179 research outputs found

    ECHO Information sharing models

    Get PDF
    As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents involved in the E-EWS. The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains

    Digitalization: The Way to Tourism Destination’s Competitive Advantage (Case Study of Indonesia Marine Tourism)

    Get PDF
    This article is a conceptual paper that proposes the importance of digitalization in marine tourism destination in order to significantly improve its competitive advantage. The digitalization should become a new capability as it supports the activities of value co-creation amongst the stakeholders including the customers. Digitalization will create resource integration, value platform and information-sharing models, while the pre-requisites for the success of its implementation are developing digital strategy, leadership and culture. National tourism digitalization movement, appoint seaports as leader in digital transformation, encourage collaboration intra- and inter-destination, and conduct intensive digital socialization and training.     Keywords: digitalization, digital capability, value co-creation, digital transformatio

    Exploring Design Space For An Integrated Intelligent System

    Get PDF
    Understanding the trade-offs available in the design space of intelligent systems is a major unaddressed element in the study of Artificial Intelligence. In this paper we approach this problem in two ways. First, we discuss the development of our integrated robotic system in terms of its trajectory through design space. Second, we demonstrate the practical implications of architectural design decisions by using this system as an experimental platform for comparing behaviourally similar yet architecturally different systems. The results of this show that our system occupies a "sweet spot" in design space in terms of the cost of moving information between processing components

    An evolutionarily stable joining policy for group foragers

    Get PDF
    For foragers that exploit patchily distributed resources that are challenging to locate, detecting discoveries made by others with a view to joining them and sharing the patch may often be an attractive tactic, and such behavior has been observed across many taxa. If, as will commonly be true, the time taken to join another individual on a patch increases with the distance to that patch, then we would expect foragers to be selective in accepting joining opportunities: preferentially joining nearby discoveries. If competition occurs on patches, then the profitability of joining (and of not joining) will be influenced by the strategies adopted by others. Here we present a series of models designed to illuminate the evolutionarily stable joining strategy. We confirm rigorously the previous suggestion that there should be a critical joining distance, with all joining opportunities within that distance being accepted and all others being declined. Further, we predict that this distance should be unaffected by the total availability of food in the environment, but should increase with decreasing density of other foragers, increasing speed of movement towards joining opportunities, increased difficulty in finding undiscovered food patches, and decreasing speed with which discovered patches can be harvested. We are further able to make predictions as to how fully discovered patches should be exploited before being abandoned as unprofitable, with discovered patches being more heavily exploited when patches are hard to find: patches can be searched for remaining food more quickly, forager density is low, and foragers are relatively slow in traveling to discovered patches

    Guest editorial SACMAT 2009 and 2010

    Get PDF

    CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain

    Get PDF
    The ECHO project aims at organizing and coordinating an approach to strengthen proactive cyber security in the European Union through effective and efficient multi-sector collaboration. One important tool for this aim is the ECHO Early Warning System (E-EWS). The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains. In 2009, the Commission adopted a Communication Towards the integration of maritime surveillance in the EU: “A common information sharing environment for the EU maritime domain (CISE),” setting out guiding principles towards its establishment. The aim of the COM(2010)584 final was to generate a situational awareness of activities at sea and impact overall maritime safety and security. As a outcome of COM(2010)584 final, the EUCISE2020 project has developed a test-bed for maritime information sharing. This case study analyses information sharing models in the maritime domain, the EUCISE2020 test bed and the CISE itself as an alternative for cyber information sharing system. The maritime sector represents a suitable research case because it is already digitized in many aspects

    An Assurance Framework for Independent Co-assurance of Safety and Security

    Get PDF
    Integrated safety and security assurance for complex systems is difficult for many technical and socio-technical reasons such as mismatched processes, inadequate information, differing use of language and philosophies, etc.. Many co-assurance techniques rely on disregarding some of these challenges in order to present a unified methodology. Even with this simplification, no methodology has been widely adopted primarily because this approach is unrealistic when met with the complexity of real-world system development. This paper presents an alternate approach by providing a Safety-Security Assurance Framework (SSAF) based on a core set of assurance principles. This is done so that safety and security can be co-assured independently, as opposed to unified co-assurance which has been shown to have significant drawbacks. This also allows for separate processes and expertise from practitioners in each domain. With this structure, the focus is shifted from simplified unification to integration through exchanging the correct information at the right time using synchronisation activities

    Synchronization and decoupling of plants piloting in a supply chain dedicated to customized mass production.

    Get PDF
    The synchronization of the production of a manufacturing supplier, who makes alternate components assembled on his industrial customer’s work station with this client’s production specialized in mass production of highly diversified products, must take into account the improvement of their knowledge of the final demand (displacement of the Order Penetration Point) and the distance of some of the suppliers. The customer periodically forwards firm orders to his supplier calculated so as to preclude any production line stoppage. It is necessary that the supplier honor them to ensure the decoupling of the control of these two entities in the supply chain and define the efficiency of synchronization. In the considered context, the supplier also receives all available projected information from the industrial customer (final orders, firm on the short term, and structural characteristics of the final demand beyond). The efficiency of the supplier depends on the proper use of all information, notably when the production cycle of alternate components is longer than the demand cycle. In the study of the customer’s requirements, it is necessary to take into account the batch constraints linked to transportation, which compels the customer to hold safety stocks even though the set up organization guarantees that orders will be duly honored. The determinants of these stocks will be put in evidence. Similarly at the supplier, safety stocks will be necessary if the production process involves grouping in batches.synchronisation de la production dans une chaîne logistique; stock de sécurité; chaîne logistique;

    TRIDEnT: Building Decentralized Incentives for Collaborative Security

    Full text link
    Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the potential to cause destructive damage to organizations and critical infrastructure. To timely detect and contain such attacks, collaboration among the defenders is critical. By correlating real-time detection information (alerts) from multiple sources (collaborative intrusion detection), defenders can detect attacks and take the appropriate defensive measures in time. However, although the technical tools to facilitate collaboration exist, real-world adoption of such collaborative security mechanisms is still underwhelming. This is largely due to a lack of trust and participation incentives for companies and organizations. This paper proposes TRIDEnT, a novel collaborative platform that aims to enable and incentivize parties to exchange network alert data, thus increasing their overall detection capabilities. TRIDEnT allows parties that may be in a competitive relationship, to selectively advertise, sell and acquire security alerts in the form of (near) real-time peer-to-peer streams. To validate the basic principles behind TRIDEnT, we present an intuitive game-theoretic model of alert sharing, that is of independent interest, and show that collaboration is bound to take place infinitely often. Furthermore, to demonstrate the feasibility of our approach, we instantiate our design in a decentralized manner using Ethereum smart contracts and provide a fully functional prototype.Comment: 28 page
    • …
    corecore