwidth limitations. A security analysis shows the theoretical improvements our scheme offers. Results obtained confirm that the framework accommodates the CIA-triad (which is the confidentiality, integrity and availability model designed to guide policies of information security) of our work and can be used to motivate further research work in this field

    ALT-C 2010 - Conference Proceedings

    Get PDF
    corecore