ESTGV - DI - Artigo em revista científica, não indexada ao WoS/Scopus
Permanent URI for this collection
Browse
Browsing ESTGV - DI - Artigo em revista científica, não indexada ao WoS/Scopus by Issue Date
Now showing 1 - 10 of 14
Results Per Page
Sort Options
- Os Novos Alunos da EST do Politécnico de Viseu.Publication . Francisco, Francisco F.; Martins, José Carlos M.; Bebiano, Rui A. Quadroso âmbito dum grupo de trabalho nomeado pela Comissão Coordenadora do Conselho Científico de 14 de Junho de 1996, realizaram-se alguns inquéritos, dos quais se destaca o que foi apresentado aos "Novos Alunos". A oportunidade de tornar público parte do estudo e algumas das conclusões retiradas do inquérito surgiu agora com a publicação da Millenium. Em síntese podemos dizer que a população estudantil da Escola Superior de Tecnologia é constituída por alunos jovens (média inferior a 20 anos), maioritariamente do sexo masculino (58%) e provenientes em grande parte da região de Viseu e concelhos limítrofes. Do litoral norte e centro vêm também muitos alunos (32%). A grande maioria inscreve-se no curso que pretende e na escola que deseja, com excepções registadas nos cursos de Eng. de Madeiras e Eng. do Ambiente. O curso maior é o de Gestão de Empresas e o mais pequeno o de Engenharia de Sistemas e Informática. O inquérito foi realizado no acto da matrícula e colocado anonimamente aos "Novos Alunos". Responderam quatrocentos e dezoito alunos, estimando-se que com os alunos retidos no primeiro ano a população escolar seja superior a meio milhar de indivíduos.
- Flywheel -" A Bateria Electromecânica"..Publication . Carvalho, António Manuel Santos; Marques, Bruno Filipe; Apura, Paulo Fernando da CostaDesde sempre, o homem necessitou de fontes energéticas. Uma vez que essas fontes não estão sempre disponíveis, existe a necessidade de armazenar a energia para utilização posterior. Isso passa-se com os seres vivos que, alimentando-se, conservam a energia dos alimentos sob a forma de compostos químicos no próprio organismo. Com o desenvolvimento da civilização tornou-se óbvio o armazenamento de várias formas de energia. No caso de um painel solar, só se produz energia durante as horas do dia. Mas o homem também vive de noite, necessitando também de energia eléctrica. Torna-se então clara a necessidade de armazenar a energia produzida durante o dia, muitas vezes em excesso, pois nem sequer é utilizada.
- Policy-based networking: Applications to firewall managementPublication . Caldeira, Filipe; Monteiro, E.This paper describes a policy-based approach to firewall management. The Policy-Based Networking (PBN) architecture proposed by the Policy Framework Group of lnternet Engineering Task Force (1ETF) is analysed, together with the communication protocols, policy specification languages, and the necessary information models. An overview of policy specification languages applicability to PBN architecture is presented paying particular attention to the specification of security policies through Security Policy Specification Language (SPSL). The Common Open Policy Service protocol (coPs) and its variant, coPs for Policy provisioning (COPS-PR), both used for the transport of policy information, are also presented. The paper continues with a description of an application of the PBN architecture to firewall management. The proposed architecture is presented and its implementation issues are analysed with some usage examples. The paper concludes with the evaluation of the policybased approach to firewall management.
- Policy-based networking: applications to firewall managementPublication . Caldeira, Filipe; Monteiro, EdmundoThis paper describes a policy-based approach to firewall management. The Policy-Based Networking (pbn) architecture proposed by the Policy Framework Group of Internet Engineering Task Force (ietf) is analysed, together with the communication protocols, policy specification languages, and the necessary information models. An overview of policy specification languages applicability topbn architecture is presented paying particular attention to the specification of security policies through Security Policy Specification Language (spsl). The Common Open Policy Service protocol (cops) and its variant,cops for Policy provisioning (cops-pr), both used for the transport of policy information, are also presented. The paper continues with a description of an application of thepbn architecture to firewall management. The proposed architecture is presented and its implementation issues are analysed with some usage examples. The paper concludes with the evaluation of the policy-based approach to firewall management.
- A Ghost Cell-Based Data Structure for Multiresolution MeshesPublication . Rodrigues, Rui; Morgado, José Francisco; Silva, Frutuoso; Gomes, AbelMultiresolution meshes enable us to build representations of geometric objects at different Levels of Detail (LODs). We introduce a multiresolution scheme whose data structure allows us to separately re- store the geometry and topology of a mesh during the refinement process. Additionally, we use a topological criterion (not a geometric criterion, as usual in the literature) to quickly simplify a mesh, what seems to make the corresponding simplification algorithm adequate for real-time appli- cations such as, for example, on-line computer games.
