247,015 research outputs found
Security and Privacy Issues of Big Data
This chapter revises the most important aspects in how computing
infrastructures should be configured and intelligently managed to fulfill the
most notably security aspects required by Big Data applications. One of them is
privacy. It is a pertinent aspect to be addressed because users share more and
more personal data and content through their devices and computers to social
networks and public clouds. So, a secure framework to social networks is a very
hot topic research. This last topic is addressed in one of the two sections of
the current chapter with case studies. In addition, the traditional mechanisms
to support security such as firewalls and demilitarized zones are not suitable
to be applied in computing systems to support Big Data. SDN is an emergent
management solution that could become a convenient mechanism to implement
security in Big Data systems, as we show through a second case study at the end
of the chapter. This also discusses current relevant work and identifies open
issues.Comment: In book Handbook of Research on Trends and Future Directions in Big
Data and Web Intelligence, IGI Global, 201
Recommended from our members
Biological Security Education Handbook: The Power of Team-Based Learning.
yesIntroduction
Combining Contents with Strategy: A Case for Team-Based Learning.
The term "biosecurity‟ has been used in many different contexts for many different purposes.
The present Handbook uses the concept of "biosecurity‟ (or biological security) to mean
successful minimising of the risks that the biological sciences will be deliberately or
accidentally misused in a way which causes harm for humans, animals, plants or the
environment, including through awareness and understanding of the risks. Biosecurity thus
involves a complex and rapidly evolving set of issues that concern a broad range of
stakeholders: policy makers, legislators, industry, academia, the security community, science
educators, life science students and practitioners, and the general public.1 Addressing those
issues requires continuous cooperation among all concerned parties, that is, biosecurity
awareness is a responsibility incumbent upon all.
The need for fostering awareness of biological security among those engaged in the life
sciences has been widely acknowledged in various fora and, as a result, over the past few
years a number of important initiatives have been carried out, designed to further education
about the broader social, ethical, security and legal implications of cutting-edge
biotechnology.2
The chief objective of the present Handbook is to complement those efforts
by combining teaching material in biological security with an active learning training
approach – Team-Based Learning (TBL) – to empower educators, students and practitioners
as they begin to engage with biological security. The Handbook seeks to supplement the
Guide "Preventing Biological Threats: What You Can Do‟ by providing its users with tips
and insights into how to implement its content in different educational settings. Part 5 of the
Guide introduces the reader to the value of active learning in the context of biosecurity
education and training. Chapter 20 in particular details the implementation of the TBL format
at an interactive biosecurity seminar and the results achieved by the seminar participants.
Consequently, the Handbook aims to:
i. Highlight the strengths of the TBL format in teaching biological security.
ii. Provide practical guidance on how to organise, run, and facilitate TBL biosecurity
seminars.
iii. Offer sample sets of exercises based on the individual chapters of the Guide.
iv. Explain how each set of exercises can be used for achieving specific learning
objectives.
Each chapter of the Handbook introduces the reader to a key concept discussed in the
respective chapter of the Guide and elaborates on the specific learning objectives, which the
TBL exercises are aimed at. Each set comprises Individual and Team Readiness Assurance
Test questions, and Application Exercises in the form of multiple-choice problem-solving
tasks and practical scenarios (see below).
A growing body of evidence suggests that the use of active learning approaches to teaching
and training can significantly enhance the effectiveness of education programmes.3
Part of
the reason behind this trend is the fact that active learning strategies aid the learner in
„unlocking‟ their existing knowledge and linking new subject matter to their established
conceptual framework.4
In other words, through case studies, scenarios, problem-solving
games, role plays, and simulations – to name few examples of active learning methods –
learners are prompted to think critically, reflect and develop understanding of unfamiliar
concepts. Active learning approaches allow fostering a learner-centred environment where
the learner rather than the instructor is at the centre of the activities taking place in the
classroom.5
The Handbook focuses on a specific format of active learning instruction – Team Based
Learning (TBL). This is a special form of collaborative learning which uses a specific
sequence of individual work, group work, and immediate feedback to create a motivational
framework, whereby the focus is shifted from conveying concepts by the instructor to the
application of concepts by student teams.6
TBL is an easy-to-replicate, user-friendly
approach, that can be applied in many different educational settings at various stages of
instruction, and for different purposes. It enables the instructor to cover new material in a
way that engages learners as active participants, allowing them to take ownership of their
own learning, and develop reflection and self-evaluation skills
The Paperless Letter of Credit and Related Documents of Title
