28 research outputs found
Legal issues in clouds: towards a risk inventory.
Cloud computing technologies have reached a high level of development, yet a number of obstacles still exist that must be overcome before widespread commercial adoption can become a reality. In a cloud environment, end users requesting services and cloud providers negotiate service-level agreements (SLAs) that provide explicit statements of all expectations and obligations of the participants. If cloud computing is to experience widespread commercial adoption, then incorporating risk assessment techniques is essential during SLA negotiation and service operation. This article focuses on the legal issues surrounding risk assessment in cloud computing. Specifically, it analyses risk regarding data protection and security, and presents the requirements of an inherent risk inventory. The usefulness of such a risk inventory is described in the context of the OPTIMIS project
[Paroxysmal atrial fibrillation: study of the pattern of onset using dynamic electrocardiography]
We have examined 24 hours ECG Holter recordings of 22 patients without any organic heart disease and with recurrent episodes of paroxysmal atrial fibrillation (PAF) to check the possible sympatho-vagal influence on spontaneous initiation. Patients were divided into 3 groups according to average heart rate (HR) during the 24 hours recording and to the mode of onset of the arrhythmia: sympathetic (only diurnal episodes, HR greater than or equal to 75 b/min before the onset of the episode, average 24 hours HR greater than or equal to 80 b/min, progressive or sudden shortening of sinusal cycle before the onset), vagal (only nocturnal episodes, HR less than or equal to 60 b/min before the onset, average 24 hours HR less than or equal to 60 b/min, progressive or sudden lengthening of sinusal cycle before the onset of the episode) or "others" who did not show the aforementioned characteristics
[Electrocardiographic, clinical and prognostic evaluation of sustained ventricular tachycardia in acute and chronic ischemic heart disease]
We retrospectively evaluated 48 patients with sustained ventricular tachycardia (STV), in whom a 12 lead ECG had been recorded during arrhythmia, considering two groups: pts. with acute or subacute myocardial infarction (MI group = 15 pts.) and pts. with chronic post infarction ischemic heart disease (CPIIHD group = 33 pts.). The electrocardiographic patterns in the basal ECG and during SVT (16 SVT in the MI group, 40 in the CPIIHD group) as well as the in-hospital and long-term prognosis were evaluated. The two groups were comparable as far as mean age, site of acute or previous infarction, and baseline ECG parameters are concerned. QTc values greater than 440 msec were present in 64.5% of the cases. The ECG recording during SVT showed longer duration of QRS in CPIIHD group (171 +/- 39 msec) versus MI group (140 +/- 25 msec) (p less than 0.005). In comparison to basal ECG, Q waves in the SVT recording were in the same site (47.2%) or in a wider site (38.1%), rarely (10.9% of the cases) there was a discordance between the two tracings. In-hospital mortality was 40% (6/15 pts.) in MI group, related to severe hemodynamic impairment, 15.1% (5/33 pts.) in CPIIHD group. During the follow-up (mean 38.4 months) survival in CPIIHD group was 89.3% at 12 months, in MI group 88.9% at 12 months. In CPIIHD patients SVT was recurrent in 60.6% of the cases.(ABSTRACT TRUNCATED AT 250 WORDS
Electric Power System Anomaly Detection Using Neural Networks
Wellington, New Zealand, Lecture Notes in Artificial Intelligenc
Social and Cyber Factors Interacting over the Infrastructures: A MAS Framework for Security Analysis
Critical infrastructures are usually characterized by a network structure in which many technical devices interact on a physical layer, being monitored and controlled throughout a cyber network in charge of conveying commands/measurements from/to the decision making centers run by the human decision makers or automatic controllers at the top of this complex system. This chapter presents a general framework for the analysis of the security of critical infrastructures in terms of three different interacting layers: the physical layer, the cyber layer, and the decision-making layer. In this framework a multi-agent system is introduced to model the interaction of the various players, and the analysis of the security control against natural failures or malicious attacks is conceptually discussed with reference to the interconnected power systems. With each layer is associated a set of metrics able to characterize the layer with respect to its operation and security and that can account for the interactions among the various layers. In this chapter we will show a possible application for the quantitative assessment of the impact of information in system security, by comparing different information scenarios and then identifying and ranking the most critical information. The aim of the framework is to provide a comprehensive viewpoint of the system robustness or security which takes into account not only physical operation but also the cyber and social (organizational and human) factors to support better security analysis for critical infrastructure