Sample records for digital world securing

  1. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  2. Transitioning from analog to digital communications: An information security perspective

    NASA Technical Reports Server (NTRS)

    Dean, Richard A.

    1990-01-01

    A summary is given of the government's perspective on evolving digital communications as they affect secure voice users and approaches for operating during a transition period to an all digital world. An integrated architecture and a mobile satellite interface are discussed.

  3. Assessing security technology's impact: old tools for new problems.

    PubMed

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  4. Approach to spatial information security based on digital certificate

    NASA Astrophysics Data System (ADS)

    Cong, Shengri; Zhang, Kai; Chen, Baowen

    2005-11-01

    With the development of the online applications of geographic information systems (GIS) and the spatial information services, the spatial information security becomes more important. This work introduced digital certificates and authorization schemes into GIS to protect the crucial spatial information combining the techniques of the role-based access control (RBAC), the public key infrastructure (PKI) and the privilege management infrastructure (PMI). We investigated the spatial information granularity suited for sensitivity marking and digital certificate model that fits the need of GIS security based on the semantics analysis of spatial information. It implements a secure, flexible, fine-grained data access based on public technologies in GIS in the world.

  5. Status of Optical Disk Standards and Copy Protection Technology

    DTIC Science & Technology

    2000-01-01

    Technology (IT), the Consumer Electronics (CE) and the Content Providers such as the Motion Picture Association (MPA) and Secure Digital Music ...and Access Control. On audio recording, Secure Digital Music Initiative (SDMI) is leading the effort. 10 Besides these organizations, a world wide...coordinating orgainzation which ia working with the Information Technology Inductry Association (ITI), the Content Providers such as the Motion Picture

  6. Becoming Citizens of the World

    ERIC Educational Resources Information Center

    Stewart, Vivien

    2007-01-01

    The globalization of economies, the digitization of work, pressing health and security issues, and changing demographics have dramatically changed our world. Unlike previous generations, U.S. high school graduates will routinely buy from the world, sell to the world, work for international companies, manage employees from other cultures and…

  7. Discovering and Mitigating Software Vulnerabilities through Large-Scale Collaboration

    ERIC Educational Resources Information Center

    Zhao, Mingyi

    2016-01-01

    In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…

  8. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed

    Duncan, R G; Shabot, M M

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR).

  9. Secure remote access to a clinical data repository using a wireless personal digital assistant (PDA).

    PubMed Central

    Duncan, R. G.; Shabot, M. M.

    2000-01-01

    TCP/IP and World-Wide-Web (WWW) technology have become the universal standards for networking and delivery of information. Personal digital assistants (PDAs), cellular telephones, and alphanumeric pagers are rapidly converging on a single pocket device that will leverage wireless TCP/IP networks and WWW protocols and can be used to deliver clinical information and alerts anytime, anywhere. We describe a wireless interface to clinical information for physicians based on Palm Corp.'s Palm VII pocket computer, a wireless digital network, encrypted data transmission, secure web servers, and a clinical data repository (CDR). PMID:11079875

  10. Security Meets Real-World Computing. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence K.

    2005-01-01

    The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…

  11. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    PubMed

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  12. Developing Thoughtful "Cybercitizens"

    ERIC Educational Resources Information Center

    Berson, Michael J.; Berson, Ilene R.

    2004-01-01

    What does it mean to be a citizen in a digital world where technology has facilitated global connections? The children of today are immersed in a digital age, and as increasing numbers of students go online, they require skills to securely and responsibly take full advantage of computers and the Internet. Despite the natural enthusiasm that many…

  13. Digital Watermarking of Autonomous Vehicles Imagery and Video Communication

    DTIC Science & Technology

    2005-10-01

    world’s recent events, the increasing need in different domains, those being: spatial, spectral and corn- homeland security and defense is a critical topic...watermarking schemes benefit in that security and analysis is also vital, especially when using there is no need for full or partial decompression, which...are embedded Arguably, the most widely used technique is spread spec- change with each application. Whether it is secure covert trum watermarking (SS

  14. Balancing Social Media with Operations Security (OPSEC) in the 21st Century

    DTIC Science & Technology

    2010-05-03

    anticipated since the inception of digital media and the World Wide Web. Military personnel are equally influenced by social media and social ...FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE Balancing Social Media with Operations Security (OPSEC) in the...necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The use of social media and networking sites like Facebook, MySpace, and

  15. First Digit Law and Its Application to Digital Forensics

    NASA Astrophysics Data System (ADS)

    Shi, Yun Q.

    Digital data forensics, which gathers evidence of data composition, origin, and history, is crucial in our digital world. Although this new research field is still in its infancy stage, it has started to attract increasing attention from the multimedia-security research community. This lecture addresses the first digit law and its applications to digital forensics. First, the Benford and generalized Benford laws, referred to as first digit law, are introduced. Then, the application of first digit law to detection of JPEG compression history for a given BMP image and detection of double JPEG compressions are presented. Finally, applying first digit law to detection of double MPEG video compressions is discussed. It is expected that the first digit law may play an active role in other task of digital forensics. The lesson learned is that statistical models play an important role in digital forensics and for a specific forensic task different models may provide different performance.

  16. IT-security challenges in IoT environments and autonomous systems

    NASA Astrophysics Data System (ADS)

    Heun, Ulrich

    2017-05-01

    Internet of Things will open the digital world for future services working across company borders. Together with autonomous systems intelligent things will communicate and work together without direct influence of human technicians or service managers. IT-security will become one of the most important challenges to ensure a stable service performance and to provide a trustful environment to let people use such service without any concerns regarding data privacy and eligibility of the outcomes.

  17. Information Security in a World of Global Connectivity: A Case Study

    ERIC Educational Resources Information Center

    Lawrence, Cameron; Olson, Garrett; Douma, Bambi

    2015-01-01

    The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…

  18. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Oehmen, Christopher S.

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less

  19. The real world: The user

    NASA Technical Reports Server (NTRS)

    Kitchell, J.

    1984-01-01

    Satellite communication is by far the most advanced of all commercial applications of space technology. The past, present, and some future possibilities for the field of public communications are considered. Some serious concerns that are becoming apparent to the user of this technology are examined. Among the specific topics mentioned are digital television, electronic mail, cable television, and systems security.

  20. An analysis of United States K-12 stem education versus STEM workforce at the dawn of the digital revolution

    NASA Astrophysics Data System (ADS)

    Cataldo, Franca

    The world is at the dawn of a third industrial revolution, the digital revolution, that brings great changes the world over. Today, computing devices, the Internet, and the World Wide Web are vital technology tools that affect every aspect of everyday life and success. While computing technologies offer enormous benefits, there are equally enormous safety and security risks that have been growing exponentially since they became widely available to the public in 1994. Cybercriminals are increasingly implementing sophisticated and serious hack attacks and breaches upon our nation's government, financial institutions, organizations, communities, and private citizens. There is a great need for computer scientists to carry America's innovation and economic growth forward and for cybersecurity professionals to keep our nation safe from criminal hacking. In this digital age, computer science and cybersecurity are essential foundational ingredients of technological innovation, economic growth, and cybersecurity that span all industries. Yet, America's K-12 education institutions are not teaching the computer science and cybersecurity skills required to produce a technologically-savvy 21st century workforce. Education is the key to preparing students to enter the workforce and, therefore, American K-12 STEM education must be reformed to accommodate the teachings required in the digital age. Keywords: Cybersecurity Education, Cybersecurity Education Initiatives, Computer Science Education, Computer Science Education Initiatives, 21 st Century K-12 STEM Education Reform, 21st Century Digital Literacies, High-Tech Innovative Problem-Solving Skills, 21st Century Digital Workforce, Standardized Testing, Foreign Language and Culture Studies, Utica College, Professor Chris Riddell.

  1. A Study of Current World Telecommunications and a Projection of the Future

    DTIC Science & Technology

    1992-09-01

    SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) A STUDY OF CURRENT...51 b. Integrated Services Digital Network 53 c. Network Switching ...... ........... 54 d. SS7 ...54 Table IX PERCENTAGE OF CO WITH SS7 CAPABILITY FOR THE GROUP OF SEVEN ............. .................. 55 Table X TRENDS, FORECAST IN

  2. Dealing with Today’s Asymmetric Threat to U.S. and Global Security: The Need for an Integrated National Asymmetric Threat Strategy

    DTIC Science & Technology

    2008-08-01

    world of You- Tube and digital recorders, there is no longer any distinction between local and worldwide audiences. Equally, anyone with a cell phone...at the local level. One of the best examples is Grameen Bank, a microfinance organization and community development bank started in Bangladesh in

  3. System Control for the Transitional DCS. Appendices.

    DTIC Science & Technology

    1978-12-01

    the deployment of the AN/TTC-39 circuit switch. This is a hybrid analog/digital switch providing the following services: o Non- secure analog telephone...service. o Non- secure 16 Kb/s digital telephone service. o Secure 16 Kb/s digital telephone service with automatic key distribution and end to end... security . o Analog circuits to support current inventory 50 Kb/sec and 9.6 Kb/sec secure digital communications. In the deployment model for this study

  4. New long-zoom lens for 4K super 35mm digital cameras

    NASA Astrophysics Data System (ADS)

    Thorpe, Laurence J.; Usui, Fumiaki; Kamata, Ryuhei

    2015-05-01

    The world of television production is beginning to adopt 4K Super 35 mm (S35) image capture for a widening range of program genres that seek both the unique imaging properties of that large image format and the protection of their program assets in a world anticipating future 4K services. Documentary and natural history production in particular are transitioning to this form of production. The nature of their shooting demands long zoom lenses. In their traditional world of 2/3-inch digital HDTV cameras they have a broad choice in portable lenses - with zoom ranges as high as 40:1. In the world of Super 35mm the longest zoom lens is limited to 12:1 offering a telephoto of 400mm. Canon was requested to consider a significantly longer focal range lens while severely curtailing its size and weight. Extensive computer simulation explored countless combinations of optical and optomechanical systems in a quest to ensure that all operational requests and full 4K performance could be met. The final lens design is anticipated to have applications beyond entertainment production, including a variety of security systems.

  5. Security analysis of RSA cryptosystem algorithm and it’s properties

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Chenglian; Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles tomore » discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.« less

  6. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    NASA Astrophysics Data System (ADS)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  7. What good cyber resilience looks like.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  8. Introducing cyber.

    PubMed

    Hult, Fredrik; Sivanesan, Giri

    In January 2012, the World Economic Forum made cyber attacks its fourth top global risk. In the 2013 risk report, cyber attacks were noted to be an even higher risk in absolute terms. The reliance of critical infrastructure on cyber working has never been higher; the frequency, intensity, impact and sophistication of attacks is growing. This trend looks likely to continue. It can be argued that it is no longer a question whether an organisation will be successfully hacked, but how long it will take to detect. In the ever-changing cyber environment, traditional protection techniques and reliance on preventive controls are not enough. A more agile approach is required to give assurance of a sufficiently secure digital society. Are we faced with a paradigm shift or a storm in a digital teacup? This paper offers an introduction to why cyber is important, a wider taxonomy on the topic and some historical context on how the discipline of cyber security has evolved, and an interpretation on what this means in the new normal of today.

  9. Research in DRM architecture based on watermarking and PKI

    NASA Astrophysics Data System (ADS)

    Liu, Ligang; Chen, Xiaosu; Xiao, Dao-ju; Yi, Miao

    2005-02-01

    Analyze the virtue and disadvantage of the present digital copyright protecting system, design a kind of security protocol model of digital copyright protection, which equilibrium consider the digital media"s use validity, integrality, security of transmission, and trade equity, make a detailed formalize description to the protocol model, analyze the relationship of the entities involved in the digital work copyright protection. The analysis of the security and capability of the protocol model shows that the model is good at security and practicability.

  10. Multinational Counter-Piracy Operations: How Strategically Significant is the Gulf of Guinea to the Major Maritime Powers

    DTIC Science & Technology

    2015-12-01

    DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words ) Piracy in the Gulf of Guinea regularly exceeded that of the Gulf of Aden between 2000 and 2007. But...flow of goods is the flow of services, which in today’s computer-centric world travels electronically in digital bits and bytes through fiber optic...piracy prosecutions, among others. Second order costs include fisheries, food security and food price inflation, tourism , and environmental pollution

  11. Enhanced optical security by using information carrier digital screening

    NASA Astrophysics Data System (ADS)

    Koltai, Ferenc; Adam, Bence

    2004-06-01

    Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.

  12. Sub-pixel analysis to support graphic security after scanning at low resolution

    NASA Astrophysics Data System (ADS)

    Haas, Bertrand; Cordery, Robert; Gou, Hongmei; Decker, Steve

    2006-02-01

    Whether in the domain of audio, video or finance, our world tends to become increasingly digital. However, for diverse reasons, the transition from analog to digital is often much extended in time, and proceeds by long steps (and sometimes never completes). One such step is the conversion of information on analog media to digital information. We focus in this paper on the conversion (scanning) of printed documents to digital images. Analog media have the advantage over digital channels that they can harbor much imperceptible information that can be used for fraud detection and forensic purposes. But this secondary information usually fails to be retrieved during the conversion step. This is particularly relevant since the Check-21 act (Check Clearing for the 21st Century act) became effective in 2004 and allows images of checks to be handled by banks as usual paper checks. We use here this situation of check scanning as our primary benchmark for graphic security features after scanning. We will first present a quick review of the most common graphic security features currently found on checks, with their specific purpose, qualities and disadvantages, and we demonstrate their poor survivability after scanning in the average scanning conditions expected from the Check-21 Act. We will then present a novel method of measurement of distances between and rotations of line elements in a scanned image: Based on an appropriate print model, we refine direct measurements to an accuracy beyond the size of a scanning pixel, so we can then determine expected distances, periodicity, sharpness and print quality of known characters, symbols and other graphic elements in a document image. Finally we will apply our method to fraud detection of documents after gray-scale scanning at 300dpi resolution. We show in particular that alterations on legitimate checks or copies of checks can be successfully detected by measuring with sub-pixel accuracy the irregularities inherently introduced by the illegitimate process.

  13. The Digital Divide: A Global View

    NASA Astrophysics Data System (ADS)

    Ntoko, Alexander

    2011-04-01

    Huge progress was made in bridging the digital divide in first decade of 21^st century. This was largely due to the explosive growth of mobile, which saw numbers rise from under 500 million to over five billion mobile cellular subscriptions in just ten years. With household mobile penetration rates of over 50% even in rural areas of developing countries, we have achieved the dream of bringing all the world's people within reach of communications technology. We must now, however, replicate the mobile miracle for the Internet, and especially broadband, if we are to avoid creating a new broadband breach to replace the digital divide. Three things need to happen for this to be achieved: firstly, broadband needs to be brought to the top of the development agenda; secondly, broadband needs to become much more affordable and thirdly, security needs to be part of the strategy.

  14. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.

    PubMed

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-06-15

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.

  15. Cloud computing and cloud security in China

    NASA Astrophysics Data System (ADS)

    Zhang, Shaohe; Jiang, Cuenyun; Wang, Ruxin

    2018-04-01

    We live in the data age. It's not easy to measure the total volume of data stored electronically, but an IDC estimate put the size of the "digital universe" at 0.18 zettabytes in 2006 and is forecasting a tenfold growth by 2011 to 1.8 zettabytes. A zettabyte is 1021 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That's roughly the same order of magnitude as one disk drive for every person in the world.

  16. Realization of Quantum Digital Signatures without the Requirement of Quantum Memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldson, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-07-01

    Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.

  17. Realization of quantum digital signatures without the requirement of quantum memory.

    PubMed

    Collins, Robert J; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J; Andersson, Erika; Jeffers, John; Buller, Gerald S

    2014-07-25

    Digital signatures are widely used to provide security for electronic communications, for example, in financial transactions and electronic mail. Currently used classical digital signature schemes, however, only offer security relying on unproven computational assumptions. In contrast, quantum digital signatures offer information-theoretic security based on laws of quantum mechanics. Here, security against forging relies on the impossibility of perfectly distinguishing between nonorthogonal quantum states. A serious drawback of previous quantum digital signature schemes is that they require long-term quantum memory, making them impractical at present. We present the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors. In our realization, the recipients measure the distributed quantum signature states using a new type of quantum measurement, quantum state elimination. This significantly advances quantum digital signatures as a quantum technology with potential for real applications.

  18. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  19. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    NASA Astrophysics Data System (ADS)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  20. Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Yan, Xin; Zhang, Ling; Wu, Yang; Luo, Youlong; Zhang, Xiaoxing

    2017-02-01

    As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.

  1. A Cyber Security Self-Assessment Method for Nuclear Power Plants

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.

    2004-11-01

    A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less

  2. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  3. Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

    PubMed Central

    Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim

    2016-01-01

    Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358

  4. High-Speed Large-Alphabet Quantum Key Distribution Using Photonic Integrated Circuits

    DTIC Science & Technology

    2014-01-28

    polarizing beam splitter, TDC: time-to-digital converter. Extra&loss& photon/bin frame size QSER secure bpp ECC secure&key&rate& none& 0.0031 64 14...to-digital converter. photon/frame frame size QSER secure bpp ECC secure&key& rate& 1.3 16 9.5 % 2.9 layered LDPC 7.3&Mbps& Figure 24: Operating

  5. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  6. Advanced optical correlation and digital methods for pattern matching—50th anniversary of Vander Lugt matched filter

    NASA Astrophysics Data System (ADS)

    Millán, María S.

    2012-10-01

    On the verge of the 50th anniversary of Vander Lugt’s formulation for pattern matching based on matched filtering and optical correlation, we acknowledge the very intense research activity developed in the field of correlation-based pattern recognition during this period of time. The paper reviews some domains that appeared as emerging fields in the last years of the 20th century and have been developed later on in the 21st century. Such is the case of three-dimensional (3D) object recognition, biometric pattern matching, optical security and hybrid optical-digital processors. 3D object recognition is a challenging case of multidimensional image recognition because of its implications in the recognition of real-world objects independent of their perspective. Biometric recognition is essentially pattern recognition for which the personal identification is based on the authentication of a specific physiological characteristic possessed by the subject (e.g. fingerprint, face, iris, retina, and multifactor combinations). Biometric recognition often appears combined with encryption-decryption processes to secure information. The optical implementations of correlation-based pattern recognition processes still rely on the 4f-correlator, the joint transform correlator, or some of their variants. But the many applications developed in the field have been pushing the systems for a continuous improvement of their architectures and algorithms, thus leading towards merged optical-digital solutions.

  7. Using digital watermarking to enhance security in wireless medical image transmission.

    PubMed

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  8. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  9. Assuring the privacy and security of transmitting sensitive electronic health information.

    PubMed

    Peng, Charlie; Kesarinath, Gautam; Brinks, Tom; Young, James; Groves, David

    2009-11-14

    The interchange of electronic health records between healthcare providers and public health organizations has become an increasingly desirable tool in reducing healthcare costs, improving healthcare quality, and protecting population health. Assuring privacy and security in nationwide sharing of Electronic Health Records (EHR) in an environment such as GRID has become a top challenge and concern. The Centers for Disease Control and Prevention's (CDC) and The Science Application International Corporation (SAIC) have jointly conducted a proof of concept study to find and build a common secure and reliable messaging platform (the SRM Platform) to handle this challenge. The SRM Platform is built on the open standards of OASIS, World Wide Web Consortium (W3C) web-services standards, and Web Services Interoperability (WS-I) specifications to provide the secure transport of sensitive EHR or electronic medical records (EMR). Transmitted data may be in any digital form including text, data, and binary files, such as images. This paper identifies the business use cases, architecture, test results, and new connectivity options for disparate health networks among PHIN, NHIN, Grid, and others.

  10. Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Fujiwara, Mikio; Amiri, Ryan; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Andersson, Erika; Buller, Gerald S.; Sasaki, Masahide

    2016-10-01

    The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable. The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure. There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority. Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.

  11. Use of a wireless local area network in an orthodontic clinic.

    PubMed

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  12. Digitally Controlled ’Programmable’ Active Filters.

    DTIC Science & Technology

    1985-12-01

    Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR

  13. Managing in the Virtual World: How Second Life is Rewriting the Rules of "Real Life" Business

    NASA Astrophysics Data System (ADS)

    Wyld, David C.

    In this paper, we will explore the growth of virtual worlds - one of the most exciting and fast-growing concepts in the Web 2.0 era. We will see that while there has been significant growth across all demographic groups, online gaming in MMOGs (Massively Multiplayer Online Games) are finding particular appeal in today's youth - the so-called "digital native" generation. We then overview the today's virtual world marketplace, both in the youth and adult-oriented markets. Second Life is emerging as the most important virtual world today, due to the intense interest amongst both large organizations and individual entrepreneurs to conduct real business in the virtual environment. Due to its prominence today and its forecasted growth over the next decade, we take a look at the unscripted world of Second Life, examining the corporate presence in-world, as well as the economic, technical, legal, ethical and security issues involved for companies doing business in the virtual world. In conclusion, we present an analysis of where we stand in terms of virtual world development today and a projection of where we will be heading in the near future. Finally, we present advice to management practitioners and academicians on how to learn about virtual worlds and explore the world of opportunities in them.

  14. 78 FR 13139 - In the Matter of Digital Video Systems, Inc., Geocom Resources, Inc., and GoldMountain...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Digital Video Systems, Inc., Geocom Resources, Inc., and GoldMountain Exploration Corp., and Real Data, Inc. (a/k/a Galtech... securities of Digital Video Systems, Inc. because it has not filed any periodic reports since the period...

  15. Evaluation of security algorithms used for security processing on DICOM images

    NASA Astrophysics Data System (ADS)

    Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.

    2005-04-01

    In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.

  16. Securing Digital Audio using Complex Quadratic Map

    NASA Astrophysics Data System (ADS)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  17. Soil Security Assessment of Tasmania

    NASA Astrophysics Data System (ADS)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  18. The Internet and medicine: past, present, and future.

    PubMed

    Doyle, D J; Ruskin, K J; Engel, T P

    1996-01-01

    The enormous growth of the Internet and the World Wide Web has made these two technologies an important potential adjunct to cost-effective health care research and delivery. This article surveys some recent developments in telecommunications, networking and artificial intelligence that are likely to have a significant impact on improving the efficiency and quality of future health care. Issues discussed include: clinical record keeping on the Internet, Internet-assisted medical diagnosis, privacy and security matters, financial transactions, digital money, bandwidth concerns, multimedia (music, audio and video) information delivery via the Internet, intellectual property, and the concept of Information Philanthropy.

  19. The Internet and medicine: past, present, and future.

    PubMed Central

    Doyle, D. J.; Ruskin, K. J.; Engel, T. P.

    1996-01-01

    The enormous growth of the Internet and the World Wide Web has made these two technologies an important potential adjunct to cost-effective health care research and delivery. This article surveys some recent developments in telecommunications, networking and artificial intelligence that are likely to have a significant impact on improving the efficiency and quality of future health care. Issues discussed include: clinical record keeping on the Internet, Internet-assisted medical diagnosis, privacy and security matters, financial transactions, digital money, bandwidth concerns, multimedia (music, audio and video) information delivery via the Internet, intellectual property, and the concept of Information Philanthropy. PMID:9381738

  20. Maritime Cyber Security University Research

    DTIC Science & Technology

    2016-05-01

    traffic so vital to the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously...Abstract (MAXIMUM 200 WORDS) Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping...integrity of the entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime

  1. Maritime Cyber Security University Research: Phase 1

    DTIC Science & Technology

    2016-05-01

    the global economy . The vulnerabilities associated with reliance on digital systems in the maritime environment must be continuously examined. System...Report: Modern maritime systems are highly complex digital systems to ensure the safety and efficient operation of the shipping traffic so vital to...entrances to our " digital ports" and work to develop practical cyber security solutions to protect the nation’s maritime infrastructure. 17. Key

  2. Security Research on VoIP with Watermarking

    NASA Astrophysics Data System (ADS)

    Hu, Dong; Lee, Ping

    2008-11-01

    With the wide application of VoIP, many problems have occurred. One of the problems is security. The problems with securing VoIP systems, insufficient standardization and lack of security mechanisms emerged the need for new approaches and solutions. In this paper, we propose a new security architecture for VoIP which is based on digital watermarking which is a new, flexible and powerful technology that is increasingly gaining more and more attentions. Besides known applications e.g. to solve copyright protection problems, we propose to use digital watermarking to secure not only transmitted audio but also signaling protocol that VoIP is based on.

  3. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  4. 75 FR 35508 - Draft Regulatory Guide: Issuance, Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-22

    ... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...

  5. Web Server Security on Open Source Environments

    NASA Astrophysics Data System (ADS)

    Gkoutzelis, Dimitrios X.; Sardis, Manolis S.

    Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.

  6. A Secure Information Framework with APRQ Properties

    NASA Astrophysics Data System (ADS)

    Rupa, Ch.

    2017-08-01

    Internet of the things is the most trending topics in the digital world. Security issues are rampant. In the corporate or institutional setting, security risks are apparent from the outset. Market leaders are unable to use the cryptographic techniques due to their complexities. Hence many bits of private information, including ID, are readily available for third parties to see and to utilize. There is a need to decrease the complexity and increase the robustness of the cryptographic approaches. In view of this, a new cryptographic technique as good encryption pact with adjacency, random prime number and quantum code properties has been proposed. Here, encryption can be done by using quantum photons with gray code. This approach uses the concepts of physics and mathematics with no external key exchange to improve the security of the data. It also reduces the key attacks by generation of a key at the party side instead of sharing. This method makes the security more robust than with the existing approach. Important properties of gray code and quantum are adjacency property and different photons to a single bit (0 or 1). These can reduce the avalanche effect. Cryptanalysis of the proposed method shows that it is resistant to various attacks and stronger than the existing approaches.

  7. Digital camera with apparatus for authentication of images produced from an image file

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1993-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely based upon the private key that digital data encrypted with the private key by the processor may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating at any time the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match, since even one bit change in the image hash will cause the image hash to be totally different from the secure hash.

  8. 77 FR 60984 - World Digital Innovations; Supplemental Notice That Initial Market-Based Rate Filing Includes...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER12-2654-001] World Digital Innovations; Supplemental Notice That Initial Market-Based Rate Filing Includes Request for Blanket Section 204 Authorization This is a supplemental notice in the above-referenced proceeding, of World Digital...

  9. The new color of money: safer, smarter, more secure

    NASA Astrophysics Data System (ADS)

    DiNunzio, Lisa A.; Clarke, Lenore

    2004-06-01

    Approximately 60% of U.S. currency notes circulate abroad. As the most widely used currency in the world, U.S. notes are the most likely to be counterfeited. Since 1996, the United States has been issuing currency with new security features. These features make U.S. currency easier to recognize as genuine and more secure against advancing computer technology that could be used for counterfeiting. Currency counterfeiters are increasingly turning to digital methods, as advances in technology make digital counterfeiting of currency easier and cheaper. In 1995, for example, less than one percent of counterfeit notes detected in the U.S. were digitally produced. By 2002, that number had grown to nearly 40 percent, according to the Secret Service. Yet despite the efforts of counterfeiters, U.S. currency counterfeiting has been kept at low levels. According to current estimates, between 0.01 and 0.02 percent of notes in circulation are counterfeit, or about 1-2 notes in every 10,000 genuine notes. The strategy for maintaining the security of Federal Reserve notes is to enhance the design of U.S. currency every seven to ten years. One objective of introducing the new currency is to emphasize the number of features available to the public for authenticating bills. The most-talked-about aspect of the redesigned currency is the subtle introduction of background colors to the bills. While color itself is not a security feature, the use of color provides the opportunity to add features that could assist in deterring counterfeiting. Color will also help people to better distinguish their notes. Security features for the newly designed currency include a security thread, a watermark, and a more distinct color-shifting ink. The new 20 note was issued in fall 2003, with the 50 and 100 notes scheduled to follow 12 to 18 months later. Plans to redesign the 10 and 5 are still under consideration, but there are no plans to redesign the 2 and 1 notes. As was the case with the redesigned 20 note issued in 1998, the new design will co-circulate with the current design. As notes return to the Federal Reserve from depository institutions, the Federal Reserve will only destroy the unfit notes introduced since 1998. Designs older than the Series 1996 are destroyed when returned to the Federal Reserve regardless of condition. To ensure a smooth introduction of the new currency, a five-year international public education effort was launched in 2002 to inform the public and target audiences, including financial institutions, law enforcement, and the vending industry of the transition to the new design. The public is the first line of defense against counterfeiting. So, it's important the public has the tools to recognize the new and modified security features in the redesigned notes.

  10. 77 FR 70176 - Previous Participation Certification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-23

    ... percent automated and digital submission of all data and certifications is available via HUD's secure... information is designed to be 100 percent automated and digital submission of all data and certifications is available via HUD's secure Internet systems. However HUD will provide for both electronic and paper...

  11. Digitizing and Securing Archived Laboratory Notebooks

    ERIC Educational Resources Information Center

    Caporizzo, Marilyn

    2008-01-01

    The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…

  12. Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light

    PubMed Central

    Clarke, Patrick J.; Collins, Robert J.; Dunjko, Vedran; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2012-01-01

    Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called ‘one-way' mathematical functions is used to provide security over sufficiently long timescales. No mathematical proofs are known for the long-term security of such techniques. Quantum digital signatures offer a means of sending a message, which cannot be forged or repudiated, with security verified by information-theoretical limits and quantum mechanics. Here we demonstrate an experimental system, which distributes quantum signatures from one sender to two receivers and enables message sending ensured against forging and repudiation. Additionally, we analyse the security of the system in some typical scenarios. Our system is based on the interference of phase-encoded coherent states of light and our implementation utilizes polarization-maintaining optical fibre and photons with a wavelength of 850 nm. PMID:23132024

  13. Network-based reading system for lung cancer screening CT

    NASA Astrophysics Data System (ADS)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  14. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

  15. Experimental measurement-device-independent quantum digital signatures over a metropolitan network

    NASA Astrophysics Data System (ADS)

    Yin, Hua-Lei; Wang, Wei-Long; Tang, Yan-Lin; Zhao, Qi; Liu, Hui; Sun, Xiang-Xiang; Zhang, Wei-Jun; Li, Hao; Puthoor, Ittoop Vergheese; You, Li-Xing; Andersson, Erika; Wang, Zhen; Liu, Yang; Jiang, Xiao; Ma, Xiongfeng; Zhang, Qiang; Curty, Marcos; Chen, Teng-Yun; Pan, Jian-Wei

    2017-04-01

    Quantum digital signatures (QDSs) provide a means for signing electronic communications with information-theoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here we exploit a measurement-device-independent (MDI) quantum network, over a metropolitan area, to perform a field test of a three-party MDI QDS scheme that is secure against any detector side-channel attack. In so doing, we are able to successfully sign a binary message with a security level of about 10-7. Remarkably, our work demonstrates the feasibility of MDI QDSs for practical applications.

