The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The understanding of internal security in the post-Cold War period considerably differs from the perception of the concept prevailing in the previous era. The qualitative change in the meaning of internal security has been caused by many factors of both intra-state as well as – paradoxically – international character. However, internal security is understood in different ways in various states because...
We characterize the cache behavior of an in-memory tag table and demonstrate that an optimized implementation can typically achieve a near-zero memory traffic overhead. Both industry and academia have repeatedly demonstrated tagged memory as a key mechanism to enable enforcement of powerful security invariants, including capabilities, pointer integrity, watchpoints, and information-flow tracking....
This paper describes a real-time multi-vehicle motion planning (MVMP) algorithm for the emergency vehicle clearance task. To address the inherent limitations of human drivers in perception, communication, and cooperation, we require that the emergency vehicle and the surrounding normal vehicles are connected and automated vehicles (CAVs). The concerned MVMP task is to find cooperative trajectories...
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
Security/Safety is managed, mostly, by means of integrated systems which have to consider, more and more, sensors, devices, cameras, mobile terminals, wearable devices, etc. that use wireless networks, to ensure protection of people and/or tangible/intangible assets from voluntary attacks, allowing also the safe management of the related consequent emergency situations that can derive from the above...
The problem of the technical diagnostics of measuring channels under the conditions of information introduction and measurement systems in terms of complex safety is considered. The purpose of the study is to build models for creation and evaluation of the effectiveness of the systems that ensure the safety of the technical diagnostics of measuring channels based on a systematic approach to the accounting...
The use of big data for cyber-physical systems (CPS) is gaining more importance due to the ever-increasing amount of collectable data. Due to the decreasing cost of sensors and the growth of embedded systems, which are increasingly used in the industries as well as in the private sectors, new methods are needed to evaluate and process the collected data. Therefore, in this paper we proposed a framework...
Developers neglect to update legacy software dependencies, resulting in buggy and insecure software. One explanation for this neglect is the difficulty of constantly checking for the availability of new software updates, verifying their safety, and addressing any migration efforts needed when upgrading a dependency. Emerging tools attempt to address this problem by introducing automated pull requests...
The Papal Basilica and the Sacred Convent of St. Francis in Assisi, Italy together represent a unique and specific cultural heritage site where the mortal remains of St. Francis have been housed since 1230 AD. Millions of pilgrims and visitors from all over the world visit this site each year. In 2000 AD, together with other Franciscan sites in the surrounding area, it achieved UNESCO World Heritage...
An improved ant colony algorithm is proposed in the actual storage environment on the basis of safety and stability. Keeping the omni-directional mobile vehicle away from obstacles is concerned first in order to reduce the risk of collision in consideration of the car size and the diversity of the obstacle species. Then, redundant points are simplified in the path and fewer inflection path is filtered...
For strengthening the effective supervision of key vehicles' illegal driving which are not in accordance with the prescribed routes, and to prevent and reduce the road accidents, this paper puts forward a method of the active discrimination of key vehicle's not-according-to-the-prescribed-routes based on the gate system's passing through information. Through analyzing key vehicles' passing records...
Security attacks on medical devices have been shown to have potential safety concerns. Because of this, stakeholders (device makers, regulators, users, etc.) have increasing interest in enhancing security in medical devices. An effective means to approach this objective is to integrate systematic security requirements elicitation and analysis into the design and evaluation of medical device software...
Just-in-time (JIT) approaches have been suggested for managing non-functional requirements in agile projects. However, many non-functional requirements cannot be raised and met on the spot. In this position paper, we argue that effective JIT engineering of quality requirements depends on a solid foundation of long-term knowledge about all relevant quality requirements. We present two examples from...
The purpose of this paper is to develop a framework to use Assurance Case methodology for Industrial IoT systems (IIoT). To achieve a general goal we discuss the three following issues. Firstly, a brief analysis of state-of-the-art researches and resources in area of Assurance Case is done. Secondly, we discuss specific components for IIoT Assurance Case with focus on Security Assurance. Thirdly,...
One of the main issues to be handled in today's cities is related to public safety, which can be improved by implementing the smart city concept. Despite its relevance as means of achieving societal well-being, smart public security has not been much targeted by technological solutions developed to smart cities. In this paper, we introduce Safe Citizen, a mobile application relying on citizens' engagement...
This paper is the first attempt to carry out the system analysis of Internet of Things as a global and booming object. The hierarchical IoT division into subsystems has been made. The main function executed by certain subsystem is chosen as a criterion of division. The scale of degrees of risks, which can emerge because of negative factors, arising in each of the subsystems is offered. The scale of...
Millennials, Digital Natives, the ‘we want it now’ Generation-Y. Many names have been used to describe the new generation of college students referring to their technological abilities, teamwork skills, speed and openness. Everyday technology and the students of this generations change brought new standards to the world of education. They move global education ‘marketplace’ and its competition to...
A partitioning environment is one of the components of an avionics architecture aligned with the Future Airborne Capability Environment (FACE™). In this paper, we explore the design of a hypervisor to provide the partitioning specified in the FACE Technical Standard. The FACE Consortium is focused on military aviation software, with a dual emphasis on technical standards and business acquisition strategies...
This article discusses the assessment of the impact of the modern risk-based standards for ensuring the safety and security of Complex Industrial Facilities (CIF) of various industries. The focus pointed on the implementation the management systems based on PDCA cycle of safety process for CIF of fuel and energy complexes, including IT-Security. Furthermore, it is shown that the relevant applicability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.