17 results on '"security approach"'
Search Results
2. Climate Change and Maritime Security in the Indo-Pacific Region: A Strategic Approach
- Author
-
Singh, Amit Kumar, Aparna, Himiyama, Yukio, Series Editor, Anand, Subhash, Series Editor, Tripathi, Gaurav, editor, Shakya, Achala, editor, Kanga, Shruti, editor, Singh, Suraj Kumar, editor, and Rai, Praveen Kumar, editor
- Published
- 2024
- Full Text
- View/download PDF
3. Comprehensive Risk Classification and Mitigation in the Petroleum Cyber-Physical Systems of the Oil and Gas Industry.
- Author
-
Oudina, Zina, Dib, Ahmed, Yakoubi, Mohamed Amine, and Derdour, Makhlouf
- Subjects
CYBER physical systems ,GAS industry ,PETROLEUM industry ,PETROLEUM ,SMART devices ,PASSPORTS - Abstract
The oil and gas (O&G) industry is the engine of the global economy. Oil and gas production passes through axes related to exploration, research, extraction, transportation, and finally the final manufacturing of energy products. All these stages permeate some risks that threaten both the human factor and the material factor. The oil industry merged with the fourth technological industry 4.0, which included multiple technologies and systems, the most important of which is the cyber-physical system (CPS), which some researchers have named petroleum cyber-physical systems if it is embodied within this industry. CPSs are collaborative systems formed of autonomous and smart devices that can handle data flows and activities while maintaining integrated physical objects. Several risks confront the energy field, with the potential to interrupt critical supply lines, hurt the environment, and trigger a financial catastrophe. In the field of O&G, there are very few scientific studies that are exposed to risks in a complementary and comprehensive manner, including only those that focus on cyber-attacks and their causes. There is a lack of comprehension and in-depth studies of all types of threats in all their aspects that surround cyber-physical systems within this field. Some risk classifications are based on internal and external risks, while others are based on the influencing and causative aspects in a general way. This study deals with the classification of risks: 1) classification of risk for the global industry of O&G. 2) in terms of the fact that the cyber-physical system is the most important component in the O&G industry and that these risks are either physical, cyber, or related to permissibility and authorization in the O&G field. A security approach is also presented that leads to mitigating the impact of risks in oil and gas zones. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. An Efficient Multi-Class Privacy-Preserving-Based Encryption Framework for Large Distributed Databases.
- Author
-
Mohammed Gouse, Sk. and Babu Burra, Vijaya
- Subjects
DISTRIBUTED databases ,MEDICAL databases ,ELECTRONIC data processing ,DATA privacy - Abstract
This paper introduces a novel hybrid filter-based ensemble multi-class classification model for distributed privacy-preserving applications. The conventional privacy-preserving multi-class learning models have limited capacity to enhance the true positive rate, mainly due to computational time and memory constraints, as well as the static nature of metrics for parameter optimization and multi-class perturbation processes. In this research, we develop the proposed model on large medical and market databases with the aim of enhancing multi-party data confidentiality through a security framework during the privacy-preserving process. Moreover, we also introduce a secure multi-party data perturbation process to improve computational efficiency and privacy-preserving performance. Experimental results were evaluated on different real-time privacy-preserving datasets, such as medical and market datasets, using different statistical metrics. The evaluation results demonstrate that the proposed multi-party-based multi-class privacy-preserving model performs statistically better than conventional approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Security for wireless sensor networks using cryptography
- Author
-
P. Ramadevi, S. Ayyasamy, Yalla Suryaprakash, Chunduru Anilkumar, S. Vijayakumar, and R. Sudha
- Subjects
Wireless sensor network ,Security approach ,Cryptography and sensitive information ,Electric apparatus and materials. Electric circuits. Electric networks ,TK452-454.4 - Abstract
WSNs (Wireless Sensor Networks) are becoming more and more capable with each passing day. Widespread usage of WSNs is helping mitigate many dangers. Protecting these networks from risks need proper security measures. This paper offered a security strategy that makes use of IEKC (Improved Elliptic Key Cryptography). Data encryption and decryption are accomplished via IKEC. A major feature of this technique is that node's source codes maintain Private Keys which protect other keys in non-volatile memories. The suggested technique prevents replay, DoS and Sybil attacks. In this node, cluster chiefs are chosen using CSO (Chicken Swarm Optimization) and nodes are organised according to network size. According to the findings of the simulation, this security mechanism effectively counters different attacks with fewer resources, and it also significantly strengthens the network's resistance to node capture. Results from experiments show that the suggested model is effective regarding PDR (packet delivery ratio), end-to-end latency, throughputs, and energy consumptions.
