179 research outputs found
ECHO Information sharing models
As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents involved in the E-EWS. The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains
Digitalization: The Way to Tourism Destination’s Competitive Advantage (Case Study of Indonesia Marine Tourism)
This article is a conceptual paper that proposes the importance of digitalization in marine tourism destination in order to significantly improve its competitive advantage. The digitalization should become a new capability as it supports the activities of value co-creation amongst the stakeholders including the customers. Digitalization will create resource integration, value platform and information-sharing models, while the pre-requisites for the success of its implementation are developing digital strategy, leadership and culture. National tourism digitalization movement, appoint seaports as leader in digital transformation, encourage collaboration intra- and inter-destination, and conduct intensive digital socialization and training.
Keywords: digitalization, digital capability, value co-creation, digital transformatio
Exploring Design Space For An Integrated Intelligent System
Understanding the trade-offs available in the design space of intelligent systems is a major unaddressed element in the study of Artificial Intelligence. In this paper we approach this problem in two ways. First, we discuss the development of our integrated robotic system in terms of its trajectory through design space. Second, we demonstrate the practical implications of architectural design decisions by using this system as an experimental platform for comparing behaviourally similar yet architecturally different systems. The results of this show that our system occupies a "sweet spot" in design space in terms of the cost of moving information between processing components
An evolutionarily stable joining policy for group foragers
For foragers that exploit patchily distributed resources that are challenging to locate, detecting discoveries made by others with a view to joining them and sharing the patch may often be an attractive tactic, and such behavior has been observed across many taxa. If, as will commonly be true, the time taken to join another individual on a patch increases with the distance to that patch, then we would expect foragers to be selective in accepting joining opportunities: preferentially joining nearby discoveries. If competition occurs on patches, then the profitability of joining (and of not joining) will be influenced by the strategies adopted by others. Here we present a series of models designed to illuminate the evolutionarily stable joining strategy. We confirm rigorously the previous suggestion that there should be a critical joining distance, with all joining opportunities within that distance being accepted and all others being declined. Further, we predict that this distance should be unaffected by the total availability of food in the environment, but should increase with decreasing density of other foragers, increasing speed of movement towards joining opportunities, increased difficulty in finding undiscovered food patches, and decreasing speed with which discovered patches can be harvested. We are further able to make predictions as to how fully discovered patches should be exploited before being abandoned as unprofitable, with discovered patches being more heavily exploited when patches are hard to find: patches can be searched for remaining food more quickly, forager density is low, and foragers are relatively slow in traveling to discovered patches
CISE as a Tool for Sharing Sensitive Cyber Information in Maritime Domain
The ECHO project aims at organizing and coordinating an approach to strengthen proactive cyber security in the European Union through effective and efficient multi-sector collaboration. One important tool for this aim is the ECHO Early Warning System (E-EWS). The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain, as well as models from other domains. In 2009, the Commission adopted a Communication Towards the integration of maritime surveillance in the EU: “A common information sharing environment for the EU maritime domain (CISE),” setting out guiding principles towards its establishment. The aim of the COM(2010)584 final was to generate a situational awareness of activities at sea and impact overall maritime safety and security. As a outcome of COM(2010)584 final, the EUCISE2020 project has developed a test-bed for maritime information sharing. This case study analyses information sharing models in the maritime domain, the EUCISE2020 test bed and the CISE itself as an alternative for cyber information sharing system. The maritime sector represents a suitable research case because it is already digitized in many aspects
An Assurance Framework for Independent Co-assurance of Safety and Security
Integrated safety and security assurance for complex systems is difficult for
many technical and socio-technical reasons such as mismatched processes,
inadequate information, differing use of language and philosophies, etc.. Many
co-assurance techniques rely on disregarding some of these challenges in order
to present a unified methodology. Even with this simplification, no methodology
has been widely adopted primarily because this approach is unrealistic when met
with the complexity of real-world system development.
This paper presents an alternate approach by providing a Safety-Security
Assurance Framework (SSAF) based on a core set of assurance principles. This is
done so that safety and security can be co-assured independently, as opposed to
unified co-assurance which has been shown to have significant drawbacks. This
also allows for separate processes and expertise from practitioners in each
domain. With this structure, the focus is shifted from simplified unification
to integration through exchanging the correct information at the right time
using synchronisation activities
Synchronization and decoupling of plants piloting in a supply chain dedicated to customized mass production.
The synchronization of the production of a manufacturing supplier, who makes alternate components assembled on his industrial customer’s work station with this client’s production specialized in mass production of highly diversified products, must take into account the improvement of their knowledge of the final demand (displacement of the Order Penetration Point) and the distance of some of the suppliers. The customer periodically forwards firm orders to his supplier calculated so as to preclude any production line stoppage. It is necessary that the supplier honor them to ensure the decoupling of the control of these two entities in the supply chain and define the efficiency of synchronization. In the considered context, the supplier also receives all available projected information from the industrial customer (final orders, firm on the short term, and structural characteristics of the final demand beyond). The efficiency of the supplier depends on the proper use of all information, notably when the production cycle of alternate components is longer than the demand cycle. In the study of the customer’s requirements, it is necessary to take into account the batch constraints linked to transportation, which compels the customer to hold safety stocks even though the set up organization guarantees that orders will be duly honored. The determinants of these stocks will be put in evidence. Similarly at the supplier, safety stocks will be necessary if the production process involves grouping in batches.synchronisation de la production dans une chaîne logistique; stock de sécurité; chaîne logistique;
TRIDEnT: Building Decentralized Incentives for Collaborative Security
Sophisticated mass attacks, especially when exploiting zero-day
vulnerabilities, have the potential to cause destructive damage to
organizations and critical infrastructure. To timely detect and contain such
attacks, collaboration among the defenders is critical. By correlating
real-time detection information (alerts) from multiple sources (collaborative
intrusion detection), defenders can detect attacks and take the appropriate
defensive measures in time. However, although the technical tools to facilitate
collaboration exist, real-world adoption of such collaborative security
mechanisms is still underwhelming. This is largely due to a lack of trust and
participation incentives for companies and organizations. This paper proposes
TRIDEnT, a novel collaborative platform that aims to enable and incentivize
parties to exchange network alert data, thus increasing their overall detection
capabilities. TRIDEnT allows parties that may be in a competitive relationship,
to selectively advertise, sell and acquire security alerts in the form of
(near) real-time peer-to-peer streams. To validate the basic principles behind
TRIDEnT, we present an intuitive game-theoretic model of alert sharing, that is
of independent interest, and show that collaboration is bound to take place
infinitely often. Furthermore, to demonstrate the feasibility of our approach,
we instantiate our design in a decentralized manner using Ethereum smart
contracts and provide a fully functional prototype.Comment: 28 page
- …