  16. Leap Frog Digital Sensors and Definition, Integration & Testing FY 2003 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Shoemaker, Steven V.

    2003-12-31

    The objective of Leap Frog is to develop a comprehensive security tool that is transparent to the user community and more effective than current methods for preventing and detecting security compromises of critical physical and digital assets. Current security tools intrude on the people that interact with these critical assets by requiring them to perform additional functions or having additional visible sensors. Leap Frog takes security to the next level by being more effective and reducing the adverse impact on the people interacting with protected assets.

  17. Safeguarding Digital Library Contents: Charging for Online Content.

    ERIC Educational Resources Information Center

    Herzberg, Amir

    1998-01-01

    Investigates the need for mechanisms for charging by digital libraries and other providers of online content, in particular for micropayments, i.e., charging for small amounts. The SSL (Secure Socket Layer) and SET (Secure Electronic Transactions) protocols for charge card payments and the MiniPay micropayment mechanism for charging small amounts…

  18. 76 FR 18738 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-05

    ... Records in the System: First, middle and last name, nickname, last four digits of Social Security Number..., Accessing, Retaining, and Disposing of Records: Storage: Records are stored on electronic storage media... characteristics (such as name, last four digits of Social Security Number (SSN), series, grade, dates of service...

  19. 76 FR 28499 - Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...

  20. Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter

    NASA Astrophysics Data System (ADS)

    Siregar, H.; Junaeti, E.; Hayatno, T.

    2017-03-01

    Activities correspondence is often used by agencies or companies, so that institutions or companies set up a special division to handle issues related to the letter management. Most of the distribution of letters using electronic media, then the letter should be kept confidential in order to avoid things that are not desirable. Techniques that can be done to meet the security aspect is by using cryptography or by giving a digital signature. The addition of asymmetric and symmetric algorithms, i.e. RSA and AES algorithms, on the digital signature had been done in this study to maintain data security. The RSA algorithm was used during the process of giving digital signature, while the AES algorithm was used during the process of encoding a message that will be sent to the receiver. Based on the research can be concluded that the additions of AES and RSA algorithms on the digital signature meet four objectives of cryptography: Secrecy, Data Integrity, Authentication and Non-repudiation.

  1. Practical quantum digital signature

    NASA Astrophysics Data System (ADS)

    Yin, Hua-Lei; Fu, Yao; Chen, Zeng-Bing

    2016-03-01

    Guaranteeing nonrepudiation, unforgeability as well as transferability of a signature is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretic security for this cryptographic task. However, up to date, the previously proposed QDS protocols are impractical due to various challenging problems and most importantly, the requirement of authenticated (secure) quantum channels between participants. Here, we present the first quantum digital signature protocol that removes the assumption of authenticated quantum channels while remaining secure against the collective attacks. Besides, our QDS protocol can be practically implemented over more than 100 km under current mature technology as used in quantum key distribution.

  2. Security Sector Reform’s Utility in Conflict Prevention

    DTIC Science & Technology

    2013-12-10

    Publications, 1994), 18. 40 Many of these countries in Africa are states in name only due to ill defined borders, fiscal limitations, nomadic ...Security Watch, 12 OCT 2009), Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013]. 85...ISN Security Watch, 12 OCT 2009. Online at http://www.isn.ethz.ch/isn/ Digital -Library/Articles/Detail/?lng= en&id= 108451[accessed on 27 May 2013

  3. MEMS reliability: coming of age

    NASA Astrophysics Data System (ADS)

    Douglass, Michael R.

    2008-02-01

    In today's high-volume semiconductor world, one could easily take reliability for granted. As the MOEMS/MEMS industry continues to establish itself as a viable alternative to conventional manufacturing in the macro world, reliability can be of high concern. Currently, there are several emerging market opportunities in which MOEMS/MEMS is gaining a foothold. Markets such as mobile media, consumer electronics, biomedical devices, and homeland security are all showing great interest in microfabricated products. At the same time, these markets are among the most demanding when it comes to reliability assurance. To be successful, each company developing a MOEMS/MEMS device must consider reliability on an equal footing with cost, performance and manufacturability. What can this maturing industry learn from the successful development of DLP technology, air bag accelerometers and inkjet printheads? This paper discusses some basic reliability principles which any MOEMS/MEMS device development must use. Examples from the commercially successful and highly reliable Digital Micromirror Device complement the discussion.

  4. The Digital Natives Are Restless: Inspiring a New Generation of Learners

    ERIC Educational Resources Information Center

    Rudi, Alan

    2012-01-01

    The current crop of "digital natives"--kids born into a world of modern technology--has been immersed in a world of video games, computers, digital music players, and cell phones from an early age. Shaped by the Internet, Google searches, and instant messaging, they can't imagine life without technology. Theirs is a vastly different world from…

  5. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-03

    ...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...

  6. Prototype system of secure VOD

    NASA Astrophysics Data System (ADS)

    Minemura, Harumi; Yamaguchi, Tomohisa

    1997-12-01

    Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.

  7. Study and validation of tools interoperability in JPSEC

    NASA Astrophysics Data System (ADS)

    Conan, V.; Sadourny, Y.; Jean-Marie, K.; Chan, C.; Wee, S.; Apostolopoulos, J.

    2005-08-01

    Digital imagery is important in many applications today, and the security of digital imagery is important today and is likely to gain in importance in the near future. The emerging international standard ISO/IEC JPEG-2000 Security (JPSEC) is designed to provide security for digital imagery, and in particular digital imagery coded with the JPEG-2000 image coding standard. One of the primary goals of a standard is to ensure interoperability between creators and consumers produced by different manufacturers. The JPSEC standard, similar to the popular JPEG and MPEG family of standards, specifies only the bitstream syntax and the receiver's processing, and not how the bitstream is created or the details of how it is consumed. This paper examines the interoperability for the JPSEC standard, and presents an example JPSEC consumption process which can provide insights in the design of JPSEC consumers. Initial interoperability tests between different groups with independently created implementations of JPSEC creators and consumers have been successful in providing the JPSEC security services of confidentiality (via encryption) and authentication (via message authentication codes, or MACs). Further interoperability work is on-going.

  8. Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    NASA Astrophysics Data System (ADS)

    Dittmann, Jana; Steinebach, Martin; Croce Ferri, Lucilla

    2002-04-01

    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.

  9. Realization and optimization of AES algorithm on the TMS320DM6446 based on DaVinci technology

    NASA Astrophysics Data System (ADS)

    Jia, Wen-bin; Xiao, Fu-hai

    2013-03-01

    The application of AES algorithm in the digital cinema system avoids video data to be illegal theft or malicious tampering, and solves its security problems. At the same time, in order to meet the requirements of the real-time, scene and transparent encryption of high-speed data streams of audio and video in the information security field, through the in-depth analysis of AES algorithm principle, based on the hardware platform of TMS320DM6446, with the software framework structure of DaVinci, this paper proposes the specific realization methods of AES algorithm in digital video system and its optimization solutions. The test results show digital movies encrypted by AES128 can not play normally, which ensures the security of digital movies. Through the comparison of the performance of AES128 algorithm before optimization and after, the correctness and validity of improved algorithm is verified.

  10. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Donaldon, Ross J.; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2014-10-01

    Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

  11. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    NASA Astrophysics Data System (ADS)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and to indicate degradations.

  12. Systems and methods for performing wireless financial transactions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCown, Steven Harvey

    2012-07-03

    A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less

  13. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    NASA Astrophysics Data System (ADS)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  14. DigitalGlobe(TM) Incorporated Corporate and System Update

    NASA Technical Reports Server (NTRS)

    Thomassie, Brett

    2007-01-01

    This viewgraph presentation describes a system update of Quickbird, the world's highest resolution commercial imaging satellite, operated by DigitalGlobe (TM) Incorporated. A satellite comparison of Quickbird, WorldView-60, and WorldView-110 is also presented.

  15. Alternative security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  16. 3D Digital Legos for Teaching Security Protocols

    ERIC Educational Resources Information Center

    Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao

    2011-01-01

    We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…

  17. Digital rights management for digital cinema

    NASA Astrophysics Data System (ADS)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  18. Virtual Worlds and the Learner Hero: How Today's Video Games Can Inform Tomorrow's Digital Learning Environments

    ERIC Educational Resources Information Center

    Rigby, C. Scott; Przybylski, Andrew K.

    2009-01-01

    Participation in expansive video games called "virtual worlds" has become a mainstream leisure activity for tens of millions of people around the world. The growth of this industry and the strong motivational appeal of these digital worlds invite a closer examination as to how educators can learn from today's virtual worlds in the development of…

  19. The impact of European Registers of Road Transport Undertakings on security and enforcement of the system of digital tachograph

    NASA Astrophysics Data System (ADS)

    Rychter, M.; Rychter, R.

    2016-09-01

    Secure digital tachograph system is indisputably a means having the great influence on road safety, enforcement of the social conditions for drivers in road transport as well as supporting the fair competition between road transport undertakings. In order to better monitor the compliance of road transport with the rules in force, inter alia the provisions on usage the digital tachographs, the European Union regulation introduces the European Registers of Road Transport Undertakings (ERRU), a system that allows a better exchange of information between Member States. The main purpose of this analysis is to present the measures for enforcement the execution of the provisions on obligation of installation and usage of digital tachographs in road transport and for improving the security of data recorded within digital tachograph system especially through exchange of the information on the most serious infringements committed by hauliers in any Member State, which may lead to the loss of good repute and the e-document engineering method used by the ERRU system.

  20. Real-time terahertz digital holography with a quantum cascade laser

    PubMed Central

    Locatelli, Massimiliano; Ravaro, Marco; Bartalini, Saverio; Consolino, Luigi; Vitiello, Miriam S.; Cicchi, Riccardo; Pavone, Francesco; De Natale, Paolo

    2015-01-01

    Coherent imaging in the THz range promises to exploit the peculiar capabilities of these wavelengths to penetrate common materials like plastics, ceramics, paper or clothes with potential breakthroughs in non-destructive inspection and quality control, homeland security and biomedical applications. Up to now, however, THz coherent imaging has been limited by time-consuming raster scanning, point-like detection schemes and by the lack of adequate coherent sources. Here, we demonstrate real-time digital holography (DH) at THz frequencies exploiting the high spectral purity and the mW output power of a quantum cascade laser combined with the high sensitivity and resolution of a microbolometric array. We show that, in a one-shot exposure, phase and amplitude information of whole samples, either in reflection or in transmission, can be recorded. Furthermore, a 200 times reduced sensitivity to mechanical vibrations and a significantly enlarged field of view are observed, as compared to DH in the visible range. These properties of THz DH enable unprecedented holographic recording of real world dynamic scenes. PMID:26315647

  1. Confronting the Digital Divide: Debunking Brave New World Discourses

    ERIC Educational Resources Information Center

    Rowsell, Jennifer; Morrell, Ernest; Alvermann, Donna E.

    2017-01-01

    There is far more to the digital divide than meets the eye. In this article, the authors consolidate existing research on the digital divide to offer some tangible ways for educators to bridge the gap between the haves and have-nots, or the cans and cannots. Drawing on Aldous Huxley's notion of a "brave new world," some digital divide…

  2. Develop security architecture for both in-house healthcare information systems and electronic patient record

    NASA Astrophysics Data System (ADS)

    Zhang, Jianguo; Chen, Xiaomeng; Zhuang, Jun; Jiang, Jianrong; Zhang, Xiaoyan; Wu, Dongqing; Huang, H. K.

    2003-05-01

    In this paper, we presented a new security approach to provide security measures and features in both healthcare information systems (PACS, RIS/HIS), and electronic patient record (EPR). We introduced two security components, certificate authoring (CA) system and patient record digital signature management (DSPR) system, as well as electronic envelope technology, into the current hospital healthcare information infrastructure to provide security measures and functions such as confidential or privacy, authenticity, integrity, reliability, non-repudiation, and authentication for in-house healthcare information systems daily operating, and EPR exchanging among the hospitals or healthcare administration levels, and the DSPR component manages the all the digital signatures of patient medical records signed through using an-symmetry key encryption technologies. The electronic envelopes used for EPR exchanging are created based on the information of signers, digital signatures, and identifications of patient records stored in CAS and DSMS, as well as the destinations and the remote users. The CAS and DSMS were developed and integrated into a RIS-integrated PACS, and the integration of these new security components is seamless and painless. The electronic envelopes designed for EPR were used successfully in multimedia data transmission.

  3. PDF file encryption on mobile phone using super-encryption of Variably Modified Permutation Composition (VMPC) and two square cipher algorithm

    NASA Astrophysics Data System (ADS)

    Rachmawati, D.; Budiman, M. A.; Atika, F.

    2018-03-01

    Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.

  4. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  5. World population, world health and security: 20th century trends.

    PubMed

    Bashford, A

    2008-03-01

    The connection between infectious disease control and national security is now firmly entrenched. This article takes a historical look at another security issue once prominent in debate on foreign policy and international relations, but now more or less absent: overpopulation. It explores the nature of the debate on population as a security question, and its complicated historical relation to the development of world health.

  6. A Fast lattice-based polynomial digital signature system for m-commerce

    NASA Astrophysics Data System (ADS)

    Wei, Xinzhou; Leung, Lin; Anshel, Michael

    2003-01-01

    The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.

  7. Science beyond fiction. A revolution of knowledge transfer in research, education, and practice is on the horizon.

    PubMed

    Ammann, Alexander

    2016-01-01

    "Digitality" (as opposed to "digitalization"--the conversion from the analog domain to the digital domain) will open up a whole new world that does not originate from the analog world. Contemporary research in the field of neural concepts and neuromorphic computing systems will lead to convergences between the world of digitality and the world of neuronality, giving the theme "Knowledge and Culture" a new meaning. The simulation of virtual multidimensional and contextual spaces will transform the transfer of knowledge from a uni- and bidirectional process into an interactive experience. We will learn to learn in a ubiquitous computing environment and will abandon conventional curriculum organization principles. The adaptation of individualized ontologies will result in the emergence of a new world of knowledge in which knowledge evolves from a cultural heritage into a commodity.

  8. Digital questionnaire platform in the Danish Blood Donor Study.

    PubMed

    Burgdorf, K S; Felsted, N; Mikkelsen, S; Nielsen, M H; Thørner, L W; Pedersen, O B; Sørensen, E; Nielsen, K R; Bruun, M T; Werge, T; Erikstrup, C; Hansen, T; Ullum, H

    2016-10-01

    The Danish Blood Donor Study (DBDS) is a prospective, population-based study and biobank. Since 2010, 100,000 Danish blood donors have been included in the study. Prior to July 2015 all participating donors had to complete a paper-based questionnaire. Here we describe the establishment of a digital tablet-based questionnaire platform implemented in blood bank sites across Denmark. The digital questionnaire was developed using the open source survey software tool LimeSurvey. The participants accesses the questionnaire online with a standard SSL encrypted HTTP connection using their personal civil registration numbers. The questionnaire is placed at a front-end web server and a collection server retrieves the completed questionnaires. Data from blood samples, register data, genetic data and verification of signed informed consent are then transferred to and merged with the questionnaire data in the DBDS database. The digital platform enables personalized questionnaires, presenting only questions relevant to the specific donor by hiding unneeded follow-up questions on screening question results. New versions of questionnaires are immediately available at all blood collection facilities when new projects are initiated. The digital platform is a faster, cost-effective and more flexible solution to collect valid data from participating donors compared to paper-based questionnaires. The overall system can be used around the world by the use of Internet connection, but the level of security depends on the sensitivity of the data to be collected. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  9. Theft of Virtual Property — Towards Security Requirements for Virtual Worlds

    NASA Astrophysics Data System (ADS)

    Beyer, Anja

    The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.

  10. Introducing AgilePQ DCM (Digital Conversion Module) - Video Text Version

    Science.gov Websites

    monolith. There's not one thing you do to make things digitally secure. We talk in terms of confidentiality enable these nonfunctional attributes. There's not, as I said, one thing you can do to satisfy the whole subject of cyber security. And there's not one thing you can do to fully enable these nonfunctional

  11. Authentication, integrity, and confidentiality in DICOM-structured reporting: concept and implementation

    NASA Astrophysics Data System (ADS)

    Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.

    2002-05-01

    With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.

  12. Vulnerabilities in GSM technology and feasibility of selected attacks

    NASA Astrophysics Data System (ADS)

    Voznak, M.; Prokes, M.; Sevcik, L.; Frnda, J.; Toral-Cruz, Homer; Jakovlev, Sergej; Fazio, Peppino; Mehic, M.; Mikulec, M.

    2015-05-01

    Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem's occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting - Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

  13. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers.

    PubMed

    Zapateiro De la Hoz, Mauricio; Acho, Leonardo; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes.

  14. Wireless local area network for the dental office.

    PubMed

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  15. Three Essays on Digital Evolution

    ERIC Educational Resources Information Center

    Zhang, Zhewei

    2016-01-01

    Digital products are rapidly shaping our world into a ubiquitous computing world. Because of its unique characteristics, digital artifacts are generative and highly evolving through the recombination of existing elements as well as by the invention of new elements. In this thesis, I first propose an evolutionary view to examine how digital…

  16. Divergence of Digital World of Teachers

    ERIC Educational Resources Information Center

    Uzunboylu, Huseyin; Tuncay, Nazime

    2010-01-01

    There exists great diversity in the teachers' digital world. Teachers are being discriminated based on numerous educational gaps. This paper seeks to assess the extent of the digital divide among the North Cyprus vocational teachers along the four axes: age, Internet access, computer access, and performance (computing knowledge/experience). A…

  17. Uniting the paper and digital worlds.

    PubMed

    Schreiner, Keri

    2008-01-01

    Digital pen and paper technologies are increasingly popular in vertical markets such as health care, but the broad market of everyday consumers remains untapped. In the past year, several developers targeting that market have focused on notetakers-whether journalists, lawyers, or students-in the hope of uniting the paper and digital worlds.

  18. Firefly: an optical lithographic system for the fabrication of holographic security labels

    NASA Astrophysics Data System (ADS)

    Calderón, Jorge; Rincón, Oscar; Amézquita, Ricardo; Pulido, Iván.; Amézquita, Sebastián.; Bernal, Andrés.; Romero, Luis; Agudelo, Viviana

    2016-03-01

    This paper introduces Firefly, an optical lithography origination system that has been developed to produce holographic masters of high quality. This mask-less lithography system has a resolution of 418 nm half-pitch, and generates holographic masters with the optical characteristics required for security applications of level 1 (visual verification), level 2 (pocket reader verification) and level 3 (forensic verification). The holographic master constitutes the main core of the manufacturing process of security holographic labels used for the authentication of products and documents worldwide. Additionally, the Firefly is equipped with a software tool that allows for the hologram design from graphic formats stored in bitmaps. The software is capable of generating and configuring basic optical effects such as animation and color, as well as effects of high complexity such as Fresnel lenses, engraves and encrypted images, among others. The Firefly technology gathers together optical lithography, digital image processing and the most advanced control systems, making possible a competitive equipment that challenges the best technologies in the industry of holographic generation around the world. In this paper, a general description of the origination system is provided as well as some examples of its capabilities.

  19. Lighting in digital game worlds: effects on affect and play performance.

    PubMed

    Knez, Igor; Niedenthal, Simon

    2008-04-01

    As a means of extending the significance of findings in experimental psychology and nonvisual psychological lighting research to digital game research, the present study was designed to investigate the impact of warm (reddish) and cool (bluish) simulated illumination in digital game worlds on game users' affect and play performance. In line with some previous findings, we predicted that lighting in a digital game world might, as in the real world, differently influence the nonvisual psychological mechanisms of affect, which in turn might enhance or impair the players' performance. It was shown that the players performed best and fastest in a game world lit with a warm (reddish) as compared to a cool (bluish) lighting. The former color of lighting also induced the highest level of pleasantness in game users. A regression analysis indicated tentatively that it was the level of pleasantness induced by the warm lighting that enhanced the players' better performance in that digital game world. It was also shown that high- as opposed to medium- or low-skilled players engage almost 2.5 times more per week in game playing. Given their skill, they performed significantly faster and felt significantly calmer and more relaxed in doing so.

  20. The application of data encryption technology in computer network communication security

    NASA Astrophysics Data System (ADS)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  1. Digital image envelope: method and evaluation

    NASA Astrophysics Data System (ADS)

    Huang, H. K.; Cao, Fei; Zhou, Michael Z.; Mogel, Greg T.; Liu, Brent J.; Zhou, Xiaoqiang

    2003-05-01

    Health data security, characterized in terms of data privacy, authenticity, and integrity, is a vital issue when digital images and other patient information are transmitted through public networks in telehealth applications such as teleradiology. Mandates for ensuring health data security have been extensively discussed (for example The Health Insurance Portability and Accountability Act, HIPAA) and health informatics guidelines (such as the DICOM standard) are beginning to focus on issues of data continue to be published by organizing bodies in healthcare; however, there has not been a systematic method developed to ensure data security in medical imaging Because data privacy and authenticity are often managed primarily with firewall and password protection, we have focused our research and development on data integrity. We have developed a systematic method of ensuring medical image data integrity across public networks using the concept of the digital envelope. When a medical image is generated regardless of the modality, three processes are performed: the image signature is obtained, the DICOM image header is encrypted, and a digital envelope is formed by combining the signature and the encrypted header. The envelope is encrypted and embedded in the original image. This assures the security of both the image and the patient ID. The embedded image is encrypted again and transmitted across the network. The reverse process is performed at the receiving site. The result is two digital signatures, one from the original image before transmission, and second from the image after transmission. If the signatures are identical, there has been no alteration of the image. This paper concentrates in the method and evaluation of the digital image envelope.

  2. Optical design of cipher block chaining (CBC) encryption mode by using digital holography

    NASA Astrophysics Data System (ADS)

    Gil, Sang Keun; Jeon, Seok Hee; Jung, Jong Rae; Kim, Nam

    2016-03-01

    We propose an optical design of cipher block chaining (CBC) encryption by using digital holographic technique, which has higher security than the conventional electronic method because of the analog-type randomized cipher text with 2-D array. In this paper, an optical design of CBC encryption mode is implemented by 2-step quadrature phase-shifting digital holographic encryption technique using orthogonal polarization. A block of plain text is encrypted with the encryption key by applying 2-step phase-shifting digital holography, and it is changed into cipher text blocks which are digital holograms. These ciphered digital holograms with the encrypted information are Fourier transform holograms and are recorded on CCDs with 256 gray levels quantized intensities. The decryption is computed by these encrypted digital holograms of cipher texts, the same encryption key and the previous cipher text. Results of computer simulations are presented to verify that the proposed method shows the feasibility in the high secure CBC encryption system.

  3. 77 FR 73509 - Emerging World Pharma, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Emerging World Pharma, Inc.; Order of... lack of current and accurate information concerning the securities of Emerging World Pharma, Inc. (``Emerging World''). Emerging World is a Florida corporation purportedly based in Manassas, Virginia and...

  4. Secure communications system

    NASA Technical Reports Server (NTRS)

    Doland, G. D.

    1977-01-01

    System employs electronically randomized variant of quadraphase modulation and demodulation between two synchronized transceivers. System uses off-the-shelf components. It may be used with digital data, command signals, delta-modulated voice signals, digital television signals, or other data converted to digital form.

  5. Unfolding Lives in Digital Worlds: Digikid Teachers Revisited

    ERIC Educational Resources Information Center

    Graham, Lynda

    2012-01-01

    In this paper, I describe ongoing research exploring ways in which young teachers' digital lives unfold inside and outside classrooms. I first interviewed teachers in 2006, and identified three different routes into digital worlds: serious solitary self-taught, serious solitary school-taught and playful social. A number of teachers agreed to be…

  6. The Economic Impact on Future European Security.

    DTIC Science & Technology

    1991-07-01

    countries in the developing tripolar scenario, I purposely focused this discussion on economics within the realm of Europe with some consideration of...security definitions of a bipolar world to a world of what some would like to consider as multipolar, but is actually evolving into a tripolar world of U.S...Europe-Japan based on economic security.1 In his article describing the new tripolar world, Mr. Bergsten quotes historian Robert Gilpin’s statement

  7. Memory skills mediating superior memory in a world-class memorist.

    PubMed

    Ericsson, K Anders; Cheng, Xiaojun; Pan, Yafeng; Ku, Yixuan; Ge, Yi; Hu, Yi

    2017-10-01

    Laboratory studies have investigated how individuals with normal memory spans attained digit spans over 80 digits after hundreds of hours of practice. Experimental analyses of their memory skills suggested that their attained memory spans were constrained by the encoding time, for the time needed will increase if the length of digit sequences to be memorised becomes longer. These constraints seemed to be violated by a world-class memorist, Feng Wang (FW), who won the World Memory Championship by recalling 300 digits presented at 1 digit/s. In several studies we examined FW's memory skills underlying his exceptional performance. First FW reproduced his superior memory span of 200 digits under laboratory condition, and we obtained his retrospective reports describing his encoding/retrieval processes (Experiment 1). Further experiments used self-paced memorisation to identify temporal characteristics of encoding of digits in 4-digit clusters (Experiment 2), and explored memory encoding at presentation speeds much faster than 1 digit/s (Experiment 3). FW's superiority over previous digit span experts is explained by his acquisition of well-known mnemonic techniques and his training that focused on rapid memorisation. His memory performance supports the feasibility of acquiring memory skills for improved working memory based on storage in long-term memory.

  8. Meeting the challenges of the digital medical enterprise of the future by reusing enterprise software components

    NASA Astrophysics Data System (ADS)

    Shani, Uri; Kol, Tomer; Shachor, Gal

    2004-04-01

    Managing medical digital information objects, and in particular medical images is an enterprise-grade problem. Firstly, there is the sheer amount of digital data that is generated in the proliferation of digital (and film-free) medical imaging. Secondly, the managing software ought to enjoy high availability, recoverability and manageability that are found only in the most business-critical systems. Indeed, such requirements are borrowed from the business enterprise world. Moreover, the solution for the medical information management problem should too employ the same software tools, middlewares and architectures. It is safe to say that all first-line medical PACS products strive to provide a solution for all these challenging requirements. The DICOM standard has been a prime enabler of such solutions. DICOM created the interconnectivity, which made it possible for a PACS service to manage millions of exams consisting of trillions of images. With the more comprehensive IHE architecture, the enterprise is expanded into a multi-facility regional conglomerate, which presents extreme demands from the data management system. HIPPA legislations add considerable challenges per security, privacy and other legal issues, which aggravate the situation. In this paper, we firstly present what in our view should be the general requirements for a first-line medical PACS, taken from an enterprise medical imaging storage and management solution perspective. While these requirements can be met by homegrown implementations, we suggest looking at the existing technologies, which have emerged in the recent years to meet exactly these challenges in the business world. We present an evolutionary process, which led to the design and implementation of a medical object management subsystem. This is indeed an enterprise medical imaging solution that is built upon respective technological components. The system answers all these challenges simply by not reinventing wheels, but rather reusing the best "wheels" for the job. Relying on such middleware components allowed us to concentrate on added value for this specific problem domain.

  9. Digital Signature Management.

    ERIC Educational Resources Information Center

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  10. Advancing the science of forensic data management

    NASA Astrophysics Data System (ADS)

    Naughton, Timothy S.

    2002-07-01

    Many individual elements comprise a typical forensics process. Collecting evidence, analyzing it, and using results to draw conclusions are all mutually distinct endeavors. Different physical locations and personnel are involved, juxtaposed against an acute need for security and data integrity. Using digital technologies and the Internet's ubiquity, these diverse elements can be conjoined using digital data as the common element. This result is a new data management process that can be applied to serve all elements of the community. The first step is recognition of a forensics lifecycle. Evidence gathering, analysis, storage, and use in legal proceedings are actually just distinct parts of a single end-to-end process, and thus, it is hypothesized that a single data system that can also accommodate each constituent phase using common network and security protocols. This paper introduces the idea of web-based Central Data Repository. Its cornerstone is anywhere, anytime Internet upload, viewing, and report distribution. Archives exist indefinitely after being created, and high-strength security and encryption protect data and ensure subsequent case file additions do not violate chain-of-custody or other handling provisions. Several legal precedents have been established for using digital information in courts of law, and in fact, effective prosecution of cyber crimes absolutely relies on its use. An example is a US Department of Agriculture division's use of digital images to back up its inspection process, with pictures and information retained on secure servers to enforce the Perishable Agricultural Commodities Act. Forensics is a cumulative process. Secure, web-based data management solutions, such as the Central Data Repository postulated here, can support each process step. Logically marrying digital technologies with Internet accessibility should help nurture a thought process to explore alternatives that make forensics data accessible to authorized individuals, whenever and wherever they need it.

  11. Theoretical Limits of Lunar Vision Aided Navigation with Inertial Navigation System

    DTIC Science & Technology

    2015-03-26

    camera model. Light reflected or projected from objects in the scene of the outside world is taken in by the aperture (or opening) shaped as a double...model’s analog aspects with an analog-to-digital interface converting raw images of the outside world scene into digital information a computer can use to...Figure 2.7. Digital Image Coordinate System. Used with permission [30]. Angular Field of View. The angular field of view is the angle of the world scene

  12. Secure data exchange between intelligent devices and computing centers

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  13. 77 FR 62505 - Combined Notice of Filings #2

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-15

    ...-2654-000. Applicants: World Digital Innovations. Description: World Digital Innovations submits tariff...Library system by clicking on the links or querying the docket number. Any person desiring to intervene or...

  14. Virtual Australia and New Zealand (VANZ): Creating a piece of Digital Earth

    NASA Astrophysics Data System (ADS)

    Haines, M.

