Security Concerns (security + concern)

Distribution by Scientific Domains


Selected Abstracts


Refactoring service-based systems: how to avoid trusting a workflow service

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 10 2006
Howard Chivers
Abstract Grid systems span multiple organizations, so their workflow processes have security requirements, such as restricting access to data or ensuring that process constraints are observed. These requirements are often managed by the workflow component, because of the close association between this sub-system and the processes it enacts. However, high-quality security mechanisms and complex functionality are difficult to combine, so designers and users of workflow systems are faced with a tradeoff between security and functionality, which is unlikely to provide confidence in the security implementation. This paper resolves that tension by showing that process security can be enforced outside the workflow component. Separating security and process functionality in this way improves the quality of security protection, because it is implemented by standard system mechanisms; it also allows the workflow component to be deployed as a standard service, rather than a privileged system component. To make this change of design philosophy accessible outside the security community it is documented as a collection of refactorings, which include problem templates that identify suspect design practice, and target patterns that provide solutions. Worked examples show that these patterns can be used in practice to implement practical applications, with both traditional workflow security concerns, and Grid requirements. Copyright © 2005 John Wiley & Sons, Ltd. [source]


Anatomy of an Ambush: Security Risks Facing International Humanitarian Assistance

DISASTERS, Issue 1 2005
Frederick M. Burkle Jr. MD
The 2003 war with Iraq has generated security concerns that present unique challenges to the practice of providing international humanitarian assistance during war and conflict. Objective research studies on security management are lacking. However, case studies have proven to be an important education and training tool to advance situational awareness of security risks. These challenges are illustrated by an analysis of the events surrounding the first ambush of, and assassination attempt on, a senior US aid official in Baghdad. Before deployment to conflict areas, especially those characterised by insurgent activity, humanitarian providers must realistically assess the threats to life and to the mission. They must obtain pre-deployment situational awareness education, security training and optimal protective equipment and vehicles. [source]


Do European Primarily Internet Banks Show Scale and Experience Efficiencies?

EUROPEAN FINANCIAL MANAGEMENT, Issue 4 2007
Javier Delgado
G21; O32; O33 Abstract Empirical evidence shows that Internet banks worldwide have underperformed newly chartered traditional banks mainly because of their higher overhead costs. European banks have not been an exception in this regard. This paper analyses, for the first time in Europe, whether this is a temporary phenomenon and whether Internet banks may generate scale economies in excess of those available to traditional banks. Also do they (and their customers) accumulate experience with this new business model, allowing them to perform as well or even better than their peers, the traditional banks? To this end, we have generally followed the same analytical framework and methodology used byDeYoung (2001, 2002, 2005)for Internet banks in the USA although the limitations in the availability of data, as well as the existence of different regulatory frameworks and market conditions, particularly in the retail segment, in the 15 European Union countries have required some modifications to the methodology. The empirical analysis confirms that, as is the case for US banks, European Internet banks show technologically based scale economies, while no conclusive evidence exists of technology based learning economies. As Internet banks get larger, the profitability gap with traditional banks shrinks. To the extent that Internet banks are profitable, European authorities may encourage a larger number of consumers to use this delivery channel, by tackling consumers security concerns. This would allow Internet banks to capture more of the potential scale efficiencies implied in our estimations. [source]


Fluorimetric Nerve Gas Sensing Based on Pyrene Imines Incorporated into Films and Sub-Micrometer Fibers

ADVANCED FUNCTIONAL MATERIALS, Issue 5 2009
Jeremy M. Rathfon
Abstract The chemical sensing of nerve gas agents has become an increasingly important goal due to the 1995 terrorist attack in a Tokyo subway as well as national security concerns in regard to world affairs. Chemical detection needs to be sensitive and selective while being facile, portable, and timely. In this paper, a sensing approach using a pyrene imine molecule is presented that is fluorimetric in response. The detection of a chloro-Sarin surrogate is measured at 5 ppmv in less than 1 second and is highly selective towards halogenated organophosphates. The pyrene imine molecule is incorporated into polystyrene films as well as micrometer and sub-micrometer fibers. Using both a direct drawing approach and electrospinning, micrometer and nanofibers can be easily manufactured. Applications for functional sensing micrometer and nanofibers are envisioned for optical devices and photonics in addition to solution and airflow sensing devices. [source]


Open Borders: Absurd Chimera or Inevitable Future Policy?

