48 research outputs found

    Book reports

    Get PDF

    Cryptography and its application to operating system security

    Get PDF
    Not provided

    Supervision Report 2020

    Get PDF

    Internet of Things 2.0: Concepts, Applications, and Future Directions

    Full text link
    Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for Internet of Things 2.0. The Internet of Things 2.0 development is discussed across seven major fields. These fields are machine learning intelligence, mission critical communication, scalability, energy harvesting-based energy sustainability, interoperability, user friendly IoT, and security. Other than these major fields, the architectural development of the Internet of Things and major types of applications are also reviewed. Finally, this article ends with the vision and current limitations of the Internet of Things in future network environments

    Security analysis of a basis-independent scheme for quantum cryptography

    Get PDF
    Master'sMASTER OF SCIENC

    SIP Draft Specification

    Get PDF
    A Submission Information Package (SIP) is defined in the OAIS standard1 as an Information Package that is delivered by the Producer to the OAIS for use in the construction or update of one or more AIPs and/or the associated Descriptive Information. Many different SIP formats are used all over the world and unfortunately there is currently no central format for a SIP which would cover all individual national and business needs identified in the E-ARK Report on Available Best Practices. Therefore, the main objective of this report is to describe a draft SIP specification for the E-ARK project – give an overview of the structure and main metadata elements for E-ARK SIP and provide initial input for the technical implementations of E-ARK ingest tools. The target group of this work are E-ARK project partners as well as all other archival institutions and software providers creating or updating their SIP format specifications. This report provides an overview of: • The general structure for submission information packages. This report explains how the E-ARK SIP is constructed by following the common rules for all other (archival, dissemination) information packages. • The SIP METS Profile. We provide a detailed overview of metadata sections and the metadata elements in these sections. The table with all metadata elements could possibly be of interest to technical stakeholders who wish to continue with the more detailed work of the E-ARK SIP implementation later. Two examples with different kinds of content (MoReq2010, SIARD-E) following the common structure for EARK submission information package can be found in the appendixes to this report

    Tailored Information Security Strategies for Financial Services Companies in Nigeria

    Get PDF
    Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes to include the need to align information security plans of actions with corporate strategies, ensuring there are information security policies, processes, and procedures to guide disciplined efforts for information risk mitigation. A comprehensive risk management process can be used to determine information security strategies to ensure all risk areas are covered. This study may contribute to positive social change when a much more significant percentage of the Nigerian public use financial services because institutions adopt strategies to protect confidentiality, integrity, and availability of information

    Exploring patterns of diagenesis in ancient proteins

    Get PDF
    Palaeoproteomics is a rapidly growing field of research that involves applying mass spectrometry to objects of archaeological and palaeontological interest in order to gain insight into the past. However, due to a lack of clear authentication criteria and understanding of the biomolecular characteristics of ancient proteins, there are suspicions about many remarkable results. This is of particular importance, as many samples are derived from museum collections, which may have been exposed to contamination, or had contaminants added as part of past conservation treatments. This thesis aims to (a) investigate the diagenetic forces acting on ancient proteins by quantifying the patterns of degradation in truly ancient proteins, and (b) use this knowledge in order to develop tools to authenticate results. This thesis develops a novel tool, deamiDATE 1.0, for the authentication of ancient proteins using site-specific deamidation. This is relatively effective in broadly differentiating between modern and ancient proteins (with a focus on structural (collagen) and dietary (milk) proteins). Analysis of site-specific deamidation in ancient milk proteins reveals that although there is a modest trend of increasing deamidation over time, the deamidation of milk proteomes in the archaeological record is hugely variable. Therefore, other lines of evidence are recommended in order to assess the authenticity of low abundance proteins. Lastly, the patterns of collagen degradation in parchment are elucidated, showing that there is a region of the collagen structure that is a hotspot for hydrolysis. Taken together, the results of this thesis represent a novel contribution to the understanding of the diagenetic forces that act on proteins through time, and how to reliably authenticate proteomics data

    Strategies to Improve Minority Business Enterprises’ Access to Capital for Competitive Positioning and Profitability

    Get PDF
    Some minority business enterprises (MBEs) have limited capital for setting up their businesses, which often leads to business failure. Grounded in entrepreneurship theory, the purpose of this qualitative multiple-case study was to explore strategies MBEs used to access capital to improve their competitive positioning and profitability. The participants were six MBE owners from Alabama who demonstrated success at maintaining and securing working capital to maintain a profitable business for a minimum of 5 years. Data were collected from semistructured interviews and reviews of organization documents and websites. Using Yin’s five-step data analysis process, four themes emerged: owner financing, government loans and grants, financial literacy and credit risk, and family and friends. A key recommendation for MBE owners is to establish worthwhile credit scorecards. The implications for positive social change help MBEs survive, thereby increasing the tax base, and employment in the community in which they operate

    Strategies to Improve Minority Business Enterprises’ Access to Capital for Competitive Positioning and Profitability

    Get PDF
    Some minority business enterprises (MBEs) have limited capital for setting up their businesses, which often leads to business failure. Grounded in entrepreneurship theory, the purpose of this qualitative multiple-case study was to explore strategies MBEs used to access capital to improve their competitive positioning and profitability. The participants were six MBE owners from Alabama who demonstrated success at maintaining and securing working capital to maintain a profitable business for a minimum of 5 years. Data were collected from semistructured interviews and reviews of organization documents and websites. Using Yin’s five-step data analysis process, four themes emerged: owner financing, government loans and grants, financial literacy and credit risk, and family and friends. A key recommendation for MBE owners is to establish worthwhile credit scorecards. The implications for positive social change help MBEs survive, thereby increasing the tax base, and employment in the community in which they operate
    corecore