    2014-02-01

    VANZ is an Initiative of a wide group of research, government, industry, technology and legal stakeholders in Australia and New Zealand. Its purpose is to broker development of the 'Authorised Virtual World' that brings together 3D Spatial and Building Information Modelling within a proposed new Legal Framework. The aim is to create an 'authoritative' and 'enduring' 3D model of both the 'physical attributes', and 'legal entitlements' relating to every property. This 'authorised virtual world' would be used in all 'property-related' activities - to deliver better, quicker and cheaper outcomes. It would also be used as the context for serious games and to model dynamic processes within the built environment, as well as for emergency response and disaster recovery. Productivity savings across Australia have been estimated at 5 billion pa for the design and construct phases alone. The problem for owners, bankers, insurers, architects, engineers and construction companies, and others, is that they require access to 'authoritative' and detailed 3D data for their own purposes, that must also be securely shared with others up and down the 'property' chain, and over time. All parties also need to know what are the rights, responsibilities and restrictions applying to the data, as well as to the land and buildings that it models. VANZ proposes the creation of a network of Data Banks, to hold the 'authoritative data set', 'in perpetuity', along with the associated software and virtual hardware used to model it. Under the proposal, rights of access to the 'authoritative data' will mirror each person's rights in the property that the data models. As more and more buildings are modelled (inside and out), privacy, security and liability become issues of paramount importance. This paper offers a way for the global community to address these issues. It is targeted at all who have an interest in the practical implementation of Digital Earth for the built environment - including new business opportunities worth billions.

  15. Storytelling in the digital world: achieving higher-level learning objectives.

    PubMed

    Schwartz, Melissa R

    2012-01-01

    Nursing students are not passive media consumers but instead live in a technology ecosystem where digital is the language they speak. To prepare the next generation of nurses, educators must incorporate multiple technologies to improve higher-order learning. The author discusses the evolution and use of storytelling as part of the digital world and how digital stories can be aligned with Bloom's Taxonomy so that students achieve higher-level learning objectives.

  16. 77 FR 14955 - DoD Information Assurance Scholarship Program (IASP)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-14

    ... IA and information technology (IT) management, technical, digital and multimedia forensics, cyber..., digital and multimedia forensics, electrical engineering, electronics engineering, information security...

  17. Watermarking requirements for Boeing digital cinema

    NASA Astrophysics Data System (ADS)

    Lixvar, John P.

    2003-06-01

    The enormous economic incentives for safeguarding intellectual property in the digital domain have made forensic watermarking a research topic of considerable interest. However, a recent examination of some of the leading product development efforts reveals that at present there is no effective watermarking implementation that addresses both the fidelity and security requirements of high definition digital cinema. If Boeing Digital Cinema (BDC, a business unit of Boeing Integrated Defense Systems) is to succeed in using watermarking as a deterrent to the unauthorized capture and distribution of high value cinematic material, the technology must be robust, transparent, asymmetric in its insertion/detection costs, and compatible with all the other elements of Boeing's multi-layered security system, including its compression, encryption, and key management services.

  18. Digital Photograph Security: What Plastic Surgeons Need to Know.

    PubMed

    Thomas, Virginia A; Rugeley, Patricia B; Lau, Frank H

    2015-11-01

    Sharing and storing digital patient photographs occur daily in plastic surgery. Two major risks associated with the practice, data theft and Health Insurance Portability and Accountability Act (HIPAA) violations, have been dramatically amplified by high-speed data connections and digital camera ubiquity. The authors review what plastic surgeons need to know to mitigate those risks and provide recommendations for implementing an ideal, HIPAA-compliant solution for plastic surgeons' digital photography needs: smartphones and cloud storage. Through informal discussions with plastic surgeons, the authors identified the most common photograph sharing and storage methods. For each method, a literature search was performed to identify the risks of data theft and HIPAA violations. HIPAA violation risks were confirmed by the second author (P.B.R.), a compliance liaison and privacy officer. A comprehensive review of HIPAA-compliant cloud storage services was performed. When possible, informal interviews with cloud storage services representatives were conducted. The most common sharing and storage methods are not HIPAA compliant, and several are prone to data theft. The authors' review of cloud storage services identified six HIPAA-compliant vendors that have strong to excellent security protocols and policies. These options are reasonably priced. Digital photography and technological advances offer major benefits to plastic surgeons but are not without risks. A proper understanding of data security and HIPAA regulations needs to be applied to these technologies to safely capture their benefits. Cloud storage services offer efficient photograph sharing and storage with layers of security to ensure HIPAA compliance and mitigate data theft risk.

  19. Collusion issue in video watermarking

    NASA Astrophysics Data System (ADS)

    Doerr, Gwenael; Dugelay, Jean-Luc

    2005-03-01

    Digital watermarking has first been introduced as a possible way to ensure intellectual property (IP) protection. However, fifteen years after its infancy, it is still viewed as a young technology and digital watermarking is far from being introduced in Digital Right Management (DRM) frameworks. A possible explanation is that the research community has so far mainly focused on the robustness of the embedded watermark and has almost ignored security aspects. For IP protection applications such as fingerprinting and copyright protection, the watermark should provide means to ensure some kind of trust in a non secure environment. To this end, security against attacks from malicious users has to be considered. This paper will focus on collusion attacks to evaluate security in the context of video watermarking. In particular, security pitfalls will be exhibited when frame-by-frame embedding strategies are enforced for video watermarking. Two alternative strategies will be surveyed: either eavesdropping the watermarking channel to identify some redundant hidden structure, or jamming the watermarking channel to wash out the embedded watermark signal. Finally, the need for a new brand of watermarking schemes will be highlighted if the watermark is to be released in a hostile environment, which is typically the case for IP protection applications.

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less

  1. Measurement-device-independent quantum digital signatures

    NASA Astrophysics Data System (ADS)

    Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika

    2016-08-01

    Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.

  2. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  3. 77 FR 60976 - Combined Notice of Filings #1

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-05

    ... Numbers: ER12-2654-001. Applicants: World Digital Innovations. Description: World Digital Innovations...-5196. Comments Due: 5 p.m. ET 10/18/12. The filings are accessible in the Commission's eLibrary system...

  4. Wireless networking for the dental office: current wireless standards and security protocols.

    PubMed

    Mupparapu, Muralidhar; Arora, Sarika

    2004-11-15

    Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS). A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography. Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged-coupled device (CCD) sensors in early 2004 (Schick Technologies, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated.

  5. Digital Authenticity and Integrity: Digital Cultural Heritage Documents as Research Resources

    ERIC Educational Resources Information Center

    Bradley; Rachael

    2005-01-01

    This article presents the results of a survey addressing methods of securing digital content and ensuring the content's authenticity and integrity, as well as the perceived importance of authenticity and integrity. The survey was sent to 40 digital repositories in the United States and Canada between June 30 and July 19, 2003. Twenty-two…

  6. Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community

    DTIC Science & Technology

    2012-01-13

    unintrusive solutions that boost security. For example, gamers are even buying hardware tokens to protect their World of Warcraft accounts [5]. Build...security technology. http://www. vmware.com/technology/security/vmsafe.html. [4] VNC. http://en.wikipedia.org/wiki/VNC. [5] World of warcraft to sell

  7. Security Issues on the Internet.

    ERIC Educational Resources Information Center

    Bar-Ilan, Judit

    1996-01-01

    Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)

  8. These Aren't Your Father's Funny Papers: The New World of Digital Graphic Novels

    ERIC Educational Resources Information Center

    Moorefield-Lang, Heather; Gavigan, Karen

    2012-01-01

    Due to the development of new 21st-century technologies, the world of children's and young adult literature is continually changing. For example, one of the fastest-growing multimodal formats that today's visually literate youth embrace is the digital graphic novel. Digital graphic novels are graphic novels produced on and/or accessed on some form…

  9. Quantum random oracle model for quantum digital signature

    NASA Astrophysics Data System (ADS)

    Shang, Tao; Lei, Qi; Liu, Jianwei

    2016-10-01

    The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.

  10. Associated diacritical watermarking approach to protect sensitive arabic digital texts

    NASA Astrophysics Data System (ADS)

    Kamaruddin, Nurul Shamimi; Kamsin, Amirrudin; Hakak, Saqib

    2017-10-01

    Among multimedia content, one of the most predominant medium is text content. There have been lots of efforts to protect and secure text information over the Internet. The limitations of existing works have been identified in terms of watermark capacity, time complexity and memory complexity. In this work, an invisible digital watermarking approach has been proposed to protect and secure the most sensitive text i.e. Digital Holy Quran. The proposed approach works by XOR-ing only those Quranic letters that has certain diacritics associated with it. Due to sensitive nature of Holy Quran, diacritics play vital role in the meaning of the particular verse. Hence, securing letters with certain diacritics will preserve the original meaning of Quranic verses in case of alternation attempt. Initial results have shown that the proposed approach is promising with less memory complexity and time complexity compared to existing approaches.

  11. Information Security - Data Loss Prevention Procedure

    EPA Pesticide Factsheets

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  12. Children's Virtual Play Worlds Culture, Learning, and Participation. New Literacies and Digital Epistemologies. Volume 58

    ERIC Educational Resources Information Center

    Burke, Anne, Ed.; Marsh, Jackie, Ed.

    2013-01-01

    As children's digital lives become more relevant to schools and educators, the question of play and learning is being revisited in new and interesting ways. "Children's Virtual Play Worlds: Culture, Learning, and Participation" provides a more reasoned account of children's play engagements in virtual worlds through a number of scholarly…

  13. 15 CFR Supplement No. 1 to Part 746 - Examples of Luxury Goods

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS...) Personal digital assistants (PDAs) (3) Personal digital music players (4) Computer laptops (g...

  14. Security and privacy in electronic health records: a systematic literature review.

    PubMed

    Fernández-Alemán, José Luis; Señor, Inmaculada Carrión; Lozoya, Pedro Ángel Oliver; Toval, Ambrosio

    2013-06-01

    To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database. Only those articles dealing with the security and privacy of EHR systems. The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth. A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy. Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems. Copyright © 2013 Elsevier Inc. All rights reserved.

  15. Training Psychiatry Residents in Professionalism in the Digital World.

    PubMed

    John, Nadyah Janine; Shelton, P G; Lang, Michael C; Ingersoll, Jennifer

    2017-06-01

    Professionalism is an abstract concept which makes it difficult to define, assess and teach. An additional layer of complexity is added when discussing professionalism in the context of digital technology, the internet and social media - the digital world. Current physicians-in-training (residents and fellows) are digital natives having been raised in a digital, media saturated world. Consequently, their use of digital technology and social media has been unconstrained - a reflection of it being integral to their social construct and identity. Cultivating the professional identity and therefore professionalism is the charge of residency training programs. Residents have shown negative and hostile attitudes to formalized professionalism curricula in training. Approaches to these curricula need to consider the learning style of Millennials and incorporate more active learning techniques that utilize technology. Reviewing landmark position papers, guidelines and scholarly work can therefore be augmented with use of vignettes and technology that are available to residency training programs for use with their Millennial learners.

  16. Security: Individuals and Leviathans

    DTIC Science & Technology

    2013-05-20

    What is human security and how does it fit in the current world order? The United Nations (UN) proposed human security in 1994 at the end of the Cold... world orders established by Western nations, from the Treaty of Westphalia to the UN, suggesting these have been inadequate leviathans. The argument...the globe, when and where they can. However, as the world becomes more multipolar, these Western liberal nations are likely to be restrained from

  17. World Food Security and Insecurity, 1974-84.

    ERIC Educational Resources Information Center

    Kriesberg, Martin

    In the decade since the World Food Conference of 1974, increased attention has been directed to the problems of world food security. The emphasis on technologies of production, while important, have not sufficed. Two major shortcomings of the World Food Conference and the efforts it stimulated were (1) the failure to recognize the relationship…

  18. Digital Camera with Apparatus for Authentication of Images Produced from an Image File

    NASA Technical Reports Server (NTRS)

    Friedman, Gary L. (Inventor)

    1996-01-01

    A digital camera equipped with a processor for authentication of images produced from an image file taken by the digital camera is provided. The digital camera processor has embedded therein a private key unique to it, and the camera housing has a public key that is so uniquely related to the private key that digital data encrypted with the private key may be decrypted using the public key. The digital camera processor comprises means for calculating a hash of the image file using a predetermined algorithm, and second means for encrypting the image hash with the private key, thereby producing a digital signature. The image file and the digital signature are stored in suitable recording means so they will be available together. Apparatus for authenticating the image file as being free of any alteration uses the public key for decrypting the digital signature, thereby deriving a secure image hash identical to the image hash produced by the digital camera and used to produce the digital signature. The authenticating apparatus calculates from the image file an image hash using the same algorithm as before. By comparing this last image hash with the secure image hash, authenticity of the image file is determined if they match. Other techniques to address time-honored methods of deception, such as attaching false captions or inducing forced perspectives, are included.

  19. Choosing a Global Positioning System Device for Use in U.S. Army Corps of Engineers Regulatory Districts

    DTIC Science & Technology

    2017-12-01

    Information Systems Center of Expertise (RS/GIS CX) (CEERD-RZR), U.S. Army Engineer Research and Development Center, Cold Regions Research and...GIS Geographic Information Systems GPS Global Positioning System HH Handheld IWR U.S. Army Engineer Institute for Water Resources n/a Not...Applicable NAE U.S. Army New England Regulatory District RS/GIS Remote Sensing/Geographic Information Systems SD Secure Digital SDHC Secure Digital High

  20. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    PubMed

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  1. Digital Natives: Back to the Future of Microworlds in a Corporate Learning Organization

    ERIC Educational Resources Information Center

    Cabanero-Johnson, Paz Susan; Berge, Zane

    2009-01-01

    Purpose: The purpose of this paper is to provide description and an analysis of two worlds colliding where real-world roles or ideas play out in a virtual dimension. Inhabited by digital natives, the virtual world in a learning organization is a journey back to the future of microworlds where the only limitation is one's imagination.…

  2. Learning Behaviors and Interaction Patterns among Students in Virtual Learning Worlds

    ERIC Educational Resources Information Center

    Lin, Chi-Syan; Ma, Jung Tsan; Chen, Yi-Lung; Kuo, Ming-Shiou

    2010-01-01

    The goal of this study is to investigate how students behave themselves in the virtual learning worlds. The study creates a 3D virtual learning world, entitled the Best Digital Village, and implements a learning program on it. The learning program, the Expo, takes place at the Exhibition Center in the Best Digital Village. The space in the Expo is…

  3. A Digital Radio Receiver for Ionospheric Research

    DTIC Science & Technology

    2006-06-01

    amplification, the signals are digitized and then processed by a digital down converter ( DDC ) and decimating low-pass filter. The resultant digital...images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 41 19a. NAME OF...the University of Calgary under a Contributions Agreement contract awarded by the Canadian Space Agency. The present paper follows an earlier article

  4. Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing.

    PubMed

    Yassin, Ali A

    2014-01-01

    Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification.

  5. Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing

    PubMed Central

    Yassin, Ali A.

    2014-01-01

    Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification. PMID:27355051

  6. PDA-phone-based instant transmission of radiological images over a CDMA network by combining the PACS screen with a Bluetooth-interfaced local wireless link.

    PubMed

    Kim, Dong Keun; Yoo, Sun K; Park, Jeong Jin; Kim, Sun Ho

    2007-06-01

    Remote teleconsultation by specialists is important for timely, correct, and specialized emergency surgical and medical decision making. In this paper, we designed a new personal digital assistant (PDA)-phone-based emergency teleradiology system by combining cellular communication with Bluetooth-interfaced local wireless links. The mobility and portability resulting from the use of PDAs and wireless communication can provide a more effective means of emergency teleconsultation without requiring the user to be limited to a fixed location. Moreover, it enables synchronized radiological image sharing between the attending physician in the emergency room and the remote specialist on picture archiving and communication system terminals without distorted image acquisition. To enable rapid and fine-quality radiological image transmission over a cellular network in a secure manner, progressive compression and security mechanisms have been incorporated. The proposed system is tested over a code division Multiple Access 1x-Evolution Data-Only network to evaluate the performance and to demonstrate the feasibility of this system in a real-world setting.

  7. An Experimental Realization of a Chaos-Based Secure Communication Using Arduino Microcontrollers

    PubMed Central

    Zapateiro De la Hoz, Mauricio; Vidal, Yolanda

    2015-01-01

    Security and secrecy are some of the important concerns in the communications world. In the last years, several encryption techniques have been proposed in order to improve the secrecy of the information transmitted. Chaos-based encryption techniques are being widely studied as part of the problem because of the highly unpredictable and random-look nature of the chaotic signals. In this paper we propose a digital-based communication system that uses the logistic map which is a mathematically simple model that is chaotic under certain conditions. The input message signal is modulated using a simple Delta modulator and encrypted using a logistic map. The key signal is also encrypted using the same logistic map with different initial conditions. In the receiver side, the binary-coded message is decrypted using the encrypted key signal that is sent through one of the communication channels. The proposed scheme is experimentally tested using Arduino shields which are simple yet powerful development kits that allows for the implementation of the communication system for testing purposes. PMID:26413563

  8. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    PubMed

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  9. Data security101: avoiding the list.

    PubMed

    Perna, Gabriel

    2012-01-01

    Thanks to the rampant digitization of healthcare data, breaches have become commonplace in an industry that lacks advanced security practices. In this industry-wide report, those who have dealt with breaches implore others to shore up internal security practices and be transparent. As one CIO keenly notes, "we're all in this together."

  10. New Technology's Surprising Security Threats. Building Digital Libraries

    ERIC Educational Resources Information Center

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  11. Racing to the Future: Security in the Gigabit Race?

    ERIC Educational Resources Information Center

    Gregory, Mark A; Cradduck, Lucy

    2016-01-01

    This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…

  12. Medical Image Authentication Using DPT Watermarking: A Preliminary Attempt

    NASA Astrophysics Data System (ADS)

    Wong, M. L. Dennis; Goh, Antionette W.-T.; Chua, Hong Siang

    Secure authentication of digital medical image content provides great value to the e-Health community and medical insurance industries. Fragile Watermarking has been proposed to provide the mechanism to authenticate digital medical image securely. Transform Domain based Watermarking are typically slower than spatial domain watermarking owing to the overhead in calculation of coefficients. In this paper, we propose a new Discrete Pascal Transform based watermarking technique. Preliminary experiment result shows authentication capability. Possible improvements on the proposed scheme are also presented before conclusions.

  13. Special Reports; Homeland Security and Information Management; The Development of Electronic Government in the United States: The Federal Policy Experience; Digital Rights Management: Why Libraries Should Be Major Players; The Current State and Future Promise of Portal Applications; Recruitment and Retention: A Professional Concern.

    ERIC Educational Resources Information Center

    Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.

    2003-01-01

    Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…

  14. The World Data Fabric: A New Concept for Geophysical Data Collection and Dissemination

    NASA Astrophysics Data System (ADS)

    Papitashvili, V.; Papitashvili, N.

    2005-12-01

    Nowadays, a multitude of digital geophysical data have become available via the World Wide Web from a variety of sources, including the World Data Centers (WDC), their suppliers (discipline-specific observatories, research institutions, government agencies), and short-lived, sporadic datasets produced by individual investigators from their research grants. As a result, worldwide geophysical databases become diverse and distributed, urging for sophisticated search engines capable of identifying discipline-specific data on the Web and then retrieving requested intervals for scientific analyses or practical applications. Here we introduce a concept of the World Data Fabric (WDF) emerged from the essence of World Data Centers system that successfully served geophysical communities since the International Geophysical Year (1957-58). We propose to unify both components of the WDC System - data centers and data providers - into a worldwide data network (data fabric), where the WDC role would become more proactive through their direct interaction with the data producers. It suggested that the World Data Centers would become a backbone of the World Data Fabric, watching and copying newly ``Webbed'' geophysical data to the center archives - to preserve at least 2-3 copies (or as many as Centers exist) of the new datasets within the entire WDF. Thus, the WDF would become a self-organized system of the data nodes (providers) and data portals (the WDCs as``clearinghouse''). The WDF would be then developing similarly to the Web, but its focus would be on geophysical data rather than on the content of a specific geophysical discipline. Introducing the WDF concept, we face a number of challenges: (a) data providers should make their datasets available via the Internet using open (but secure) access protocols; (b) multiple copies of every dataset would spread across WDF; (c) every WDF dataset (original or copied) must be digitally signed by the data providers and then by the data copiers; and (c) the WDF datasets must be protected from deliberate corruption or hacking. As the WDF (for all or specific geophysical disciplines) is established and actively maintained by a series of policies and regulations (i.e., specific for a particular discipline) through the WDC activities, then one can write a specific middleware to retrieve required data from the ``data fabric'', building then either the specific Virtual Observatory or Distributed Data System. The presentation will address these challenges suggesting some immediate and intervening solutions.

  15. Device interoperability and authentication for telemedical appliance based on the ISO/IEEE 11073 Personal Health Device (PHD) Standards.

    PubMed

    Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G

    2012-01-01

    In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.

  16. Exploring Robust and Resilient Pathways to Water Security (Invited)

    NASA Astrophysics Data System (ADS)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  17. Digital Literacy Learning in Higher Education through Digital Storytelling Approach

    ERIC Educational Resources Information Center

    Chan, Banny S. K.; Churchill, Daniel; Chiu, Thomas K. F.

    2017-01-01

    It is necessary to develop digital literacy skills with which students can communicate and express their ideas effectively using digital media. The educational sectors around the world are beginning to incorporate digital literacy into the curriculum. Digital storytelling, one of the possible classroom activities, is an approach which may help…

  18. Using Swarming Agents for Scalable Security in Large Network Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crouse, Michael; White, Jacob L.; Fulp, Errin W.

    2011-09-23

    The difficulty of securing computer infrastructures increases as they grow in size and complexity. Network-based security solutions such as IDS and firewalls cannot scale because of exponentially increasing computational costs inherent in detecting the rapidly growing number of threat signatures. Hostbased solutions like virus scanners and IDS suffer similar issues, and these are compounded when enterprises try to monitor these in a centralized manner. Swarm-based autonomous agent systems like digital ants and artificial immune systems can provide a scalable security solution for large network environments. The digital ants approach offers a biologically inspired design where each ant in the virtualmore » colony can detect atoms of evidence that may help identify a possible threat. By assembling the atomic evidences from different ant types the colony may detect the threat. This decentralized approach can require, on average, fewer computational resources than traditional centralized solutions; however there are limits to its scalability. This paper describes how dividing a large infrastructure into smaller managed enclaves allows the digital ant framework to effectively operate in larger environments. Experimental results will show that using smaller enclaves allows for more consistent distribution of agents and results in faster response times.« less

  19. World oil

    NASA Astrophysics Data System (ADS)

    Sweeney, J. L.

    1982-06-01

    Results obtained through the application of 10 prominent world oil or world energy models to 12 scenarios are reported. These scenarios were designed to bound the range of likely future world oil market outcomes. Conclusions relate to oil market trends, impacts of policies on oil prices, security of oil supplies, impacts of policies on oil security problems, use of the oil import premium in policymaking, the transition to oil substitutes, and the state of the art of world oil modeling.

  20. The Elements of a Network to Educate for World Security.

    ERIC Educational Resources Information Center

    Network to Educate for World Security, New York, NY.

    This publication examines efforts to educate for peace and disarmament. A proposal by the Network to Educate for World Security for the establishment of a United Nations sponsored disarmament fund devoted to worldwide peace and security education is presented in Section One. Section Two contains papers that suggest how the traditional way to…

  1. U.S. Geological Survey World Wide Web Information

    USGS Publications Warehouse

    ,

    2000-01-01

    The U.S. Geological Survey (USGS) invites you to explore an earth science virtual library of digital information, publications, and data. The USGS World Wide Web sites offer an array of information that reflects scientific research and monitoring programs conducted in the areas of natural hazards, environmental resources, and cartog-raphy. This list provides gateways to access a cross section of the digital information on the USGS World Wide Web sites.

  2. U.S. Geological Survey World Wide Web Information

    USGS Publications Warehouse

    ,

    2003-01-01

    The U.S. Geological Survey (USGS) invites you to explore an earth science virtual library of digital information, publications, and data. The USGS World Wide Web sites offer an array of information that reflects scientific research and monitoring programs conducted in the areas of natural hazards, environmental resources, and cartography. This list provides gateways to access a cross section of the digital information on the USGS World Wide Web sites.

  3. U.S. Geological Survey World Wide Web Information

    USGS Publications Warehouse

    ,

    1999-01-01

    The U.S. Geological Survey (USGS) invites you to explore an earth science virtual library of digital information, publications, and data. The USGS Internet World Wide Web sites offer an array of information that reflects scientific research and monitoring programs conducted in the areas of natural hazards, environmental resources, and cartography. This list provides gateways to access a cross section of the digital information on the USGS World Wide Web sites.

  4. U.S. Geological Survey World Wide Web information

    USGS Publications Warehouse

    ,

    1997-01-01

    The U.S. Geological Survey (USGS) invites you to explore an earth science virtual library of digital information, publications, and data. The USGS Internet World Wide Web sites offer an array of information that reflects scientific research and monitoring programs conducted in the areas of natural hazards, environmental resources, and cartography. This list provides gateways to access a cross section of the digital information on the USGS World Wide Web sites.

  5. The Delivery of an Effective Collective Security Mechanism in West Africa: It Is Long Overdue

    DTIC Science & Technology

    2014-06-13

    latter typical of conflicts of the context of bipolar dispute of post- World War II between the USA and the USSR, popularly known as the Cold War...the world powers, it generated an 3 unprecedented response to national and regional security cooperation and the requirement for a strong...stable world order can only be maintained with the benefit of a collective security system, with the military as an integral part to that cause

  6. 29 CFR 5.5 - Contract provisions and related matters.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... contain the name, address, and social security number of each such worker, his or her correct... maintained under 29 CFR 5.5(a)(3)(i), except that full social security numbers and home addresses shall not... identifying number for each employee (e.g., the last four digits of the employee's social security number...

  7. 78 FR 57921 - Municipal Mortgage & Equity LLC, Prolink Holdings Corp., RPM Technologies, Inc., SARS Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Municipal Mortgage & Equity LLC, Prolink Holdings Corp., RPM Technologies, Inc., SARS Corp., Secured Digital Storage Corp., Siboney Corp., SiriCOMM... securities of SARS Corp. because it has not filed any periodic reports since the period ended June 30, 2008...

  8. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  9. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  10. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  11. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  12. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....90 of this chapter, a cyber security plan that satisfies the requirements of this section for.... Implementation of the licensee's cyber security program must be consistent with the approved schedule. Current... Commission prior to the effective date of this rule must amend their applications to include a cyber security...

  13. 78 FR 19400 - Registry for Attorneys and Representatives

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-01

    ... digits of his or her Social Security number. See 68 FR 75162. EOIR notes that online security standards... are only accredited to appear before the Department of Homeland Security. See id. \\3\\ As part of the... accredited representative registers, he or she will create a unique UserID and password for online access to...

  14. 75 FR 34286 - Federal Acquisition Regulation; FAR Case 2009-018, Payrolls and Basic Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-16

    ... removed the requirement to submit complete social security numbers and home addresses of individual... of full social security numbers and home addresses of individual workers from the prime contractor on... for each employee (e.g., the last four digits of the employee's social security number). The...

  15. E-Learning Environments for Digitally-Minded Students

    ERIC Educational Resources Information Center

    Andone, Diana; Dron, Jon; Pemberton, Lyn; Boyne, Chris

    2007-01-01

    While most existing online learning environments cater for needs identified during the 1990s, a new generation of digital students has emerged in the developed world. Digital students are young adults who have grown up with digital technologies integrated as an everyday feature of their lives. Digital students use technology differently, fluidly…

  16. Listen to the Natives

    ERIC Educational Resources Information Center

    Prensky, Marc

    2006-01-01

    "Digital natives" refer to today's students because they are native speakers of technology, fluent in the digital language of computers, video games, and the Internet. Those who were not born into the digital world are referred to as digital immigrants. Educators, considered digital immigrants, have slid into the 21st century--and into the digital…

  17. Phase in Optical Image Processing

    NASA Astrophysics Data System (ADS)

    Naughton, Thomas J.

    2010-04-01

    The use of phase has a long standing history in optical image processing, with early milestones being in the field of pattern recognition, such as VanderLugt's practical construction technique for matched filters, and (implicitly) Goodman's joint Fourier transform correlator. In recent years, the flexibility afforded by phase-only spatial light modulators and digital holography, for example, has enabled many processing techniques based on the explicit encoding and decoding of phase. One application area concerns efficient numerical computations. Pushing phase measurement to its physical limits, designs employing the physical properties of phase have ranged from the sensible to the wonderful, in some cases making computationally easy problems easier to solve and in other cases addressing mathematics' most challenging computationally hard problems. Another application area is optical image encryption, in which, typically, a phase mask modulates the fractional Fourier transformed coefficients of a perturbed input image, and the phase of the inverse transform is then sensed as the encrypted image. The inherent linearity that makes the system so elegant mitigates against its use as an effective encryption technique, but we show how a combination of optical and digital techniques can restore confidence in that security. We conclude with the concept of digital hologram image processing, and applications of same that are uniquely suited to optical implementation, where the processing, recognition, or encryption step operates on full field information, such as that emanating from a coherently illuminated real-world three-dimensional object.

  18. Teaching Students to Think in the Digital Environment: Digital Literacy and Digital Inquiry

    ERIC Educational Resources Information Center

    Stripling, Barbara

    2010-01-01

    The digital world, much like any new or changing environment, demands an assessment of the situation and development of new ways of thinking or working. School librarians must, therefore, partner with other educators to identify and teach the digital literacy and inquiry skills that will enable all students to be effective digital learners.…

  19. A cryptologic based trust center for medical images.

    PubMed

    Wong, S T

    1996-01-01

    To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment.

  20. A cryptologic based trust center for medical images.

    PubMed Central

    Wong, S T

    1996-01-01

    OBJECTIVE: To investigate practical solutions that can integrate cryptographic techniques and picture archiving and communication systems (PACS) to improve the security of medical images. DESIGN: The PACS at the University of California San Francisco Medical Center consolidate images and associated data from various scanners into a centralized data archive and transmit them to remote display stations for review and consultation purposes. The purpose of this study is to investigate the model of a digital trust center that integrates cryptographic algorithms and protocols seamlessly into such a digital radiology environment to improve the security of medical images. MEASUREMENTS: The timing performance of encryption, decryption, and transmission of the cryptographic protocols over 81 volumetric PACS datasets has been measured. Lossless data compression is also applied before the encryption. The transmission performance is measured against three types of networks of different bandwidths: narrow-band Integrated Services Digital Network, Ethernet, and OC-3c Asynchronous Transfer Mode. RESULTS: The proposed digital trust center provides a cryptosystem solution to protect the confidentiality and to determine the authenticity of digital images in hospitals. The results of this study indicate that diagnostic images such as x-rays and magnetic resonance images could be routinely encrypted in PACS. However, applying encryption in teleradiology and PACS is a tradeoff between communications performance and security measures. CONCLUSION: Many people are uncertain about how to integrate cryptographic algorithms coherently into existing operations of the clinical enterprise. This paper describes a centralized cryptosystem architecture to ensure image data authenticity in a digital radiology department. The system performance has been evaluated in a hospital-integrated PACS environment. PMID:8930857

  1. Developing the Vision: Preparing Teachers to Deliver a Digital World-Class Education System

    ERIC Educational Resources Information Center

    Lane, Jenny M.