INTERNATIONAL MIGRATION, Issue 5 2010
John P. Casey
In the current climate of security concerns, the movement of people across borders is becoming increasingly criminalised. Yet there is a parallel political and economic reality in which borders are opening and the movement of people is being liberalised: zones of free movement such as the European Union expand; other bilateral and multilateral agreements include provisions for more fluid cross-border movement; international trade negotiations seek to facilitate the flow of those providing goods and services; developing countries' push for greater access for their citizens to the labour markets of the industrialised world; and a new class of "gold collar" professionals moves with increasing ease around the globe. This paper explores the possibilities of universal open borders as a future policy option. The author accepts realpolitik and understands that the free flow of immigrants is currently impossible, but also maintains that open borders are an inevitable long-term consequence of globalisation, as well as a policy option for addressing North-South inequalities and a moral touchstone for the global extension of human rights. The paper does not advocate for more migration, but instead explores the paradox that the creation of the conditions that would allow for the opening of borders is likely to reduce the incentives for emigration. The paper explores the policy changes needed to achieve open borders. [source]


Electronic health records: Use, barriers and satisfaction among physicians who care for black and Hispanic patients

JOURNAL OF EVALUATION IN CLINICAL PRACTICE, Issue 1 2009
Ashish K. Jha MD MPH
Abstract Objectives, Electronic health records (EHRs) are a promising tool to improve the quality of health care, although it remains unclear who will benefit from this new technology. Given that a small group of providers care for most racial/ethnic minorities, we sought to determine whether minority-serving providers adopt EHR systems at comparable rates to other providers. Methods, We used survey data from stratified random sample of all medical practices in Massachusetts in 2005. We determined rates of EHR adoption, perceived barriers to adoption, and satisfaction with EHR systems. Results, Physicians who reported patient panels of more than 40% black or Hispanic had comparable levels of EHR adoption than other physicians (27.9% and 21.8%, respectively, P = 0.46). Physicians from minority-serving practices identified financial and other barriers to implementing EHR systems at similar rates, although these physicians were less likely to be concerned with privacy and security concerns of EHRs (47.1% vs. 64.4%, P = 0.01). Finally, physicians from high-minority practices had similar perceptions about the positive impact of EHRs on quality (73.7% vs. 76.6%, P = 0.43) and costs (46.9% vs. 51.5%, P = 0.17) of care. Conclusions, In a state with a diverse minority population, we found no evidence that minority-serving providers had lower EHR adoption rates, faced different barriers to adoption or were less satisfied with EHRs. Given the importance of ensuring that minority-serving providers have equal access to EHR systems, we failed to find evidence of a new digital divide. [source]


Homeland security initiatives and background checks in higher education

NEW DIRECTIONS FOR INSTITUTIONAL RESEARCH, Issue 146 2010
Stephanie Hughes
This chapter addresses the issue of higher education institution policies and procedures in regard to background checks for students, staff, and faculty in light of homeland security concerns. [source]


Four Perspectives on Terrorism: Where They Stand Depends on Where You Sit

POLITICAL STUDIES REVIEW, Issue 2 2009
Thomas J. Butko
The general assumption is that there is one objective and universally applicable conceptualization of ,terrorism'. This position is especially prominent in the United States and other Western countries after the terrorist attacks of 9/11. Yet, despite such a view, it is possible to distinguish four specific perspectives or paradigms on terrorism: standard/mainstream, radical, relativist and constructivist. While the standard/mainstream approach remains dominant among academics, intelligence analysts and policy makers, the other positions have exhibited their own adherents. In the end, it will be argued that the constructivist perspective is the most accurate. Since ,terrorism' remains too contentious and disputed a term to achieve universal consensus, the constructivist approach has been the most effective in stressing the decisive role that parochial state and national interests perform in any conceptualization of ,terrorism', especially the strategic and security concerns of the dominant or hegemonic power(s) within the international system. [source]


Advanced IMS client supporting secure signaling

BELL LABS TECHNICAL JOURNAL, Issue 4 2008
Ramana Isukapalli
With recent advances in core and access networks and the availability of increased bandwidth and sophisticated devices for end users, there is an increased demand for client applications running on mobile devices, such as laptops and handheld devices, to support real time applications like Voice over Internet Protocol (VoIP) and streaming video, apart from traditional applications like web browsing. This paper presents a prototype IP Multimedia Subsystem (IMS) client, which serves as a VoIP client to set up calls between Internet Protocol (IP) devices and interworks with circuit-switched networks to deliver calls to public switched telephone network (PSTN) phones. It implements supplementary services (including call waiting, call transfer, and call forwarding); supports multimedia ringing, short message service/multimedia messaging service (SMS/MMS), audio/video conferencing, and peer-to-peer video; and it can deliver a call to a user (as opposed to a device) by simultaneously ringing multiple devices registered by the user. Further, to address various security concerns, the client supports Hypertext Transfer Protocol (HTTP) digest authentication using Message Digest 5 (MD5) cryptographic function authentication and key agreement (AKA) and can create secure tunnels to the core network using IP security (IPsec). © 2008 Alcatel-Lucent. [source]