- Published
- 2023
- Full Text
- View/download PDF
6. Information and Data Security Model: Background, Risks, and Challenges
- Author
-
Taneja, Bhuvan, Bhushan, Bharat, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Tavares, João Manuel R. S., editor, Chakrabarti, Satyajit, editor, Bhattacharya, Abhishek, editor, and Ghatak, Sujata, editor
- Published
- 2021
- Full Text
- View/download PDF
7. Security Approach of Hassan Rouhani’ Government Based on the Copenhagen School Approach
- Author
-
alireza samiee, jaafar noruzinejad, and shahrooz soltan ahmadi
- Subjects
security approach ,rouhani’s government ,national security ,copenhagen school ,societal security ,Political science ,Political science (General) ,JA1-92 - Abstract
The following article seeks to answer the main question: What security approach has the moderate government of Hassan Rouhani put in its agenda during the first term of its presidency (2013-2016)? And more clearly; what are the dimensions, components, and reference, purpose and security strategies in this security approach? The research hypothesis is that the security approach of Hassan Rouhani's government, influenced by the requirements of social fields, had a McNamara approach; In a way, the link between security and development, and especially economic, social and political development, has been a priority. The findings show that the Eleventh Government considers national power to be the result of a broader definition of security and considers it a strategic mistake to limit this concept to military power and the use of harsh tools. It has maximized the issue of security and has tried to improve the national security situation by relying on development policies in the fields of economy, society and politics. Qualitative research method of causal explanation and conceptual and theoretical tools for subject analysis, using the security theory of Barry Buzan and Weaver is one of the leading experts of the Copenhagen school. The method of data collection is also library and also the use of scientific resources of cyberspace.
- Published
- 2022
- Full Text
- View/download PDF
8. Security Challenges in 5G-Based IoT Middleware Systems
- Author
-
Tiburski, Ramão Tiago, Amaral, Leonardo Albernaz, Hessel, Fabiano, Patnaik, Srikanta, Series editor, Sethi, Ishwar, Series editor, Li, Xiaolong, Series editor, Mavromoustakis, Constandinos X., editor, Mastorakis, George, editor, and Batalla, Jordi Mongay, editor
- Published
- 2016
- Full Text
- View/download PDF
9. A Secure Web Services Providing Framework Based on Lock-Keeper
- Author
-
Cheng, Feng, Menzel, Michael, Meinel, Christoph, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Ata, Shingo, editor, and Hong, Choong Seon, editor
- Published
- 2007
- Full Text
- View/download PDF
10. Northeast Asian Critical Security
- Author
-
Renwick, Neil and Renwick, Neil
- Published
- 2004
- Full Text
- View/download PDF
11. The National Cancer Institute’s net-Trials™
- Author
-
Reeves, Dianne M., Hageman, Douglas, Hannah, Kathryn J., editor, Ball, Marion J., editor, Silva, John S., editor, Chute, Christopher G., editor, Douglas, Judith V., editor, Langlotz, Curtis P., editor, Niland, Joyce C., editor, and Scherlis, William L., editor
- Published
- 2002
- Full Text
- View/download PDF
12. What Role for Public Participation in Implementing the EU Floods Directive? A Comparison With the Water Framework Directive, Early Evidence from Germany and a Research Agenda.