    2012-01-01

    In 2008 Australians were promised a "Digital Education Revolution" by the government to dramatically change classroom education and build a "world-class education system". Eight billion dollars have been spent providing computer equipment for upper secondary classrooms, yet there is little evidence that a revolution has…

  2. A Digital Ecosystems Model of Assessment Feedback on Student Learning

    ERIC Educational Resources Information Center

    Gomez, Stephen; Andersson, Holger; Park, Julian; Maw, Stephen; Crook, Anne; Orsmond, Paul

    2013-01-01

    The term ecosystem has been used to describe complex interactions between living organisms and the physical world. The principles underlying ecosystems can also be applied to complex human interactions in the digital world. As internet technologies make an increasing contribution to teaching and learning practice in higher education, the…

  3. Building the Digital Library Infrastructure: A Primer.

    ERIC Educational Resources Information Center

    Tebbetts, Diane R.

    1999-01-01

    Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)

  4. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wheeler, Timothy A.; Denman, Matthew R.; Williams, R. A.

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities.more » iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.« less

  5. 20 CFR 408.110 - General definitions and use of terms.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Section 408.110 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR... World War II under title VIII of the Act. (5) State. Unless otherwise indicated, this means: (i) A State... Islands. (8) We, us or our means the Social Security Administration (SSA). (9) World War II. The period...

  6. 20 CFR 408.110 - General definitions and use of terms.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Section 408.110 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR... World War II under title VIII of the Act. (5) State. Unless otherwise indicated, this means: (i) A State... Islands. (8) We, us or our means the Social Security Administration (SSA). (9) World War II. The period...

  7. 20 CFR 408.110 - General definitions and use of terms.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Section 408.110 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR... World War II under title VIII of the Act. (5) State. Unless otherwise indicated, this means: (i) A State... Islands. (8) We, us or our means the Social Security Administration (SSA). (9) World War II. The period...

  8. 20 CFR 408.110 - General definitions and use of terms.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Section 408.110 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR... World War II under title VIII of the Act. (5) State. Unless otherwise indicated, this means: (i) A State... Islands. (8) We, us or our means the Social Security Administration (SSA). (9) World War II. The period...

  9. 20 CFR 408.110 - General definitions and use of terms.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 408.110 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR... World War II under title VIII of the Act. (5) State. Unless otherwise indicated, this means: (i) A State... Islands. (8) We, us or our means the Social Security Administration (SSA). (9) World War II. The period...

  10. Camouflaging in Digital Image for Secure Communication

    NASA Astrophysics Data System (ADS)

    Jindal, B.; Singh, A. P.

    2013-06-01

    The present paper reports on a new type of camouflaging in digital image for hiding crypto-data using moderate bit alteration in the pixel. In the proposed method, cryptography is combined with steganography to provide a two layer security to the hidden data. The novelty of the algorithm proposed in the present work lies in the fact that the information about hidden bit is reflected by parity condition in one part of the image pixel. The remaining part of the image pixel is used to perform local pixel adjustment to improve the visual perception of the cover image. In order to examine the effectiveness of the proposed method, image quality measuring parameters are computed. In addition to this, security analysis is also carried by comparing the histograms of cover and stego images. This scheme provides a higher security as well as robustness to intentional as well as unintentional attacks.

  11. The Impact of Developing Technology on Media Communications.

    ERIC Educational Resources Information Center

    MacDonald, Lindsay W.

    1997-01-01

    Examines changes in media communications resulting from new information technologies: communications technologies (networks, World Wide Web, digital set-top box); graphic arts (digital photography, CD and digital archives, desktop design and publishing, printing technology); television and video (digital editing, interactive television, news and…

  12. Driving without wings: The effect of different digital mirror locations on the visual behaviour, performance and opinions of drivers.

    PubMed

    Large, David R; Crundall, Elizabeth; Burnett, Gary; Harvey, Catherine; Konstantopoulos, Panos

    2016-07-01

    Drivers' awareness of the rearward road scene is critical when contemplating or executing lane-change manoeuvres, such as overtaking. Preliminary investigations have speculated on the use of rear-facing cameras to relay images to displays mounted inside the car to create 'digital mirrors'. These may overcome many of the limitations associated with traditional 'wing' and rear-view mirrors, yet will inevitably effect drivers' normal visual scanning behaviour, and may force them to consider the rearward road scene from an unfamiliar perspective that is incongruent with their mental model of the outside world. We describe a study conducted within a medium-fidelity simulator aiming to explore the visual behaviour, driving performance and opinions of drivers while using internally located digital mirrors during different overtaking manoeuvres. Using a generic UK motorway scenario, thirty-eight experienced drivers conducted overtaking manoeuvres using each of five different layouts of digital mirrors with varying degrees of 'real-world' mapping. The results showed reductions in decision time for lane changes and eyes-off road time while using the digital mirrors, when compared with baseline traditional reflective mirrors, suggesting that digital displays may enable drivers to more rapidly pick up the salient information from the rearward road scene. Subjectively, drivers preferred configurations that most closely matched existing mirror locations, where aspects of real-world mapping were largely preserved. The research highlights important human factors issues that require further investigation prior to further development/implementation of digital mirrors within vehicles. Future work should also aim to validate findings within real-world on-road environments whilst considering the effects of digital mirrors on other important visual behaviour characteristics, such as depth perception. Copyright © 2016 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  13. Managing the Aviation Insider Threat

    DTIC Science & Technology

    2010-12-01

    World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal

  14. Cyber Security Audit and Attack Detection Toolkit

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  15. Health and social security reforms in Latin America: the convergence of the World Health Organization, the World Bank, and transnational corporations.

    PubMed

    Armada, F; Muntaner, C; Navarro, V

    2001-01-01

    International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health and pensions. Moreover, by endorsing the privatization of health services in Latin America, the World Health Organization has converged with these policies. The privatization of social security has benefited international corporations that become partners with local business elites. Thus the World Health Organization, international financial institutions, and transnational corporations have converged in the neoliberal reforms of social security in Latin America. Overall, the process represents a mechanism of resource transfer from labor to capital and sheds light on one of the ways in which neoliberalism may affect the health of Latin American populations.

  16. NCSTRL: Design and Deployment of a Globally Distributed Digital Library.

    ERIC Educational Resources Information Center

    Davies, James R.; Lagoze, Carl

    2000-01-01

    Discusses the development of a digital library architecture that allows the creation of digital libraries within the World Wide Web. Describes a digital library, NCSTRL (Networked Computer Science Technical Research Library), within which the work has taken place and explains Dienst, a protocol and architecture for distributed digital libraries.…

  17. Digital Preservation in Open-Source Digital Library Software

    ERIC Educational Resources Information Center

    Madalli, Devika P.; Barve, Sunita; Amin, Saiful

    2012-01-01

    Digital archives and digital library projects are being initiated all over the world for materials of different formats and domains. To organize, store, and retrieve digital content, many libraries as well as archiving centers are using either proprietary or open-source software. While it is accepted that print media can survive for centuries with…

  18. Development of Youth Digital Citizenship Scale and Implication for Educational Setting

    ERIC Educational Resources Information Center

    Kim, Minjeong; Choi, Dongyeon

    2018-01-01

    Digital citizens need comprehensive knowledge and technological accessibility to the internet and digital world and teachers have a responsibility to lead them to become digital citizens. However, existing Digital Citizenship Scales contain too broad ranges and do not precisely focus on the target students, so teachers do not have clear criteria…

  19. A 21st Century Science, Technology, and Innovation Strategy for Americas National Security

    DTIC Science & Technology

    2016-05-01

    areas. Advanced Computing and Communications The exponential growth of the digital economy, driven by ubiquitous computing and communication...weapons- focused R&D, many of the capabilities being developed have significant dual-use potential. Digital connectivity, for instance, brings...scale than traditional recombinant DNA techniques, and to share these designs digitally . Nanotechnology promises the ability to engineer entirely

  20. Digital Refractometry of Piezoelectric Crystalline Media

    DTIC Science & Technology

    1988-11-01

    Research and Development Technical Report SLCET-TR-87-0727-1 III DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA CD Dr. Edward Collett...1L 1 DA313485 11. TITLE (include Security Classification) DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA (U) 12. PERSONAL AUTHOR(S) Dr...GROUP SUB-GROUP Lasers; quartz; dielectrics; permittivity; refractometry 9 U-1optics; millimeter waves; microwaves; crystals. ,𔄃. ABSTRACT (Continue on

  1. Nonimmigrant Overstays: Brief Synthesis of the Issue

    DTIC Science & Technology

    2010-01-15

    finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States

  2. Securing Secrets and Managing Trust in Modern Computing Applications

    ERIC Educational Resources Information Center

    Sayler, Andy

    2016-01-01

    The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…

  3. The Case for Inclusion of Competitive Teams in Security Education

    ERIC Educational Resources Information Center

    Serapiglia, Anthony

    2016-01-01

    Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…

  4. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  5. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  6. Materials inspired by mathematics.

    PubMed

    Kotani, Motoko; Ikeda, Susumu

    2016-01-01

    Our world is transforming into an interacting system of the physical world and the digital world. What will be the materials science in the new era? With the rising expectations of the rapid development of computers, information science and mathematical science including statistics and probability theory, 'data-driven materials design' has become a common term. There is knowledge and experience gained in the physical world in the form of know-how and recipes for the creation of material. An important key is how we establish vocabulary and grammar to translate them into the language of the digital world. In this article, we outline how materials science develops when it encounters mathematics, showing some emerging directions.

  7. Cyber security best practices for the nuclear industry

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badr, I.

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  8. Design Principles for "Thriving in Our Digital World": A High School Computer Science Course

    ERIC Educational Resources Information Center

    Veletsianos, George; Beth, Bradley; Lin, Calvin; Russell, Gregory

    2016-01-01

    "Thriving in Our Digital World" is a technology-enhanced dual enrollment course introducing high school students to computer science through project- and problem-based learning. This article describes the evolution of the course and five lessons learned during the design, development, implementation, and iteration of the course from its…

  9. A Survey of Recent Advances in Optical and Multimedia Information Technologies.

    ERIC Educational Resources Information Center

    Jessop, Deborah

    1997-01-01

    Examines developments in multimedia technologies and in the World Wide Web. Discusses CD-recordable, CD-rewritable, cable modems, personal digital assistants, digital video discs, interactivity and virtual worlds, advertising on the Web, and Intranets and CD-ROM networks. Eight tables and figures show costs, download time, estimated sales, storage…

  10. Education for a Digital World: Advice, Guidelines, and Effective Practice from around the Globe

    ERIC Educational Resources Information Center

    Commonwealth of Learning, 2008

    2008-01-01

    "Education for a Digital World" contains a collection of strategies and tools for effective online teaching, based on the principles of learning as a social process. Narrative is supplemented by real-life examples, case studies, and resources to supply comprehensive perspectives about structuring and fostering socially engaging learning…

  11. Global Digital Revolution and Africa: Transforming Nigerian Universities to World Class Institutions

    ERIC Educational Resources Information Center

    Isah, Emmanuel Aileonokhuoya; Ayeni, A. O.

    2010-01-01

    This study examined the global digital revolution and the transformation of Nigerian universities. The study overviewed university developments world wide in line with what obtains in Nigeria. The study highlighted the several challenges that face Nigerian universities inclusive of poor funding, poor personnel and the poor exposure to global…

  12. Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.

    ERIC Educational Resources Information Center

    Mische, Patricia; And Others

    The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…

  13. Turning Access into a web-enabled secure information system for clinical trials.

    PubMed

    Dongquan Chen; Chen, Wei-Bang; Soong, Mayhue; Soong, Seng-Jaw; Orthner, Helmuth F

    2009-08-01

    Organizations that have limited resources need to conduct clinical studies in a cost-effective, but secure way. Clinical data residing in various individual databases need to be easily accessed and secured. Although widely available, digital certification, encryption, and secure web server, have not been implemented as widely, partly due to a lack of understanding of needs and concerns over issues such as cost and difficulty in implementation. The objective of this study was to test the possibility of centralizing various databases and to demonstrate ways of offering an alternative to a large-scale comprehensive and costly commercial product, especially for simple phase I and II trials, with reasonable convenience and security. We report a working procedure to transform and develop a standalone Access database into a secure Web-based secure information system. For data collection and reporting purposes, we centralized several individual databases; developed, and tested a web-based secure server using self-issued digital certificates. The system lacks audit trails. The cost of development and maintenance may hinder its wide application. The clinical trial databases scattered in various departments of an institution could be centralized into a web-enabled secure information system. The limitations such as the lack of a calendar and audit trail can be partially addressed with additional programming. The centralized Web system may provide an alternative to a comprehensive clinical trial management system.

  14. Digital telephony analysis model and issues

    NASA Astrophysics Data System (ADS)

    Keuthan, Lynn M.

    1995-09-01

    Experts in the fields of digital telephony and communications security have stated the need for an analytical tool for evaluating complex issues. Some important policy issues discussed by experts recently include implementing digital wire-taps, implementation of the 'Clipper Chip', required registration of encryption/decryption keys, and export control of cryptographic equipment. Associated with the implementation of these policies are direct costs resulting from implementation, indirect cost benefits from implementation, and indirect costs resulting from the risks of implementation or factors reducing cost benefits. Presented herein is a model for analyzing digital telephony policies and systems and their associated direct costs and indirect benefit and risk factors. In order to present the structure of the model, issues of national importance and business-related issues are discussed. The various factors impacting the implementation of the associated communications systems and communications security are summarized, and various implementation tradeoffs are compared based on economic benefits/impact. The importance of the issues addressed herein, as well as other digital telephony issues, has greatly increased with the enormous increases in communication system connectivity due to the advance of the National Information Infrastructure.

  15. Optical/digital identification/verification system based on digital watermarking technology

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Voloshynovskiy, Sviatoslav V.; Hrytskiv, Zenon D.

    2000-06-01

    This paper presents a new approach for the secure integrity verification of driver licenses, passports or other analogue identification documents. The system embeds (detects) the reference number of the identification document with the DCT watermark technology in (from) the owner photo of the identification document holder. During verification the reference number is extracted and compared with the reference number printed in the identification document. The approach combines optical and digital image processing techniques. The detection system must be able to scan an analogue driver license or passport, convert the image of this document into a digital representation and then apply the watermark verification algorithm to check the payload of the embedded watermark. If the payload of the watermark is identical with the printed visual reference number of the issuer, the verification was successful and the passport or driver license has not been modified. This approach constitutes a new class of application for the watermark technology, which was originally targeted for the copyright protection of digital multimedia data. The presented approach substantially increases the security of the analogue identification documents applied in many European countries.

  16. Autonomic Intelligent Cyber Sensor to Support Industrial Control Network Awareness

    DOE PAGES

    Vollmer, Todd; Manic, Milos; Linda, Ondrej

    2013-06-01

    The proliferation of digital devices in a networked industrial ecosystem, along with an exponential growth in complexity and scope, has resulted in elevated security concerns and management complexity issues. This paper describes a novel architecture utilizing concepts of Autonomic computing and a SOAP based IF-MAP external communication layer to create a network security sensor. This approach simplifies integration of legacy software and supports a secure, scalable, self-managed framework. The contribution of this paper is two-fold: 1) A flexible two level communication layer based on Autonomic computing and Service Oriented Architecture is detailed and 2) Three complementary modules that dynamically reconfiguremore » in response to a changing environment are presented. One module utilizes clustering and fuzzy logic to monitor traffic for abnormal behavior. Another module passively monitors network traffic and deploys deceptive virtual network hosts. These components of the sensor system were implemented in C++ and PERL and utilize a common internal D-Bus communication mechanism. A proof of concept prototype was deployed on a mixed-use test network showing the possible real world applicability. In testing, 45 of the 46 network attached devices were recognized and 10 of the 12 emulated devices were created with specific Operating System and port configurations. Additionally the anomaly detection algorithm achieved a 99.9% recognition rate. All output from the modules were correctly distributed using the common communication structure.« less

  17. Distributing medical images with internet technologies: a DICOM web server and a DICOM java viewer.

    PubMed

    Fernàndez-Bayó, J; Barbero, O; Rubies, C; Sentís, M; Donoso, L

    2000-01-01

    With the advent of filmless radiology, it becomes important to be able to distribute radiologic images digitally throughout an entire hospital. A new approach based on World Wide Web technologies was developed to accomplish this objective. This approach involves a Web server that allows the query and retrieval of images stored in a Digital Imaging and Communications in Medicine (DICOM) archive. The images can be viewed inside a Web browser with use of a small Java program known as the DICOM Java Viewer, which is executed inside the browser. The system offers several advantages over more traditional picture archiving and communication systems (PACS): It is easy to install and maintain, is platform independent, allows images to be manipulated and displayed efficiently, and is easy to integrate with existing systems that are already making use of Web technologies. The system is user-friendly and can easily be used from outside the hospital if a security policy is in place. The simplicity and flexibility of Internet technologies makes them highly preferable to the more complex PACS workstations. The system works well, especially with magnetic resonance and computed tomographic images, and can help improve and simplify interdepartmental relationships in a filmless hospital environment.

  18. Digital Divide in Sub-Saharan African Universities: Recommendations and Monitoring

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barry, Boubakar; /Assoc. Afr. Univ.; Chukwuma, Victor

    The Digital Divide prevents Africa from taking advantages of new information technologies. One of the most urgent priorities is to bring the Internet in African Universities, Research, and Learning Centers to the level of other regions of the world. eGY-Africa, and the Sharing Knowledge Foundation are two bottom-up initiatives by scientists to secure better cyber-infrastructure and Internet facilities in Africa. Recommendations by the present scientific communities are being formulated at national, regional and international levels. The Internet capabilities are well documented at country level overall, but this is not the case at the University level. The snapshot of the Internetmore » status in universities in 17 African countries, obtained by a questionnaire survey, is consistent with measures of Internet penetration in the corresponding country. The monitoring of Internet performance has been proposed to those African universities to provide an information base for arguing the need to improve the coverage for Africa. A pilot program is recommended that will start scientific collaboration with Europe in western Africa using ICT. The program will lay the foundations for the arrival of new technologies like Grids.« less

  19. a Review of Digital Watermarking and Copyright Control Technology for Cultural Relics

    NASA Astrophysics Data System (ADS)

    Liu, H.; Hou, M.; Hu, Y.

    2018-04-01

    With the rapid growth of the application and sharing of the 3-D model data in the protection of cultural relics, the problem of Shared security and copyright control of the three-dimensional model of cultural relics is becoming increasingly prominent. Followed by a digital watermarking copyright control has become the frontier technology of 3-D model security protection of cultural relics and effective means, related technology research and application in recent years also got further development. 3-D model based on cultural relics digital watermarking and copyright control technology, introduces the research background and demand, its unique characteristics were described, and its development and application of the algorithm are discussed, and the prospects of the future development trend and some problems and the solution.

  20. A Double-function Digital Watermarking Algorithm Based on Chaotic System and LWT

    NASA Astrophysics Data System (ADS)

    Yuxia, Zhao; Jingbo, Fan

    A double- function digital watermarking technology is studied and a double-function digital watermarking algorithm of colored image is presented based on chaotic system and the lifting wavelet transformation (LWT).The algorithm has realized the double aims of the copyright protection and the integrity authentication of image content. Making use of feature of human visual system (HVS), the watermark image is embedded into the color image's low frequency component and middle frequency components by different means. The algorithm has great security by using two kinds chaotic mappings and Arnold to scramble the watermark image at the same time. The algorithm has good efficiency by using LWT. The emulation experiment indicates the algorithm has great efficiency and security, and the effect of concealing is really good.

  1. Content Management and the Future of Academic Libraries.

    ERIC Educational Resources Information Center

    Wu, Yuhfen Diana; Liu, Mengxiong

    2001-01-01

    Discusses Internet-based electronic content management in digital libraries and considers the future of academic libraries. Topics include digital technologies; content management systems; standards; bandwidth; security and privacy concerns; legal matters, including copyrights and ownership; lifecycle; and multilingual access and interface. (LRW)

  2. TCP/IP Implementations and Vendors Guide,

    DTIC Science & Technology

    1986-02-01

    DOCUMENTATION PAGE la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/ AVAILABILIT OF...UNIX System V (5.2) IMPLEMENTATION-LANGUAGE: C DISTRIBUTOR: UNIQ Digital Technologies 28 S. Water St. Batavia, fI1 60510 (312) 879-1008 CONTACT

  3. The Challenge of Acquisitions in the Digital Age

    ERIC Educational Resources Information Center

    Whittaker, Martha

    2008-01-01

    People are now beginning to appreciate that acquisitions in the digital world is different. In addition to business acumen and accounting knowledge, a digital-age acquisitions librarian needs to understand scholarly communication and the emerging business models of digital publishing. In this article, the author discusses the challenges and the…

  4. Cyberkids

    ERIC Educational Resources Information Center

    Clifford, Pat

    2005-01-01

    While critics draw important attention to worrisome aspects of digital cultures, they may be missing a much larger point about how young people live in a digital world, how they create and re-create themselves and their identities in ways that are remarkably foreign to others "digital immigrants". In this article, "digital immigrants" refers to…

  5. Cyber-Security Curricula for Basic Users

    DTIC Science & Technology

    2013-09-01

    like cyberbullying , digital cheating, and safety and security concerns‖ [7]. The need to teach security principles to this age demographic is at an...addresses the following topics: Cyberbullying , Inappropriate content, 25 Predators, Revealing too much Information, Spyware, spam, and scams. Each...emerging technology, surfing the web, video gaming, the dark side – cyberbullying . Each topic is covered by providing facts for the teacher to present

  6. Visualization and interaction tools for aerial photograph mosaics

    NASA Astrophysics Data System (ADS)

    Fernandes, João Pedro; Fonseca, Alexandra; Pereira, Luís; Faria, Adriano; Figueira, Helder; Henriques, Inês; Garção, Rita; Câmara, António

    1997-05-01

    This paper describes the development of a digital spatial library based on mosaics of digital orthophotos, called Interactive Portugal, that will enable users both to retrieve geospatial information existing in the Portuguese National System for Geographic Information World Wide Web server, and to develop local databases connected to the main system. A set of navigation, interaction, and visualization tools are proposed and discussed. They include sketching, dynamic sketching, and navigation capabilities over the digital orthophotos mosaics. Main applications of this digital spatial library are pointed out and discussed, namely for education, professional, and tourism markets. Future developments are considered. These developments are related to user reactions, technological advancements, and projects that also aim at delivering and exploring digital imagery on the World Wide Web. Future capabilities for site selection and change detection are also considered.

  7. The law of the leading digits and the world religions

    NASA Astrophysics Data System (ADS)

    Mir, T. A.

    2012-02-01

    Benford's law states that the occurrence of significant digits in many data sets is not uniform but tends to follow a logarithmic distribution such that the smaller digits appear as first significant digits more frequently than the larger ones. We investigate here numerical data on the country-wise adherent distribution of seven major world religions i.e. Christianity, Islam, Buddhism, Hinduism, Sikhism, Judaism and Baha'ism to see if the proportion of the leading digits occurring in the distribution conforms to Benford's law. We find that the adherent data of all the religions, except Christianity, excellently does conform to Benford's law. Furthermore, unlike the adherent data on Christianity, the significant digit distribution of the three major Christian denominations i.e. Catholicism, Protestantism and Orthodoxy obeys the law. Thus in spite of their complexity general laws can be established for the evolution of religious groups.

  8. Binary Lives: Digital Citizenship and Disability Participation in a User Content Created Virtual World

    ERIC Educational Resources Information Center

    Vizenor, Katie Virginia

    2014-01-01

    Digital Citizenship is a concept typically used in discussions of how technology impacts our relationships with others and our physical world communities. It is also used to describe ways that we can leverage our technology use and skill to make our communities and nations better and stronger. Educators are now teaching "good digital…

  9. Teaching 21st-Century Art Education in a "Virtual" Age: Art Cafe at Second Life

    ERIC Educational Resources Information Center

    Lu, Lilly

    2010-01-01

    The emerging three-dimensional (3D) virtual world (VW) technology offers great potential for teaching contemporary digital art and growing digital visual culture in 21st-century art education. Such online virtual worlds are built and conceptualized based on information visualization and visual metaphors. Recently, an increasing number of…

  10. Digital Worlds as Sites of Belonging for Third Culture Kids: A New Literacies Perspective

    ERIC Educational Resources Information Center

    Hannaford, Jeanette

    2016-01-01

    Literacies developed in digital worlds are part of the out-of-school experiences that students bring into their classrooms every day. This article, which draws from a multiple case study undertaken in an international school, calls on a sociocultural--new literacies approach to explore identity, discourse and space within the online practices of…

  11. An Evidence Centered Design for Learning and Assessment in the Digital World. CRESST Report 778

    ERIC Educational Resources Information Center

    Behrens, John T.; Mislevy, Robert J.; DiCerbo, Kristen E.; Levy, Roy

    2010-01-01

    The world in which learning and assessment must take place is rapidly changing. The digital revolution has created a vast space of interconnected information, communication, and interaction. Functioning effectively in this environment requires so-called 21st century skills such as technological fluency, complex problem solving, and the ability to…

  12. Bringing the Digital World to Students: Partnering with the University Communications Office to Provide Social Media Experiential Learning Projects

    ERIC Educational Resources Information Center

    Childers, Courtney C.; Levenshus, Abbey B.

    2016-01-01

    The Accrediting Council on Education in Journalism and Mass Communications recognizes the importance of a curriculum that prepares students "to apply current tools and technologies appropriate for the communications professions in which they work, and to understand the digital world" (ACEJMC, n.d.). Infusing experiential learning into…

  13. Authored Assemblages in a Digital World: Illustrations of a Child's Online Social, Critical and Semiotic Meaning-Making

    ERIC Educational Resources Information Center

    Winters, Kari-Lynn; Vratulis, Vetta

    2013-01-01

    Drawing on case illustrations of a six-year-old child as he "assembles" a digital world using Webkinz[TM], this paper proposes an approach that researchers and educators might use to understand, analyse and critique multimodality. This multidisciplinary theoretical framework integrates new literacies, social semiotics and critical…

  14. Digital watermarking for secure and adaptive teleconferencing

    NASA Astrophysics Data System (ADS)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  15. Materials inspired by mathematics

    PubMed Central

    Kotani, Motoko; Ikeda, Susumu

    2016-01-01

    Abstract Our world is transforming into an interacting system of the physical world and the digital world. What will be the materials science in the new era? With the rising expectations of the rapid development of computers, information science and mathematical science including statistics and probability theory, ‘data-driven materials design’ has become a common term. There is knowledge and experience gained in the physical world in the form of know-how and recipes for the creation of material. An important key is how we establish vocabulary and grammar to translate them into the language of the digital world. In this article, we outline how materials science develops when it encounters mathematics, showing some emerging directions. PMID:27877877

  16. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  17. 10 CFR 2.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... and safety or the common defense and security; security measures for the physical protection and... computer that contains the participant's name, e-mail address, and participant's digital signature, proves... inspection. It is also the place where NRC makes computer terminals available to access the Publicly...

  18. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  19. Development and testing for physical security robots

    NASA Astrophysics Data System (ADS)

    Carroll, Daniel M.; Nguyen, Chinh; Everett, H. R.; Frederick, Brian

    2005-05-01

    The Mobile Detection Assessment Response System (MDARS) provides physical security for Department of Defense bases and depots using autonomous unmanned ground vehicles (UGVs) to patrol the site while operating payloads for intruder detection and assessment, barrier assessment, and product assessment. MDARS is in the System Development and Demonstration acquisition phase and is currently undergoing developmental testing including an Early User Appraisal (EUA) at the Hawthorne Army Depot, Nevada-the world's largest army depot. The Multiple Resource Host Architecture (MRHA) allows the human guard force to command and control several MDARS platforms simultaneously. The MRHA graphically displays video, map, and status for each resource using wireless digital communications for integrated data, video, and audio. Events are prioritized and the user is prompted with audio alerts and text instructions for alarms and warnings. The MRHA also interfaces to remote resources to automate legacy physical devices such as fence gate controls, garage doors, and remote power on/off capability for the MDARS patrol units. This paper provides an overview and history of the MDARS program and control station software with details on the installation and operation at Hawthorne Army Depot, including discussions on scenarios for EUA excursions. Special attention is given to the MDARS technical development strategy for spiral evolutions.

  20. Using Digital Photography to Enhance Student Creativity

    ERIC Educational Resources Information Center

    Siegle, Del

    2012-01-01

    The purpose of this article is to help students develop their digital photography skills and see the world through new eyes. An emphasis is placed on using digital photography to communicate ideas and feelings. (Contains 6 figures and 2 tables.)

  1. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  2. Electronic medical archives: a different approach to applying re-signing mechanisms to digital signatures.

    PubMed

    Chen, Tzer-Long; Lin, Frank Y S

    2011-08-01

    Electronic medical records can be defined as a digital format of the traditionally paper-based anamneses, which contains the history of a patient such as his somewhat illness, current health problems, and his chronic treatments. An electronic anamnesis is meant to make the patient's health information more conveniently accessible and transferable between different medical institutions and also easier to be kept quite a long time. Because of such transferability and accessibility of electronic anamneses, we can use less resource than before on storing the patients' medical information. This also means that medical care providers could save more funds on record-keeping and access a patient's medical background directly since shown on the computer screen more quickly and easily. Overall, the service quality has seemingly improved greatly. However, the usage of electronic anamneses involves in some concerned issues such as its related law declaration, and the security of the patient's confidential information. Because of these concerns, a secure medical networking scheme is taking into consideration. Nowadays, the administrators at the medical institutions are facing more challenges on monitoring computers and network systems, because of dramatic advances in this field. For instance, a trusted third party is authorized to access some medical records for a certain period of time. In regard to the security purpose, all the electronic medical records are embedded with both of the public-key infrastructure (PKI) cryptography and the digital signature technique so as to ensure the records well-protected. Since the signatures will be invalid due to the revocation or time expiration, the security of records under this premise would turn into vulnerable. Hence, we propose a re-signing scheme, whose purpose is to make a going-expired digital signature been resigned in time, in keeping with the premise of not conflicting with the laws, morals, and privacy while maintaining the security of the electronic medical records.

