A secure cross‐organizational container deployment approach to enable ad hoc collaborations

Author(s):  
Laurens Van Hoye ◽  
Tim Wauters ◽  
Filip De Turck ◽  
Bruno Volckaert
Keyword(s):  
Ad Hoc ◽  
Author(s):  
Indrajit Ray ◽  
Indrakshi Ray ◽  
Sudip Chakraborty

Ad hoc collaborations often necessitate impromptu sharing of sensitive information or resources between member organizations. Each member of resulting collaboration needs to carefully assess and tradeoff the requirements of protecting its own sensitive information against the requirements of sharing some or all of them. The challenge is that no policies have been previously arrived at for such secure sharing (since the collaboration has been formed in an ad hoc manner). Thus, it needs to be done based on an evaluation of the trustworthiness of the recipient of the information or resources. In this chapter, the authors discuss some previously proposed trust models to determine if they can be effectively used to compute trustworthiness for such sharing purposes in ad hoc collaborations. Unfortunately, none of these models appear to be completely satisfactory. Almost all of them fail to satisfy one or more of the following requirements: (i) well defined techniques and procedures to evaluate and/or measure trust relationships, (ii) techniques to compare and compose trust values which are needed in the formation of collaborations, and (iii) techniques to evaluate trust in the face of incomplete information. This prompts the authors to propose a new vector (we use the term “vector” loosely; vector in this work means a tuple) model of trust that is suitable for reasoning about the trustworthiness of systems built from the integration of multiple subsystems, such as ad hoc collaborations. They identify three parameters on which trust depends and formulate how to evaluate trust relationships. The trust relationship between a truster and a trustee is associated with a context and depends on the experience, knowledge, and recommendation that the truster has with respect to the trustee in the given context. The authors show how their model can measure trust in a given context. Sometimes enough information is not available about a given context to calculate the trust value. Towards this end the authors show how the relationships between different contexts can be captured using a context graph. Formalizing the relationships between contexts allows us to extrapolate values from related contexts to approximate a trust value of an entity even when all the information needed to calculate the trust value is not available. Finally, the authors develop formalisms to compare two trust relationships and to compose two or more of the same – features that are invaluable in ad hoc collaborations.


Author(s):  
William F Murphy ◽  
Sandra Sanchez Murphy ◽  
Raymond R Buettner ◽  
Grandon Gill

The Joint Interagency Field Experimentation (JIFX) event, organized by the Naval Postgraduate School (NPS), is conducted 3-4 times a year at various locations. The four day event can be characterized as an informing system specifically designed to facilitate structured and unstructured communications between a variety of parties—e.g., software developers, inventors, military and civilian users of various technologies, academics, and agencies responsible for identifying and procuring technology solutions—that frequently are constrained in their informing activities in more restrictive venues. Over the course of the event, participants may observe technology demonstrations, obtain feedback from potential users, acquire new ideas about their technologies might be employed and, perhaps most significantly, engage in ad hoc collaborations with other participants. The present paper describes an exploratory case research study that was conducted over a one year period and involved both direct observation of the event and follow-up interviews with 49 past participants in the event. The goal of the research was to assess the nature of participant-impact resulting from attending JIFX and to consider the consistency of the findings with the predictions of various theoretical frameworks used in informing science. The results suggest that participants perceived that the event provided significant value from three principal sources: discovery, interaction with potential clients (users) of the technologies involved, and networking with other participants. These findings were largely consistent with what could be expected from informing under conditions of high complexity; because value generally derives from combinations of attributes rather than from the sum of individual attributes, we would expect that overall value from informing activities will be perceived even though estimates of the incremental value of that informing cannot be made.


Author(s):  
Paolo Bellavista ◽  
Rebecca Montanari ◽  
Daniela Tibaldi ◽  
Alessandra Toninelli

The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic resource sharing. However, the fear of exposure to risky interactions is currently limiting the widespread uptake of ad hoc collaborations. This chapter introduces the challenge of identifying and validating novel security models/systems for securing ad hoc collaborations, by taking into account the high unpredictability, heterogeneity, and dynamicity of envisioned wireless environments. We claim that the concept of trust management should become a primary engineering design principle, to associate with the subsequent trust refinement into effective authorization policies, thus calling for original and innovative access control models. The chapter overviews the state-of-theart solutions for trust management and access control in wireless environments by pointing out both the need for their tight integration and the related emerging design guidelines, that is, exploitation of context awareness and adoption of semantic technologies.


