111,938 research outputs found

    Ending the Energy Stalemate: A Bipartisan Strategy to Meet America's Energy Challenges

    Get PDF
    Provides detailed policy recommendations for addressing oil security, climate change, natural gas supply, the future of nuclear energy, and other long-term challenges

    Dynamic deployment of context-aware access control policies for constrained security devices

    Get PDF
    Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages

    Evaluating the Energy Security Implications of a Carbon-Constrained U.S. Economy

    Get PDF
    Examines how factors linked to U.S. energy security would be affected in eight scenarios in which carbon emissions are limited to a certain level. Assesses the feasibility of and need for low-carbon technology

    Short Paper: On Deployment of DNS-based Security Enhancements

    Full text link
    Although the Domain Name System (DNS) was designed as a naming system, its features have made it appealing to repurpose it for the deployment of novel systems. One important class of such systems are security enhancements, and this work sheds light on their deployment. We show the characteristics of these solutions and measure reliability of DNS in these applications. We investigate the compatibility of these solutions with the Tor network, signal necessary changes, and report on surprising drawbacks in Tor's DNS resolution.Comment: Financial Cryptography and Data Security (FC) 201

    The OMII Software – Demonstrations and Comparisons between two different deployments for Client-Server Distributed Systems

    No full text
    This paper describes the key elements of the OMII software and the scenarios which OMII software can be deployed to achieve distributed computing in the UK e-Science Community, where two different deployments for Client-Server distributed systems are demonstrated. Scenarios and experiments for each deployment have been described, with its advantages and disadvantages compared and analyzed. We conclude that our first deployment is more relevant for system administrators or developers, and the second deployment is more suitable for users’ perspective which they can send and check job status for hundred job submissions

    Energy security issues in contemporary Europe

    Get PDF
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends in the energy sector. Our paper discusses energy security status and innovations in the energy sector in European Union (EU). We analyze the recent up-to-date developments of the energy policy and exploitation of energy sources, as well as scrutinize the channels of energy streaming to the EU countries and the risks associated with this energy import. Moreover, we argue that the shift to the low-carbon production of energy and the massive deployment of renewable energy sources (RES) might become the key issue in ensuring the energy security and independency of the EU from its external energy supplies. Both RES, distributed energy resources (DER) and “green energy” that will be based on the energy efficiency and the shift to the alternative energy supply might change the energy security status quo for the EU
    corecore