231,243 research outputs found

    Identity in research infrastructure and scientific communication: Report from the 1st IRISC workshop, Helsinki Sep 12-13, 2011

    Get PDF
    Motivation for the IRISC workshop came from the observation that identity and digital identification are increasingly important factors in modern scientific research, especially with the now near-ubiquitous use of the Internet as a global medium for dissemination and debate of scientific knowledge and data, and as a platform for scientific collaborations and large-scale e-science activities.

The 1 1/2 day IRISC2011 workshop sought to explore a series of interrelated topics under two main themes: i) unambiguously identifying authors/creators & attributing their scholarly works, and ii) individual identification and access management in the context of identity federations. Specific aims of the workshop included:

• Raising overall awareness of key technical and non-technical challenges, opportunities and developments.
• Facilitating a dialogue, cross-pollination of ideas, collaboration and coordination between diverse – and largely unconnected – communities.
• Identifying & discussing existing/emerging technologies, best practices and requirements for researcher identification.

This report provides background information on key identification-related concepts & projects, describes workshop proceedings and summarizes key workshop findings

    Security and computer forensics in web engineering education

    Get PDF
    The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'bolted on' to a web application at some point. Security issues must be integrated into Web Engineering processes right from the beginning to create secure solutions and therefore security should be an integral part of a Web Engineering curriculum. One aspect of Computer forensics investigates failures in security. Hence, students should be aware of the issues in forensics and how to respond when security failures occur; collecting evidence is particularly difficult for Web-based applications

    Report on improved use of research facilities and topics relevant for integration, and training schemes

    Get PDF
    This report describes the possibilities of different research facilities to fulfil the research needs established by the participating countries of the CORE Organic project. The report is based on information given in the WP4 report, WP6 report and WP6 final report

    Management plan documentation standard and Data Item Descriptions (DID). Volume of the information system life-cycle and documentation standards, volume 2

    Get PDF
    This is the second of five volumes of the Information System Life-Cycle and Documentation Standards. This volume provides a well-organized, easily used standard for management plans used in acquiring, assuring, and developing information systems and software, hardware, and operational procedures components, and related processes

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (1/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 1 of

    Internal report cluster 1: Urban freight innovations and solutions for sustainable deliveries (2/4)

    Get PDF
    Technical report about sustainable urban freight solutions, part 2 of

    Constraints on the Development of European Identity: Territorial and Demographic Challenges for EU Public Support. EUMA Papers, Vol. 4 No. 11 May 2007

    Get PDF
    [From the introduction]. European integration has transformed in the past few years from an elitist process into an elite-driven mechanism with substantial public oversight and pressure by the citizen and the media, as examples such as the constitutional impasse have shown. The development of public support and identification with the EU is dependent upon a multitude of economic, political and social factors resulting in affective and utilitarian attitudesi which are contingent upon member states’ as well as overarching Union policies. In addition, there exist a number of related factors such as immigration, demographic changes and the enlargement process, that are consistently under-analyzed in the field of EU studies, yet potentially exert significant influence over public opinion and a common identification and hence, the integration process more generally. I will adhere to this conceptual distinction by using the term identification when referring to the gradual processes of civic identification with the EU resulting in affective support, as compared to the mainly utilitarian components of public support – both of which moved to the forefront in the post-Maastricht integration period

    Assurance specification documentation standard and Data Item Descriptions (DID). Volume of the information system life-cycle and documentation standards, volume 4

    Get PDF
    This is the fourth of five volumes on Information System Life-Cycle and Documentation Standards. This volume provides a well organized, easily used standard for assurance documentation for information systems and software, hardware, and operational procedures components, and related processes. The specifications are developed in conjunction with the corresponding management plans specifying the assurance activities to be performed
    corecore