Securing community-controlled infrastructure: SPARC’s plan of action
نویسندگان
چکیده
منابع مشابه
Infrastructure for Securing IoT
The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...
متن کاملsSCADA: securing SCADA infrastructure communications
Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water and wastewater industries. While control systems can be vulnerable to a variety o...
متن کاملAntimicrobial resistance: a plan of action for community practice.
Antibiotic resistance was once confined primarily to hospitals but is becoming increasingly prevalent in family practice settings, making daily therapeutic decisions more challenging. Recent reports of pediatric deaths and illnesses in communities in the United States have raised concerns about the implications and future of antibiotic resistance. Because 20 percent to 50 percent of antibiotic ...
متن کاملSecuring the information infrastructure for EV charging
We consider the functional and security requirements for the information exchanges in the infrastructure for EV charging being trialled in the Netherlands, which includes support for congestion management using the smart charging protocol OSCP. We note that current solutions do not provide true end-to-end security, even if all communication links are secured (for instance with TLS), as some dat...
متن کاملTowards Securing Communications in Infrastructure-Poor Areas
Structured P2P networks have proven to be effective in the exchange of data between nodes whose identity and content are generally indexed in a DHT. For years, such DHT networks have allowed, among other users, third world inhabitants, such as African people, to exchange information among them and with the rest of the world without relying on a centralized infrastructure. Unfortunately, more th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: College & Research Libraries News
سال: 2018
ISSN: 2150-6698,0099-0086
DOI: 10.5860/crln.79.8.426