  3. Experimental demonstration of quantum digital signatures over 43 dB channel loss using differential phase shift quantum key distribution.

    PubMed

    Collins, Robert J; Amiri, Ryan; Fujiwara, Mikio; Honjo, Toshimori; Shimizu, Kaoru; Tamaki, Kiyoshi; Takeoka, Masahiro; Sasaki, Masahide; Andersson, Erika; Buller, Gerald S

    2017-06-12

    Ensuring the integrity and transferability of digital messages is an important challenge in modern communications. Although purely mathematical approaches exist, they usually rely on the computational complexity of certain functions, in which case there is no guarantee of long-term security. Alternatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mechanics. Prior experimental demonstrations of quantum digital signatures in optical fiber have typically been limited to operation over short distances and/or operated in a laboratory environment. Here we report the experimental transmission of quantum digital signatures over channel losses of up to 42.8 ± 1.2 dB in a link comprised of 90 km of installed fiber with additional optical attenuation introduced to simulate longer distances. The channel loss of 42.8 ± 1.2 dB corresponds to an equivalent distance of 134.2 ± 3.8 km and this represents the longest effective distance and highest channel loss that quantum digital signatures have been shown to operate over to date. Our theoretical model indicates that this represents close to the maximum possible channel attenuation for this quantum digital signature protocol, defined as the loss for which the signal rate is comparable to the dark count rate of the detectors.

  4. Teaching Multimedia Data Protection through an International Online Competition

    ERIC Educational Resources Information Center

    Battisti, F.; Boato, G.; Carli, M.; Neri, A.

    2011-01-01

    Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…

  5. Digital Citizenship: Paving the Way for Family and Consumer Sciences

    ERIC Educational Resources Information Center

    Godfrey, Roxie V.

    2016-01-01

    With the progress of digital technologies and applications being used in schools, family and consumer sciences (FCS) educators have a collective responsibility to teach what it means to be a responsible digital citizen in the virtual world. The nine elements of digital citizenship developed by Ribble (2015) offer a framework for teaching students…

  6. Are Digital Natives a Myth or Reality? University Students' Use of Digital Technologies

    ERIC Educational Resources Information Center

    Margaryan, Anoush; Littlejohn, Allison; Vojt, Gabrielle

    2011-01-01

    This study investigated the extent and nature of university students' use of digital technologies for learning and socialising. The findings show that students use a limited range of mainly established technologies. Use of collaborative knowledge creation tools, virtual worlds, and social networking sites was low. "Digital natives" and students of…

  7. Meeting the Challenges of Regional Security

    DTIC Science & Technology

    1994-02-01

    targets over time, assessing strike damage, and, of course, developing up-to- date maps of crucial urban and industrial areas. Coupled with modem digital ...of huge diverse data bases is key to dissecting criminal infrastructures, and identifying relevant regional and global linkages. New digital processing...cities). They can aid in reaction force planning and training. One 10-inch optical disc can easily store 25 (and display at any scale with 4- digit

  8. Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure

    DTIC Science & Technology

    2009-05-01

    information technology revolution. The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient...thriving digital infrastructure. In addi­ tion, differing national and regional laws and practices —such as laws concerning the investigation and... technology has transformed the global economy and connected people and markets in ways never imagined. To realize the full benefits of the digital

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.

    Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.

  10. 78 FR 32476 - Advisory Committee on Reactor Safeguards (ACRS); Meeting of the ACRS Subcommittee on Digital I&C...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-30

    ..., June 4, 2013--1:00 p.m. Until 5:00 p.m. The Subcommittee will review and discuss all cyber security... Flint North building, 11555 Rockville Pike, Rockville, MD. After registering with security, please...

  11. IT Security on Campus: A Fragile Equilibrium.

    ERIC Educational Resources Information Center

    Wada, Kent

    2003-01-01

    Considers how to provide appropriate levels of information technology (IT) security in the higher education environment. Discusses implications of the Digital Millennium Copyright Act, the USA Patriot Act, the Health Insurance Portability and Accountability Act of 1996, California Information Practices Act, VISA USA Cardholder Information Security…

  12. 20 CFR 405.333 - Submitting documents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... digits of the claimant's social security number. All such documents must be clear and legible to the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Submitting documents. 405.333 Section 405.333 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL...

  13. Single-electron random-number generator (RNG) for highly secure ubiquitous computing applications

    NASA Astrophysics Data System (ADS)

    Uchida, Ken; Tanamoto, Tetsufumi; Fujita, Shinobu

    2007-11-01

    Since the security of all modern cryptographic techniques relies on unpredictable and irreproducible digital keys generated by random-number generators (RNGs), the realization of high-quality RNG is essential for secure communications. In this report, a new RNG, which utilizes single-electron phenomena, is proposed. A room-temperature operating silicon single-electron transistor (SET) having nearby an electron pocket is used as a high-quality, ultra-small RNG. In the proposed RNG, stochastic single-electron capture/emission processes to/from the electron pocket are detected with high sensitivity by the SET, and result in giant random telegraphic signals (GRTS) on the SET current. It is experimentally demonstrated that the single-electron RNG generates extremely high-quality random digital sequences at room temperature, in spite of its simple configuration. Because of its small-size and low-power properties, the single-electron RNG is promising as a key nanoelectronic device for future ubiquitous computing systems with highly secure mobile communication capabilities.

  14. Integrated fingerprinting in secure digital cinema projection

    NASA Astrophysics Data System (ADS)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  15. The PartoPen: Using Digital Pen Technology to Improve Maternal Labor Monitoring in the Developing World

    ERIC Educational Resources Information Center

    Underwood, Heather Marie

    2013-01-01

    This dissertation presents the PartoPen, a new approach to addressing maternal labor monitoring challenges in developing countries. The PartoPen is a hardware and software system that uses digital pen technology to enhance, rather than replace, the paper-based labor monitoring tool known as the partograph. In the developing world, correct use of…

  16. Teachers' Perceptions of Digital Game Based Learning as a Pertinent Instructional Method

    ERIC Educational Resources Information Center

    Zigo, Suzanne L.

    2016-01-01

    Digital game-based instruction is a relatively new phenomenon in the world of education. Teachers hold the key to unlock the world of DGBL within the classroom. Within the classroom a teacher is much like an artist with a blank canvas and typically artistic freedom is granted. What is taught, the curriculum, is generally mandated by local,…

  17. Cell Phones for Low-Resource Environments

    ERIC Educational Resources Information Center

    Chiverton, Scott

    2017-01-01

    Those of us in North America, Europe, many parts of Central and South America, and eastern Asia live in a digital world, and there has been ongoing debate about technology and learning. In other parts of the world, such as the African continent and much of central and south central Asia, there is evidence of a digital invasion, but it is still not…

  18. Comparing the Reading Performance of High-Achieving Adolescents: Computer-Based Testing versus Paper/Pencil

    ERIC Educational Resources Information Center

    Eno, Linda Peet

    2011-01-01

    Literacy is moving into the digital context. Many of the literacy tasks associated with higher education, the workplace, and civic life now take place in the digital world. Literacy in high school, however, languishes in the text world. This study compared the text literacy of a group of high-achieving 10th-grade students, to their digital…

  19. Loneliness and Social Internet Use: Pathways to Reconnection in a Digital World?

    PubMed

    Nowland, Rebecca; Necka, Elizabeth A; Cacioppo, John T

    2018-01-01

    With the rise of online social networking, social relationships are increasingly developed and maintained in a digital domain. Drawing conclusions about the impact of the digital world on loneliness is difficult because there are contradictory findings, and cross-sectional studies dominate the literature, making causation difficult to establish. In this review, we present our theoretical model and propose that there is a bidirectional and dynamic relationship between loneliness and social Internet use. When the Internet is used as a way station on the route to enhancing existing relationships and forging new social connections, it is a useful tool for reducing loneliness. But when social technologies are used to escape the social world and withdraw from the "social pain" of interaction, feelings of loneliness are increased. We propose that loneliness is also a determinant of how people interact with the digital world. Lonely people express a preference for using the Internet for social interaction and are more likely to use the Internet in a way that displaces time spent in offline social activities. This suggests that lonely people may need support with their social Internet use so that they employ it in a way that enhances existing friendships and/or to forge new ones.

  20. 77 FR 21587 - Bayer Cropscience, LP, Including On-Site Leased Workers From Jacobs PSG, Middough Associates, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-10

    ...., Digital Management Group, Mercury Air Group, Inc., Greenwood, and Professional Maintenance of Charleston... Solutions, Becht Engineering, Engineering Support Systems, Manufacturing Management Services, US Securities, WB Wells, Belcan, American Engineers, CH2M Hill Engineers, Inc., Digital Management Group, Mercury...

  1. 47 CFR 64.5103 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... VRS access technology. Such calls are made by means of ten-digit NANP numbers assigned to customers by...'s social security number, or the last four digits of that number; mother's maiden name; home address... driver's license, passport, or comparable ID that has not expired. (v) Video relay service. The term...

  2. 47 CFR 64.5103 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... VRS access technology. Such calls are made by means of ten-digit NANP numbers assigned to customers by...'s social security number, or the last four digits of that number; mother's maiden name; home address... driver's license, passport, or comparable ID that has not expired. (v) Video relay service. The term...

  3. Multimodal biometric digital watermarking on immigrant visas for homeland security

    NASA Astrophysics Data System (ADS)

    Sasi, Sreela; Tamhane, Kirti C.; Rajappa, Mahesh B.

    2004-08-01

    Passengers with immigrant Visa's are a major concern to the International Airports due to the various fraud operations identified. To curb tampering of genuine Visa, the Visa's should contain human identification information. Biometric characteristic is a common and reliable way to authenticate the identity of an individual [1]. A Multimodal Biometric Human Identification System (MBHIS) that integrates iris code, DNA fingerprint, and the passport number on the Visa photograph using digital watermarking scheme is presented. Digital Watermarking technique is well suited for any system requiring high security [2]. Ophthalmologists [3], [4], [5] suggested that iris scan is an accurate and nonintrusive optical fingerprint. DNA sequence can be used as a genetic barcode [6], [7]. While issuing Visa at the US consulates, the DNA sequence isolated from saliva, the iris code and passport number shall be digitally watermarked in the Visa photograph. This information is also recorded in the 'immigrant database'. A 'forward watermarking phase' combines a 2-D DWT transformed digital photograph with the personal identification information. A 'detection phase' extracts the watermarked information from this VISA photograph at the port of entry, from which iris code can be used for identification and DNA biometric for authentication, if an anomaly arises.

  4. 47 CFR 76.1204 - Availability of equipment performing conditional access or security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... system; and (3) Does not provide access to any digital transmission of multichannel video programming or... COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive... security functions. (a)(1) A multichannel video programming distributor that utilizes navigation devices to...

  5. Analysis on the threats and spatiotemporal distribution pattern of security in World Natural Heritage Sites.

    PubMed

    Wang, Zhaoguo; Yang, Zhaoping; Du, Xishihui

    2015-01-01

    World Natural Heritage Sites (WNHS) are treasures that need human protection and invite appreciation, which makes conservation of WNHS an urgent task. This paper assesses where in the world threats are most pressing and which WNHS require emergency assistance. Using an analysis of "hot spots" and inverse distance weighting, it finds that Africa is the region where WNHS are least secure. Reports of the state of the conservation of WNHS describe the many threats that exist. Of these, management activities and institutional factors are the primary threats. The paper suggests relevant measures to improve the WNHS security.

  6. Securing Digital Images Integrity using Artificial Neural Networks

    NASA Astrophysics Data System (ADS)

    Hajji, Tarik; Itahriouan, Zakaria; Ouazzani Jamil, Mohammed

    2018-05-01

    Digital image signature is a technique used to protect the image integrity. The application of this technique can serve several areas of imaging applied to smart cities. The objective of this work is to propose two methods to protect digital image integrity. We present a description of two approaches using artificial neural networks (ANN) to digitally sign an image. The first one is “Direct Signature without learning” and the second is “Direct Signature with learning”. This paper presents the theory of proposed approaches and an experimental study to test their effectiveness.

  7. Libraries in Today's Digital Age: The Copyright Controversy. ERIC Digest.

    ERIC Educational Resources Information Center

    Russell, Carrie

    This digest focuses on the continuing ambiguities libraries and their users face in dealing with copyright in the digital environment. In the networked digital world, the basic principles of copyright are more difficult to apply. Digital copies are easy to create, modify, and manipulate, they are extremely easy to distribute widely over networks,…

  8. An Exploratory Survey of Digital Libraries on the World Wide Web: Art and Literature of the Early Italian Renaissance.

    ERIC Educational Resources Information Center

    McKibben, Suzanne J.

    This study assessed the ongoing development of digital libraries (DLs) on the World Wide Web. DLs of art and literature were surveyed for selected works from the early Italian Renaissance in order to gain insight into the current trends prevalent throughout the larger population of DLs. The following artists and authors were selected for study:…

  9. Open Access, Open Source and Digital Libraries: A Current Trend in University Libraries around the World

    ERIC Educational Resources Information Center

    Krishnamurthy, M.

    2008-01-01

    Purpose: The purpose of this paper is to describe the open access and open source movement in the digital library world. Design/methodology/approach: A review of key developments in the open access and open source movement is provided. Findings: Open source software and open access to research findings are of great use to scholars in developing…

  10. New Concepts of Play and the Problem of Technology, Digital Media and Popular-Culture Integration with Play-Based Learning in Early Childhood Education

    ERIC Educational Resources Information Center

    Edwards, Susan

    2016-01-01

    Technology, digital media and popular culture form an important aspect of young children's life-worlds in contemporary post-industrial societies. A problem for early childhood educators is how to most effectively integrate these aspects of children's life-worlds into the provision of play-based learning. Traditionally, research has considered…

  11. Build a Catastrophe: Using Digital World and Policy Models to Engage Political Science Students with Climate Change

    NASA Astrophysics Data System (ADS)

    Horodyskyj, L.; Lennon, T.; Mead, C.; Anbar, A. D.

    2017-12-01

    Climate change is a problem that involves science, economics, and politics. Particularly in the United States, political resistance to addressing climate change has been exacerbated by a concerted misinformation campaign against the basic science, a negative response to how the proposed solutions to climate change intersect with values. Scientists often propose more climate science education as a solution to the problem, but preliminary studies indicate that more science education does not necessarily reduce polarization on the topic (Kahan et al. 2012). Is there a way that we can better engage non-science students in topics related to climate change that improve their comprehension of the problem and its implications, overcoming polarization? In an existing political science course, "Do You Want to Build a Nation?", we are testing a new digital world-building model based on resource development and consequent environmental and societal impacts. Students spend half the class building their nations based on their assigned ideology (i.e., socialist, absolute monarchy, libertarian) and the second half of the class negotiating with other nations to resolve global issues while remaining true to their ideologies. The course instructor, co-author Lennon, and ASU's Center for Education Through eXploration have collaborated to design a digital world model based on resources linked to an adaptive decision-making environment that translates student policies into modifications to the digital world. The model tracks students' exploration and justification of their nation's policy choices. In the Fall 2017 offering of the course, we will investigate how this digital world model and scenarios built around it affect student learning outcomes. Specifically, we anticipate improved understanding of the policy trade-offs related to energy development, better understanding of the ways that different ideologies approach solutions to climate change, and that both will result in more realistic diplomatic negotiations in the latter half of the course. We will report on the technical details of how the digital world model and scenarios are constructed as well as how students responded to the scenario.

  12. Conclusions

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    Some say that an increase in security does not necessarily mean a further encroachment on privacy - indeed, security is necessary to protect personal data and our privacy. Networks must be secure, our personal devices, reliable, dependable and trustworthy. But security is a multifaceted term, with many dimensions. We are of the view that an increase in security most likely will encroach upon our privacy in an ambient intelligence world. Surveillance cameras will continue to proliferate. We assume that, whatever the law is, whatever privacy protections government and business say they honour, our telecommunications, e-mails and Internet usage will be monitored to an increasing degree. The same will be true of our interfaces with the world of ambient intelligence.

  13. Shaping Our World: Digital Storytelling and the Authoring of Society

    ERIC Educational Resources Information Center

    Brzoska, Karen Lynn

    2009-01-01

    Globalization, networked societies, and a knowledge-based economy engender increasing reliance on digital communication technologies for the dissemination of information and ideas (Castells, Fernandez-Ardevol, Qiu & Sey, 2006). While the technological revolution has broadened access this digital domain, participants often adopt the passive…

  14. CR digital mammography: an affordable entry.

    PubMed

    Fischer, Cathy

    2006-01-01

    CR full-field digital mammography (FFDM) has been used extensively in other countries, and it was one of the 4 digital mammography technologies employed in the Digital Mammographic Imaging Screening Trial. Affordability and easy integration with pre-existing mammography systems makes CR FFDM an attractive way to secure the advantages of filmless mammography imaging. CR mammography is true digital mammography--it is merely a different way of acquiring the image. The FDA has recently approved the first CR FFDM system for sale in the United States. At Gundersen Lutheran Health System (La Crosse, Wisconsin), CR FFDM is the most practical technology for realizing the potential everyday clinical benefits of filmless mammography imaging.

  15. Institutionalizing Sustainability into the Total Army

    DTIC Science & Technology

    2008-03-14

    unsustainable world in which we live has an impact on our national security. Today it is clear that linkages between the environment and security are powerful...U.S. national security interests…” 31 The world is in an unsustainable state as it continues to incur a vast water deficit by consuming water belonging...any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a

  16. The Effects of Japan’s Apology for World War II Atrocities on Regional Relations

    DTIC Science & Technology

    2008-12-01

    textbooks and by government officials visiting Yasukuni Shrine, where Japan’s war dead are commemorated. The Japanese counter that they have offered... textbooks , Yasukuni War Shrine, Japan Apology, Article 9. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...World War II. They assert that Japan feels no remorse, as evidenced by treatment of World War II in Japanese school textbooks and by government

  17. Secure chaotic transmission of electrocardiography signals with acousto-optic modulation under profiled beam propagation.

    PubMed

    Almehmadi, Fares S; Chatterjee, Monish R

    2015-01-10

    Electrocardiography (ECG) signals are used for both medical purposes and identifying individuals. It is often necessary to encrypt this highly sensitive information before it is transmitted over any channel. A closed-loop acousto-optic hybrid device acting as a chaotic modulator is applied to ECG signals to achieve this encryption. Recently improved modeling of this approach using profiled optical beams has shown it to be very sensitive to key parameters that characterize the encryption and decryption process, exhibiting its potential for secure transmission of analog and digital signals. Here the encryption and decryption is demonstrated for ECG signals, both analog and digital versions, illustrating strong encryption without significant distortion. Performance analysis pertinent to both analog and digital transmission of the ECG waveform is also carried out using output signal-to-noise, signal-to-distortion, and bit-error-rate measures relative to the key parameters and presence of channel noise in the system.

  18. Design for Security Workshop

    DTIC Science & Technology

    2014-09-30

    fingerprint sensor etc.  Secure application execution  Trust established outwards  With normal world apps  With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User

  19. Medical Images Remote Consultation

    NASA Astrophysics Data System (ADS)

    Ferraris, Maurizio; Frixione, Paolo; Squarcia, Sandro

    Teleconsultation of digital images among different medical centers is now a reality. The problem to be solved is how to interconnect all the clinical diagnostic devices in a hospital in order to allow physicians and health physicists, working in different places, to discuss on interesting clinical cases visualizing the same diagnostic images at the same time. Applying World Wide Web technologies, the proposed system can be easily used by people with no specific computer knowledge providing a verbose help to guide the user through the right steps of execution. Diagnostic images are retrieved from a relational database or from a standard DICOM-PACS through the DICOM-WWW gateway allowing connection of the usual Web browsers to DICOM applications via the HTTP protocol. The system, which is proposed for radiotherapy implementation, where radiographies play a fundamental role, can be easily converted to different field of medical applications where a remote access to secure data are compulsory.

  20. Adrenal insufficiency secondary to tuberculosis: the value of telemedicine in the remote diagnosis of Addison's disease in Ebeye, Republic of the Marshall Islands.

    PubMed

    Bush, Lisabeth A; Ruess, Lynne; Jack, Tom; Person, Donald A

    2009-01-01

    A young Marshallese woman presented with the insidious development of fever, cough, fatigue, profound weakness, massive weight loss, cachexia, alopecia, amenorrhea, and periumbilical hyperpigmentation. Limited laboratory studies revealed anemia, leukocytosis, and hyponatremia. Imaging studies, as well as digital photographs, transmitted over the Internet, using the secure Pacific Island Health Care Project (PIHCP), store-and-forward telemedicine system, suggested the diagnosis of disseminated tuberculosis, and antimycobacterial antibiotics were begun. Sputum cultures eventually grew Mycobacterium tuberculosis. Based on the constellation of clinical signs and symptoms, the transmitted images, and limited laboratory data, adrenal tuberculosis (Addison's disease) with adrenal insufficiency was diagnosed and corticosteroids were initiated. The patient responded dramatically This case underscores the utility of telemedicine in the diagnosis and treatment of patients with unusual conditions, rarely seen today in the United States, from remote sites in the Developing World.

  1. 77 FR 27615 - Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-11

    ...-on, more detailed, digital forensics analysis or damage assessments of individual incidents... information. In addition, during any follow-on forensics or damage assessment activities, the Government and...), (c) and (d) of this section are maintained by the digital and multimedia forensics laboratory at DC3...

  2. 75 FR 43498 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... effective without further notice on August 25, 2010 unless comments are received which result in a contrary.... Categories of records in the system: Name, last four digits of the Social Security Number (SSN), date of... system: Storage: Electronic storage media. Retrievability: Last name, first name and/or last four digits...

  3. Playing Digital Security: Youth Voices on Their Digital Rights

    ERIC Educational Resources Information Center

    Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara

    2017-01-01

    The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…

  4. Deconstructing Digital Natives: Young People, Technology, and the New Literacies

    ERIC Educational Resources Information Center

    Thomas, Michael, Ed.

    2011-01-01

    There have been many attempts to define the generation of students who emerged with the Web and new digital technologies in the early 1990s. The term "digital native" refers to the generation born after 1980, which has grown up in a world where digital technologies and the internet are a normal part of everyday life. Young people…

  5. Digital Technology Use by the Students and English Teachers and Self-Directed Language Learning

    ERIC Educational Resources Information Center

    Sert, Nehir; Boynuegri, Ebru

    2017-01-01

    The digital era is a new challenge for teachers. While children get acquainted with the digital technology before the age of six, teachers, who have encountered with the digital world at a later time in their lives, struggle with it. Self-directed learning, which is crucial for lifelong learning, can be enhanced by the use technology particularly…

  6. Pre-Service Teachers in Second Life: Are Digital Natives Prepared for a Web 2.0 Experience?

    ERIC Educational Resources Information Center

    Inman, Christopher T.

    2010-01-01

    Today's college students, "digital natives," have had digital technology at their fingertips (Rushkoff, 1996; Prensky, 2001a). Technology habits and expectations of young people are changing; the educational and business worlds have placed a focus on skills called "21st century skills," to prepare students for the digital age (Lemke, 2002). Skills…

  7. Trustworthy History and Provenance for Files and Databases

    ERIC Educational Resources Information Center

    Hasan, Ragib

    2009-01-01

    In today's world, information is increasingly created, processed, transmitted, and stored digitally. While the digital nature of information has brought enormous benefits, it has also created new vulnerabilities and attacks against data. Unlike physical documents, digitally stored information can be rapidly copied, erased, or modified. The…

  8. Transnational Feminist Rhetorics in a Digital World

    ERIC Educational Resources Information Center

    Queen, Mary

    2008-01-01

    In this essay, the author examines the digital circulations of representations of one Afghan women's rights organization--the Revolutionary Association of Women of Afghanistan (RAWA)--to demonstrate the importance of a global and digital field for feminist rhetorical analysis. Specifically, this analysis traces how women's self-representations are…

  9. Teaching Language and Culture in a Digital Age

    ERIC Educational Resources Information Center

    Chamberlin-Quinlisk, Carla

    2012-01-01

    This article examines part of the complex relationship between linguistic and cultural diversity and the digital technologies that shape our social worlds. In particular, the author explores how digital media cultivate ideas about language practice in multicultural communities and simultaneously serve as a pedagogical tool for discussing…

  10. Educating Digital Citizens

    ERIC Educational Resources Information Center

    Tan, Thomas

    2011-01-01

    Digital citizenship is how educators, citizens, and parents can teach where the lines of cyber safety and ethics are in the interconnected online world their students will inhabit. Aside from keeping technology users safe, digital citizenship also prepares students to survive and thrive in an environment embedded with information, communication,…

  11. Adapting Digital Libraries to Continual Evolution

    NASA Technical Reports Server (NTRS)

    Barkstrom, Bruce R.; Finch, Melinda; Ferebee, Michelle; Mackey, Calvin

    2002-01-01

    In this paper, we describe five investment streams (data storage infrastructure, knowledge management, data production control, data transport and security, and personnel skill mix) that need to be balanced against short-term operating demands in order to maximize the probability of long-term viability of a digital library. Because of the rapid pace of information technology change, a digital library cannot be a static institution. Rather, it has to become a flexible organization adapted to continuous evolution of its infrastructure.

  12. Acquisition of a Surface Plasmon Resonance Imager, Digital Microscope, and Peristaltic Pumps for Defense-Based Research

    DTIC Science & Technology

    2016-05-05

    SECURITY CLASSIFICATION OF: The goal of this proposal is to purchase the GWC Technologies, Inc. Horizontal Surface Plasmon Resonance Imaging (SPRi...Unlimited UU UU UU UU 05-05-2016 1-Feb-2014 31-Jan-2016 Final Report: Acquisition of a Surface Plasmon Resonance Imager, Digital Microscope, and...S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211 Surface Plasmon Resonance Imager, Digital

  13. In- and Out-of-Character: The Digital Literacy Practices and Emergent Information Worlds of Active Role-Players in a New Massively Multiplayer Online Role-Playing Game

    ERIC Educational Resources Information Center

    Hollister, Jonathan M.

    2016-01-01

    This dissertation explores and describes the in-character and out-of-character information worlds and digital literacy practices of role-players, those that create and enact their characters' or avatars' stories, both within and outside of WildStar, a Massively Multiplayer Online Role-Playing Game (MMORPG) (Carbine Studios, 2015). Utilizing Jaeger…

  14. Turning the Digital Divide into Digital Dividends through Free Content and Open Networks: WikiEducator Learning4Content (L4C) Initiative

    ERIC Educational Resources Information Center

    Schlicht, Patricia

    2013-01-01

    In today's world where tuition fees continue to rise rapidly and the demand for higher education increases in both the developing and developed world, it is important to find additional and alternative learning pathways that learners can afford. Traditional education as we have known it has begun to change, allowing for new parallel learning…

  15. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  16. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information

    DTIC Science & Technology

    2010-04-23

    from the stock market. Journal of Computer Security, 11(3):431–448, 2003. [7] D . Chaum . Untraceable electronic mail, return addresses, and digital...to cross several other administrative boundaries (e.g., ISPs C, D , . . .), causing potential congestion at all of these intermediaries. A very...Quarterly Journal of Economics, 108(1):259–271, February 1993. [9] P. Ferguson and D . Senie. Network ingress filtering: Defeating denial of service

  17. Picture archiving and communication in radiology.

    PubMed

    Napoli, Marzia; Nanni, Marinella; Cimarra, Stefania; Crisafulli, Letizia; Campioni, Paolo; Marano, Pasquale

    2003-01-01

    After over 80 years of exclusive archiving of radiologic films, at present, in Radiology, digital archiving is increasingly gaining ground. Digital archiving allows a considerable reduction in costs and space saving, but most importantly, immediate or remote consultation of all examinations and reports in the hospital clinical wards, is feasible. The RIS system, in this case, is the starting point of the process of electronic archiving which however is the task of PACS. The latter can be used as radiologic archive in accordance with the law provided that it is in conformance with some specifications as the use of optical long-term storage media or with electronic track of change. PACS archives, in a hierarchical system, all digital images produced by each diagnostic imaging modality. Images and patient data can be retrieved and used for consultation or remote consultation by the reporting radiologist who requires images and reports of previous radiologic examinations or by the referring physician of the ward. Modern PACS owing to the WEB server allow remote access to extremely simplified images and data however ensuring the due regulations and access protections. Since the PACS enables a simpler data communication within the hospital, security and patient privacy should be protected. A secure and reliable PACS should be able to minimize the risk of accidental data destruction, and should prevent non authorized access to the archive with adequate security measures in relation to the acquired knowledge and based on the technological advances. Archiving of data produced by modern digital imaging is a problem now present also in small Radiology services. The technology is able to readily solve problems which were extremely complex up to some years ago as the connection between equipment and archiving system owing also to the universalization of the DICOM 3.0 standard. The evolution of communication networks and the use of standard protocols as TCP/IP can minimize problems of data and image remote transmission within the healthcare enterprise as well as over the territory. However, new problems are appearing as that of digital data security profiles and of the different systems which should ensure it. Among these, algorithms of electronic signature should be mentioned. In Italy they are validated by law and therefore can be used in digital archives in accordance with the law.

