4,903 research outputs found

    Identity Management in Information Age Government: Exploring Concepts, Definitions, Approaches and Solutions

    No full text
    Our research question is the following: What could be a useful working definition of Identity Management in government at present? a) What are conceptualisations, definitions and approaches of IDM in government according to academic literature? b) Which e-authentication solutions have been developed in other jurisdictions

    Digital governance in support of infrastructure asset management

    Get PDF

    Digital governance in support of infrastructure asset management

    Get PDF

    Editing Team: Markus Fiedler

    Get PDF
    and contributions of the FIA community on the important research topics that should be addressed for the Framework Programme 8 research programmes broadly grouped around three main concerns; economic and business interests; societal interests and challenges; technical disruptions and capabilities. The contents of this roadmap originate with the community of researchers working on all aspects of the Future Internet and meet to share and discuss ideas through the Future Internet Assembly through an open consultation of research projects who participate in FIA. This roadmap is primarily concerned with identifying research that can be carried out in the second half of this decade and which will have an impact in 2020 and beyond. By ‘impact ’ we mean will result in products, services, systems, capabilities, that come to market and are available and deployed in that timeframe The approach adopted in this report is to integrate contributions across the entire space of future Internet research with the aim of bringing out the vision for how and where the Internet will make a significant difference in the future and identifying the broad challenges and gaps, and identifying the solutions and research needs in the future. In this report we have summarised and grouped ideas with the aim of identifying the strong themes and consistent challenges that emerge looking acros

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate

    Securing industrial control system environments: the missing piece

    Get PDF
    Cyberattacks on industrial control systems (ICSs) are no longer matters of anticipation. These systems are continually subject to malicious attacks without much resistance. Network breaches, data theft, denial of service, and command and control functions are examples of common attacks on ICSs. Despite available security solutions, safety, security, resilience, and performance require both private public sectors to step-up strategies to address increasing security concerns on ICSs. This paper reviews the ICS security risk landscape, including current security solution strategies in order to determine the gaps and limitations for effective mitigation. Notable issues point to a greater emphasis on technology security while discounting people and processes attributes. This is clearly incongruent with; emerging security risk trends, the biased security strategy of focusing more on supervisory control and data acquisition systems, and the emergence of more sector-specific solutions as against generic security solutions. Better solutions need to include approaches that follow similar patterns as the problem trend. These include security measures that are evolutionary by design in response to security risk dynamics. Solutions that recognize and include; people, process and technology security enhancement into asingle system, and addressing all three-entity vulnerabilities can provide a better solution for ICS environments

    Flock together with CReATIVE-B: A roadmap of global research data infrastructures supporting biodiversity and ecosystem science

    Get PDF
    Biodiversity research infrastructures are providing the integrated data sets and support for studying scenarios of biodiversity and ecosystem dynamics. The CReATIVE-B project - Coordination of Research e-Infrastructures Activities Toward an International Virtual Environment for Biodiversity – explored how cooperation and interoperability of large-scale Research Infrastructures across the globe could support the challenges of biodiversity and ecosystem research. A key outcome of the project is that the research infrastructures agreed to continue cooperation after the end of the project to advance scientific progress in understanding and predicting the complexity of natural systems. By working together in implementing the recommendations in this Roadmap, the data and capabilities of the cooperating research infrastructures are better served to address the grand challenges for biodiversity and ecosystem scientists
    corecore