- Trust and reputation management for critical infrastructure protectionPublication . Caldeira, Filipe; Monteiro, Edmundo; Simoes, PauloToday's critical communication technologies (ICTs) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This work addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the policy-based management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the scope of the European FP7 MICIE project, to allow information exchange among interconnected CIs.
- Design and implementation of a mediation system enabling secure communication among Critical InfrastructuresPublication . Castrucci, Marco; Neri, Alessandro; Caldeira, Filipe; Aubert, Jocelyn; Khadraoui, Djamel; Aubigny, Matthieu; Harpes, Carlo; Simoes, Paulo; Suraci, Vincenzo; Capodieci, PaoloNowadays, the increase of interdependencies among different Critical Infrastructures (CI) makes it more and more difficult to protect without using a systemic approach that considers a single infrastructure as part of a complex system of infrastructures. A strong collaboration among CI owners is required to avoid, or at least to limit the propagation of failures from one infrastructure to another and to put CI in safety mode. The key element enabling this required cooperation is the possibility for them to exchange relevant information related to the status of their infrastructures and to the services provided. In this paper, we present a middleware solution that allows CIs sharing real-time information, enabling the design and implementation of fault mitigation strategies and mechanisms to prevent the cascading phenomena generated by the failure propagation from one infrastructure to another.
- Trust Based Interdependency Weighting for On-line Risk Monitoring in Interdependent Critical InfrastructuresPublication . Caldeira, Filipe; Schaberreiter, Thomas; Varrette, Sébastien; Monteiro, Edmundo; Simoes, Paulo; Pascal, Bouvry; Khadraoui, DjamelCritical infrastructure (CI) services are constantly consumed by the society and are not expected to fail. A common definition states that CIs are so vital to our society that a disruption would have a severe impact on both the society and the economy. CI sectors include, amongst others, electricity, telecommunication and transport. CIs can be mutually dependent on each others services and a failure in one of these elements can cascade to another (inter)dependent CI. CI security modelling was introduced in previous work to enable on-line risk monitoring in CIs that depend on each other by exchanging risk alerts expressed in terms of a breach of Confidentiality, a breach of Integrity and degrading Availability (C,I,A). While generally providing a solid basis for risk monitoring, there is no way of evaluating if a risk alert received from an external CI is accurate. In this paper we propose a solution to this problem by adding a trust based component to the CI security model in order to improve its accuracy and resilience to inconsistent or inaccurate risk alerts provided by (inter)dependent CIs, allowing to evaluate the correctness of the received alerts. The proposed approach is validated on a realistic scenario by evaluating a dependency between the computing and the telecommunication sectors in the context of the Grid'5000 platform.
- Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical InfrastructuresPublication . Caldeira, Filipe; Schaberreiter, Thomas; Varrette, Sébastien; Monteiro, Edmundo; Simões, Paulo; Bouvry, Pascal; Khadraoui, DjamelCritical infrastructure (CI) services are constantly consumed by the society and are not expected to fail. A common definition states that CIs are so vital to our society that a disruption would have a severe impact on both the society and the economy. CI sectors include, amongst others, electricity, telecommunication and transport. CIs can be mutually dependent on each others services and a failure in one of these elements can cascade to another (inter)dependent CI. CI security modelling was introduced in previous work to enable on-line risk monitoring in CIs that depend on each other by exchanging risk alerts expressed in terms of a breach of Confidentiality, a breach of Integrity and degrading Availability (C,I,A). While generally providing a solid basis for risk monitoring, there is no way of evaluating if a risk alert received from an external CI is accurate. In this paper we propose a solution to this problem by adding a trust based component to the CI security model in order to improve its accuracy and resilience to inconsistent or inaccurate risk alerts provided by (inter)dependent CIs, allowing to evaluate the correctness of the received alerts. The proposed approach is validated on a realistic scenario by evaluating a dependency between the computing and the telecommunication sectors in the context of the Grid'5000 platform.
- Intelligent beacon location and fingerprintingPublication . Martins, Pedro; Abbasi, Maryam; Sa, Filipe; Celiclio, Jose; Morgado, Francisco; Caldeira, FilipeThe complex way radio waves propagate indoors, leads to the derivation of location using fingerprinting techniques. In this cases, location is computed relying on WiFi signals strength mapping. Recent Bluetooth Low Energy (BLE) provides new opportunities to explore positioning. Indoor location identification plays a fundamental role as a business and personal level. At a business level, indoor location pinpointing where GPS signal is nonexistent is used to advise users and send push notifications (e.g., stores publicity, guide persons with special needs, or even for emergency evacuation). In this work is studied how BLE beacons radio signals can be used for indoor location scenarios, as well as their precision. The proposed study is performed inside the campus of Viseu Polytechnic Institute, using hundreds of students, each with his smart-phone, as proof of concept. Experimental results show that BLE allows having less than 1.5 meters error approximately 90% of the times.