28,291 research outputs found
Towards Grid Interoperability
The Grid paradigm promises to provide global access to computing resources, data storage and experimental instruments. It also provides an elegant solution to many resource administration and provisioning problems while offering a platform for collaboration and resource sharing. Although substantial progress has been made towards these goals, nevertheless there is still a lot of work to be done until the Grid can deliver its promises. One of the central issues is the development of standards and Grid interoperability. Job execution is one of the key capabilities in all Grid environments. This is a well understood, mature area with standards and implementations. This paper describes some proof of concept experiments demonstrating the interoperability between various Grid environments
When mobility is not a choice Problematising asylum seekersâ secondary movements and their criminalisation in the EU. CEPS Paper in Liberty and Security in Europe No. 2019-11, December 2019
The notion of âsecondary movementsâ is commonly used to describe the mobility of third country
nationals for the purpose of seeking international protection in an EU member state other than the
one of first irregular entry according to the EU Dublin Regulation. Secondary movements are often
identified as a major insecurity factor undermining the sustainability of the Schengen regime and
the functioning of the EU Dublin system. Consequently, EU policies have focused on their
âcriminalisationâ, as testified by the range of sanctions included in the 2016 CEAS reform package,
and on a âpolicingâ approach, which has materialised in the expanded access to data stored in the
EURODAC database by police authorities, and its future interconnection with other EU databases
under the 2019 EU Interoperability Regulations.
This Paper shows that the EU notion of secondary movements is flawed and must be reconsidered
in any upcoming reform of the CEAS. The concept overlooks the fact that asylum seekersâ mobility
may be non-voluntary and thus cannot be understood as a matter of âfree choiceâ or in terms of
âpreferencesâ about the member state of destination. Such an understanding is based on the wrong
assumption that asylum seekersâ decisions to move to a different EU country are illegitimate, as all
EU member states are assumed to be âsafeâ for people in need of international protectio
Audit Techniques for Service Oriented Architecture Applications
The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed.Service Oriented Architecture, Audit, Quality Attributes, Interoperability, Performance, Security
Medical Cyber-Physical Systems Development: A Forensics-Driven Approach
The synthesis of technology and the medical industry has partly contributed
to the increasing interest in Medical Cyber-Physical Systems (MCPS). While
these systems provide benefits to patients and professionals, they also
introduce new attack vectors for malicious actors (e.g. financially-and/or
criminally-motivated actors). A successful breach involving a MCPS can impact
patient data and system availability. The complexity and operating requirements
of a MCPS complicates digital investigations. Coupling this information with
the potentially vast amounts of information that a MCPS produces and/or has
access to is generating discussions on, not only, how to compromise these
systems but, more importantly, how to investigate these systems. The paper
proposes the integration of forensics principles and concepts into the design
and development of a MCPS to strengthen an organization's investigative
posture. The framework sets the foundation for future research in the
refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd
International Workshop on Security, Privacy, and Trustworthiness in Medical
Cyber-Physical Systems (MedSPT 2017
- âŠ