20,284 research outputs found
Secure Position-Based Routing for VANETs
Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable
Transit, Transition Excavating J641 VUJ.
In July 2006 archaeologists from the University of Bristol and Atkins Heritage embarked on a contemporary archaeology project with a difference. We âexcavatedâ an old (1991) Ford Transit van, used by archaeologists and later by works and maintenance teams at the Ironbridge Museum. The object: to see what can be learnt from a very particular, common and characteristic type of contemporary place; to establish what archaeologists and archaeology can contribute to understanding the way society, and specifically we as archaeologists, use and inhabit these places; and to challenge and critique archaeologies of the contemporary past. In this report we describe our excavation and situate it within a wider debate about research practice in contemporary archaeology
Quality Program Provisions for Aeronautical and Space System Contractors
This publication sets forth quality program requirements for NASA aeronautical and space programs, systems, subsystems, and related services. These requirements provide for the effective operation of a quality program which ensures that quality criteria and requirements are recognized, definitized, and performed satisfactorily
Web Auctions in Europe
This paper argues that a better understanding of the business model of web auctions can be reached if we adopt a broader view and provide empirical research from different sites. In this paper the business model of web auctions is refined into four dimensions. These are auction model, motives, exchange processes, and stakeholders. One of the objects of this research is to redefine the blurry concept of the business model by analyzing one business model, the web auction model. We show in this research the complexity and diversity of factors contributing to the success of the web auction model. By generalizing the results to the level of business model we also show how complex and diverse business models can be. Motivated by the lack of empirically grounded justification for the mixed business results of web auctions, this paper adopts a qualitative approach that includes telephone interviews with web auctions developed in different European countries.exchange processes;stakeholders;Web auctions
Financing Marine Conservation: A Menu of Options
This guide describes over 30 mechanisms for financing the conservation of marine biodiversity, both within and outside of MPAs. Its main purpose is to familiarize conservation professionals i.e., the managers and staff of government conservation agencies, international donors, and nongovernmental organizations (NGOs) with a menu of options for financing the conservation of marine and coastal biodiversity. A number of economic incentive mechanisms for marine conservation (as contrasted with revenue-raising mechanisms) are also presented in section 5 (on Real Estate and Development Rights) and section 6 (on Fishing Industry Revenues). Each section provides a description of the financing mechanism and examples showing how the mechanism has been used to finance marine conservation. In some cases, even though a mechanism may have only been used to finance terrestrial conservation, it has been included in this guide because of its potential to also serve as a new source of funding for marine conservation. This guide is not intended to provide detailed instructions on how to establish and implement each of the different conservation financing mechanisms. Instead references are provided at the end of each section for sources of additional information about each of the mechanisms described. Citations to specific references are also included in the text in parentheses
"On the Road" - Reflections on the Security of Vehicular Communication Systems
Vehicular communication (VC) systems have recently drawn the attention of
industry, authorities, and academia. A consensus on the need to secure VC
systems and protect the privacy of their users led to concerted efforts to
design security architectures. Interestingly, the results different project
contributed thus far bear extensive similarities in terms of objectives and
mechanisms. As a result, this appears to be an auspicious time for setting the
corner-stone of trustworthy VC systems. Nonetheless, there is a considerable
distance to cover till their deployment. This paper ponders on the road ahead.
First, it presents a distillation of the state of the art, covering the
perceived threat model, security requirements, and basic secure VC system
components. Then, it dissects predominant assumptions and design choices and
considers alternatives. Under the prism of what is necessary to render secure
VC systems practical, and given possible non-technical influences, the paper
attempts to chart the landscape towards the deployment of secure VC systems
- âŠ