39 research outputs found

    An Information Security Education Initiative for Engineering and Computer Science

    Get PDF
    This paper puts forward a case for an educational initiative in information security at both the undergraduate and graduate levels. Its focus is on the need for such education, the desired educational outcomes, and how the outcomes may be assessed. A basic thesis of this paper is that the goals, methods, and evaluation techniques of information and computer security are consistent with and supportive of the stated goals of engineering education and the growing movement for outcomes-based assessment in higher education

    Interoperable Credentials Management for Wholesale Banking

    Get PDF
    A gap exists between wholesale-banking business practices and security best practices: wholesale banks operate within the boundaries of contract law, while security best practices often relies upon a benevolent trusted party outside the scope of straightforward contracts. While some business domains may be able to bridge this gap, the ultra-high-value transactions used in business-to-business banking substantially increase the size of the gap. The gap becomes most apparent when regarded from the perspective of interoperability. If a single user applies the same credential to sign high-value transactions at multiple banks, then the trusted-party model becomes overly cumbersome and conflicts with an acceptable concept of liability. This paper outlines the business complexities of wholesale banking and proposes a solution called Partner Key Management (PKM). PKM technology manages the credentials required to authenticate users and sign transactions. This paper presents PKM technology by describing an interoperable protocol, requisite data structures, and an interoperable XML definition. The paper uses formal methods to demonstrate a security equivalence between revocation options within PKM against the security offered by the traditional Public Key Infrastructure (PKI), a technology that features the benevolent trusted party

    Riociguat treatment in patients with chronic thromboembolic pulmonary hypertension: Final safety data from the EXPERT registry

    Get PDF
    Objective: The soluble guanylate cyclase stimulator riociguat is approved for the treatment of adult patients with pulmonary arterial hypertension (PAH) and inoperable or persistent/recurrent chronic thromboembolic pulmonary hypertension (CTEPH) following Phase

    An atlas of the hydrographic stations off Point Sur

    Get PDF
    This atlas presents the hydrographic (CTD) data collected during the California Undercurrent (CUC) project, which spanned three years (April 1988 - April 1991) and 19 cruises. The study area consisted primarily of a transection of 22 CTD sites extending offshore from Point Sur, California, to an intersection point with California Cooperative Oceanic Fisheries Investigations (CalCoFi) line 67 and thence along that line to a point approximately 200 km offshore. The study area also included approximately 20 more CTD sites scattered in and about Monterey Bay. The CTD data are presented graphically and in tabular form for selected pressures.Fund number: MIPR 7UNPSR

    Integrating security into the curriculum

    No full text
    corecore