10.28945/2141 ◽  
2015 ◽  
Author(s):  
William F Murphy ◽  
Sandra Sanchez Murphy ◽  
Raymond R Buettner ◽  
Grandon Gill

The Joint Interagency Field Experimentation (JIFX) event, organized by the Naval Postgraduate School (NPS), is conducted 3-4 times a year at various locations. The four day event can be characterized as an informing system specifically designed to facilitate structured and unstructured communications between a variety of parties—e.g., software developers, inventors, military and civilian users of various technologies, academics, and agencies responsible for identifying and procuring technology solutions—that frequently are constrained in their informing activities in more restrictive venues. Over the course of the event, participants may observe technology demonstrations, obtain feedback from potential users, acquire new ideas about their technologies might be employed and, perhaps most significantly, engage in ad hoc collaborations with other participants. The present paper describes an exploratory case research study that was conducted over a one year period and involved both direct observation of the event and follow-up interviews with 49 past participants in the event. The goal of the research was to assess the nature of participant-impact resulting from attending JIFX, and considering the consistency of the findings with the predictions of various theoretical frameworks used in informing science. The results suggest that participants perceived that the event provided significant value from three principal sources: discovery, interaction with potential clients (users) of the technologies involved, and networking with other participants. These findings were largely consistent with what could be expected from informing under conditions of high complexity: because value generally derives from combinations of attributes rather than from the sum of individual attributes, we would expect that overall value from informing activities will be perceived even though estimates of the incremental value of that informing cannot be made. A revised version of this paper was published in the journal Informing Science: the International Journal of an Emerging Transdiscipline, Volume 18, 2015


Pflege ◽  
2020 ◽  
Vol 33 (5) ◽  
pp. 289-298
Author(s):  
Katharina Silies ◽  
Angelika Schley ◽  
Janna Sill ◽  
Steffen Fleischer ◽  
Martin Müller ◽  
...  

Zusammenfassung. Hintergrund: Die COVID-19-Pandemie ist eine Ausnahmesituation ohne Präzedenz und erforderte zahlreiche Ad-hoc-Anpassungen in den Strukturen und Prozessen der akutstationären Versorgung. Ziel: Ziel war es zu untersuchen, wie aus Sicht von Führungspersonen und Hygienefachkräften in der Pflege die stationäre Akutversorgung durch die Pandemiesituation beeinflusst wurde und welche Implikationen sich daraus für die Zukunft ergeben. Methoden: Qualitative Studie bestehend aus semistrukturierten Interviews mit fünf Verantwortlichen des leitenden Pflegemanagements und drei Hygienefachkräften in vier Krankenhäusern in Deutschland. Die Interviews wurden mittels qualitativer Inhaltsanalyse ausgewertet. Ergebnisse: Die Befragten beschrieben den auf die prioritäre Versorgung von COVID-19-Fällen hin umstrukturierten Klinikalltag. Herausforderungen waren Unsicherheit und Angst bei den Mitarbeiter_innen, relative Ressourcenknappheit von Material und Personal und die schnelle Umsetzung neuer Anforderungen an die Versorgungleistung. Dem wurde durch gezielte Kommunikation und Information, massive Anstrengungen zur Sicherung der Ressourcen und koordinierte Steuerung aller Prozesse durch bereichsübergreifende, interprofessionelle Task Forces begegnet. Schlussfolgerungen: Die in der COVID-19-Pandemie vorgenommenen Anpassungen zeigen Entwicklungspotenziale für die zukünftige Routineversorgung auf, z. B. könnten neue Arbeits- und Skill Mix-Modelle aufgegriffen werden. Für die Konkretisierung praktischer Implikationen sind vertiefende Analysen der Daten mit zeitlichem Abstand erforderlich.


Sign in / Sign up

Export Citation Format

Share Document