689,961 research outputs found

    Zika Virus and Global Health Security

    Get PDF
    Americans are largely apathetic about the risks of Zika virus and Congress cannot agree on preparedness funding. Strategies to counter the spread of Zika by the World Health Organisation (WHO) grossly underestimate the disease’s impact. WHO and member countries lack sufficient resources to respond. Consequences of fiscal apathy can be measured in lives lost and long-term disabilities. Zika prevention is a matter of global health security. The epidemiologic brunt of Zika in South America falls largely on vulnerable women at heightened risk of exposure through mosquitoes and sexual transmission. Resulting transmission to fetuses and infants will have generational impacts in South American and Caribbean countries, as well as the U.S. Global costs to address Zika infections among infected infants will exceed hundreds of billions (U.S. dollars). WHO and some U.S. leaders, including President Obama, correctly assert that Zika threatens national and global security similar to humanitarian crises, climate change, and war. Words alone, however, are not enough. Global recognition of this public health crisis must stimulate greater investment in preventing negative repercussions

    Time-Energy Entangled Quantum Key Distribution Without Franson Interferometry

    Get PDF
    Traditional encryption protocols are becoming less secure as quantum computing becomes more viable. Quantum Key Distribution(QKD) uses quantum entanglement to distribute provably secure encryption keys. Previous QKD protocols have used polarization-entangled photons that can be easily measured, but cannot be easily transmitted over long distances. This project will use time-energy entanglement which is more challenging to verify but can be easily transmitted over long distances. This project demonstrates Time-Energy entanglement and proposes a method of verifying security independent of Franson interferometry verification

    Examining Task Conflict and Team Atmosphere in Virtual Teams Engaged in Outsourced Project Work

    Get PDF
    Global teams have become commonplace. As teams have become more dispersed, leveraging outsourced resources has gained popularity. Outsourcing can be a prudent move financially; however, when it is inappropriately applied, the damage it produces can easily overshadow any financial gains. Such ill effects can include impaired employee performance and morale caused by decreased job security. Moreover, it can lead to a less favorable team atmosphere and increased task conflict. This study examined the effects of team virtuality along with the strategic alignment of outsourcing on team performance. The research utilized the intervening processes theory (IPT). The IPT posits that the relationship between certain constructs cannot be measured directly; however, the impact can be measured through other constructs. In the case of this study, it was the impacts of the constructs of virtuality, job security, outsourcing, and team temporariness on team performance. The intervening constructs were team atmosphere and task conflict. The research instrument was an online survey. The results of this survey supported the hypotheses that task conflict was impacted by team virtualization, job security, and team atmosphere. Weak support was provided for the influence of team temporariness on task conflict. The impacts of team virtualization and job security on team atmosphere were not supported. Finally, team performance was influenced by team atmosphere but not task conflict

    Integrated Biometric Template Security using Random Rectangular Hashing

    Get PDF
    Large centralized biometric databases, accessible over networks in real time are especially used for identification purposes. Multimodal biometric systems which are more robust and accurate in human identification require multiple templates storage of the same user analogous to individual biometric sources. This may raises concern about their usage and security when these stored templates are compromised since each person is believed to have a unique biometric trait. Unlike passwords, the biometric templates cannot be revoked and switch to another set of uncompromised identifiers when compromised. Therefore, fool-proof techniques satisfying the requirements of diversity, revocability, security and performance are required to protect stored templates such that both the security of the application and the users2019; privacy are not compromised by the impostor attacks. Thus, this paper proposes a template protection scheme coined as random rectangular hashing to strengthen the multimodal biometric system. The performance of the proposed template protection scheme is measured using the fingerprint FVC2004 and PolyU palmprint database

    Estudio de la Seguridad en Redes de Sensores Corporales aplicadas al Ámbito Sanitario

    Get PDF
    Nowadays, the technology has become necessary in daily aspects of everyday life, included healthcare and healthy lifestyle. Thus, in the last years has taken place an important development of Body Sensor Networks (BSN) to let a continuous monitoring. Security is becoming increasingly important in all areas related to Information Technology, and becomes even more important when patient’s health is involved. Confiability and privacy are necessary requirements for patients to feel secure with the sensors, but the reliability is necessary too, because if all measured data are lost or damage before reaching their destination, it cannot be made an adequate monitor or make the best diagnosis. The aim of this work is to provide a review of the security for BSN applied to the healthcare, in order to enable the development of applications to improve the patient's diagnosis and treatment with chronic diseases.Keywords: BSN, healthcare,confiability, reliability, chronic diseases

    PALANTIR: Zero-trust architecture for Managed Security Service Provider

    Get PDF
    The H2020 PALANTIR project aims at delivering a Security-as-a-Service solution to SMEs and microenterprises via the exploitation of containerised Network Functions. However, these functions are conceived by third-party developers and can also be deployed in untrustworthy virtualisation layers, depending on the subscribed delivery model. Therefore, they cannot be trusted and require a stringent monitoring to ensure their harmlessness, as well as adequate measures to remediate any nefarious activities. This paper justifies, details and evaluates a Zero-Trust architecture supporting PALANTIR’s solution. Specifically, PALANTIR periodically attests the service and infrastructure’s components for signs of compromise by implementing the Trusted Computing paradigm. Verification addresses the firmware, OS and software using UEFI measured boot and Linux Integrity Measurement Architecture, extended to support containerised application attestation. Mitigation actions are supervised by the Recovery Service and the Security Orchestrator based on OSM to, respectively, determine the adequate remediation actions from a recovery policy and enforce them down to the lower layers of the infrastructure through local authenticated enablers. We detail an implementation prototype serving a baseline for quantitative evaluation of our work
    corecore