  18. Population growth and global security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mumford, S.

    A new threat to international and domestic security has emerged in the past three decades: uncontrolled world population growth. Current world population growth control efforts are ineffective. Unchecked growth will threaten global security by depleting food, energy, and other resources. Immigration is another complicating factor that is straining the carrying capacity of some overpopulated regions. Barriers to effective action include the desire of decision-makers to avoid the controversy of abortion and the role of the Catholic church in lobbying against birth control. (3 graphs, 12 photos, 2 tables)

  19. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    DTIC Science & Technology

    2016-02-12

    SECURITY CLASSIFICATION OF: This project examined China’s drive to become a world-class defense and dual -use technological and industrial power and...2211 China, science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...Place in the Global Technology Order Report Title This project examined China’s drive to become a world-class defense and dual -use technological and

  20. Pedagogy Meets Digital Media: A Tangle of Teachers, Strategies, and Tactics

    ERIC Educational Resources Information Center

    Rust, Julie

    2017-01-01

    Although increasingly encouraged to incorporate digital media into classrooms to prepare students for engaged participation in a digital world, teachers are often taken by surprise when paradigm clashes arise between traditional school expectations and the affordances of these new spaces. Through data gathered from ethnographic methodologies…

  1. Reaching Digital Natives on Their Terms

    ERIC Educational Resources Information Center

    Dessoff, Alan

    2010-01-01

    From replacing print textbooks with digital content created by teachers or gathered from outside sources to encouraging students to explore the world around them digitally, many districts are creating a new type of student-friendly teaching and learning environment that goes beyond just adding computers to classrooms. Through a wide range of…

  2. Perspectives on Communicating with the Net Generation

    ERIC Educational Resources Information Center

    Zimmerman, Lynn; Milligan, Anastasia Trekles

    2008-01-01

    Lynn Zimmerman and Anastasia Trekles Milligan examine technological communication from the perspectives of two instructors, one a digital immigrant and the other a digital native. Today's students are digital natives, reared in a world permeated by interactive technology; as a result, they are used to a model of communication that is significantly…

  3. Migrant Adult Learners and Digital Literacy: Using DBR to Support Teaching and Learning

    ERIC Educational Resources Information Center

    Vanek, Jenifer B.

    2017-01-01

    This research explores the difficulties faced by many migrant, refugee, and immigrant adults confronted with technological ubiquity in economically developed countries. Preparing migrant adult learners for the digital world by building digital literacy skills can help to maintain home language proficiency, support English language learning, and…

  4. Digital Media and Emergent Literacy

    ERIC Educational Resources Information Center

    Hisrich, Katy; Blanchard, Jay

    2009-01-01

    This article discusses digital media and its potential effects on emergent literacy skills development for young children. While the impact of digital media exposure on children's emergent literacy development is largely unknown, it is becoming a significant issue, as more and more young children throughout the world observe and use various forms…

  5. Creating and Sharing: Teens' Information Practices in Digital Communities

    ERIC Educational Resources Information Center

    Harlan, Mary Ann; Bruce, Christine; Lupton, Mandy

    2014-01-01

    Introduction: In a connected world youth are participating in digital content creating communities. This paper introduces a description of teens' information practices in digital content creating and sharing communities. Method: The research design was a constructivist grounded theory methodology. Seventeen interviews with eleven teens were…

  6. South Korean Digital Textbook Project

    ERIC Educational Resources Information Center

    Kim, Jackie Hee-Young; Jung, Hye-Yoon

    2010-01-01

    South Korea has adopted the widespread use of digital textbooks. Part school reform and part an effort to prepare today's children for tomorrow's challenging world, the way in which this effort was implemented and the lessons learned are valuable. This article highlights the history of the digital textbook project and compares printed textbooks…

  7. Learning the Virtual Life: Public Pedagogy in a Digital World

    ERIC Educational Resources Information Center

    Trifonas, Peter Pericles, Ed.

    2011-01-01

    Digital technologies have transformed cultural perceptions of learning and what it means to be literate, expanding the importance of experience alongside interpretation and reflection. "Living the Virtual Life" offers ways to consider the local and global effects of digital media on educational environments, as well as the cultural transformations…

  8. Discovering History in a Digital World: The Texas Story Project

    ERIC Educational Resources Information Center

    Munns, David

    2016-01-01

    New digital tools and technologies create an opportunity for history museums to personalize visitor experiences, reach new audiences, and increase their relevancy by including visitors' historical narratives in museum content and programming. By adapting to the shift in social narrative prompted by digital media advancements, museums are…

  9. Impacts of Psychological Science on National Security Agencies Post-9/11

    ERIC Educational Resources Information Center

    Brandon, Susan E.

    2011-01-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of…

  10. World Food Security and Insecurity, 1984-2000.

    ERIC Educational Resources Information Center

    Farrell, Kenneth R.

    Effective economic demand, rather than resource constraints, will continue to be the dominant limiting factor in improving the security of world food supplies between now and the year 2000. The global demand for food will continue to grow but the rate of growth is declining in virtually all regions, easing the pressure on agricultural resources.…

  11. Radiology on handheld devices: image display, manipulation, and PACS integration issues.

    PubMed

    Raman, Bhargav; Raman, Raghav; Raman, Lalithakala; Beaulieu, Christopher F

    2004-01-01

    Handheld personal digital assistants (PDAs) have undergone continuous and substantial improvements in hardware and graphics capabilities, making them a compelling platform for novel developments in teleradiology. The latest PDAs have processor speeds of up to 400 MHz and storage capacities of up to 80 Gbytes with memory expansion methods. A Digital Imaging and Communications in Medicine (DICOM)-compliant, vendor-independent handheld image access system was developed in which a PDA server acts as the gateway between a picture archiving and communication system (PACS) and PDAs. The system is compatible with most currently available PDA models. It is capable of both wired and wireless transfer of images and includes custom PDA software and World Wide Web interfaces that implement a variety of basic image manipulation functions. Implementation of this system, which is currently undergoing debugging and beta testing, required optimization of the user interface to efficiently display images on smaller PDA screens. The PDA server manages user work lists and implements compression and security features to accelerate transfer speeds, protect patient information, and regulate access. Although some limitations remain, PDA-based teleradiology has the potential to increase the efficiency of the radiologic work flow, increasing productivity and improving communication with referring physicians and patients. Copyright RSNA, 2004

  12. International organizations to enable world-wide mobile satellite services

    NASA Technical Reports Server (NTRS)

    Anglin, Richard L., Jr.

    1993-01-01

    Numbers of systems exist or have been proposed to provide world-wide mobile satellite services (MSS). Developers of these systems have formulated institutional structures they consider most appropriate for profitable delivery of these services. MSS systems provide niche services and complement traditional telecommunications networks; they are not integrated into world-wide networks. To be successful, MSS system operators must be able to provide an integrated suite of services to support the increasing globalization, interconnectivity, and mobility of business. The critical issue to enabling 'universal roaming' is securing authority to provide MSS in all of the nations of the world. Such authority must be secured in the context of evolving trends in international telecommunications, and must specifically address issues of standardization, regulation and organization. Today, only one existing organization has such world-wide authority. The question is how proponents of new MSS systems and services can gain similar authority. Securing the appropriate authorizations requires that these new organizations reflect the objectives of the nations in which services are to be delivered.

  13. Merging Digital Medicine and Economics: Two Moving Averages Unlock Biosignals for Better Health.

    PubMed

    Elgendi, Mohamed

    2018-01-06

    Algorithm development in digital medicine necessitates ongoing knowledge and skills updating to match the current demands and constant progression in the field. In today's chaotic world there is an increasing trend to seek out simple solutions for complex problems that can increase efficiency, reduce resource consumption, and improve scalability. This desire has spilled over into the world of science and research where many disciplines have taken to investigating and applying more simplistic approaches. Interestingly, through a review of current literature and research efforts, it seems that the learning and teaching principles in digital medicine continue to push towards the development of sophisticated algorithms with a limited scope and has not fully embraced or encouraged a shift towards more simple solutions that yield equal or better results. This short note aims to demonstrate that within the world of digital medicine and engineering, simpler algorithms can offer effective and efficient solutions, where traditionally more complex algorithms have been used. Moreover, the note demonstrates that bridging different research disciplines is very beneficial and yields valuable insights and results.

  14. Gaming the System: Developing an Educational Game for Securing Principles of Arterial Blood Gases.

    PubMed

    Boyd, Cory Ann; Warren, Jonah; Glendon, Mary Ann

    2016-01-01

    This article describes the development process for creating a digital educational mini game prototype designed to provide practice opportunities for learning fundamental principles of arterial blood gases. Mini games generally take less than an hour to play and focus on specific subject matter. An interdisciplinary team of faculty from two universities mentored student game developers to design a digital educational mini game prototype. Sixteen accelerated bachelor of science in nursing students collaborated with game development students and playtested the game prototype during the last semester of their senior year in nursing school. Playtesting is a form of feedback that supports an iterative design process that is critical to game development. A 10-question survey was coupled with group discussions addressing five broad themes of an archetypical digital educational mini game to yield feedback on game design, play, and content. Four rounds of playtesting and incorporating feedback supported the iterative process. Accelerated bachelor of science in nursing student playtester feedback suggests that the digital educational mini game prototype has potential for offering an engaging, playful game experience that will support securing the fundamental principles of arterial blood gases. Next steps are to test the digital educational mini game for teaching and learning effectiveness. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Digital information management: a progress report on the National Digital Mammography Archive

    NASA Astrophysics Data System (ADS)

    Beckerman, Barbara G.; Schnall, Mitchell D.

    2002-05-01

    Digital mammography creates very large images, which require new approaches to storage, retrieval, management, and security. The National Digital Mammography Archive (NDMA) project, funded by the National Library of Medicine (NLM), is developing a limited testbed that demonstrates the feasibility of a national breast imaging archive, with access to prior exams; patient information; computer aids for image processing, teaching, and testing tools; and security components to ensure confidentiality of patient information. There will be significant benefits to patients and clinicians in terms of accessible data with which to make a diagnosis and to researchers performing studies on breast cancer. Mammography was chosen for the project, because standards were already available for digital images, report formats, and structures. New standards have been created for communications protocols between devices, front- end portal and archive. NDMA is a distributed computing concept that provides for sharing and access across corporate entities. Privacy, auditing, and patient consent are all integrated into the system. Five sites, Universities of Pennsylvania, Chicago, North Carolina and Toronto, and BWXT Y12, are connected through high-speed networks to demonstrate functionality. We will review progress, including technical challenges, innovative research and development activities, standards and protocols being implemented, and potential benefits to healthcare systems.

  16. Patient-Centered Access to Secure Systems Online (PCASSO): a secure approach to clinical data access via the World Wide Web.

    PubMed Central

    Masys, D. R.; Baker, D. B.

    1997-01-01

    The Internet's World-Wide Web (WWW) provides an appealing medium for the communication of health related information due to its ease of use and growing popularity. But current technologies for communicating data between WWW clients and servers are systematically vulnerable to certain types of security threats. Prominent among these threats are "Trojan horse" programs running on client workstations, which perform some useful and known function for a user, while breaching security via background functions that are not apparent to the user. The Patient-Centered Access to Secure Systems Online (PCASSO) project of SAIC and UCSD is a research, development and evaluation project to exploit state-of-the-art security and WWW technology for health care. PCASSO is designed to provide secure access to clinical data for healthcare providers and their patients using the Internet. PCASSO will be evaluated for both safety and effectiveness, and may provide a model for secure communications via public data networks. PMID:9357644

  17. Benford's Law and Why the Integers Are Not What We Think They Are: A Critical Numeracy of Benford's Law

    ERIC Educational Resources Information Center

    Stoessiger, Rex

    2013-01-01

    A critical numeracy examination of Benford's Law suggests that our understanding of the integers is faulty. We think of them as equally likely to turn up as the first digit of a random real world number. For many real world data sets this is not true. In many cases, ranging from eBay auction prices to six digit numbers in Google to the…

  18. Protecting Digital Evidence Integrity by Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  19. Center for Coastline Security Technology, Year 3

    DTIC Science & Technology

    2008-05-01

    Polarization control for 3D Imaging with the Sony SRX-R105 Digital Cinema Projectors 3.4 HDMAX Camera and Sony SRX-R105 Projector Configuration for 3D...HDMAX Camera Pair Figure 3.2 Sony SRX-R105 Digital Cinema Projector Figure 3.3 Effect of camera rotation on projected overlay image. Figure 3.4...system that combines a pair of FAU’s HD-MAX video cameras with a pair of Sony SRX-R105 digital cinema projectors for stereo imaging and projection

  20. Advanced Information Assurance Handbook

    DTIC Science & Technology

    2004-03-01

    and extraction of stored or recorded digital /electronic evidence (from the Latin root “ forensis ,” relating to the forum/legal business). 4.3...up over 100 MB of memory ) and also open the door to potential security incidents. Services can be set to start automatically upon boot or they can... digital certificates, thereby increasing the reliability of the authentication considerably. 12

  1. Intranasal Insulin for Improving Cognitive Function in Multiple Sclerosis

    DTIC Science & Technology

    2017-10-01

    Insulin, Symbol Digit Modalities Test , Minimal Assessment of Cognitive Function in Multiple Sclerosis 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...going to evaluate if intranasal insulin improves cognition in people with MS, as assessed by standardized cognitive assessment tests . 2. KEYWORDS...Multiple Sclerosis, Cognitive Impairment, Neurodegenerative diseases, Intranasal Insulin, Symbol Digit Modalities Test , Minimal Assessment of Cognitive

  2. Activities report of PTT Research

    NASA Astrophysics Data System (ADS)

    In the field of postal infrastructure research, activities were performed on postcode readers, radiolabels, and techniques of operations research and artificial intelligence. In the field of telecommunication, transportation, and information, research was made on multipurpose coding schemes, speech recognition, hypertext, a multimedia information server, security of electronic data interchange, document retrieval, improvement of the quality of user interfaces, domotics living support (techniques), and standardization of telecommunication prototcols. In the field of telecommunication infrastructure and provisions research, activities were performed on universal personal telecommunications, advanced broadband network technologies, coherent techniques, measurement of audio quality, near field facilities, local beam communication, local area networks, network security, coupling of broadband and narrowband integrated services digital networks, digital mapping, and standardization of protocols.

  3. A Study of the U.S. Foreign Military Sales and ROC (Republic of China) Procurement System

    DTIC Science & Technology

    1988-09-01

    representatives have long contact with American suppliers, and in a world in which the ROC no longer enjoys diplomatic recognition among the major suppliers, it ...THE FMS IN THE U.S. A. GENERAL Itt. United States Security Assistance Program is an important instrument for pursuing peace and world order. It has...been a cornerstone of postwar U.S. foreign polic~tt, and an integral part of its overall nat~onal security effort. In order to maintain a stable world

  4. Cold War Agency: The United States and the Failure of the DIEM Experiment

    DTIC Science & Technology

    2017-03-01

    2000s to establish democratic regimes in Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests...Afghanistan and Iraq reflect an American foreign policy tradition that began at the end of World War II. The pairing of national security interests with the

  5. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    PubMed

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, P<0.001 for both). Education and sex-related differences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  6. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  7. The electronic security partnership of safety/security and information systems departments.

    PubMed

    Yow, J Art

    2012-01-01

    The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.

  8. Air Force’s Combat Aircraft: A Future Holding into the Past

    DTIC Science & Technology

    2010-04-07

    Global Security, “9M111 / SA-19 GRISON ,” Globalsecurity.org, http://www.globalsecurity.org/military/world/ russia/sa-19.htm (accessed March 13, 2010...world/russia/9k338.htm (assessed March 13, 2010). Global Security. “9M111 / SA-19 GRISON .” Globalsecurity.org. http://www.globalsecurity. org

  9. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    PubMed Central

    Peter, Steffen; Pratap Reddy, Bhanu; Momtaz, Farshad; Givargis, Tony

    2016-01-01

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system. PMID:27110785

  10. Use of Emerging Grid Computing Technologies for the Analysis of LIGO Data

    NASA Astrophysics Data System (ADS)

    Koranda, Scott

    2004-03-01

    The LIGO Scientific Collaboration (LSC) today faces the challenge of enabling analysis of terabytes of LIGO data by hundreds of scientists from institutions all around the world. To meet this challenge the LSC is developing tools, infrastructure, applications, and expertise leveraging Grid Computing technologies available today, and making available to LSC scientists compute resources at sites across the United States and Europe. We use digital credentials for strong and secure authentication and authorization to compute resources and data. Building on top of products from the Globus project for high-speed data transfer and information discovery we have created the Lightweight Data Replicator (LDR) to securely and robustly replicate data to resource sites. We have deployed at our computing sites the Virtual Data Toolkit (VDT) Server and Client packages, developed in collaboration with our partners in the GriPhyN and iVDGL projects, providing uniform access to distributed resources for users and their applications. Taken together these Grid Computing technologies and infrastructure have formed the LSC DataGrid--a coherent and uniform environment across two continents for the analysis of gravitational-wave detector data. Much work, however, remains in order to scale current analyses and recent lessons learned need to be integrated into the next generation of Grid middleware.

  11. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    PubMed

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  12. Digital Video and the Internet: A Powerful Combination.

    ERIC Educational Resources Information Center

    Barron, Ann E.; Orwig, Gary W.

    1995-01-01

    Provides an overview of digital video and outlines hardware and software necessary for interactive training on the World Wide Web and for videoconferences via the Internet. Lists sites providing additional information on digital video, on CU-SeeMe software, and on MBONE (Multicast BackBONE), a technology that permits real-time transmission of…

  13. iResilience of Science Pre-Service Teachers through Digital Storytelling

    ERIC Educational Resources Information Center

    Ng, Wan; Nicholas, Howard

    2015-01-01

    We live in a multimodal world where communication enabled by digital media supports the expression of ideas, opinions, instructions and experiences in a variety of formats that empower the individual to convey thoughts and emotions persuasively. In education, digital storytelling as a pedagogical strategy can be embedded in student-generated…

  14. The International Children's Digital Library: Increasing Children's Access to Books through Technology

    ERIC Educational Resources Information Center

    Weeks, Ann Carlson

    2007-01-01

    The International Children's Digital Library (ICDL) began as a research project funded primarily by the National Science Foundation (NSF), the Institute for Museum and Library Services (IMLS), and Microsoft Research and creates a digital library of outstanding children's books from all over the world (http://www. childrenslibrary.org). The project…

  15. A Study on Exploiting Commercial Digital Games into School Context

    ERIC Educational Resources Information Center

    Panoutsopoulos, Hercules; Sampson, Demetrios G.

    2012-01-01

    Digital game-based learning is a research field within the context of technology-enhanced learning that has attracted significant research interest. Commercial off-the-shelf digital games have the potential to provide concrete learning experiences and allow for drawing links between abstract concepts and real-world situations. The aim of this…

  16. Encounters across Difference: The Digital Geographies of Inuit, The Arctic, and Environmental Management

    ERIC Educational Resources Information Center

    Young, Jason C.

    2017-01-01

    There is broad consensus amongst scholars across a wide range of disciplines that digital technologies are having profound effects on micro- and macropolitical processes across the world. However, research into digital geographies has not rigorously examined the role of the Internet in bridging epistemological difference. Rather, most of this…

  17. Digital Portfolios: Documenting Student Growth

    ERIC Educational Resources Information Center

    Cramer, Matthew

    2009-01-01

    The digital portfolio process at Camino Nuevo High School (CNHS) offers an essential 21st century skill to students. All students are trained in basic web design to build and maintain their digital portfolios. These skills equip them with tools they will likely use in their future endeavors in college and the professional world. Teachers at CNHS…

  18. Standpoints: Researching and Teaching English in the Digital Dimension

    ERIC Educational Resources Information Center

    Kirkland, David E.

    2009-01-01

    David E. Kirkland argues that our understanding of literate practice in relation to space needs to be radically reworked to account for new digital dimensions that are dispersed, discontinuous, and yet deeply woven into everyday and institutional worlds. His account highlights the way these digital spaces pepper the official landscape of…

  19. Building Expertise to Support Digital Scholarship: A Global Perspective

    ERIC Educational Resources Information Center

    Lewis, Vivian; Spiro, Lisa; Wang, Xuemao; Cawthorne, Jon E.

    2015-01-01

    This report sheds light on the expertise required to support a robust and sustainable digital scholarship (DS) program. It focuses first on defining and describing the key domain knowledge, skills, competencies, and mindsets at some of the world's most prominent digital scholarship programs. It then identifies the main strategies used to build…

  20. Enhancing Scientific Practice and Education through Collaborative Digital Libraries.

    ERIC Educational Resources Information Center

    Maini, Gaurav; Leggett, John J.; Ong, Teongjoo; Wilson, Hugh D.; Reed, Monique D.; Hatch, Stephan L.; Dawson, John E.

    The need for accurate and current scientific information in the fast paced Internet-aware world has prompted the scientific community to develop tools that reduce the scientist's time and effort to make digital information available to all interested parties. The availability of such tools has made the Internet a vast digital repository of…

  1. "Impossible Is Nothing": Expressing Difficult Knowledge through Digital Storytelling

    ERIC Educational Resources Information Center

    Johnson, Lauren; Kendrick, Maureen

    2017-01-01

    The study focuses on a digital storytelling project conducted in a school district's transition program, in which adolescent refugee and immigrant English learners were invited to share aspects of their identities and social worlds through a range of modes. In this article, the authors look closely at one student's digital story through a…

  2. Digital Content: The Babel of Cyberspace.

    ERIC Educational Resources Information Center

    Bruce, Bertram

    1999-01-01

    Takes a fanciful journey into the digital library imagined by Jorge Luis Borges, and uses it as a metaphor to examine what sort of library the World Wide Web is. Examines how digital libraries are growing and what they mean for literacy education. Includes a description of a particular Web page, and a glossary. (SR)

  3. PrimaryAccess: Creating Digital Documentaries in the Social Studies Classroom

    ERIC Educational Resources Information Center

    Ferster, Bill; Hammond, Tom; Bull, Glen

    2006-01-01

    The authors have been working with teachers who are drawing upon various online resources to construct digital documentaries that explore some facet of history, such as Japanese American internment or the liberation of Western Europe during World War II. These activities build on students' interest in digital media, recognizing a fundamental shift…

  4. Revisiting the Digital Divide in the Context of a "Flattening" World

    ERIC Educational Resources Information Center

    Subramony, Deepak Prem

    2014-01-01

    This article employs a variety of theoretical lenses to describe the nature and ramifications of the Digital Divide, which, the author states, continues to remain one of the biggest social challenges to confront the human race in modern times--even as technological advances, globalization, and other socioeconomic shifts are rendering digital media…

  5. Digital Leisure and Perceived Family Functioning in Youth of Upper Secondary Education

    ERIC Educational Resources Information Center

    Valdemoros-San-Emeterio, M-Angeles; Sanz-Arazuri, Eva; Ponce-de-León-Elizondo, Ana

    2017-01-01

    The "Network Society" is identified by accelerated changes that occur between real and virtual worlds. The progress of digital devices has generated a new model of leisure that has conditioned family interactions. The aim of this research was to identify the relationship between digital leisure experiences and perceived family…

  6. A Digital Library for Education: The PEN-DOR Project.

    ERIC Educational Resources Information Center

    Fullerton, Karen; Greenberg, Jane; McClure, Maureen; Rasmussen, Edie; Stewart, Darin

    1999-01-01

    Describes Pen-DOR (Pennsylvania Education Network Digital Object Repository), a digital library designed to provide K-12 educators with access to multimedia resources and tools to create new lesson plans and modify existing ones via the World Wide Web. Discusses design problems of a distributed, object-oriented database architecture and describes…

  7. Rethinking Workplace Learning in the Digital World: A Case Study of Open Badges

    ERIC Educational Resources Information Center

    Eaglen Bertrando, Sharen Linn

    2017-01-01

    The purpose of this collective case study was to explore digital badging in educational institutions as support for K-12 practitioners struggling to integrate technology into pedagogical practices. The researcher conducted a mixed-method study that captured perceptions about digital badges and follow-up interviews with selected badge users to…

  8. The Digital Divide Revisited: What Is Next?

    ERIC Educational Resources Information Center

    Huffman, Stephanie

    2018-01-01

    As soon as the Internet came into existence and the World Wide Web was introduced to make Internet utilization much easier, leaders have been worried about the "digital divide." The digital divide refers to the inequality of access to information services. There has been marked improvements over the last 20 years, however the poorest…

  9. Getting It Together: Relational Habitus in the Emergence of Digital Literacies

    ERIC Educational Resources Information Center

    Underwood, Charles; Parker, Leann; Stone, Lynda

    2013-01-01

    Digital literacies have fast become indispensable for productive engagement, competency, and citizenship in a rapidly changing world. After-school programs represent an important venue where many young people can develop a mastery of digital literacies, encompassing both the creative and responsible use of a broad range of new media. This paper…

  10. Small Wonders Close Encounters

    ERIC Educational Resources Information Center

    Kniseley, MacGregor; Capraro, Karen

    2013-01-01

    This article introduces students to the world of digital microscopy. Looking at small objects through a digital microscope is like traveling through a foreign country for the first time. The experience is new, engaging, and exciting. A handheld digital microscope is an essential tool in a 21st century teacher's toolkit and the perfect tool to…

  11. Distributed digital music archives and libraries

    NASA Astrophysics Data System (ADS)

    Fujinaga, Ichiro

    2005-09-01

    The main goal of this research program is to develop and evaluate practices, frameworks, and tools for the design and construction of worldwide distributed digital music archives and libraries. Over the last few millennia, humans have amassed an enormous amount of musical information that is scattered around the world. It is becoming abundantly clear that the optimal path for acquisition is to distribute the task of digitizing the wealth of historical and cultural heritage material that exists in analogue formats, which may include books and manuscripts related to music, music scores, photographs, videos, audio tapes, and phonograph records. In order to achieve this goal, libraries, museums, and archives throughout the world, large or small, need well-researched policies, proper guidance, and efficient tools to digitize their collections and to make them available economically. The research conducted within the program addresses unique and imminent challenges posed by the digitization and dissemination of music media. The are four major research projects in progress: development and evaluation of digitization methods for preservation of analogue recordings; optical music recognition using microfilms; design of workflow management system with automatic metadata extraction; and formulation of interlibrary communication strategies.

  12. Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry

    ERIC Educational Resources Information Center

    Willey, Lorrie; White, Barbara Jo

    2013-01-01

    Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…

  13. Intellectual Property, Digital Technology and the Developing World

    NASA Astrophysics Data System (ADS)

    Pupillo, Lorenzo Maria

    This chapter provides an overview of how the converging ICTs are challenging the traditional off-line copyright doctrine and suggests how developing countries should approach issues such as copyright in the digital world, software (Protection, Open Source, Reverse Engineering), and data base protection. The balance of the chapter is organized into three sections. After the introduction, the second section explains how digital technology is dramatically changing the entertainment industry, what are the major challenges to the industry, and what are the approaches that the economic literature suggest to face the structural changes that the digital revolution is bringing forward. Starting from the assumption that IPRs frameworks need to be customized to the countries’ development needs, the third section makes recommendations on how developing countries should use copyright to support access to information and to creative industries.

  14. Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations

    DTIC Science & Technology

    2014-08-26

    America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal

  15. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  16. Improved performance of analog and digital acousto-optic modulation with feedback under profiled beam propagation for secure communication using chaos

    NASA Astrophysics Data System (ADS)

    Almehmadi, Fares S.; Chatterjee, Monish R.

    2014-12-01

    Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise. The simulations with profiled input beams are shown to produce a stronger encryption key (i.e., much lower parametric tolerance thresholds) relative to simulations with uniform plane wave input beams. In each case, it is shown that the tolerance for key parameters drops by factors ranging from 10 to 20 times below those for uniform plane wave propagation. Results are shown to be at consistently lower tolerances for secure transmission of analog and digital signals using parameter tolerance measures, as well as BER performance measures for digital signals. These results hold out the promise for considerably greater information transmission security for such a system.

  17. Democratizing LGBTQ History Online: Digitizing Public History in "U.S. Homophile Internationalism".

    PubMed

    de Szegheo Lang, Tamara

    2017-01-01

    This article argues that the online archive and exhibit "U.S. Homophile Internationalism" effectively contributes to the democratizing effects that digital archives and online initiatives are having on the practice of history. "U.S. Homophile Internationalism" is an online archive of over 800 digitized articles, letters, advertisements, and other materials from the U.S. homophile press that reference six non-U.S. regions of the world. It also provides visitors with introductory regional essays, annotated bibliographies, and an interactive map feature. This essay weaves "U.S. Homophile Internationalism" into the debates in community-run LGBTQ archives regarding the digitization of archival materials and the possibilities presented by digital public history. In doing so, it outlines the structure and content of "U.S. Homophile Internationalism," highlighting how it increases the public accessibility of primary sources, encourages historical research on regions of the world that have not been adequately represented in LGBTQ history writing, and creates interactive components to support public engagements with the Web site.

  18. Inselect: Automating the Digitization of Natural History Collections.

    PubMed

    Hudson, Lawrence N; Blagoderov, Vladimir; Heaton, Alice; Holtzhausen, Pieter; Livermore, Laurence; Price, Benjamin W; van der Walt, Stéfan; Smith, Vincent S

    2015-01-01

    The world's natural history collections constitute an enormous evidence base for scientific research on the natural world. To facilitate these studies and improve access to collections, many organisations are embarking on major programmes of digitization. This requires automated approaches to mass-digitization that support rapid imaging of specimens and associated data capture, in order to process the tens of millions of specimens common to most natural history collections. In this paper we present Inselect-a modular, easy-to-use, cross-platform suite of open-source software tools that supports the semi-automated processing of specimen images generated by natural history digitization programmes. The software is made up of a Windows, Mac OS X, and Linux desktop application, together with command-line tools that are designed for unattended operation on batches of images. Blending image visualisation algorithms that automatically recognise specimens together with workflows to support post-processing tasks such as barcode reading, label transcription and metadata capture, Inselect fills a critical gap to increase the rate of specimen digitization.

  19. Electronic transfer of sensitive patient data.

    PubMed

    Detterbeck, A M W; Kaiser, J; Hirschfelder, U

    2015-01-01

    The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.

  20. Information Operations & Security

    DTIC Science & Technology

    2012-03-05

    Fred B. Schneider, Cornell The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders ...Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited. Digital Multimedia Anti...fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and

  1. 78 FR 17939 - Announcement of Funding Awards; Capital Fund Safety and Security Grants; Fiscal Year 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-25

    ... publishing the names, addresses, and amounts of the 18 awards made under the set aside in Appendix A to this... Security Camera Harrison Street, Oakland, CA Surveillance System 94612. including digital video recorders... Cameras, 50 Lincoln Plaza, Wilkes-Barre, Network Video PA 18702. Recorders, and Lighting. Ft. Worth...

