administrative domains
Recently Published Documents


TOTAL DOCUMENTS

57
(FIVE YEARS 2)

H-INDEX

5
(FIVE YEARS 0)

2021 ◽  
Vol 68 ◽  
pp. 69-84
Author(s):  
Lieven D’hulst

The metaphors of centre and periphery tend to reduce the complexity of language relations and interlingual exchanges that are featured by multilingual societies. At a crucial point of multilingual Belgium’s evolution, i.e. during the 19th century, exchanges between its two major languages, namely French and Flemish, offer a suitable angle to capture the processes of centralisation and peripherisation of both languages. Translingual practices, including translation, are at the heart of these processes. On the one hand, they sustain continuous attempts to impose and maintain the centrality of official French in the legal and administrative domains; on the other hand, they nurture counterbalancing claims for recognition and officialisation of Flemish as an equal language. This contribution puts focus on three major aspects of interlingual exchange: the design and management of Belgian translation policies, the asymmetric translation flows between French and Flemish vs. Flemish and French, and the emancipatory efforts of Flemish and its modest effects, notably in the literary domain.


Smart Cities ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 767-782
Author(s):  
Emilia Rönkkö ◽  
Aulikki Herneoja

This article addresses the challenges and capability gaps confronted by public administrations concerning digital transformation and the use of novel tools in the context of land use, facilities and urban services planning. The present state of planning and management processes in Finland is introduced and reflected through experimental piloting conducted in two Finnish cities. Participatory action research and design research methodology was utilised to identify the main challenges as well as unravel the possibilities of digital transformation in the context of public services planning. The resulting analysis revealed the critical importance of facilitating integrative policies and coordination when working across knowledge boundaries between administrative domains. The paper contributes to a wider theoretical and conceptual understanding, as it discusses the advantages and feasibility of digital tools as boundary objects for cross-sectoral work in smart, people-centred urban governance. The authors see this direction of research as a fruitful ground for further investigations within the interdisciplinary urban planning research context.


2020 ◽  
Vol 44 (3) ◽  
pp. 273-286
Author(s):  
Silvia Dal Negro

Abstract Walser German is a prototypical example of ‘extreme’ minority language, the survival of which appears at present extremely critical, at least in the Italian context. From a sociolinguistic point of view, Walser German is dispersed in a discontinuous territory and subject to language shift, language attrition and demographic shrinkage. Linguistically, it is part of a dialect continuum that stretches north of the Alps; yet, the dialects spoken in Italy have developed independently from each other and from their Swiss counterparts, with the result that they are now mutually unintelligible, and structurally too distant from Standard Modern German for this variety to be eligible as their Dachsprache. Given this background, the effects of a law protecting and promoting minority languages were foreseeable: Walser German is not a language under any sociolinguistic respect and could neither be protected or promoted by encouraging its use in administrative domains or developing a standard variety. However, what actually happened was not foreseeable either. Legal and funding support fostered documentation activities creating or enhancing local expertise in various domains; in addition, communities started to feel legitimised of a cultural and linguistic ‘otherness’ that could be exploited as a commodity, especially in the domain of tourism.


Author(s):  
Emerson Ribeiro de Mello ◽  
Michelle Silva Wangham ◽  
Samuel Bristot Loli ◽  
Carlos Eduardo da Silva ◽  
Gabriela Cavalcanti da Silva ◽  
...  

AbstractThe federated identity model provides a solution for user authentication across multiple administrative domains. The academic federations, such as the Brazilian federation, are examples of this model in practice. The majority of institutions that participate in academic federations employ password-based authentication for their users, with an attacker only needing to find out one password in order to personify the user in all federated service providers. Multi-factor authentication emerges as a solution to increase the robustness of the authentication process. This article aims to introduce a comprehensive and open source solution to offer multi-factor authentication for Shibboleth Identity Providers. Based on the Multi-factor Authentication Profile standard, our solution provides three extra second factors (One-Time Password, FIDO2 and Phone Prompt). The solution has been deployed in the Brazilian academic federation, where it was evaluated using functional and integration testing, as well as security and case study analysis.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1392
Author(s):  
Luis M. Contreras ◽  
Carlos J. Bernardos

Multi-access Edge Computing (MEC) is proposed as a standard framework for the provision and consumption of applications and services in proximity to the end-users of network operators. Proximity has been identified as one of the enablers of the forthcoming 5G, where extreme low latency and large bandwidth will be necessary for some services. However, the need of proximity imposes to network operators the necessity of huge investments in order to distribute computing capabilities towards the access. A less investment intensive approach would consist on sharing infrastructures by integrating MEC environments from different operators or providers. This could open the door to new business models on the one hand, as well as to avoid restrictions in terms of space, energy of regulation, on the other. This paper overviews different integration options by analyzing the MEC framework defined by the European Telecommunications Standards Institute (ETSI) and identifying different architectural alternatives as well as the business and technical aspects that need to be taken into consideration for realizing such integration.