- Author
-
Newig, Jens, Challies, Edward, Jager, Nicolas, and Kochskämper, Elisa
- Subjects
FLOOD risk ,NATURAL disasters ,ENVIRONMENTAL policy - Abstract
ABSTRACT We examine the roles and functions of non-state actor participation in implementing the EU Floods Directive of 2007 (FD). We draw on experiences with participation under the Water Framework Directive (WFD), because of important links between the two directives. Comparing the legal bases and the different functions for participation, we observe the paradoxical situation that while the WFD has fervently advocated public participation public interest has remained low, whereas the FD is less sanguine about participation despite citizens being potentially more affected by flood management issues - particularly given the current trend towards a 'risk management' approach under the FD. Our examination of current FD implementation in Germany reveals a considerable variety of participation approaches, as well as a general trend to 'less' rather than 'more' participation as compared with the WFD. The paper closes by discussing implications for future flood management planning and avenues for comparative research. Copyright © 2014 John Wiley & Sons, Ltd and ERP Environment [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
13. Towards a Risk Governance Culture in Flood Policy--Findings from the Implementation of the "Floods Directive" in Germany.
- Author
-
Heintz, Marc Daniel, Hagemeier-Klose, Maria, and Wagner, Klaus
- Subjects
FLOOD risk ,STANDARDS ,WATERSHEDS - Abstract
The European Directive on the Assessment and Management of Flood Risks is likely to cause changes to flood policy in Germany and other member states. With its risk governance approach, it introduces a holistic and catchment-oriented flood risk management and tries to overcome shortcomings of the past, such as the event-driven construction of mainly structural measures. However, there is leeway for interpretation in implementing the directive. The present paper gives an overview on the implementation of the floods directive in Germany and is divided into two qualitative empirical case studies. Case Study I investigates the level of acceptance of the floods directive among decision-makers in the German part of the Rhine river basin. Findings show that the federal states respond differently to the impulse given by the floods directive. Whereas some decision-makers opt for a pro-forma implementation, others take it as a starting point to systematically improve their flood policy. Case Study II presents recommendations for a successful implementation of flood risk management plans that have been developed within a project for the water authority in Bavaria and might be interesting for other federal/member states. For a participation of the interested parties on the level of shared decision-making, the planning process has to work on sub-management-plan level (15-20 communities). The water resources authority has to adopt a multi-faceted role (expert, responsible or interested party depending on the discussed topics). [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
14. Towards a Risk Governance Culture in Flood Policy—Findings from the Implementation of the 'Floods Directive' in Germany
- Author
-
Klaus Wagner, Maria Hagemeier-Klose, and Marc Daniel Heintz
- Subjects
flood risk management ,lcsh:Hydraulic engineering ,floods directive ,risk governance ,Geography, Planning and Development ,Water authority ,Aquatic Science ,Biochemistry ,German ,lcsh:Water supply for domestic and industrial purposes ,Flood risk management ,lcsh:TC1-978 ,Political science ,flood policy ,Environmental planning ,security approach ,Water Science and Technology ,lcsh:TD201-500 ,Flood myth ,business.industry ,risk approach ,Environmental resource management ,Risk governance ,stakeholder participation ,Directive ,decision-makers ,language.human_language ,Water resources ,Planning process ,water authority ,language ,business - Abstract
The European Directive on the Assessment and Management of Flood Risks is likely to cause changes to flood policy in Germany and other member states. With its risk governance approach, it introduces a holistic and catchment-oriented flood risk management and tries to overcome shortcomings of the past, such as the event-driven construction of mainly structural measures. However, there is leeway for interpretation in implementing the directive. The present paper gives an overview on the implementation of the floods directive in Germany and is divided into two qualitative empirical case studies. Case Study I investigates the level of acceptance of the floods directive among decision-makers in the German part of the Rhine river basin. Findings show that the federal states respond differently to the impulse given by the floods directive. Whereas some decision-makers opt for a pro-forma implementation, others take it as a starting point to systematically improve their flood policy. Case Study II presents recommendations for a successful implementation of flood risk management plans that have been developed within a project for the water authority in Bavaria and might be interesting for other federal/member states. For a participation of the interested parties on the level of shared decision-making, the planning process has to work on sub-management-plan level (15–20 communities). The water resources authority has to adopt a multi-faceted role (expert, responsible or interested party depending on the discussed topics).
