2 research outputs found
Public Participation GIS for sustainable urban mobility planning: methods, applications and challenges
Sustainable mobility planning is a new approach to planning, and as such it requires new methods of public participation, data collection and data aggregation. In the article we present an overview of Public Participation GIS (PPGIS) methods with potential use in sustainable urban mobility planning. We present the methods using examples from two recent case studies conducted in Polish cities of Pozna艅 and 艁od藕. Sustainable urban mobility planning is a cyclical process, and each stage has different data and participatory requirements. Consequently, we situate the PPGIS methods in appropriate stages of planning, based on potential benefits they may bring into the planning process. We discuss key issues related to participant recruitment and provide guidelines for planners interested in implementing methods presented in the paper. The article outlines future research directions stressing the need for systematic case study evaluation
Secured Workstation to Process the Data of Different Classification Levels, Journal of Telecommunications and Information Technology, 2012, nr 3
The paper presents some of the results obtained within the ongoing project related with functional requirements and design models of secure workstation for special applications (SWSA). SWSA project is directed toward the combination of the existing hardware and software virtualization with cryptography and identification technologies to ensure the security of multilevel classified data by means of some formal methods. In the paper the requirements for SWSA, its hardware and software architecture, selected security solution for data processing and utilized approach to designing secure software are presented. The novel method for secure software design employs dedicated tools to verify the confidentiality and the integrity of data using Unified Modeling Language (UML) models. In general, the UML security models are embedded in and simulated with the system architecture models, thus the security problems in SWSA can be detected early during the software design. The application of UML topology models enables also to verify the fundamental requirement for MLS systems, namely the hardware isolation of subjects from different security domains