2020 ◽  
Vol 9 (1) ◽  
pp. 4 ◽  
Author(s):  
Panagiotis Trakadas ◽  
Panagiotis Karkazis ◽  
Helen C. Leligou ◽  
Theodore Zahariadis ◽  
Felipe Vicens ◽  
...  

5G is considered to be the technology that will accommodate the development and management of innovative services with stringent and diverse requirements from end users, calling for new business models from the industry. In this context, the development and efficient management of Network Services (NS) serving specific vertical industries and spanning across multiple administrative domains and heterogeneous infrastructures is challenging. The main challenges regard the efficient provision of NSs considering the Quality of Service (QoS) requirements per vertical industry along with the optimal usage of the allocated resources. Towards addressing these challenges, this paper details an innovative approach that we have developed for managing and orchestrating such NSs, called SONATA, and compare it with OSM and Cloudify, which are two of the most known open-source Management and Orchestration (MANO) frameworks. In addition to examining the supported orchestration mechanisms per MANO framework, an evaluation of main operational and functional KPIs is provided based on experimentation using a real testbed. The final aim is the identification of their strong and weak points, and the assessment of their suitability for serving diverse vertical industry needs, including of course the Internet of Things (IoT) service ecosystem.


Cryptography ◽  
2020 ◽  
pp. 373-390
Author(s):  
Mahinder Pal Singh Bhatia ◽  
Manjot Kaur Bhatia ◽  
Sunil Kumar Muttoo

Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.


2019 ◽  
Vol 9 (21) ◽  
pp. 4547 ◽  
Author(s):  
Mario Vega-Barbas ◽  
Víctor A. Villagrá ◽  
Fernando Monje ◽  
Raúl Riesco ◽  
Xavier Larriva-Novo ◽  
...  

With the increasing complexity of cyberthreats, it is necessary to have tools to understand the changing context in real-time. This document will present architecture and a prototype designed to model the risk of administrative domains, exemplifying the case of a country in real-time, specifically, Spain. In order to carry out this task, a modeling of the assets and threats detected by various sources of information has been carried out. All this information is stored as knowledge making use of ontologies, which enables the application of reasoning engines in order to infer new knowledge that can be used later in the following reasoning. This modeling and reasoning have been enriched with a dynamic system for managing the trust of the different sources of information and capabilities for increased reliability with the inclusion of additional threat intelligence information.


Author(s):  
Puru Gaur ◽  
Amish Tandon ◽  
Nupur Goyal ◽  
Gitanjali Chandwani ◽  
Mangey Ram

Present-day computer systems have drastically transformed from the ones in days of basic file sharing, peripheral sharing or the hosting of companywide applications on a server to much more sophisticated, small and faster systems. These systems have further expanded to include cloud-based networks, virtualized desktops, servers, etc. The capabilities of evolving heterogeneous computer systems require advanced control plane. Software-defined networking (SDN) proposes to control the network from a centralized controller instead of a distributed configuration. SDN makes it easier for network operators to evolve network capabilities. Even though SDN proposes a logically centralized system, the controllers may not represent a single, centralized device, instead the control plane may consist of logically centralized but physically distributed controllers wherein each controller manages different administrative domains of the network or different parts of the flow space. There are mainly two types of control plane architecture: flat control plane and hierarchical control plane. In this paper, we have analyzed the reliability and availability of the hierarchical SDN control plane. We take into consideration work-load capacities of the controllers, link failures, node failures and controller-end failures to determine the reliability of the system.


Author(s):  
Raphael V. Rosa ◽  
Christian Esteve Rothenberg

Towards end-to-end network slicing, diverse envisioned 5G services (eg, augmented reality, vehicular communications, IoT) Call for advanced multi-administrative domain service deployments, open challenges from vertical Agreement (SLA) -based orchestration hazards. Through different proposed methodologies and demonstrated prototypes, this work showcases: the automated extraction of network function profiles; the manners to analyze how such profiles compose programmable network slice footprints; and the means to perform fine-grained auditable SLAs for end-to-end network slicing among multiple administrative domains. Sustained on state-of-the-art networking concepts, this work presents contributions by detecting roots on standardization efforts and best-of-breed open source embodiments, each one standing prominent future work topics in shape of its shortcomings.


Sign in / Sign up

Export Citation Format

Share Document