- Published
- 2012
- Full Text
- View/download PDF
15. The Security Thinking of the West and the Post-Cold War Security Threat: the Case Study of Iranian Nuclear Issue
- Author
-
Seyed Mohammad kazem Sajjadpour and Saeedeh Ejtehadi
- Subjects
the west ,lcsh:Political science ,threat ,strategy ,the islamic republic of iran ,security approach ,lcsh:J ,nuclear program - Abstract
The Security Thinking of the West and the Post-Cold War Security Threat: the Case Study of Iranian Nuclear Issue Dr. Seyyed Mohammad Kazem Sajjadpour Saeedeh Ejtehadi The end of cold war resulted in the emergence of a new security thinking in the west on the sources of threat to international security and the way of managing them. This is the prism through which the American and European security thinking have evolved on the Iranian nuclear issue. In this research, the development of the western security thinking on Iranian nuclear file is tackled through raising and answering the following questions: “What are the foundations of western thinking on international security after the cold war?” and “How is Iranian nuclear issue relevant to this thinking?” In response to these questions, the present paper argues that there is a need for combination of neo realist and constructivist theories of international relations in which both the structure of international politics as well as the constructed identities and security notion of the ruling elites should be tackled simultaneously.
- Published
- 2010
16. Security from a Systems Thinking Perspective - Applying Soft Systems Methodology to the Analysis of an Information Security Incident
- Author
-
Al Sabbagh, Bilal, Kowalski, Stewart, Al Sabbagh, Bilal, and Kowalski, Stewart
- Abstract
Applying systems theory to information security enables security analysts to consider the socio-technical role of the security system instead of only focusing on the technical part. Systems theory can also equip security analysts with the skills required to have a holistic and an abstract level of understanding of the security problem in their organisations and to proactively define and evaluate existing risks. The Soft Systems Methodology (SSM) developed by Peter Checkland was created in order to deal with unstructured situations where human beings are part of the socio-technical system. In this paper, SSM is applied as a framework to diagnose a real case security incident in an organisation. The purpose of this application is to demonstrate how the methodology can be considered a beneficial tool for security analysts during security incident management and risk analysis. Literature review and experience indicate an existing lack of customisable incident response tools that facilitate communication and elaboration within organizations during incident management. In addition to the fact that these tools are mainly technical and don’t take the human factor into consideration. Using SSM as such, we define the security attack as a human activity transformation system that transforms a security event triggered by an attacker into a security breach that cause damage to the victim organisation. The attack system is then modelled to include a number of dependent activity sub-systems that interact with each other and their environment including the security control activity systems. By having such systemic perception of a security attack, security analysts, we suggest, can have a holistic perception under what conditions a security attack has succeeded and what elements of the socio-technical system and its environment should have been considered in order to mitigate and reduce the risk exposure.
- Published
- 2014
17. Digitale Wasserzeichen - Grundlagen - Anwendungen - Grenzen
- Author
-
Steinebach, M., Dittmann, J., and Publica
- Subjects
illegal copy ,advertisement ,biometrics ,public key infrastructure (PKI) ,owner authentication ,transmark ,digital media content protection ,security approach ,media on demand ,digital watermarking ,digital rights management - Abstract
Digital watermarking has become an often-discussed approach for digital rights management (DRM). Owner authentication, identification of pirates and even prevention of illegal copies are addressed. We provide an overview of watermarking technology. Furthermore we identify problems in watermarking-based DRM and show application scenarios: H2O/sub 4/M provides a combined security approach including PKI and biometrics. Transmark is a DRM example for media on demand. We discuss new methods of advertisement and content-protection for digital media.
- Published
- 2002
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.