1,065 research outputs found
Digital archives : comparative study and interoperability framework
Estágio realizado na ParadigmaXis e orientado pelo Eng.º Filipe CorreiaTese de mestrado integrado. Engenharia Informátca e Computação. Faculdade de Engenharia. Universidade do Porto. 200
An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures
New requirements from the customers\u27 and manufacturers\u27 point of view such as adding new software functions during the product life cycle require a transformed architecture design for future vehicles. The paradigm of signal-oriented communication established for many years will increasingly be replaced by service-oriented approaches in order to increase the update and upgrade capability. In this article, we provide an overview of current protocols and communication patterns for automotive architectures based on the service-oriented architecture (SOA) paradigm and compare them with signal-oriented approaches. Resulting challenges and opportunities of SOAs with respect to information security are outlined and discussed. For this purpose, we explain different security countermeasures and present a state of the section of automotive approaches in the fields of firewalls, Intrusion Detection Systems (IDSs) and Identity and Access Management (IAM). Our final discussion is based on an exemplary hybrid architecture (signal- and service-oriented) and examines the adaptation of existing security measures as well as their specific security features
Device discovery and context registration in static context header compression networks
Due to the limited bandwidth of Low-Power Wide-Area Networks (LPWAN), the application layer is currently often tied straight above the link layer, limiting the evolution of sensor networks distributed over a large area. Consequently, the highly efficient Static Context Header Compression (SCHC) standard was introduced, where devices can compress the IPv6 and upper layer protocols down to a single byte. This approach, however, assumes that every compression context is distributed before deployment, again limiting the evolution of such networks. Therefore, this paper presents two context registration mechanisms leveraging on the SCHC adaptation layer. This is done by analyzing current registration solutions in order to find limitations and optimizations with regard to very constrained networks. Both solutions and the current State-of-The-Art (SoTA) are evaluated in a Lightweight Machine to Machine (LwM2M) environment. In such situation, both developed solutions decrease the energy consumption already after 25 transmissions, compared with the current SoTA. Furthermore, simulations show that Long Range (LoRa) devices still have a 80% chance to successfully complete the registration flow in a network with a 50% Packet Error Ratio. Briefly, the work presented in this paper delivers bootstrapping tools to constrained, SCHC-enabled networks while still being able to reduce energy consumption
Near Field Communication: From theory to practice
This book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab - Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technology, and security considerations are discussed in detail. Key Features: Offers a complete understanding of the NFC technology, including standards, technical essentials, operating modes, application development with Java, security and privacy, business ecosystem analysis Provides analysis, design as well as development guidance for professionals from administrative and technical perspectives Discusses methods, techniques and modelling support including UML are demonstrated with real cases Contains case studies such as payment, ticketing, social networking and remote shopping This book will be an invaluable guide for business and ecosystem analysts, project managers, mobile commerce consultants, system and application developers, mobile developers and practitioners. It will also be of interest to researchers, software engineers, computer scientists, information technology specialists including students and graduates.Publisher's Versio
Western States Dublin Core Metadata Best Practices, version 1.2
Funded by a grant awarded by the Institute for Museum and Library Services (IMLS) in the fall of 2001, the University of Denver (Denver, Colorado) spearheaded a multi-state collaborative initiative to create a virtual collection of widely dispersed digital resources on the topic, Western trails. As part of this initiative, 23 institutions in four Western states were awarded mini-grants to create digital content and metadata for resources related to Western trails. In addition to creation of a virtual collection of digital resources, another significant component of this multi-state initiative was development of a set of Dublin-Core based best practices by representatives from cultural heritage institutions beyond the original four participating states. Accordingly, in March 2002, 18 representatives from eight Western states met in Denver, Colorado to begin exploring issues associated with application of Dublin Core to digital objects by cultural heritage institutions. This group, the Western States Digital Standards Group (WSDSG) Metadata Working Group, formed two task forces to develop guidelines for the Dublin Core metadata. The WSDSG Metadata Working Group met again in Topeka, Kansas in July 2002 to finalize the guidelines and determine the remaining components of a best practices document. In November 2002 the resultant WSDSG Guidelines for the Dublin Core Elements were posted on the Colorado Digitization Program (CDP) and the Western Trails project website. In January 2003, the WSDSG Best Practices document will be released. This Best Practices document is based upon and supercedes the CDP’s General Guidelines for Descriptive Metadata Creation and Metadata
Recommended from our members
Analysis and Development of Instrument Software Paradigms: Conception and Implementation of a New Instrument Control and Data Acquisition System, Proven by Material Scientific Applications
During the last 50 years, the quality of analysis methods in many scientific disciplines has been enhanced by electronic applications, automation and data processing. While the features, performance and usability of these processes have been continually enhanced, it is conspicuous that the majority of institutes operate own proprietary software. This situation arises for both historical and financial reasons, plus a wish to retain autonomy fuelled by the requirement for a system that remains compatible with both new and legacy hardware.
