1,967 research outputs found

    Stream security particularities in Java

    Get PDF
    Regarding numerous threats connected with sending and storing confidential data, there is a problem of assuring the efficiency. As an answer to those needs, we discuss the SUN's Java Virtual Machine mechanism provided to assure security to a single object. Thanks to the mechanism of serialization in Java, it is possible to provide secure solution. In this paper, we compare the efficiency of algorithms such as DES, Blowfish, AES, RSA and ECC as means of securing serialization of an object

    Stream security particularities in Java

    Get PDF
    Regarding numerous threats connected with sending and storing confidential data, there is a problem of assuring the efficiency. As an answer to those needs, we discuss the SUN's Java Virtual Machine mechanism provided to assure security to a single object. Thanks to the mechanism of serialization in Java, it is possible to provide secure solution. In this paper, we compare the efficiency of algorithms such as DES, Blowfish, AES, RSA and ECC as means of securing serialization of an object

    The step project:societal and political engagement of young people in environmental issues

    Get PDF
    Decisions on environmental topics taken today are going to have long-term consequences that will affect future generations. Young people will have to live with the consequences of these decisions and undertake special responsibilities. Moreover, as tomorrow’s decision makers, they themselves should learn how to negotiate and debate issues before final decisions are made. Therefore, any participation they can have in environmental decision making processes will prove essential in developing a sustainable future for the community.However, recent data indicate that the young distance themselves from community affairs, mainly because the procedures involved are ‘wooden’, politicians’ discourse alienates the young and the whole experience is too formalized to them. Authorities are aware of this fact and try to establish communication channels to ensure transparency and use a language that speaks to new generations of citizens. This is where STEP project comes in.STEP (www.step4youth.eu) is a digital Platform (web/mobile) enabling youth Societal and Political e-Participation in decision-making procedures concerning environmental issues. STEP is enhanced with web/social media mining, gamification, machine translation, and visualisation features.Six pilots in real contexts are being organised for the deployment of the STEP solution in 4 European Countries: Italy, Spain, Greece, and Turkey. Pilots are implemented with the direct participation of one regional authority, four municipalities, and one association of municipalities, and include decision-making procedures on significant environmental questions.</p

    A Component-Based Approach for Securing Indoor Home Care Applications

    Get PDF
    eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.This work was financed under project DPI2015-68602-R (MINECO/FEDER, UE), UPV/EHU under project PPG17/56 and GV/EJ under recognized research group IT914-16

    When Politicians Talk: Assessing Online Conversational Practices of Political Parties on Twitter

    Full text link
    Assessing political conversations in social media requires a deeper understanding of the underlying practices and styles that drive these conversations. In this paper, we present a computational approach for assessing online conversational practices of political parties. Following a deductive approach, we devise a number of quantitative measures from a discussion of theoretical constructs in sociological theory. The resulting measures make different - mostly qualitative - aspects of online conversational practices amenable to computation. We evaluate our computational approach by applying it in a case study. In particular, we study online conversational practices of German politicians on Twitter during the German federal election 2013. We find that political parties share some interesting patterns of behavior, but also exhibit some unique and interesting idiosyncrasies. Our work sheds light on (i) how complex cultural phenomena such as online conversational practices are amenable to quantification and (ii) the way social media such as Twitter are utilized by political parties.Comment: 10 pages, 2 figures, 3 tables, Proc. 8th International AAAI Conference on Weblogs and Social Media (ICWSM 2014
    corecore