761 research outputs found

    Mission and Safety Critical (MASC): An EVACS simulation with nested transactions

    Get PDF
    The Extra-Vehicular Activity Control System (EVACS) Simulation with Nested Transactions, a recent effort of the MISSION Kernel Team, is documented. The EVACS simulation is a simulation of some aspects of the Extra-Vehicular Activity Control System, in particular, just the selection of communication frequencies. The simulation is a tool to explore mission and safety critical (MASC) applications. For the purpose of this effort, its current definition is quite narrow serving only as a starting point for prototyping purposes. (Note that EVACS itself has been supplanted in a larger scenario of a lunar outpost with astronauts and a lunar rover). The frequency selection scenario was modified to embed its processing in nested transactions. Again as a first step, only two aspects of transaction support were implemented in this prototype: architecture and state recovery. Issues of concurrency and distribution are yet to be addressed

    A Detailed Comparison of UML and OWL

    Full text link
    As models and ontologies assume an increasingly central role in software and information systems engineering, the question of how exactly they compare and how they can sensibly be used together assumes growing importance. However, no study to date has systematically and comprehensively compared the two technology spaces, and a large variety of different bridging and integration ideas have been proposed in recent years without any detailed analysis of whether they are sound or useful. In this paper, we address this problem by providing a detailed and comprehensive comparison of the two technology spaces in terms of their flagship languages – UML and OWL – each a de facto and de jure standard in its respective space. To fully analyze the end user experience, we perform the comparison at two levels – one considering the underlying boundary assumptions and philosophy adopted by each language and the other considering their detailed features. We also consider all relevant auxiliary languages such as OCL. The resulting comparison clarifies the relationship between the two technologies and provides a solid foundation for deciding how to use them together or integrate them

    Just ‘students, old timers, and sammies’? Exploring the role of stewards and private matchday security in the plural policing of Scottish football

    Get PDF
    Football clubs in Scotland employ stewards to help to provide a safe and enjoyable matchday experience for spectators. However, stewarding at football matches in Scotland has recently been subject to criticism, particularly in regard to the professionalism of stewards. This article makes an original contribution to scholarship by exploring the role of stewards and private matchday security in Scottish football, drawing upon qualitative data from interviews with 35 participants who have a professional or personal interest in stewarding and the provision of safety and security at football events. The analysis traces the rise of stewarding in Scottish football, noting both challenges and improvements in event safety. Conceptually, we refract this rise, and the concomitant decline in policing resources, through the lens of plural policing, arguing that the policing of football events in Scotland represents a paradigm example of this shift within a reconfiguring field of policing provision and security governance

    Cyber-security internals of a Skoda Octavia vRS:a hands on approach

    Get PDF
    The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can be life-critical (e.g. breaking, acceleration, cruise control, emergency communication, etc. . . ). As vehicular technology advances, in-vehicle networks are connected to external networks through 3 and 4G mobile networks, enabling manufacturer and customer monitoring of different aspects of the car. While these services provide valuable information, they also increase the attack surface of the vehicle, and can enable long and short range attacks. In this manuscript, we evaluate the security of the 2017 Skoda Octavia vRS 4x4. Both physical and remote attacks are considered, the key fob rolling code is successfully compromised, privacy attacks are demonstrated through the infotainment system, the Volkswagen Transport Protocol 2.0 is reverse engineered. Additionally, in-car attacks are highlighted and described, providing an overlook of potentially deadly threats by modifying ECU parameters and components enabling digital forensics investigation are identified

    Still an 'invisible crime'? Exploring developments in the awareness and control of human trafficking in Scotland

    Get PDF
    In 2010 Korin Lebov published her article ‘Human trafficking in Scotland’, a state-of-the-field piece that reported on the nature and extent of human trafficking and the challenges in tackling this issue. Several important developments have occurred in the period since, including new enforcement measures, the first prosecutions and convictions for human trafficking in Scottish courts, the establishment of a dedicated policing unit within Scotland’s new police service to tackle such crimes, the passage of specific human trafficking legislation through the Scottish Parliament, and, as a direct result of this legislation, the publication of a bespoke strategy by the Scottish Government to take action against human trafficking and support victims. This article draws upon the findings of a qualitative research study exploring the community impact of organized crime in Scotland and, in doing so, refracts advances in both public awareness of human trafficking and the policing response to this issue through the analytical prism of ‘invisible crimes’. Ultimately, it traces the path of human trafficking from a peripheral and largely ‘invisible’ phenomenon to becoming a core issue of concern in Scotland’s policing and community safety landscape.Output Status: Forthcoming/Available Onlin
    • …
    corecore