This thesis reviews the commonly used scientific software systems and their stakeholders and tries to identify generic problems. The demands on instrument systems are summarized by a requirement specification. Based on these requirements, a basic concept is developed that reflects the current state-of-the art in software design and which may provide a blueprint for instrument system architectures. The results are used to create a proof-of-concept implementation. Core to this approach is an application server that comes with a container, which makes use of the Inversion-of-Control pattern to loosely couple and execute components. These do not need to implement fixed interfaces and are thus decoupled from a specific use-case. Components can, for example, be proxies that control and acquire data from legacy hardware, perform calculations, provide a human-machine interface or act as storage. They are dynamically wired to experiments using XML-based Assembly files. Both Assemblies and Components can be published using a central store on a collaboration platform and shared by the community. This increases reusability and allows the use of existing Assemblies with new hardware by simply replacing the hardware proxy modules.
Example components have been provided for the access to legacy and new instrument hardware, the storage of results in the NeXus format, data reduction, simulation with McStas, the execution of customizable scans and the visualization of data
Uma arquitectura segura e colaborativa para registos de saúde electrónicos com suporte a mobilidade
Doutoramento em InformáticaDurante as ultimas décadas, os registos de saúde eletrónicos (EHR) têm
evoluído para se adaptar a novos requisitos. O cidadão tem-se envolvido
cada vez mais na prestação dos cuidados médicos, sendo mais pró ativo e
desejando potenciar a utilização do seu registo. A mobilidade do cidadão
trouxe mais desafios, a existência de dados dispersos, heterogeneidade de
sistemas e formatos e grande dificuldade de partilha e comunicação entre
os prestadores de serviços.
Para responder a estes requisitos, diversas soluções apareceram, maioritariamente
baseadas em acordos entre instituições, regiões e países. Estas abordagens
são usualmente assentes em cenários federativos muito complexos e
fora do controlo do paciente. Abordagens mais recentes, como os registos
pessoais de saúde (PHR), permitem o controlo do paciente, mas levantam
duvidas da integridade clinica da informação aos profissionais clínicos.
Neste cenário os dados saem de redes e sistemas controlados, aumentando
o risco de segurança da informação. Assim sendo, são necessárias novas
soluções que permitam uma colaboração confiável entre os diversos atores
e sistemas.
Esta tese apresenta uma solução que permite a colaboração aberta e segura
entre todos os atores envolvidos nos cuidados de saúde. Baseia-se numa
arquitetura orientada ao serviço, que lida com a informação clínica usando
o conceito de envelope fechado. Foi modelada recorrendo aos princípios
de funcionalidade e privilégios mínimos, com o propósito de fornecer proteção dos dados durante a transmissão, processamento e armazenamento.
O controlo de acesso _e estabelecido por políticas definidas pelo paciente.
Cartões de identificação eletrónicos, ou certificados similares são utilizados
para a autenticação, permitindo uma inscrição automática. Todos os
componentes requerem autenticação mútua e fazem uso de algoritmos de
cifragem para garantir a privacidade dos dados. Apresenta-se também um
modelo de ameaça para a arquitetura, por forma a analisar se as ameaças
possíveis foram mitigadas ou se são necessários mais refinamentos.
A solução proposta resolve o problema da mobilidade do paciente e a dispersão de dados, capacitando o cidadão a gerir e a colaborar na criação
e manutenção da sua informação de saúde. A arquitetura permite uma
colaboração aberta e segura, possibilitando que o paciente tenha registos
mais ricos, atualizados e permitindo o surgimento de novas formas de criar
e usar informação clínica ou complementar.Since their early adoption Electronic Health Records (EHR) have been evolving
to cope with increasing requirements from institutions, professionals
and, more recently, from patients. Citizens became more involved demanding
successively more control over their records and an active role on their
content. Mobility brought also new requirements, data become scattered
over heterogeneous systems and formats, with increasing di culties on data
sharing between distinct providers.
To cope with these challenges several solutions appeared, mostly based on
service level agreements between entities, regions and countries. They usually
required de ning complex federated scenarios and left the patient outside
the process. More recent approaches, such as personal health records
(PHR), enable patient control although raises clinical integrity doubts to
other actors, such as physicians. Also, information security risk increase as
data travels outside controlled networks and systems. To overcome this,
new solutions are needed to facilitate trustable collaboration between the
diverse actors and systems.
In this thesis we present a solution that enables a secure and open collaboration
between all healthcare actors. It is based on a service-oriented architecture
that deals with the clinical data using a closed envelope concept. The
architecture was modeled with minimal functionality and privileges bearing
in mind strong protection of data during transmission, processing and
storing. The access control is made through patient policies and authentication
uses electronic identi cation cards or similar certi cates, enabling
auto-enrollment. All the components require mutual authentication and
uses cyphering mechanisms to assure privacy. We also present a threat
model to verify, through our solution, if possible threats were mitigated or
if further re nement is needed.
The proposed solution solves the problem of patient mobility and data dispersion,
and empowers citizens to manage and collaborate in their personal
healthcare information. It also permits open and secure collaboration, enabling
the patient to have richer and up to date records that can foster new
ways to generate and use clinical or complementary information
Privacy protection in a mobile biomedical information collection service
Masteroppgave i informasjons- og kommunikasjonsteknologi 2006 - Høgskolen i Agder, GrimstadThis report presents a model in a mobile health care environment and uses a combination of existing technologies to build a privacy protection scheme. This work covers security issues in both the wireless and wired network, and proposes solutions to these issues. A framework using PKI to distribute digital certificates combined with strong encryption using the AES algorithm is described. Using this framework in combination with a RBAC model using location control we present some principles that will ensure privacy in a mobile wireless biomedical information collection service
- …