46,027 research outputs found

    Preparing for a Northwest Passage: A Workshop on the Role of New England in Navigating the New Arctic

    Get PDF
    Preparing for a Northwest Passage: A Workshop on the Role of New England in Navigating the New Arctic (March 25 - 27, 2018 -- The University of New Hampshire) paired two of NSF\u27s 10 Big Ideas: Navigating the New Arctic and Growing Convergence Research at NSF. During this event, participants assessed economic, environmental, and social impacts of Arctic change on New England and established convergence research initiatives to prepare for, adapt to, and respond to these effects. Shipping routes through an ice-free Northwest Passage in combination with modifications to ocean circulation and regional climate patterns linked to Arctic ice melt will affect trade, fisheries, tourism, coastal ecology, air and water quality, animal migration, and demographics not only in the Arctic but also in lower latitude coastal regions such as New England. With profound changes on the horizon, this is a critical opportunity for New England to prepare for uncertain yet inevitable economic and environmental impacts of Arctic change

    A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

    Full text link
    The initial phase of the deployment of Vehicular Ad-Hoc Networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both of academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs'users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing strategy for VANETs is still an open issue. In this paper, we present a comprehensive survey and classification of pseudonym changing strategies. We then discuss and compare them with respect to some relevant criteria. Finally, we highlight some current researches, and open issues and give some future directions

    Learning our way towards a sustainable agri-food system Three cases from Sweden: Stockholm Farmers market, Ramsjö Community Supported Agriculture and Järna Initiative for Local Production

    Get PDF
    This research is based on case studies of the Stockholm Farmers Market, Ramsjö Community Supported Agriculture, and Järna Initiative for Local Production. These cases are examples of alternative consumerproducer links in the Swedish agri-food system. An adapted SWOT analysis highlights key strengths, weaknesses, opportunities and constraints in each case from the multiple perspectives of producers, consumers, the organization, as well as the environment and society. Diagrams show where learning opportunities exist in the three systems, and how the structure of the consumer-producer link influences learning processes. Implication assessments consider how each link may affect surrounding ecosystems and social aspects of the agri-food system. A framework for assessing a process of development identifies six components that contribute to agri-food system development. Four key issues are discussed in terms of their potential to significantly affect the development of the agri-food system: the length of the food chain linking producers and consumers, the definition of “local”, learning in the system, and what is really being sold – is it food, or values? Critical research questions are highlighted and recommended for future research

    SECMACE: Scalable and Robust Identity and Credential Management Infrastructure in Vehicular Communication Systems

    Full text link
    Several years of academic and industrial research efforts have converged to a common understanding on fundamental security building blocks for the upcoming Vehicular Communication (VC) systems. There is a growing consensus towards deploying a special-purpose identity and credential management infrastructure, i.e., a Vehicular Public-Key Infrastructure (VPKI), enabling pseudonymous authentication, with standardization efforts towards that direction. In spite of the progress made by standardization bodies (IEEE 1609.2 and ETSI) and harmonization efforts (Car2Car Communication Consortium (C2C-CC)), significant questions remain unanswered towards deploying a VPKI. Deep understanding of the VPKI, a central building block of secure and privacy-preserving VC systems, is still lacking. This paper contributes to the closing of this gap. We present SECMACE, a VPKI system, which is compatible with the IEEE 1609.2 and ETSI standards specifications. We provide a detailed description of our state-of-the-art VPKI that improves upon existing proposals in terms of security and privacy protection, and efficiency. SECMACE facilitates multi-domain operations in the VC systems and enhances user privacy, notably preventing linking pseudonyms based on timing information and offering increased protection even against honest-but-curious VPKI entities. We propose multiple policies for the vehicle-VPKI interactions, based on which and two large-scale mobility trace datasets, we evaluate the full-blown implementation of SECMACE. With very little attention on the VPKI performance thus far, our results reveal that modest computing resources can support a large area of vehicles with very low delays and the most promising policy in terms of privacy protection can be supported with moderate overhead.Comment: 14 pages, 9 figures, 10 tables, IEEE Transactions on Intelligent Transportation System
    corecore