28,291 research outputs found

    Towards Grid Interoperability

    No full text
    The Grid paradigm promises to provide global access to computing resources, data storage and experimental instruments. It also provides an elegant solution to many resource administration and provisioning problems while offering a platform for collaboration and resource sharing. Although substantial progress has been made towards these goals, nevertheless there is still a lot of work to be done until the Grid can deliver its promises. One of the central issues is the development of standards and Grid interoperability. Job execution is one of the key capabilities in all Grid environments. This is a well understood, mature area with standards and implementations. This paper describes some proof of concept experiments demonstrating the interoperability between various Grid environments

    When mobility is not a choice Problematising asylum seekers’ secondary movements and their criminalisation in the EU. CEPS Paper in Liberty and Security in Europe No. 2019-11, December 2019

    Get PDF
    The notion of ‘secondary movements’ is commonly used to describe the mobility of third country nationals for the purpose of seeking international protection in an EU member state other than the one of first irregular entry according to the EU Dublin Regulation. Secondary movements are often identified as a major insecurity factor undermining the sustainability of the Schengen regime and the functioning of the EU Dublin system. Consequently, EU policies have focused on their ‘criminalisation’, as testified by the range of sanctions included in the 2016 CEAS reform package, and on a ‘policing’ approach, which has materialised in the expanded access to data stored in the EURODAC database by police authorities, and its future interconnection with other EU databases under the 2019 EU Interoperability Regulations. This Paper shows that the EU notion of secondary movements is flawed and must be reconsidered in any upcoming reform of the CEAS. The concept overlooks the fact that asylum seekers’ mobility may be non-voluntary and thus cannot be understood as a matter of ‘free choice’ or in terms of ‘preferences’ about the member state of destination. Such an understanding is based on the wrong assumption that asylum seekers’ decisions to move to a different EU country are illegitimate, as all EU member states are assumed to be ‘safe’ for people in need of international protectio

    Technical principles for institutional technologies

    Get PDF

    Audit Techniques for Service Oriented Architecture Applications

    Get PDF
    The Service Oriented Architecture (SOA) approach enables the development of flexible distributed applications. Auditing such applications implies several specific challenges related to interoperability, performance and security. The service oriented architecture model is described and the advantages of this approach are analyzed. We also highlight several quality attributes and potential risks in SOA applications that an architect should be aware when designing a distributed system. Key risk factors are identified and a model for risk evaluation is introduced. The top reasons for auditing SOA applications are presented as well as the most important standards. The steps for a successful audit process are given and discussed.Service Oriented Architecture, Audit, Quality Attributes, Interoperability, Performance, Security

    Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Full text link
    The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system availability. The complexity and operating requirements of a MCPS complicates digital investigations. Coupling this information with the potentially vast amounts of information that a MCPS produces and/or has access to is generating discussions on, not only, how to compromise these systems but, more importantly, how to investigate these systems. The paper proposes the integration of forensics principles and concepts into the design and development of a MCPS to strengthen an organization's investigative posture. The framework sets the foundation for future research in the refinement of specific solutions for MCPS investigations.Comment: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017
    • 

    corecore