20,284 research outputs found

    Secure Position-Based Routing for VANETs

    Get PDF
    Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable

    Transit, Transition Excavating J641 VUJ.

    Get PDF
    In July 2006 archaeologists from the University of Bristol and Atkins Heritage embarked on a contemporary archaeology project with a difference. We ‘excavated’ an old (1991) Ford Transit van, used by archaeologists and later by works and maintenance teams at the Ironbridge Museum. The object: to see what can be learnt from a very particular, common and characteristic type of contemporary place; to establish what archaeologists and archaeology can contribute to understanding the way society, and specifically we as archaeologists, use and inhabit these places; and to challenge and critique archaeologies of the contemporary past. In this report we describe our excavation and situate it within a wider debate about research practice in contemporary archaeology

    Quality Program Provisions for Aeronautical and Space System Contractors

    Get PDF
    This publication sets forth quality program requirements for NASA aeronautical and space programs, systems, subsystems, and related services. These requirements provide for the effective operation of a quality program which ensures that quality criteria and requirements are recognized, definitized, and performed satisfactorily

    Web Auctions in Europe

    Get PDF
    This paper argues that a better understanding of the business model of web auctions can be reached if we adopt a broader view and provide empirical research from different sites. In this paper the business model of web auctions is refined into four dimensions. These are auction model, motives, exchange processes, and stakeholders. One of the objects of this research is to redefine the blurry concept of the business model by analyzing one business model, the web auction model. We show in this research the complexity and diversity of factors contributing to the success of the web auction model. By generalizing the results to the level of business model we also show how complex and diverse business models can be. Motivated by the lack of empirically grounded justification for the mixed business results of web auctions, this paper adopts a qualitative approach that includes telephone interviews with web auctions developed in different European countries.exchange processes;stakeholders;Web auctions

    Financing Marine Conservation: A Menu of Options

    Get PDF
    This guide describes over 30 mechanisms for financing the conservation of marine biodiversity, both within and outside of MPAs. Its main purpose is to familiarize conservation professionals i.e., the managers and staff of government conservation agencies, international donors, and nongovernmental organizations (NGOs) with a menu of options for financing the conservation of marine and coastal biodiversity. A number of economic incentive mechanisms for marine conservation (as contrasted with revenue-raising mechanisms) are also presented in section 5 (on Real Estate and Development Rights) and section 6 (on Fishing Industry Revenues). Each section provides a description of the financing mechanism and examples showing how the mechanism has been used to finance marine conservation. In some cases, even though a mechanism may have only been used to finance terrestrial conservation, it has been included in this guide because of its potential to also serve as a new source of funding for marine conservation. This guide is not intended to provide detailed instructions on how to establish and implement each of the different conservation financing mechanisms. Instead references are provided at the end of each section for sources of additional information about each of the mechanisms described. Citations to specific references are also included in the text in parentheses

    "On the Road" - Reflections on the Security of Vehicular Communication Systems

    Get PDF
    Vehicular communication (VC) systems have recently drawn the attention of industry, authorities, and academia. A consensus on the need to secure VC systems and protect the privacy of their users led to concerted efforts to design security architectures. Interestingly, the results different project contributed thus far bear extensive similarities in terms of objectives and mechanisms. As a result, this appears to be an auspicious time for setting the corner-stone of trustworthy VC systems. Nonetheless, there is a considerable distance to cover till their deployment. This paper ponders on the road ahead. First, it presents a distillation of the state of the art, covering the perceived threat model, security requirements, and basic secure VC system components. Then, it dissects predominant assumptions and design choices and considers alternatives. Under the prism of what is necessary to render secure VC systems practical, and given possible non-technical influences, the paper attempts to chart the landscape towards the deployment of secure VC systems
    • 

    corecore