A normative analysis of paperless letters of credit that will categorize the various transactions and delineate the boundaries and relative standing of the competing sets of rules is now appropriate. The analysis will suggest when an official rule is needed and what its character should be
NASA directives master list and index
This Handbook sets forth in two parts the following information for the guidance of users of the NASA Management Directives System. Part A is a master list of management directives in force as of March 31, 1993. Chapter 1 contains introductory informative material on how to use this Handbook. Chapter 2 is a complete master list of Agencywide management directives, describing each directive by type, number, effective date, expiration date, title, and organization code of the office responsible for the directive. Chapter 3 includes a consolidated numerical list of all delegations of authority and a breakdown of such delegation by the office or installation to which special authority is assigned. Chapter 4 sets forth a consolidated list of all NASA Handbooks (NHB's) and important footnotes covering the control and ordering of such documents. Chapter 5 is a consolidated list of NASA management directives applicable to the Jet Propulsion Laboratory. Chapter 6 is a consolidated list of NASA management directives published in the Code of Federal Regulations. Complementary manuals to the NASA Management Directives System are described in Chapter 7. Part B is the index to NASA management directives in force as of March 31, 1993. This part contains an in-depth alphabetical index to all NASA management directives other than Handbooks. NHB's 1610.6, 'NASA Personnel Security Handbook,' 1620.3, 'NASA Physical Security Handbook,' 1640.4, 'NASA Information Security Program,' 1900.1, 'Standards of Conduct for NASA Employees,' 5103.6, 'Source Evaluation Board Handbook,' and 7400.1, 'Budget Administration Manual,' are indexed in-depth. All other NHB's are indexed by titles only
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Nowadays, mobile banking becomes a popular tool which consumers can conduct
financial transactions such as shopping, monitoring accounts balance,
transferring funds and other payments. Consumers dependency on mobile needs,
make people take a little bit more interest in mobile banking. The use of the
one-time password which is sent to the user mobile phone by short message
service (SMS) is a vulnerability which we want to solve with proposing a new
scheme called S-Mbank. We replace the authentication using the one-time
password with the contactless smart card to prevent attackers to use the
unencrypted message which is sent to the user's mobile phone. Moreover, it
deals vulnerability of spoofer to send an SMS pretending as a bank's server.
The contactless smart card is proposed because of its flexibility and security
which easier to bring in our wallet than the common passcode generators. The
replacement of SMS-based authentication with contactless smart card removes the
vulnerability of unauthorized users to act as a legitimate user to exploit the
mobile banking user's account. Besides that, we use public-private key pair and
PIN to provide two factors authentication and mutual authentication. We use
signcryption scheme to provide the efficiency of the computation. Pair based
text authentication is also proposed for the login process as a solution to
shoulder-surfing attack. We use Scyther tool to analyze the security of
authentication protocol in S-Mbank scheme. From the proposed scheme, we are
able to provide more security protection for mobile banking service.Comment: 6 page
Communities in Action. The Handbook
Focuses on ways to enable and improve the practice of participatory design, urban design and neighbourhood regeneration
Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications
In the era when the market segment of Internet of Things (IoT) tops the chart
in various business reports, it is apparently envisioned that the field of
medicine expects to gain a large benefit from the explosion of wearables and
internet-connected sensors that surround us to acquire and communicate
unprecedented data on symptoms, medication, food intake, and daily-life
activities impacting one's health and wellness. However, IoT-driven healthcare
would have to overcome many barriers, such as: 1) There is an increasing demand
for data storage on cloud servers where the analysis of the medical big data
becomes increasingly complex, 2) The data, when communicated, are vulnerable to
security and privacy issues, 3) The communication of the continuously collected
data is not only costly but also energy hungry, 4) Operating and maintaining
the sensors directly from the cloud servers are non-trial tasks. This book
chapter defined Fog Computing in the context of medical IoT. Conceptually, Fog
Computing is a service-oriented intermediate layer in IoT, providing the
interfaces between the sensors and cloud servers for facilitating connectivity,
data transfer, and queryable local database. The centerpiece of Fog computing
is a low-power, intelligent, wireless, embedded computing node that carries out
signal conditioning and data analytics on raw data collected from wearables or
other medical sensors and offers efficient means to serve telehealth
interventions. We implemented and tested an fog computing system using the
Intel Edison and Raspberry Pi that allows acquisition, computing, storage and
communication of the various medical data such as pathological speech data of
individuals with speech disorders, Phonocardiogram (PCG) signal for heart rate
estimation, and Electrocardiogram (ECG)-based Q, R, S detection.Comment: 29 pages, 30 figures, 5 tables. Keywords: Big Data, Body Area
Network, Body Sensor Network, Edge Computing, Fog Computing, Medical
Cyberphysical Systems, Medical Internet-of-Things, Telecare, Tele-treatment,
Wearable Devices, Chapter in Handbook of Large-Scale Distributed Computing in
Smart Healthcare (2017), Springe
- …