581 research outputs found
Hospice Palliative Home Care in Canada: A Progress Report
This report is a snapshot of hospice palliative home care services available to Canadians in 2008. The information refers only to hospice palliative care services provided in the home. Other settings where Canadians die -- in hospital, long-term care homes and hospices, and on the street -- are equally important but were not covered in this survey
Viewpoint | Personal Data and the Internet of Things: It is time to care about digital provenance
The Internet of Things promises a connected environment reacting to and
addressing our every need, but based on the assumption that all of our
movements and words can be recorded and analysed to achieve this end.
Ubiquitous surveillance is also a precondition for most dystopian societies,
both real and fictional. How our personal data is processed and consumed in an
ever more connected world must imperatively be made transparent, and more
effective technical solutions than those currently on offer, to manage personal
data must urgently be investigated.Comment: 3 pages, 0 figures, preprint for Communication of the AC
CamFlow: Managed Data-sharing for Cloud Services
A model of cloud services is emerging whereby a few trusted providers manage
the underlying hardware and communications whereas many companies build on this
infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS
applications. From the start, strong isolation between cloud tenants was seen
to be of paramount importance, provided first by virtual machines (VM) and
later by containers, which share the operating system (OS) kernel. Increasingly
it is the case that applications also require facilities to effect isolation
and protection of data managed by those applications. They also require
flexible data sharing with other applications, often across the traditional
cloud-isolation boundaries; for example, when government provides many related
services for its citizens on a common platform. Similar considerations apply to
the end-users of applications. But in particular, the incorporation of cloud
services within `Internet of Things' architectures is driving the requirements
for both protection and cross-application data sharing.
These concerns relate to the management of data. Traditional access control
is application and principal/role specific, applied at policy enforcement
points, after which there is no subsequent control over where data flows; a
crucial issue once data has left its owner's control by cloud-hosted
applications and within cloud-services. Information Flow Control (IFC), in
addition, offers system-wide, end-to-end, flow control based on the properties
of the data. We discuss the potential of cloud-deployed IFC for enforcing
owners' dataflow policy with regard to protection and sharing, as well as
safeguarding against malicious or buggy software. In addition, the audit log
associated with IFC provides transparency, giving configurable system-wide
visibility over data flows. [...]Comment: 14 pages, 8 figure
Measuring galaxy [OII] emission line doublet with future ground-based wide-field spectroscopic surveys
The next generation of wide-field spectroscopic redshift surveys will map the
large-scale galaxy distribution in the redshift range 0.7< z<2 to measure
baryonic acoustic oscillations (BAO). The primary optical signature used in
this redshift range comes from the [OII] emission line doublet, which provides
a unique redshift identification that can minimize confusion with other single
emission lines. To derive the required spectrograph resolution for these
redshift surveys, we simulate observations of the [OII] (3727,3729) doublet for
various instrument resolutions, and line velocities. We foresee two strategies
about the choice of the resolution for future spectrographs for BAO surveys.
For bright [OII] emitter surveys ([OII] flux ~30.10^{-17} erg /cm2/s like
SDSS-IV/eBOSS), a resolution of R~3300 allows the separation of 90 percent of
the doublets. The impact of the sky lines on the completeness in redshift is
less than 6 percent. For faint [OII] emitter surveys ([OII] flux ~10.10^{-17}
erg /cm2/s like DESi), the detection improves continuously with resolution, so
we recommend the highest possible resolution, the limit being given by the
number of pixels (4k by 4k) on the detector and the number of spectroscopic
channels (2 or 3).Comment: 5 pages, 1 figur
Inculturation, concept sociothéologique : essai de clarification et prospective
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal
Recommended from our members
Twenty security considerations for cloud-supported Internet of Things
To realise the broad vision of pervasive computing,
underpinned by the “Internet of Things” (IoT), it is essential to
break down application and technology-based silos and support
broad connectivity and data sharing; the cloud being a natural
enabler. Work in IoT tends towards the subsystem, often focusing
on particular technical concerns or application domains, before
offloading data to the cloud. As such, there has been little regard
given to the security, privacy and personal safety risks that arise
beyond these subsystems; that is, from the wide-scale, crossplatform
openness that cloud services bring to IoT.
In this paper we focus on security considerations for IoT from
the perspectives of cloud tenants, end-users and cloud providers,
in the context of wide-scale IoT proliferation, working across
the range of IoT technologies (be they things or entire IoT
subsystems). Our contribution is to analyse the current state of
cloud-supported IoT to make explicit the security considerations
that require further work.This work was supported by UK Engineering and Physical Sciences
Research Council grant EP/K011510 CloudSafetyNet:
End-to-End Application Security in the Cloud and Microsoft
through the Microsoft Cloud Computing Research Centre
- …