915 research outputs found

    Context-aware Authorization in Highly Dynamic Environments

    Get PDF
    Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context in the authorization subsystem can improve security, and how this new access control applies to interaction patterns, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS), in smart home security

    Outil d’aide à la décision pour élus communaux VS-OADE

    Get PDF
    La Fondation pour Développement Durable des régions de Montagne (FDDM) par M. Eric Nanchen et le professeur Jean-Pierre Rey m’ont demandé de réaliser un programme d’aide à la décision pour les élus communaux. Au cours de ce travail, une première phase de recherches et analyses a été réalisée pour déterminer les technologies et les architectures Web les plus adaptées pour ce projet, tout en tenant compte d’une possible intégration future de l’outil dans les systèmes d’information des communes. Une recherche sur les possibilités d’hébergement de l’outil et le stockage des données a également été effectuée durant cette phase. Dans une seconde phase, les environnements de développement ont été analysés et celui qui semblait le plus adapté pour ce travail a été mis en place dans l’optique de développer au mieux l’outil. Cette phase a été utile pour développer l’application localement en simulant une infrastructure Client-Serveur. Cette dernière peut facilement être configurée et mise en place pour l’utilisation de l’outil par la suite

    Recent Biotechnological Advances in the Improvement of Cassava

    Get PDF
    Cassava (Manihot esculenta Crantz) is the fourth most important source of carbohydrates for human consumption in the tropics and thus occupies a uniquely important position as a food security crop for smallholder farmers. Consequently, cassava improvement is of high priority to most national agricultural research institutions in the tropics. With advances in functional genomics and genome editing approaches in this post genomics era, there are unprecedented opportunities and potential to accelerate the improvement of this important crop. These new technologies will need to be directed toward addressing major cassava production constraints, notably virus resistance, protein content, tolerance to drought and reduction of hydrogen cyanide content. Here, we discuss the important role novel functional genomics and genome editing technologies have and will continue to play in cassava improvement efforts. These approaches, including artificial miRNA (amiRNA), trans-acting small interfering RNA (tasiRNA), clustered regularly interspaced short palindromic repeat (CRISPR)-associated protein 9 (Cas9), and Targeting Induced Local Lesions IN Genomes (TILLING), have been shown to be effective in addressing major crop production constraints. In addition to reviewing specific applications of these technologies in cassava improvement, this chapter discusses specific examples being deployed in the amelioration of cassava or of other crops that could be applied to cassava in future

    The Importance of Being Hybrid for Spatial Epidemic Models: A Multi-Scale Approach

    Get PDF
    International audienceThis work addresses the spread of a disease within an urban system, defined as a network of interconnected cities. The first step consists of comparing two different approaches: a macroscopic one, based on a system of coupled Ordinary Differential Equations (ODE) Susceptible-Infected-Recovered (SIR) systems exploiting populations on nodes and flows on edges (so-called metapopulational model), and a hybrid one, coupling ODE SIR systems on nodes and agents traveling on edges. Under homogeneous conditions (mean field approximation), this comparison leads to similar results on the outputs on which we focus (the maximum intensity of the epidemic, its duration and the time of the epidemic peak). However, when it comes to setting up epidemic control strategies, results rapidly diverge between the two approaches, and it appears that the full macroscopic model is not completely adapted to these questions. In this paper, we focus on some control strategies, which are quarantine, avoidance and risk culture, to explore the differences, advantages and disadvantages of the two models and discuss the importance of being hybrid when modeling and simulating epidemic spread at the level of a whole urban system

    Context-sensitive authorization for asynchronous communications

    Get PDF
    Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, especially in the case of asynchronous communications, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS)

    Context-Sensitive Authorization in Interaction Patterns

    Get PDF
    Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trust users once they have authenticated, despite the fact that they may reach unauthorized situations. We analyse how dynamic information can be used to improve security in the authorization process, and what are the implications when applied to interaction patterns. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS)
    • …
    corecore