1,371 research outputs found

    Security and Privacy Issues of Big Data

    Get PDF
    This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.Comment: In book Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, IGI Global, 201

    Detect coastal disturbances and climate change effects in coralligenous community through sentinel stations

    Get PDF
    This study was implemented to assess the Sessile Bioindicators in Permanent Quadrats (SBPQ) underwater environmental alert method. The SBPQ is a non-invasive and low-cost protocol; it uses sessile target species (indicators) to detect environmental alterations (natural or anthropic) at either the local or global (i.e., climate change) scale and the intrusion of invasive species. The SBPQ focuses on the monitoring of preselected sessile and sensitive benthic species associated with rocky coralligenous habitats using permanent quadrats in underwater sentinel stations. The selected target species have been well documented as bioindicators that disappear in the absence of environmental stability. However, whether these species are good indicators of stability or, in contrast, suffer variations in long-term coverage has not been verified. The purpose of this study was to assess the part of the method based on the hypothesis that, over a long temporal series in a highly structured and biodiverse coralligenous assemblage, the cover of sensitive sessile species does not change over time if the environmental stability characterising the habitat is not altered. Over a ten-year period (2005-2014), the sublittoral sessile biota in the Straits of Gibraltar Natural Park on the southern Iberian Peninsula was monitored at a 28 m-deep underwater sentinel stations. Analyses of the coverages of target indicator species (i.e., Paramuricea clavata and Astroides calycularis) together with other accompanying sessile organisms based on the periodic superimposition of gridded images from horizontal and vertical rocky surfaces allowed us to assess the effectiveness of the method. We conclude that no alterations occurred during the study period; only minimal fluctuations in cover were detected, and the method is reliable for detecting biological changes in ecosystems found in other geographical areas containing the chosen indicator species at similar dominance levels

    Markedly Divergent Tree Assemblage Responses to Tropical Forest Loss and Fragmentation across a Strong Seasonality Gradient

    Get PDF
    We examine the effects of forest fragmentation on the structure and composition of tree assemblages within three seasonal and aseasonal forest types of southern Brazil, including evergreen, Araucaria, and deciduous forests. We sampled three southernmost Atlantic Forest landscapes, including the largest continuous forest protected areas within each forest type. Tree assemblages in each forest type were sampled within 10 plots of 0.1 ha in both continuous forests and 10 adjacent forest fragments. All trees within each plot were assigned to trait categories describing their regeneration strategy, vertical stratification, seed-dispersal mode, seed size, and wood density. We detected differences among both forest types and landscape contexts in terms of overall tree species richness, and the density and species richness of different functional groups in terms of regeneration strategy, seed dispersal mode and woody density. Overall, evergreen forest fragments exhibited the largest deviations from continuous forest plots in assemblage structure. Evergreen, Araucaria and deciduous forests diverge in the functional composition of tree floras, particularly in relation to regeneration strategy and stress tolerance. By supporting a more diversified light-demanding and stress-tolerant flora with reduced richness and abundance of shade-tolerant, old-growth species, both deciduous and Araucaria forest tree assemblages are more intrinsically resilient to contemporary human-disturbances, including fragmentation-induced edge effects, in terms of species erosion and functional shifts. We suggest that these intrinsic differences in the direction and magnitude of responses to changes in landscape structure between forest types should guide a wide range of conservation strategies in restoring fragmented tropical forest landscapes worldwide

    Intrusion Tolerance: Concepts and Design Principles. A Tutorial

    Get PDF
    In traditional dependability, fault tolerance has been the workhorse of the many solutions published over the years. Classical security-related work has on the other hand privileged, with few exceptions, intrusion prevention, or intrusion detection without systematic forms of processing the intrusion symptoms. A new approach has slowly emerged during the past decade, and gained impressive momentum recently: intrusion tolerance. The purpose of this tutorial is to explain the underlying concepts and design principles. The tutorial reviews previous results under the light of intrusion tolerance (IT), introduces the fundamental ideas behind IT, and presents recent advances of the state-of-the-art, coming from European and US research efforts devoted to IT. The program of the tutorial will address: a review of the dependability and security background; introduction of the fundamental concepts of intrusion tolerance (IT); intrusion-aware fault models; intrusion prevention; intrusion detection; IT strategies and mechanisms; design methodologies for IT systems; examples of IT systems and protocol

    A comparison between Asian and Australasia backpackers using cultural consensus analysis

    Get PDF
    This study tests the differences in the shared understanding of the backpacker cultural domain between two groups: backpackers from Australasia and backpackers from Asian countries. A total of 256 backpackers responded to a questionnaire administered in Kuala Lumpur, Bangkok and Krabi Province (Thailand). Cultural consensus analysis (CCA) guided the data analysis, to identify the shared values and the differences in the backpacker culture of the two groups. The findings revealed that while the two groups share some of the backpacker cultural values, some other values are distinctively different from one another. The study provides the first empirical evidence of the differences in backpacking culture between the two groups using CCA. Based on the study findings, we propose some marketing and managerial implications

    A comparison between Asian and Australasia backpackers using cultural consensus analysis

    Get PDF
    This study tests the differences in the shared understanding of the backpacker cultural domain between two groups: backpackers from Australasia and backpackers from Asian countries. A total of 256 backpackers responded to a questionnaire administered in Kuala Lumpur, Bangkok and Krabi Province (Thailand). Cultural consensus analysis (CCA) guided the data analysis, to identify the shared values and the differences in the backpacker culture of the two groups. The findings revealed that while the two groups share some of the backpacker cultural values, some other values are distinctively different from one another. The study provides the first empirical evidence of the differences in backpacking culture between the two groups using CCA. Based on the study findings, we propose some marketing and managerial implications

    General Terms

    Get PDF
    In this paper, we describe the prevention-focused and adaptive middleware mechanisms implemented as part of the Advanced Adaptive Applications (A3) Environment that we are developing as a near-application and application-focused cyber-defense technology under the DARPA Clean-slate design of Resilient, Adaptive, Secure Hosts (CRASH) program
    corecore