European climate—energy security nexus: A model based scenario analysis
نویسندگان
چکیده
منابع مشابه
Security Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملModel-based Situational Security Analysis
Security analysis is growing in complexity with the increase in functionality, connectivity, and dynamics of current electronic business processes. To tackle this complexity, the application of models in pre-operational phases is becoming standard practice. Runtime models are also increasingly applied to analyze and validate the actual security status of business process instances. In this pape...
متن کاملToward model-based security engineering: developing a security analysis DSML
As a long-term industrial initiative, we are developing a new method to support security risk analysis, closely integrated with the overall engineering process of our critical information systems. This method is building upon model-based engineering techniques. This paper presents a prototype domainspecific modelling language (DSML) that was developed in this context; this DSML aims at supporti...
متن کاملPrivacy, identity and security in ambient intelligence: A scenario analysis
The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of individuals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This article addresses these issues by analysing scenarios for ambient intelligence applications that have been developed over the last few yea...
متن کاملScenario-Based Requirement Analysis
A method for scenario based requirements engineering is described. The method uses two types of scenario, structure models of the system context and scripts of system usage. A modelling language is reported for describing scenarios, and heuristics are given to cross check dependencies between scenario models and the requirements specification. Heuristics are grouped into several analytic treatm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Policy
سال: 2012
ISSN: 0301-4215
DOI: 10.1016/j.enpol.2011.11.061