32 research outputs found

    Face to Face with the Natural Environment: A Look at African Literature

    Get PDF
    Human impact on natural environment has seriously increased over the last few centuries. However, it is only from the mid-twentieth century that a greater sensitivity has developed around environmental problems. With an eye on the development of the African environmentalism, the paper considers the reaction of some African writers and their efforts towards the conservation of physical environment and climate change through their literary works as narrative and poetry genres

    Face to Face with the Natural Environment: A Look at African Literature

    Get PDF
    Human impact on natural environment has seriously increased over the last few centuries. However, it is only from the mid-twentieth century that a greater sensitivity has developed around environmental problems. With an eye on the development of the African environmentalism, the paper considers the reaction of some African writers and their efforts towards the conservation of physical environment and climate change through their literary works as narrative and poetry genres

    Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD

    Get PDF
    Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by ‘open networks’, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings

    Attack-Surface Metrics, OSSTMM and Common Criteria Based Approach to “Composable Security” in Complex Systems

    Get PDF
    In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual elements that constitute the system itself. This problem is particularly important in the “SMART” environments, where the huge number of devices, their significant computational capabilities as well as their tight interconnection produce a complex architecture for which it is difficult to predict (and control) a desired behavior; furthermore, if the scenario is allowed to dynamically evolve through the modification of both topology and subsystems composition, then the control problem becomes a real challenge. In this perspective, the purpose of this paper is to cope with a specific class of control problems in complex systems, the “composability of security functionalities”, recently introduced by the European Funded research through the pSHIELD and nSHIELD projects (ARTEMIS-JU programme). In a nutshell, the objective of this research is to define a control framework that, given a target security level for a specific application scenario, is able to i) discover the system elements, ii) quantify the security level of each element as well as its contribution to the security of the overall system, and iii) compute the control action to be applied on such elements to reach the security target. The main innovations proposed by the authors are: i) the definition of a comprehensive methodology to quantify the security of a generic system independently from the technology and the environment and ii) the integration of the derived metrics into a closed-loop scheme that allows real-time control of the system. The solution described in this work moves from the proof-of-concepts performed in the early phase of the pSHIELD research and enrich es it through an innovative metric with a sound foundation, able to potentially cope with any kind of pplication scenarios (railways, automotive, manufacturing, ...)

    WEIRD – Real Use Cases and Applications for the WiMAX Technology

    Get PDF
    IEEE 802.16/WiMAX is one of the most promising technologies for Broadband Wireless Access, both for fixed and mobile use. This paper presents the structure of some testbeds, set up in the framework of the European project WEIRD, about novel applications running on top of a WiMAX-based end-to-end architecture. The presented testbeds are based on real use case scenarios, including monitoring of impervious areas, tele-medicine and tele-hospitalization

    Control architecture to provide E2E security in interconnected systems: the (new) SHIELD approach

    Get PDF
    Modern Systems are usually obtained as incremental composition of proper (smaller and SMART) subsystems interacting through communication interfaces. Such flexible architecture allows the pervasive provisioning of a wide class of services, ranging from multimedia contents delivery, through monitoring data collection, to command and control functionalities. All these services requires that the adequate level of robustness and security is assured at End-to- End (E2E) level, according to user requirements that may vary depending on the specific context or the involved technologies. A flexible methodology to dynamically control the security level of the service being offered is then needed. In this perspective, the authors propose an innovative control architecture able to assure E2E security potentially in any application, by dynamically adapting to the underlying systems and using its resources to “build the security”. In particular, the main novelties of this solution are: i) the possibility of dynamically discovering and composing the available functionalities offered by the environment to satisfy the security needs and ii) the possibility of modelling and measuring the security through innovative technology-independent metrics. The results presented in this paper moves from the solutions identified in the pSHIELD project and enrich them with the innovative advances achieved through the nSHIELD research, still ongoing. Both projects have been funded by ARTEMIS-JU

    WEIRD Testbeds with Fixed and Mobile WiMAX Technology for User Applications, Telemedicine and Monitoring of Impervious Areas

    Get PDF
    Wireless Metropolitan Area Networks based on IEEE 802.16d/e standards are soon to be deployed in several countries. However, there is lack of published literature with results from actual test¬beds. This paper introduces the work done in the EU Sixth Framework Programme Project WEIRD to design and set up WiMAX testbeds in four EU countries. We describe the method¬ology followed, detail our implementation and present results from the testbeds, as deployed in the first phase of WEIRD. The testbeds are used to demonstrate how WiMAX technology can be used to extend the connectivity of the pan-European data com¬munications network (GEANT2) to isolated and impervious ar¬eas and, furthermore, to assure end-to-end quality of service to novel applications.SIGARCH, Create-NetPublishedInnsbruck, Austria1.4. TTC - Sorveglianza sismologica delle aree vulcaniche attiveope

    WEIRD Testbeds with Fixed and Mobile WiMAX Technology for User Applications, Telemedicine and Monitoring of Impervious Areas

    Get PDF
    Wireless Metropolitan Area Networks based on IEEE 802.16d/e standards are soon to be deployed in several countries. However, there is lack of published literature with results from actual test¬beds. This paper introduces the work done in the EU Sixth Framework Programme Project WEIRD to design and set up WiMAX testbeds in four EU countries. We describe the method¬ology followed, detail our implementation and present results from the testbeds, as deployed in the first phase of WEIRD. The testbeds are used to demonstrate how WiMAX technology can be used to extend the connectivity of the pan-European data com¬munications network (GEANT2) to isolated and impervious ar¬eas and, furthermore, to assure end-to-end quality of service to novel applications
    corecore