  2. Marine Magnetic Data Holdings of World Data Center-a for Marine Geology and Geophysics

    NASA Technical Reports Server (NTRS)

    Sharman, George F.; Metzger, Dan

    1992-01-01

    The World Data Center-A for Marine Geology and Geophysics is co-located with the Marine Geology & Geophysical Data Center, Boulder, CO. Fifteen million digital marine magnetic trackline measurements are managed within the GEOphysical DAta System (GEODAS). The bulk of these data were collected with proton precision magnetometers under Transit Satellite navigational control. Along-track sampling averages about 1 sample per kilometer, while spatial density, a function of ship's track and survey pattern, range from 4 to 0.02 data points/sq. km. In the near future, the entire geophysical data set will be available on CD-ROM. The Marine Geology and Geophysics Division (World Data Center-A for MGG), of the National Geophysical Data Center, handles a broad spectrum of marine geophysical data, including measurements of bathymetry, magnetics, gravity, seismic reflection subbottom profiles, and side-scan images acquired by ships throughout the world's oceans. Digital data encompass the first three, while the latter two are in analog form, recorded on 35mm microfilm. The marine geophysical digital trackline data are contained in the GEODAS data base which includes 11.6 million nautical miles of cruise trackline coverage contributed by more than 70 organizations worldwide. The inventory includes data from 3206 cruises with 33 million digital records and indexing to 5.3 million track miles of analog data on microfilm.

  3. Using SecondLife Online Virtual World Technology to Introduce Educators to the Digital Culture

    NASA Technical Reports Server (NTRS)

    Jamison, John

    2008-01-01

    The rapidly changing culture resulting from new technologies and digital gaming has created an increasing language gap between traditional educators and today's learners (Natkin, 2006; Seely-Brown, 2000). This study seeks to use the online virtual world of SecondLife.com as a tool to introduce educators to this new environment for learning. This study observes the activities and perceptions of a group of educators given unscripted access to this virtual environment. The results 'suggest that although serious technology limitations do currently exist, the potential of this virtual world environment as a learning experience for educators is strong.

  4. Worlddem - a Novel Global Foundation Layer

    NASA Astrophysics Data System (ADS)

    Riegler, G.; Hennig, S. D.; Weber, M.

    2015-03-01

    Airbus Defence and Space's WorldDEM™ provides a global Digital Elevation Model of unprecedented quality, accuracy, and coverage. The product will feature a vertical accuracy of 2m (relative) and better than 6m (absolute) in a 12m x 12m raster. The accuracy will surpass that of any global satellite-based elevation model available. WorldDEM is a game-changing disruptive technology and will define a new standard in global elevation models. The German radar satellites TerraSAR-X and TanDEM-X form a high-precision radar interferometer in space and acquire the data basis for the WorldDEM. This mission is performed jointly with the German Aerospace Center (DLR). Airbus DS refines the Digital Surface Model (e.g. editing of acquisition, processing artefacts and water surfaces) or generates a Digital Terrain Model. Three product levels are offered: WorldDEMcore (output of the processing, no editing is applied), WorldDEM™ (guarantees a void-free terrain description and hydrological consistency) and WorldDEM DTM (represents bare Earth elevation). Precise elevation data is the initial foundation of any accurate geospatial product, particularly when the integration of multi-source imagery and data is performed based upon it. Fused data provides for improved reliability, increased confidence and reduced ambiguity. This paper will present the current status of product development activities including methodologies and tool to generate these, like terrain and water bodies editing and DTM generation. In addition, the studies on verification & validation of the WorldDEM products will be presented.

  5. United States and environmental security: Deforestation and conflict in southeast Asia. Master's thesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greenwald, P.T.

    In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within nationalmore » security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.« less

  6. Optimizing Land and Water Use at the Local Level to Enhance Global Food Security through Virtual Resources Trade in the World

    NASA Astrophysics Data System (ADS)

    Cai, X.; Zhang, X.; Zhu, T.

    2014-12-01

    Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.

  7. Marketing to physicians in a digital world.

    PubMed

    Manz, Christopher; Ross, Joseph S; Grande, David

    2014-11-13

    Pharmaceutical marketing can lead to overdiagnosis, overtreatment, and overuse of medications. Digital advertising creates new pathways for reaching physicians, allowing delivery of marketing messages at the point of care, when clinical decisions are being made.

  8. DOE DISS/ET pilot system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Strait, R.S.; Wagner, E.E.

    1994-07-01

    The US Department of Energy (DOE) Office of Safeguards and Security initiated the DOE Integrated Security System / Electronic Transfer (DISS/ET) for the purpose of reducing the time required to process security clearance requests. DISS/ET will be an integrated system using electronic commerce technologies for the collection and processing of personnel security clearance data, and its transfer between DOE local security clearance offices, DOE Operations Offices, and the Office of Personnel Management. The system will use electronic forms to collect clearance applicant data. The forms data will be combined with electronic fingerprint images and packaged in a secure encrypted electronicmore » mail envelope for transmission across the Internet. Information provided by the applicant will be authenticated using digital signatures. All processing will be done electronically.« less

  9. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the private...

  10. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  11. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  12. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  13. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key, as...

  14. DEAL annual report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Misra, Shashank

    2017-11-01

    The digital electronics at the atomic limit (DEAL) project seeks to leverage Sandia's atomic-precision fabrication capability to realize the theorized orders-of-magnitude improvement in operating voltage for tunnel field effect transistors (TFETs) compared to CMOS. Not only are low-power digital circuits a critical element of many national security systems (e.g. satellites), TFETs can perform circuit functions inaccessible to CMOS (e.g. polymorphism).

  15. Digital Troposcatter Performance Model. Users Manual.

    DTIC Science & Technology

    1983-11-01

    and Information Systems - .,- - - UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) S REPORT DOCUIAENTATION PAGE READ...Diffraction Multipath Prediction MD-918 Modem Error Rate Prediction AN/TRC-170 Link Analysis 20. ABSTRACT (Continue en reverse esie If neceseay end...configurations used in the Defense Communications System (DCS), and prediction of the performance of both the MD-918 and AN/TRC-170 digital troposcatter modems

  16. An Evolving Digital Telecommunications Industry and Its Impact on the Operational Environment of the Nationwide Emergency Telecommunication System (NETS).

    DTIC Science & Technology

    1985-03-01

    005 4-, /nImII 1 liIm ulnli iiliiii I I UNCLASSIFIED SECURITY CLASSIFICATION OF TNIS PAGE ("on Data Bnter6t0 REPORT DOCUMENTATION PAGE READ...II different from ControllIng Office) 15. SECURITY CLASS (of thin report) Unclassified IS. OECLASSIFICATION/ DOWNGRADING SCMEDULE 1. DISTRIBUTION...EDITION OF I NOV 65 IS OBSOLETE UNCLASSIFIED N0102LF-0146601 1 UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Dote wrteed) ,IA UNCLASSIFIED

  17. Protected interoperability of telecommunications and digital products

    NASA Astrophysics Data System (ADS)

    Hampel, Viktor E.; Cartier, Gene N.; Craft, James P.

    1994-11-01

    New federal standards for the protection of sensitive data now make it possible to ensure the authenticity, integrity and confidentiality of digital products, and non-repudiation of digital telecommunications. Under review and comment since 1991, the new Federal standards were confirmed this year and provide standard means for the protection of voice and data communications from accidental and wilful abuse. The standards are initially tailored to protect only `sensitive-but-unclassified' (SBU) data in compliance with the Computer Security Act of 1987. These data represent the majority of transactions in electronic commerce, including sensitive procurement information, trade secrets, financial data, product definitions, and company-proprietary information classified as `intellectual property.' Harmonization of the new standards with international requirements is in progress. In the United States, the confirmation of the basic standards marks the beginning of a long-range program to assure discretionary and mandatory access controls to digital resources. Upwards compatibility into the classified domain with multi-level security is a core requirement of the National Information Infrastructure. In this report we review the powerful capabilities of standard Public-Key-Cryptology, the availability of commercial and Federal products for data protection, and make recommendations for their cost-effective use to assure reliable telecommunications and process controls.

  18. 76 FR 52042 - Auriga Laboratories, Inc., Curon Medical, Inc., Goldstate Corp., OneWorld Systems, Inc., and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Auriga Laboratories, Inc., Curon Medical, Inc., Goldstate Corp., OneWorld Systems, Inc., and PracticeXpert, Inc.; Order of Suspension of Trading August 17, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the...

  19. Digital mobile technology facilitates HIPAA-sensitive perioperative messaging, improves physician-patient communication, and streamlines patient care.

    PubMed

    Gordon, Chad R; Rezzadeh, Kameron S; Li, Andrew; Vardanian, Andrew; Zelken, Jonathan; Shores, Jamie T; Sacks, Justin M; Segovia, Andres L; Jarrahy, Reza

    2015-01-01

    Mobile device technology has revolutionized interpersonal communication, but the application of this technology to the physician-patient relationship remains limited due to concerns over patient confidentiality and the security of digital information. Nevertheless, there is a continued focus on improving communication between doctors and patients in all fields of medicine as a means of improving patient care. In this study, we implement a novel communications platform to demonstrate that instantaneously sharing perioperative information with surgical patients and members of their support networks can improve patient care and strengthen the physician-patient relationship. 423 consecutive patients scheduled to undergo elective surgical procedures were offered complimentary registration to a secure, web-based service designed to distribute perioperative updates to a group of recipients designated by each patient via Short Message Service (SMS) and/or email. Messages were created by attending surgeons and delivered instantaneously through the web-based platform. In the postoperative period, patients and their designated message recipients, as well as participating healthcare providers, were asked to complete a survey designed to assess their experience with the messaging system. Survey results were statistically analyzed to determine satisfaction rates. Of the qualifying 423 patients, 313 opted to enroll in the study. On average, patients selected a total of 3.5 recipients to receive perioperative updates. A total of 1,195 electronic messages were generated for distribution to designated recipients during the study period and delivered to recipients located around the world. There were no documented errors or failures in message delivery. Satisfaction surveys were completed by 190 users of the service (73 %). Respondents identified themselves as either patients (n = 48, 25.5 %), family/friends (n = 120, 63.8 %), or healthcare providers (n = 15, 12 %). Satisfaction with the service was high: 94.2 % of users "enjoyed this software" and and 94.2 % of family/friends "felt more connected to their loved ones during surgery." 92.5 % would "recommend their loved ones sign up for this service". Ninety percent of patients who completed the survey reported "an improved hospital experience". Digital communications platforms can facilitate the immediate transfer of HIPAA-compliant data to patients and their designees. Such systems can greatly improve the level of communication between physicians, patients, and patients' families and caregivers. All types of users, including healthcare professionals, patients, and their loved ones, recorded high levels of satisfaction. Based on these observations, we conclude that mobile digital communications platforms represent a way to harness the power of social media to enhance patient care.

  20. The role of optics in secure credentials

    NASA Astrophysics Data System (ADS)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  1. Implementation of digital image encryption algorithm using logistic function and DNA encoding

    NASA Astrophysics Data System (ADS)

    Suryadi, MT; Satria, Yudi; Fauzi, Muhammad

    2018-03-01

    Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.

  2. Optical encryption of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Liu, Qi; Wang, Jun; Wang, Qiong-Hua

    2018-03-01

    We present an optical encryption method of multiple three-dimensional objects based on multiple interferences and single-pixel digital holography. By modifying the Mach–Zehnder interferometer, the interference of the multiple objects beams and the one reference beam is used to simultaneously encrypt multiple objects into a ciphertext. During decryption, each three-dimensional object can be decrypted independently without having to decrypt other objects. Since the single-pixel digital holography based on compressive sensing theory is introduced, the encrypted data of this method is effectively reduced. In addition, recording fewer encrypted data can greatly reduce the bandwidth of network transmission. Moreover, the compressive sensing essentially serves as a secret key that makes an intruder attack invalid, which means that the system is more secure than the conventional encryption method. Simulation results demonstrate the feasibility of the proposed method and show that the system has good security performance. Project supported by the National Natural Science Foundation of China (Grant Nos. 61405130 and 61320106015).

  3. Global Access to Library of Congress' Digital Resources: National Digital Library and Internet Resources.

    ERIC Educational Resources Information Center

    Chen, Ching-chih

    1996-01-01

    Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)

  4. Greening the Net Generation: Outdoor Adult Learning in the Digital Age

    ERIC Educational Resources Information Center

    Walter, Pierre

    2013-01-01

    Adult learning today takes place primarily within walled classrooms or in other indoor settings, and often in front of various types of digital screens. As adults have adopted the digital technologies and indoor lifestyle attributed to the so-called "Net Generation," we have become detached from contact with the natural world outdoors.…

  5. The Toolbox for Local and Global Plagiarism Detection

    ERIC Educational Resources Information Center

    Butakov, Sergey; Scherbinin, Vladislav

    2009-01-01

    Digital plagiarism is a problem for educators all over the world. There are many software tools on the market for uncovering digital plagiarism. Most of them can work only with text submissions. In this paper, we present a new architecture for a plagiarism detection tool that can work with many different kinds of digital submissions, from plain or…

  6. Responding to the Call: Arts Methodologies Informing 21st Century Literacies

    ERIC Educational Resources Information Center

    Huber, Adrienne; Dinham, Judith; Chalk, Beryl

    2015-01-01

    With the advent of digital technologies, a new adventure began. How the world works has changed, and we cannot go back. Digitally savvy children born in the digital age (i.e., DigiKids) are interacting with and responding to rich, curatable multimodal communications as part of their daily-lived experience. For DigiKids, traditional text-based…

  7. Can experience-based household food security scales help improve food security governance?

    PubMed

    Pérez-Escamilla, Rafael

    2012-12-01

    Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs have increased awareness about food and nutrition insecurity in the court of public opinion. Thus, it's important to understand the potential that EBFSSs have for improving food and nutrition security governance within and across countries. The case of Brazil illustrates the strong likelihood that EBFSSs do have a strong potential to influence food and governance from the national to the municipal level. A recent Gallup World Poll data analysis on the influence of the '2008 food crisis' on food hardship illustrates how even a single item from EBFSSs can help examine if food security governance in different world regions modifies the impact of crises on household food insecurity. Systematic research that bridges across economics, political science, ethics, public health and program evaluation is needed to better understand if and how measurement in general and EBFSSs in particular affect food security governance.

  8. 76 FR 50773 - Pax World Funds Series Trust I and Pax World Management LLC; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29751; 812-13883] Pax World Funds Series Trust I and Pax World Management LLC; Notice of Application August 10, 2011. AGENCY.... Applicants: Pax World Funds Series Trust I (``Mutual Funds Trust'') and Pax World Management LLC (the...

  9. A "Social Bitcoin" could sustain a democratic digital world

    NASA Astrophysics Data System (ADS)

    Kleineberg, Kaj-Kolja; Helbing, Dirk

    2016-12-01

    A multidimensional financial system could provide benefits for individuals, companies, and states. Instead of top-down control, which is destined to eventually fail in a hyperconnected world, a bottom-up creation of value can unleash creative potential and drive innovations. Multiple currency dimensions can represent different externalities and thus enable the design of incentives and feedback mechanisms that foster the ability of complex dynamical systems to self-organize and lead to a more resilient society and sustainable economy. Modern information and communication technologies play a crucial role in this process, as Web 2.0 and online social networks promote cooperation and collaboration on unprecedented scales. Within this contribution, we discuss how one dimension of a multidimensional currency system could represent socio-digital capital (Social Bitcoins) that can be generated in a bottom-up way by individuals who perform search and navigation tasks in a future version of the digital world. The incentive to mine Social Bitcoins could sustain digital diversity, which mitigates the risk of totalitarian control by powerful monopolies of information and can create new business opportunities needed in times where a large fraction of current jobs is estimated to disappear due to computerisation.

  10. Near-Term Options for Improving Security at Los Angeles International Airport

    DTIC Science & Technology

    2004-09-26

    the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security

  11. The Greening of Global Security: The U.S. Military and International Environmental Security

    DTIC Science & Technology

    1993-12-16

    the Cold War . Issues virtually ignored only five years ago now exhibit a new luster, a new importance, a new resonance among countries of the world ...America 283 298 363 0.8 Europe 511 515 516 0.2 Oceania 28 31 39 1.2 World 5420 6292 8545 1.7 Environmental problems are now causing sizable cutbacks in...direct participation and intercession can become blurred. With NATO’s new focus in today’s Post Cold War world --i.e., low intensity peacekeeping

  12. Affordable Digital Planetariums with WorldWide Telescope

    NASA Astrophysics Data System (ADS)

    Rosenfield, P.; Connolly, A.; Fay, J.; Sayres, C.; Tofflemire, B.

    2011-09-01

    Digital planetariums can provide a broader range of educational experiences than the more classical planetariums that use star-balls. This is because of their ability to project images, content from current research, and the 3-D distribution of the stars and galaxies. While there are hundreds of planetariums in the country, the reason that few of these are fully digital is the cost. In collaboration with Microsoft Research (MSR), we have developed a way to digitize existing planetariums for approximately $40,000 using freely available software. We describe here how off the shelf equipment, together with a WorldWide Telescope client, can provide a rich and truly interactive experience. This will enable students and the public to pan though multi-wavelength full-sky scientific data sets, explore 3-D visualizations of our Solar System (including trajectories of millions of minor planets), near-by stars, and the SDSS galaxy catalog.

  13. Random digital encryption secure communication system

    NASA Technical Reports Server (NTRS)

    Doland, G. D. (Inventor)

    1982-01-01

    The design of a secure communication system is described. A product code, formed from two pseudorandom sequences of digital bits, is used to encipher or scramble data prior to transmission. The two pseudorandom sequences are periodically changed at intervals before they have had time to repeat. One of the two sequences is transmitted continuously with the scrambled data for synchronization. In the receiver portion of the system, the incoming signal is compared with one of two locally generated pseudorandom sequences until correspondence between the sequences is obtained. At this time, the two locally generated sequences are formed into a product code which deciphers the data from the incoming signal. Provision is made to ensure synchronization of the transmitting and receiving portions of the system.

  14. Low photon count based digital holography for quadratic phase cryptography.

    PubMed

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Ryle, James P; Healy, John J; Lee, Byung-Geun; Sheridan, John T

    2017-07-15

    Recently, the vulnerability of the linear canonical transform-based double random phase encryption system to attack has been demonstrated. To alleviate this, we present for the first time, to the best of our knowledge, a method for securing a two-dimensional scene using a quadratic phase encoding system operating in the photon-counted imaging (PCI) regime. Position-phase-shifting digital holography is applied to record the photon-limited encrypted complex samples. The reconstruction of the complex wavefront involves four sparse (undersampled) dataset intensity measurements (interferograms) at two different positions. Computer simulations validate that the photon-limited sparse-encrypted data has adequate information to authenticate the original data set. Finally, security analysis, employing iterative phase retrieval attacks, has been performed.

  15. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2014-01-01

    This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.

  16. Standardized access, display, and retrieval of medical video

    NASA Astrophysics Data System (ADS)

    Bellaire, Gunter; Steines, Daniel; Graschew, Georgi; Thiel, Andreas; Bernarding, Johannes; Tolxdorff, Thomas; Schlag, Peter M.

    1999-05-01

    The system presented here enhances documentation and data- secured, second-opinion facilities by integrating video sequences into DICOM 3.0. We present an implementation for a medical video server extended by a DICOM interface. Security mechanisms conforming with DICOM are integrated to enable secure internet access. Digital video documents of diagnostic and therapeutic procedures should be examined regarding the clip length and size necessary for second opinion and manageable with today's hardware. Image sources relevant for this paper include 3D laparoscope, 3D surgical microscope, 3D open surgery camera, synthetic video, and monoscopic endoscopes, etc. The global DICOM video concept and three special workplaces of distinct applications are described. Additionally, an approach is presented to analyze the motion of the endoscopic camera for future automatic video-cutting. Digital stereoscopic video sequences are especially in demand for surgery . Therefore DSVS are also integrated into the DICOM video concept. Results are presented describing the suitability of stereoscopic display techniques for the operating room.

  17. Patient empowerment by the means of citizen-managed Electronic Health Records: web 2.0 health digital identity scenarios.

    PubMed

    Falcão-Reis, Filipa; Correia, Manuel E

    2010-01-01

    With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.

  18. Space-Derived Imagery and a Commercial Remote Sensing Industry: Impossible Dream or Inevitable Reality?

    NASA Astrophysics Data System (ADS)

    Murray, Felsher

    Landsat-1 was launched in 1972 as a research satellite. Many of us viewed this satellite as a precursor to remote sensing "commercialization." Indeed since that time, the birth, growth and maturation of a remote sensing "industry" has been an ongoing objective for much of the U.S. private sector engaged in space and ground-segment activities related to the acquisition, analysis, and dissemination of imagery. In September 1999 a U.S. commercial entity, Space Imaging, Inc. launched its 1-meter pan/4-meter multispectral IKONOS sensor. DigitalGlobe, Inc. (nee EarthWatch, Inc.) matched this feat in October 2001. Thus, a full 30 years later, we are finally on the brink of building a true remote sensing information industry based on the global availability of competitively-priced space- derived imagery of the Earth. The upcoming availability of similar imagery from non-U.S. sources as ImageSat and U.S. sources as ORBIMAGE will only strengthen that reality. However, a remote sensing industry can only grow by allowing these entities (in times of peace) unencumbered access to a world market. And that market continues to expand -- up 11% in 2001, with gross revenues of U.S. commercial remote sensing firms alone reaching 2.44 billion, according to a joint NASA/ASPRS industry survey. However, the 30-year gap between the research-labeled Landsat-1 and our current commercial successes was not technology-driven. That lacuna was purely political -- driven by valid concerns related to national security. Although the world's governments have cooperated thoroughly and completely in areas related to satellite telecommunications, cooperation in space-derived image information is still today done cautiously and on a case-by-case basis -- and then only for science- based undertakings. It is still a fact that, except for the United States, all other Earth-imaging satellites/sensors flying today are owned, operated, and their products disseminated, by national governments -- and not private sector entities. Will the template now fashioned by the U.S. -- that of licensing private industry to build, fly, and operate remote sensing satellites as well as to distribute their imagery worldwide -- be replicated by other nations? Eventually, yes. Availability of the World Wide Web is an international communications reality. Availability of world wide imaging will be just as real. And much of that imagery will be marketed, sold, and distributed via that same global Internet. I feel that as an expected outcome of our technological age, we can ensure not only our own national security but international security as well, by assuring worldwide accessibility to worldwide space- derived image information. This requires -- in fact demands -- the presence of a viable international remote sensing industry. It is not impossible; It is inevitable.

  19. Restoration of hot pixels in digital imagers using lossless approximation techniques

    NASA Astrophysics Data System (ADS)

    Hadar, O.; Shleifer, A.; Cohen, E.; Dotan, Y.

    2015-09-01

    During the last twenty years, digital imagers have spread into industrial and everyday devices, such as satellites, security cameras, cell phones, laptops and more. "Hot pixels" are the main defects in remote digital cameras. In this paper we prove an improvement of existing restoration methods that use (solely or as an auxiliary tool) some average of the surrounding single pixel, such as the method of the Chapman-Koren study 1,2. The proposed method uses the CALIC algorithm and adapts it to a full use of the surrounding pixels.

  20. Food insecurity and cognitive function in Puerto Rican adults.

    PubMed

    Gao, Xiang; Scott, Tammy; Falcon, Luis M; Wilde, Parke E; Tucker, Katherine L

    2009-04-01

    Food insecurity is associated with nutrient inadequacy and a variety of unfavorable health outcomes. However, little is known about whether food security is associated with lower cognitive function in the elderly. We investigated the prevalence of food insecurity in a representative sample of 1358 Puerto Ricans aged 45-75 y living in Massachusetts in relation to cognitive function performances. Food security was assessed with the US Household Food Security Scale. Cognitive function was measured to capture general cognition with a battery of 7 tests: Mini-Mental State Examination (MMSE), word list learning (verbal memory), digit span (attention), clock drawing and figure copying (visual-spatial ability), and Stroop and verbal fluency tests (fluency executive functioning). The overall prevalence of food insecurity during the past 12 mo was 12.1%; 6.1% of the subjects reported very low food security. Food insecurity was inversely associated with global cognitive performance, as assessed by the MMSE score. The adjusted difference in the MMSE score was -0.90 (95% CI: -1.6, -0.19; P for trend = 0.003) for a comparison of participants with very low food security with those who were food secure, after adjustment for age, smoking, education, poverty status, income, acculturation, plasma homocysteine, alcohol, diabetes, and hypertension. Food insecurity was significantly associated with lower scores for word-list learning, percentage retention, letter fluency, and digit span backward tests. Very low food security was prevalent among the study subjects and was associated with lower cognitive performance. Further studies, both observational and experimental, are warranted to clarify the direction of causality in this association.

  1. The myth of secure computing.

    PubMed

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  2. 70 Years of Making the World Safer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This video shows our roles in making the world safer — working to end World War II, providing stable isotopes for research, providing unique precision manufacturing capabilities, and meeting nonproliferation and global security missions.

  3. 78 FR 47467 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70067; File No. SR-NYSEARCA-2013-74] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE Arca Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities...

  4. Conversion to use of digital chest images for surveillance of coal workers' pneumoconiosis (black lung).

    PubMed

    Levine, Betty A; Ingeholm, Mary Lou; Prior, Fred; Mun, Seong K; Freedman, Matthew; Weissman, David; Attfield, Michael; Wolfe, Anita; Petsonk, Edward

    2009-01-01

    To protect the health of active U.S. underground coal miners, the National Institute for Occupational Safety and Health (NIOSH) has a mandate to carry out surveillance for coal workers' pneumoconiosis, commonly known as Black Lung (PHS 2001). This is accomplished by reviewing chest x-ray films obtained from miners at approximately 5-year intervals in approved x-ray acquisition facilities around the country. Currently, digital chest images are not accepted. Because most chest x-rays are now obtained in digital format, NIOSH is redesigning the surveillance program to accept and manage digital x-rays. This paper highlights the functional and security requirements for a digital image management system for a surveillance program. It also identifies the operational differences between a digital imaging surveillance network and a clinical Picture Archiving Communication Systems (PACS) or teleradiology system.

  5. Digital Preservation and Deep Infrastructure; Dublin Core Metadata Initiative Progress Report and Workplan for 2002; Video Gaming, Education and Digital Learning Technologies: Relevance and Opportunities; Digital Collections of Real World Objects; The MusArt Music-Retrieval System: An Overview; eML: Taking Mississippi Libraries into the 21st Century.

    ERIC Educational Resources Information Center

    Granger, Stewart; Dekkers, Makx; Weibel, Stuart L.; Kirriemuir, John; Lensch, Hendrik P. A.; Goesele, Michael; Seidel, Hans-Peter; Birmingham, William; Pardo, Bryan; Meek, Colin; Shifrin, Jonah; Goodvin, Renee; Lippy, Brooke

    2002-01-01

    One opinion piece and five articles in this issue discuss: digital preservation infrastructure; accomplishments and changes in the Dublin Core Metadata Initiative in 2001 and plans for 2002; video gaming and how it relates to digital libraries and learning technologies; overview of a music retrieval system; and the online version of the…

  6. Global Perspectives on Children's Digital Opportunities: An Emerging Research and Policy Agenda.

    PubMed

    Livingstone, Sonia; Lemish, Dafna; Lim, Sun Sun; Bulger, Monica; Cabello, Patricio; Claro, Magdalena; Cabello-Hutt, Tania; Khalil, Joe; Kumpulainen, Kristiina; Nayar, Usha S; Nayar, Priya; Park, Jonghwi; Tan, Maria Melizza; Prinsloo, Jeanne; Wei, Bu

    2017-11-01

    Diverse international perspectives show that children can benefit greatly from digital opportunities. Despite widespread optimism about the potential of digital technologies, especially for information and education, the research reveals an insufficient evidence base to guide policy and practice across all continents of the world, especially in middle- and low-income countries. Beyond revealing pressing and sizeable gaps in knowledge, this cross-national review also reveals the importance of understanding local values and practices regarding the use of technologies. This leads us to stress that future researchers must take into account local contexts and existing inequalities and must share best practices internationally so that children can navigate the balance between risks and opportunities. This article documents the particular irony that while the world's poorer countries look to research to find ways to increase access and accelerate the fair distribution of digital educational resources, the world's wealthier countries look to research for guidance in managing excessive screen time, heavily commercial content, and technologies that intrude on autonomy and privacy. We conclude by recommending that digital divides should be carefully bridged with contextual sensitivity to avoid exacerbating existing disparities; that the provision of technological resources is complemented by a focus on skills enhancement, for teachers as well as students; that a keen eye is needed to ensure the balance of children's protection and participation rights, with protection now including data abuses as well as safety considerations; and that we forge collaborations among all stakeholders in seeking to enhance children's digital opportunities worldwide. Copyright © 2017 by the American Academy of Pediatrics.

  7. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    DTIC Science & Technology

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  8. Advances in Protection.

