Development of a software package to improve the efficiency of corporate control over compliance with industrial, environmental and energy security requirements at the Gazprom Group facilities

Author(s):  
M.I. Lukyanchikov ◽  
◽  
Yu.V. Nemchin ◽  
A.B. Dokutovich ◽  
V.D. Shapiro ◽  
...  
2011 ◽  
Vol 2 (3) ◽  
pp. 42-62
Author(s):  
Afonso Araújo Neto ◽  
Marco Vieira

When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.


Author(s):  
Afonso Araújo Neto ◽  
Marco Vieira

When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.


2021 ◽  
Vol 289 ◽  
pp. 03004
Author(s):  
Timur G. Mamedov ◽  
Aleksey G. Massel

The article discusses the development of a new version of the INTEC software complex, designed to support research in the areas of development of the fuel and energy complex from the point of view of energy security, called INTEC-A. In the course of direct reengineering of this software complex, a multi-agent approach was used to expand its functionality in the future. In more detail, the article discusses the process of reengineering existing versions of a software package based on the two previous versions. The architecture of the SC “INTEC-A” is presented, the justification of the applied technologies is given. Also SC “INTEC-A” includes a database, the description of which is given. A computational experiment was carried out with energy experts to verify and test the performance of a SF.


2020 ◽  
Vol 209 ◽  
pp. 06014
Author(s):  
Yuri Kononov

The paper studies the problem of overall assessment of energy sector development options from the standpoint of meeting energy security requirements. It is shown that as the projection time frame extends further into the future, its economic component gains in importance on a par with integral indicators descriptive of strategic threats to and sustainability of energy systems development. Methodological approaches to assessment of these indicators are proposed.


Futures ◽  
2021 ◽  
Author(s):  
Wouter J. Smolenaars ◽  
Arthur F. Lutz ◽  
Hester Biemans ◽  
Sanita Dhaubanjar ◽  
Walter W. Immerzeel ◽  
...  

Author(s):  
E. Völkl ◽  
L.F. Allard ◽  
B. Frost ◽  
T.A. Nolan

Off-axis electron holography has the well known ability to preserve the complex image wave within the final, recorded image. This final image described by I(x,y) = I(r) contains contributions from the image intensity of the elastically scattered electrons IeI (r) = |A(r) exp (iΦ(r)) |, the contributions from the inelastically scattered electrons IineI (r), and the complex image wave Ψ = A(r) exp(iΦ(r)) as:(1) I(r) = IeI (r) + Iinel (r) + μ A(r) cos(2π Δk r + Φ(r))where the constant μ describes the contrast of the interference fringes which are related to the spatial coherence of the electron beam, and Φk is the resulting vector of the difference of the wavefront vectors of the two overlaping beams. Using a software package like HoloWorks, the complex image wave Ψ can be extracted.


Author(s):  
G.F. Bastin ◽  
H.J.M. Heijligers ◽  
J.M. Dijkstra

For the calculation of X-ray intensities emitted by elements present in multi-layer systems it is vital to have an accurate knowledge of the x-ray ionization vs. mass-depth (ϕ(ρz)) curves as a function of accelerating voltage and atomic number of films and substrate. Once this knowledge is available the way is open to the analysis of thin films in which both the thicknesses as well as the compositions can usually be determined simultaneously.Our bulk matrix correction “PROZA” with its proven excellent performance for a wide variety of applications (e.g., ultra-light element analysis, extremes in accelerating voltage) has been used as the basis for the development of the software package discussed here. The PROZA program is based on our own modifications of the surface-centred Gaussian ϕ(ρz) model, originally introduced by Packwood and Brown. For its extension towards thin film applications it is required to know how the 4 Gaussian parameters α, β, γ and ϕ(o) for each element in each of the films are affected by the film thickness and the presence of other layers and the substrate.


Sign in / Sign up

Export Citation Format

Share Document