    ERIC Educational Resources Information Center

    Szczerba, Peter

    2000-01-01

    Explains how integrating information technology can extend the capabilities of school security systems far beyond traditional card access. Use of biometric identification technologies and digitized event recording are explored. (GR)

  9. Finland’s Security Solution in the Future

    DTIC Science & Technology

    2013-03-01

    important for foreign and security policies. This part of the world is becoming increasingly important for transport, natural resources and tourism . The...julkaisu/fi.jsp?oid=373066 (accessed December 22, 2012, only in Finnish). 6 Finnish Goverment Communication Department, “Government Security and

  10. Steganography and Steganalysis in Digital Images

    DTIC Science & Technology

    2012-01-01

    Nonetheless, to hide a message in a BMP using this algorithm it would require a large image used as a cover. STEGANOGRAPHY TOOLS There were eight tools in...REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany

  11. Computer Aided Detection of Breast Masses in Digital Tomosynthesis

    DTIC Science & Technology

    2008-06-01

    the suspicious CAD location were extracted. For the second set, 256x256 ROIs representing the - 8 - summed slab of 5 slices (5 mm) were extracted...region hotelling observer, digital tomosynthesis, multi-slice CAD algorithms, biopsy 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...developing computer-aided detection ( CAD ) tools for mammography. Although these tools have shown promise in identifying calcifications, detecting

  12. Network Security Guideline

    DTIC Science & Technology

    1993-06-01

    3.2.15.3 ISDN Services over the Telephone Network 3 Integrated Services Digital Network (ISDN) services are subject to the same restrictions as router...to be audited: [SYS$SYSTEM]SYS.EXE, LOGINOUT.EXE, STARTUP.COM, RIGHTSLIST.DAT [SYS$ LIBARY ] I SECURESHR.EXE [SYS$ROOT] SYSEXE.DIR, SYSLIB.DIR...quantification) of the encoded value; ASCII is normally used for asynchronous transmission. compare with digital . ASYNCHRONOUS-Data transmission that is

  13. Formal Methods for Privacy

    DTIC Science & Technology

    2009-09-01

    Review, 39:962, 1964. [8] D. Chaum . Secret ballot receipts: True voter-verifiable elections. IEEE J. Security and Privacy, pages 38–47, 2004. [9...TCC 2005), pages 363–385, 2005. [10] David Clark, Sebastian Hunt, and Pasquale Malacaria. A static analysis for quantifying in- formation flow in a... David Buckingham, editor, MacArthur Foundation Series on Digital Learning– Youth, Identity, Digital Media Volume, Cambridge, MA, 2007. MIT Press. 11

  14. Distributed Pheromone-Based Swarming Control of Unmanned Air and Ground Vehicles for RSTA

    DTIC Science & Technology

    2008-03-20

    Forthcoming in Proceedings of SPIE Defense & Security Conference, March 2008, Orlando, FL Distributed Pheromone -Based Swarming Control of Unmanned...describes recent advances in a fully distributed digital pheromone algorithm that has demonstrated its effectiveness in managing the complexity of...onboard digital pheromone responding to the needs of the automatic target recognition algorithms. UAVs and UGVs controlled by the same pheromone algorithm

  15. The Extent of Comprehension and Knowledge with Respect to Digital Citizenship among Middle Eastern and US Students at UNC

    ERIC Educational Resources Information Center

    Alqahtani, Abdullah; Alqahtani, Fatimah; Alqurashi, Mohammed

    2017-01-01

    Digital technologies have revolutionized the way people acquire information and gain new knowledge. With a click or touch on the screen, anybody who is online can sail in the digital world and accomplish many things. As such, the optimal use of information and communication technology involves user comprehension, knowledge, and awareness of…

  16. Using Digital Story Projects to Help Students Improve in Reading and Writing

    ERIC Educational Resources Information Center

    Morgan, Hani

    2014-01-01

    Today's students live in a world that has been transformed by technology, and they are often referred to as "digital natives" because their exposure to digital resources begins at birth. The increased exposure to technology has changed the way students respond to instruction and has led to a new need for teachers to integrate…

  17. Lost Identity: The Assimilation of Digital Libraries into the Web

    ERIC Educational Resources Information Center

    Lagoze, Carl Jay

    2010-01-01

    The idea of Digital Libraries emerged in the early 1990s from a vision of a "library of the future", without walls and open 24 hours a day. These digital libraries would leverage the substantial investments of federal funding in the Internet and advanced computing for the benefit of the entire population. The world's knowledge would be a key press…

  18. 2010 A Digital Odyssey: Exploring Document Camera Technology and Computer Self-Efficacy in a Digital Era

    ERIC Educational Resources Information Center

    Hoge, Robert Joaquin

    2010-01-01

    Within the sphere of education, navigating throughout a digital world has become a matter of necessity for the developing professional, as with the advent of Document Camera Technology (DCT). This study explores the pedagogical implications of implementing DCT; to see if there is a relationship between teachers' comfort with DCT and to the…

  19. Institutionalizing human-computer interaction for global health

    PubMed Central

    Gulliksen, Jan

    2017-01-01

    ABSTRACT Digitalization is the societal change process in which new ICT-based solutions bring forward completely new ways of doing things, new businesses and new movements in the society. Digitalization also provides completely new ways of addressing issues related to global health. This paper provides an overview of the field of human-computer interaction (HCI) and in what way the field has contributed to international development in different regions of the world. Additionally, it outlines the United Nations’ new sustainability goals from December 2015 and what these could contribute to the development of global health and its relationship to digitalization. Finally, it argues why and how HCI could be adopted and adapted to fit the contextual needs, the need for localization and for the development of new digital innovations. The research methodology is mostly qualitative following an action research paradigm in which the actual change process that the digitalization is evoking is equally important as the scientific conclusions that can be drawn. In conclusion, the paper argues that digitalization is fundamentally changing the society through the development and use of digital technologies and may have a profound effect on the digital development of every country in the world. But it needs to be developed based on local practices, it needs international support and to not be limited by any technological constraints. Particularly digitalization to support global health requires a profound understanding of the users and their context, arguing for user-centred systems design methodologies as particularly suitable. PMID:28838309

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    AISL-CRYPTO is a library of cryptography functions supporting other AISL software. It provides various crypto functions for Common Lisp, including Digital Signature Algorithm, Data Encryption Standard, Secure Hash Algorithm, and public-key cryptography.

  1. Risks and Uncertainties in Virtual Worlds: An Educators' Perspective

    ERIC Educational Resources Information Center

    Farahmand, Fariborz; Yadav, Aman; Spafford, Eugene H.

    2013-01-01

    Virtual worlds present tremendous advantages to cyberlearning. For example, in virtual worlds users can socialize with others, build objects and share them, customize parts of the world and hold lectures, do experiments, or share data. However, virtual worlds pose a wide range of security, privacy, and safety concerns. This may lead educators to…

  2. Solutions to Challenges Facing a University Digital Library and Press

    PubMed Central

    D'Alessandro, Michael P.; Galvin, Jeffrey R.; Colbert, Stephana I.; D'Alessandro, Donna M.; Choi, Teresa A.; Aker, Brian D.; Carlson, William S.; Pelzer, Gay D.

    2000-01-01

    During the creation of a university digital library and press intended to serve as a medical reference and education tool for health care providers and their patients, six distinct and complex digital publishing challenges were encountered. Over nine years, through a multidisciplinary approach, solutions were devised to the challenges of digital content ownership, management, mirroring, translation, interactions with users, and archiving. The result is a unique, author-owned, internationally mirrored, university digital library and press that serves as an authoritative medical reference and education tool for users around the world. The purpose of this paper is to share the valuable digital publishing lessons learned and outline the challenges facing university digital libraries and presses. PMID:10833161

  3. Social Security at the Crossroads.

    ERIC Educational Resources Information Center

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  4. PPS GPS: What Is It? And How Do I Get It

    DTIC Science & Technology

    1994-06-01

    Positioning Service, Selective Availabilit B.PRICE CODIE 17. SECURITY CLASSIFICATION II. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...the TEC Water Detection Response Team which operates in remote areas of the world. These activities, require the GPS receiver to be capable of removing

  5. Digital books.

    PubMed

    Wink, Diane M

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books.

  6. Work security in a global economy.

    PubMed

    Rosskam, Ellen

    2003-01-01

    Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.

  7. [Current status and future of telemonitoring : Scenarios for telemedical care in 2025].

    PubMed

    Zippel-Schultz, Bettina; Schultz, Carsten; Helms, Thomas M

    2017-09-01

    Telemonitoring is an already realized implementation of digital transformation in the healthcare system. It has the potential to support and secure a sustainable and comprehensive provision of healthcare for a rising number of chronically ill patients, e. g. patients with chronic heart failure. Remote regions in particular can profit from the benefits of telemonitoring; however, so far telemonitoring services have not become truly established in the German healthcare market. Together with experts from politics, science and practice, a scenario analysis "Health Care System 2025 - A Place for Telemonitoring?" was carried out with the aim to examine the future development of the healthcare market and to draw conclusions for providers of telemonitoring services or devices. The scenario analysis contained two workshops and an expert survey and was supported by a scenario software. The current drivers and barriers of the diffusion of telemonitoring were identified and the most relevant factors that influence the future development of the healthcare market were discussed. Based on those influencing factors, three different scenarios were determined: (1) administrating rather than shaping, (2) safely into the future and (3) interconnected and digital world. In the subsequent consequence analysis activities were defined, which describe the necessary infrastructure, software instruments, organizational structures and provision of services and discuss possible activities, which prepare telemonitoring solutions for the future.

  8. Poverty and Hunger: Issues and Options for Food Security in Developing Countries. A World Bank Policy Study.

    ERIC Educational Resources Information Center

    Reutlinger, Shlomo; And Others

    Food security means access by all people at all times to enough food for an active and healthy life. Available data suggest that more than 700 million people in the developing world lack the food necessary for such a life. No problem of underdevelopment may be more serious or have such important implications for the long-term growth of low-income…

  9. Digital Dimension Disruption: A National Security Enterprise Response

    DTIC Science & Technology

    2017-12-21

    societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks...humans did calculations and searched for information. In the past quarter century, human use of computers has changed fundamentally , but com- mon...the nature of data is, itself, undergoing a fundamental change. The terms “bespoke data” (from the British term for cus- tom-tailored) and “by

  10. 78 FR 47450 - Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70065; File No. SR-NYSEMKT-2013-64] Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE MKT Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Ac...

  11. 78 FR 47474 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-05

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70066; File No. SR-NYSE-2013-53] Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Modifying the Content of the NYSE Trades Digital Media Data Feed July 30, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities...

  12. About machine-readable travel documents

    NASA Astrophysics Data System (ADS)

    Vaudenay, S.; Vuagnoux, M.

    2007-07-01

    Passports are documents that help immigration officers to identify people. In order to strongly authenticate their data and to automatically identify people, they are now equipped with RFID chips. These contain private information, biometrics, and a digital signature by issuing authorities. Although they substantially increase security at the border controls, they also come with new security and privacy issues. In this paper, we survey existing protocols and their weaknesses.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Hsien-Hsin S

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less

  14. [Assessment on ecological security spatial differences of west areas of Liaohe River based on GIS].

    PubMed

    Wang, Geng; Wu, Wei

    2005-09-01

    Ecological security assessment and early warning research have spatiality; non-linearity; randomicity, it is needed to deal with much spatial information. Spatial analysis and data management are advantages of GIS, it can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. The paper discusses the method of ecological security spatial differences of west areas of Liaohe River based on GIS and ecosystem non-health. First, studying on pressure-state-response (P-S-R) assessment indicators system, investigating in person and gathering information; Second, digitizing the river, applying fuzzy AHP to put weight, quantizing and calculating by fuzzy comparing; Last, establishing grid data-base; expounding spatial differences of ecological security by GIS Interpolate and Assembly.

  15. A Chaos MIMO-OFDM Scheme for Mobile Communication with Physical-Layer Security

    NASA Astrophysics Data System (ADS)

    Okamoto, Eiji

    Chaos communications enable a physical-layer security, which can enhance the transmission security in combining with upper-layer encryption techniques, or can omit the upper-layer secure protocol and enlarges the transmission efficiency. However, the chaos communication usually degrades the error rate performance compared to unencrypted digital modulations. To achieve both physical-layer security and channel coding gain, we have proposed a chaos multiple-input multiple-output (MIMO) scheme in which a rate-one chaos convolution is applied to MIMO multiplexing. However, in the conventional study only flat fading is considered. To apply this scheme to practical mobile environments, i.e., multipath fading channels, we propose a chaos MIMO-orthogonal frequency division multi-plexing (OFDM) scheme and show its effectiveness through computer simulations.

  16. Agriculture and food availability -- remote sensing of agriculture for food security monitoring in the developing world

    USGS Publications Warehouse

    Budde, Michael E.; Rowland, James; Funk, Christopher C.

    2010-01-01

    For one-sixth of the world’s population - roughly 1 billion children, women and men - growing, buying or receiving adequate, affordable food to eat is a daily uncertainty. The World Monetary Fund reports that food prices worldwide increased 43 percent in 2007-2008, and unpredictable growing conditions make subsistence farming, on which many depend, a risky business. Scientists with the U.S. Geological Survey (USGS) are part of a network of both private and government institutions that monitor food security in many of the poorest nations in the world.

  17. Teaching Pre-Service Teachers to Make Digital Stories That Explain Complex Mathematical Concepts in a Real-World Context: The "Math-eo" Project, Creating "Cool New Tools"

    ERIC Educational Resources Information Center

    Walters, Lynne Masel; Green, Martha R.; Goldsby, Dianne; Walters, Timothy N.; Wang, Liangyan

    2016-01-01

    This mixed methods study examines whether engaging in a problem-solving project to create Math-eos (digital videos) increases pre-service teachers' understanding of the relationship between visual, auditory, and verbal representation and critical thinking in mathematics. Additionally, the study looks at what aspects of a digital problem solving…

  18. Using High Spatial Resolution Digital Imagery

    DTIC Science & Technology

    2005-02-01

    digital base maps were high resolution U.S. Geological Survey (USGS) Digital Orthophoto Quarter Quadrangles (DOQQ). The Root Mean Square Errors (RMSE...next step was to assign real world coordinates to the linear im- age. The mosaics were geometrically registered to the panchromatic orthophotos ...useable thematic map from high-resolution imagery. A more practical approach may be to divide the Refuge into a set of smaller areas, or tiles

  19. Digital Debates. WebWise Conference on Libraries and Museums in the Digital World Proceedings (10th, Capitol Hill, Washington, D.C, February 25-27, 2009)

    ERIC Educational Resources Information Center

    Zorich, Diane

    2010-01-01

    Debates typically invoke an image of individuals arguing over the merits of opposing viewpoints. However, the term has a softer, more deliberative sense that connotes reflection, discussion, and consideration. The 2009 WebWise conference, titled "Digital Debates," was conducted in this spirit, with panelists and attendees engaged in…

  20. Images of Women in Sport and Physical Education: Creating and Integrating a Digital Collection into the Classroom

    ERIC Educational Resources Information Center

    Gustafson, Julia Chance; Meese, Brenda L.

    2016-01-01

    This article will highlight key points in the process of collaboration, creation, and assessment of a digital collection intended to be used initially as a classroom tool, in addition to being a model of digital scholarship that can be used for research from anywhere in the world. This project originated from a class assignment for a course in…

  1. Rethinking Education in the Age of Technology: The Digital Revolution and Schooling in America. Technology, Education--Connections (TEC) Series

    ERIC Educational Resources Information Center

    Collins, Allan; Halverson, Richard

    2009-01-01

    The digital revolution has hit education, with more and more classrooms plugged into the whole wired world. But are schools making the most of new technologies? Are they tapping into the learning potential of today's Firefox/Facebook/cell phone generation? Have schools fallen through the crack of the digital divide? In "Rethinking Education in the…

  2. Gender Aspects of Human Security

    ERIC Educational Resources Information Center

    Moussa, Ghada

    2008-01-01

    The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…

  3. Caribbean and Eastern Pacific Maritime Security: Regional Cooperation in Bridge and Insular States

    DTIC Science & Technology

    The international cocaine market has transformed the Caribbean Basin into the most violent region in the world. Against the onslaught of drugs and... violence , interstate security cooperation and intelligence sharing are increasingly prominent features of state security strategies. The evolution of

  4. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol.

    PubMed

    Zeng, Ping; Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun

    2017-01-01

    In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on-all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications.

  5. A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol

    PubMed Central

    Tan, Qingping; Meng, Xiankai; Shao, Zeming; Xie, Qinzheng; Yan, Ying; Cao, Wei; Xu, Jianjun

    2017-01-01

    In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can be applied to the fields of network security, data analysis, load balancing, cloud robotic communications, and so on—all of which require string matching from a fixed starting position. Our approach effectively solves the performance problems of the classical multi-pattern matching algorithms. This paper explores ways to improve string matching performance under the HTTP protocol by using a hash method combined with a binary method that transforms the symbol-space matching problem into a digital-space numerical-size comparison and hashing problem. The MH approach has a fast matching speed, requires little memory, performs better than both the classical algorithms and HEM for matching fields in an HTTP stream, and it has great promise for use in real-world applications. PMID:28399157

  6. Influence of physical parameters on radiation protection and image quality in intra-oral radiology

    NASA Astrophysics Data System (ADS)

    Belinato, W.; Souza, D. N.

    2011-10-01

    In the world of diagnostic imaging, radiography is an important supplementary method for dental diagnosis. In radiology, special attention must be paid to the radiological protection of patients and health professionals, and also to image quality for correct diagnosis. In Brazil, the national rules governing the operation of medical and dental radiology were specified in 1998 by the National Sanitary Surveillance Agency, complemented in 2005 by the guide "Medical radiology: security and performance of equipment." In this study, quality control tests were performed in public clinics with dental X-ray equipment in the State of Sergipe, Brazil, with consideration of the physical parameters that influence radiological protection and also the quality of images taken in intra-oral radiography. The accuracy of the exposure time was considered acceptable for equipment with digital timers. Exposure times and focal-spot size variations can lead to increased entrance dose. Increased dose has also been associated with visual processing of radiographic film, which often requires repeating the radiographic examination.

  7. Solving Identity Management and Interoperability Problems at Pan-European Level

    NASA Astrophysics Data System (ADS)

    Sánchez García, Sergio; Gómez Oliva, Ana

    In a globalized digital world, it is essential for persons and entities to have a recognized and unambiguous electronic identity that allows them to communicate with one another. The management of this identity by public administrations is an important challenge that becomes even more crucial when interoperability among public administrations of different countries becomes necessary, as persons and entities have different credentials depending on their own national legal frameworks. More specifically, different credentials and legal frameworks cause interoperability problems that prevent reliable access to public services in a cross-border scenarios like today's European Union. Work in this doctoral thesis try to analyze the problem in a carefully detailed manner by studying existing proposals (basically in Europe), proposing improvements in defined architectures and performing practical work to test the viability of solutions. Moreover, this thesis will also address the long-standing security problem of identity delegation, which is especially important in complex and heterogeneous service delivery environments like those mentioned above. This is a position paper.

  8. Quantum information to the home

    NASA Astrophysics Data System (ADS)

    Choi, Iris; Young, Robert J.; Townsend, Paul D.

    2011-06-01

    Information encoded on individual quanta will play an important role in our future lives, much as classically encoded digital information does today. Combining quantum information carried by single photons with classical signals encoded on strong laser pulses in modern fibre-to-the-home (FTTH) networks is a significant challenge, the solution to which will facilitate the global distribution of quantum information to the home and with it a quantum internet [1]. In real-world networks, spontaneous Raman scattering in the optical fibre would induce crosstalk between the high-power classical channels and a single-photon quantum channel, such that the latter is unable to operate. Here, we show that the integration of quantum and classical information on an FTTH network is possible by performing quantum key distribution (QKD) on a network while simultaneously transferring realistic levels of classical data. Our novel scheme involves synchronously interleaving a channel of quantum data with the Raman scattered photons from a classical channel, exploiting the periodic minima in the instantaneous crosstalk and thereby enabling secure QKD to be performed.

  9. SSC San Diego Command History Calendar Year 2006

    DTIC Science & Technology

    2007-03-01

    Year: Dr. Visarath In, Yong Kho, Dr. Adi Bulsara, Dr. Joseph Neff, Dr. Brian Meadows, “Self-Induced Oscillations in Coupled Fluxgate Magnetometer : A... digital assistant. The USCG’s Underwater Port Security Working Group reviews ongoing efforts and provides direction to the USCG and the Department...provides the data link gateway as the JDN communications equipment that is used in MDSE to exchange Tactical Digital Information Link (TADIL) J, Satellite

  10. The U.S. Combat and Tactical Wheeled Vehicle Fleets: Issues and Suggestions for Congress

    DTIC Science & Technology

    2011-01-01

    nonlinear, irregular distribution of brigade and battalion formations means that there is no longer a relatively more secure rear area, an...enhancement package, according to civilian sources, included depleted- uranium armor, digital command- and-control architecture, digital color terrain maps...system robustness and flexibility, and (3) more often than not, the preparation of the analysis (e.g., terrain formatting , laydown of forces, timing of

  11. The New Engines of Learning.

    ERIC Educational Resources Information Center

    Negroponto, Nicholas

    1995-01-01

    According to the author's book "Being Digital," our world is shifting from atoms to bits. Digitally rendered information, combined with personal computing power and networks, will make computers active participants in our everyday lives. "Teaching-disabled" classrooms will move from passivity to active participation and…

  12. Diagnostic pathology in 2012: development of digital pathology in an open access journal

    PubMed Central

    2013-01-01

    Abstract Herein we describe and interpret the digital world of diagnostic surgical pathology, and take the in Pathology leading Open Access Journal Diagnostic Pathology as example. Virtual slide http://www.diagnosticpathology.diagnomx.eu/vs/1944221953867351 PMID:23305209

  13. Introduction to World Peace through World Law. Revised Edition.

    ERIC Educational Resources Information Center

    Clark, Grenville; Sohn, Louis

    Two models for changing existing international organizations into effective instruments of world governance are presented. The first model revises the present Charter of the United Nations; the second calls for a new world security and development organization which would supplement the existing machinery of the United Nations for peacekeeping,…

  14. U.S. Pacific Command Theater Security Cooperation: A Building Block to Cooperative Security in the Asia Pacific Region

    DTIC Science & Technology

    2010-03-17

    the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed

  15. 70 Years of Making the World Safer: Extended

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Extended version with narration. This video shows our roles in making the world safer — working to end World War II, providing stable isotopes for research, providing unique precision manufacturing capabilities, and meeting nonproliferation and global security missions.

  16. Security in maritime transport : risk factors and economic impact

    DOT National Transportation Integrated Search

    2003-07-01

    Immediately after the devastating September 11th World Trade Center attacks in New York, governments around the world scrambled to assess their vulnerability to highly organised terrorist groups. World trade is dependent on maritime transport and gre...

  17. Secure voice for mobile satellite applications

    NASA Technical Reports Server (NTRS)

    Vaisnys, Arvydas; Berner, Jeff

    1990-01-01

    The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.

  18. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  19. 20 CFR 404.1321 - Ninety-day active service requirement for post-World War II veterans.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... post-World War II veterans. 404.1321 Section 404.1321 Employees' Benefits SOCIAL SECURITY... of the Uniformed Services Post-World War II Veterans § 404.1321 Ninety-day active service requirement for post-World War II veterans. (a) The 90 days of active service required for post-World War II...

  20. 20 CFR 404.1321 - Ninety-day active service requirement for post-World War II veterans.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... post-World War II veterans. 404.1321 Section 404.1321 Employees' Benefits SOCIAL SECURITY... of the Uniformed Services Post-World War II Veterans § 404.1321 Ninety-day active service requirement for post-World War II veterans. (a) The 90 days of active service required for post-World War II...

  1. 20 CFR 404.1321 - Ninety-day active service requirement for post-World War II veterans.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... post-World War II veterans. 404.1321 Section 404.1321 Employees' Benefits SOCIAL SECURITY... of the Uniformed Services Post-World War II Veterans § 404.1321 Ninety-day active service requirement for post-World War II veterans. (a) The 90 days of active service required for post-World War II...

  2. 20 CFR 404.1311 - Ninety-day active service requirement for World War II veterans.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... World War II veterans. 404.1311 Section 404.1311 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... Uniformed Services World War II Veterans § 404.1311 Ninety-day active service requirement for World War II veterans. (a) The 90 days of active service required for World War II veterans do not have to be...

  3. 20 CFR 404.1321 - Ninety-day active service requirement for post-World War II veterans.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... post-World War II veterans. 404.1321 Section 404.1321 Employees' Benefits SOCIAL SECURITY... of the Uniformed Services Post-World War II Veterans § 404.1321 Ninety-day active service requirement for post-World War II veterans. (a) The 90 days of active service required for post-World War II...

  4. Food insecurity and cognitive function in Puerto Rican adults123

    PubMed Central

    Gao, Xiang; Scott, Tammy; Falcon, Luis M; Wilde, Parke E; Tucker, Katherine L

    2009-01-01

    Background: Food insecurity is associated with nutrient inadequacy and a variety of unfavorable health outcomes. However, little is known about whether food security is associated with lower cognitive function in the elderly. Objective: We investigated the prevalence of food insecurity in a representative sample of 1358 Puerto Ricans aged 45–75 y living in Massachusetts in relation to cognitive function performances. Design: Food security was assessed with the US Household Food Security Scale. Cognitive function was measured to capture general cognition with a battery of 7 tests: Mini-Mental State Examination (MMSE), word list learning (verbal memory), digit span (attention), clock drawing and figure copying (visual-spatial ability), and Stroop and verbal fluency tests (fluency executive functioning). Results: The overall prevalence of food insecurity during the past 12 mo was 12.1%; 6.1% of the subjects reported very low food security. Food insecurity was inversely associated with global cognitive performance, as assessed by the MMSE score. The adjusted difference in the MMSE score was −0.90 (95% CI: −1.6, −0.19; P for trend = 0.003) for a comparison of participants with very low food security with those who were food secure, after adjustment for age, smoking, education, poverty status, income, acculturation, plasma homocysteine, alcohol, diabetes, and hypertension. Food insecurity was significantly associated with lower scores for word-list learning, percentage retention, letter fluency, and digit span backward tests. Conclusions: Very low food security was prevalent among the study subjects and was associated with lower cognitive performance. Further studies, both observational and experimental, are warranted to clarify the direction of causality in this association. PMID:19225117

  5. Clinical evaluation of watermarked medical images.

    PubMed

    Zain, Jasni M; Fauzi, Abdul M; Aziz, Azian A

    2006-01-01

    Digital watermarking medical images provides security to the images. The purpose of this study was to see whether digitally watermarked images changed clinical diagnoses when assessed by radiologists. We embedded 256 bits watermark to various medical images in the region of non-interest (RONI) and 480K bits in both region of interest (ROI) and RONI. Our results showed that watermarking medical images did not alter clinical diagnoses. In addition, there was no difference in image quality when visually assessed by the medical radiologists. We therefore concluded that digital watermarking medical images were safe in terms of preserving image quality for clinical purposes.

  6. Impacts of psychological science on national security agencies post-9/11.

    PubMed

    Brandon, Susan E

    2011-09-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly. © 2011 American Psychological Association

  7. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  8. 31 CFR 344.3 - What provisions apply to the SLGSafe Service?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...

  9. 31 CFR 344.3 - What provisions apply to the SLGSafe Service?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE U.S. TREASURY SECURITIES...

  10. 31 CFR 344.3 - What provisions apply to the SLGSafe Service?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... to the SLGSafe Service? (a) What is the SLGSafe Service? SLGSafe is a secure Internet site on the World Wide Web through which subscribers submit SLGS securities transactions. SLGSafe Internet... (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT U.S. TREASURY SECURITIES...

  11. The Black Belt Librarian: Real-World Safety & Security

    ERIC Educational Resources Information Center

    Graham, Warren

    2012-01-01

    Sharing expertise gleaned from more than two decades as a library security manager, Graham demonstrates that libraries can maintain their best traditions of openness and public access by creating an unobtrusive yet effective security plan. In straightforward language, the author: (1) Shows how to easily set clear expectations for visitors'…

  12. SOCIAL MEDIA SECURITY

    Science.gov Websites

    , exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media

  13. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  14. Aviation Security Cooperation: Advancing Global Vigilance, Global Reach, and Global Power in a Dynamic World

    DTIC Science & Technology

    2014-10-01

    Views September–October 2014 Air & Space Power Journal | 92 Aviation Security Cooperation Advancing Global Vigilance, Global Reach, and Global Power...2014 to 00-00-2014 4. TITLE AND SUBTITLE Aviation Security Cooperation: Advancing Global Vigilance, Global Reach, and Global Power in a Dynamic

  15. 20 CFR 408.101 - What is this part about?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....101 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II... in this part 408 (Regulation No. 8 of the Social Security Administration) relate to the provisions of title VIII of the Social Security Act as added by Pub. L. 106-169 enacted December 14, 1999. Title VIII...

  16. Pose tracking for augmented reality applications in outdoor archaeological sites

    NASA Astrophysics Data System (ADS)

    Younes, Georges; Asmar, Daniel; Elhajj, Imad; Al-Harithy, Howayda

    2017-01-01

    In recent years, agencies around the world have invested huge amounts of effort toward digitizing many aspects of the world's cultural heritage. Of particular importance is the digitization of outdoor archaeological sites. In the spirit of valorization of this digital information, many groups have developed virtual or augmented reality (AR) computer applications themed around a particular archaeological object. The problem of pose tracking in outdoor AR applications is addressed. Different positional systems are analyzed, resulting in the selection of a monocular camera-based user tracker. The limitations that challenge this technique from map generation, scale, anchoring, to lighting conditions are analyzed and systematically addressed. Finally, as a case study, our pose tracking system is implemented within an AR experience in the Byblos Roman theater in Lebanon.

  17. Big data: survey, technologies, opportunities, and challenges.

    PubMed

    Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Ali, Waleed Kamaleldin Mahmoud; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah

    2014-01-01

    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data.

  18. Big Data: Survey, Technologies, Opportunities, and Challenges

    PubMed Central

    Khan, Nawsher; Yaqoob, Ibrar; Hashem, Ibrahim Abaker Targio; Inayat, Zakira; Mahmoud Ali, Waleed Kamaleldin; Alam, Muhammad; Shiraz, Muhammad; Gani, Abdullah

    2014-01-01

    Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range. Currently, over 2 billion people worldwide are connected to the Internet, and over 5 billion individuals own mobile phones. By 2020, 50 billion devices are expected to be connected to the Internet. At this point, predicted data production will be 44 times greater than that in 2009. As information is transferred and shared at light speed on optic fiber and wireless networks, the volume of data and the speed of market growth increase. However, the fast growth rate of such large data generates numerous challenges, such as the rapid growth of data, transfer speed, diverse data, and security. Nonetheless, Big Data is still in its infancy stage, and the domain has not been reviewed in general. Hence, this study comprehensively surveys and classifies the various attributes of Big Data, including its nature, definitions, rapid growth rate, volume, management, analysis, and security. This study also proposes a data life cycle that uses the technologies and terminologies of Big Data. Future research directions in this field are determined based on opportunities and several open issues in Big Data domination. These research directions facilitate the exploration of the domain and the development of optimal techniques to address Big Data. PMID:25136682

  19. Avatars Talking: The Use of Virtual Worlds within Communication Courses

    ERIC Educational Resources Information Center

    Sarachan, Jeremy; Burk, Nanci; Day, Kenneth; Trevett-Smith, Matthew

    2013-01-01

    Virtual worlds have become an invaluable space for online learning and the exploration of digital cultures. Communication departments can benefit from using these spaces to educate their students in the logistics of virtual worlds and as a way to better understand how the process of interpersonal and global communication functions in both online…

  20. The Best of All Worlds: Immersive Interfaces for Art Education in Virtual and Real World Teaching and Learning Environments

    ERIC Educational Resources Information Center

    Grenfell, Janette

    2013-01-01

    Selected ubiquitous technologies encourage collaborative participation between higher education students and educators within a virtual socially networked e-learning landscape. Multiple modes of teaching and learning, ranging from real world experiences, to text and digital images accessed within the Deakin studies online learning management…

Top