Posztindusztriális társadalomban élünk, az előállított javak meghatározó része szolgáltatás. A tanulmányban a szolgáltatások egy bizonyos részével, a létesítménygazdálkodási szolgáltatásokkal és azok mérésének kérdéskörével foglalkozunk.... more
Formal threat and risk analysis methodologies (TRA) are paramount to know and manage the risks to which information systems are exposed, reducing such risks to acceptable levels. On the other hand, Common Criteria (CC) is the reference... more
This paper presents a formal and computational methodology for incorporation of new knowledge into knowledge bases about actions and changes. We employ Gelfond and Lifschitz'action description language A to describe domains of... more
El estoicismo como una propuesta alternativa para la contemporaneidad
The Common Criteria is often too confusing and technical for non-security specialists to understand and therefore properly use. At the same time, it is essential that security critical IT products under development be validated according... more
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal... more
In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual... more
Modern Systems are usually obtained as incremental composition of proper (smaller and SMART) subsystems interacting through communication interfaces. Such flexible architecture allows the pervasive provisioning of a wide class of... more
Background: Recent studies implicate a pathophysiological role of tumor necrosis factor-α (TNF-α) in atherosclerosis, thus suggesting that serum TNF-α levels may be one of the biomarkers for future cardiovascular events. However, which... more
Background: Recent studies implicate a pathophysiological role of tumor necrosis factor-α (TNF-α) in atherosclerosis, thus suggesting that serum TNF-α levels may be one of the biomarkers for future cardiovascular events. However, which... more
Clinical outcomes for multiple myeloma (MM) are highly heterogeneous and it is now clear that pivotal genetic events are the primary harbingers of such variation. These findings have broad implications for counseling, choice of therapy... more
The Common Criteria (CC) is a computer-security standard that some governments use for procurement, e.g., the U.S. Department of Defense. To sell information-security products in these markets, CC certification is required. Much has been... more
Tool replacement operations have a great influence over the cost of machined parts. At present, the common criteria used to determine the tool life do not optimize the use of tools and lead to significant economic losses. The main... more
Today, cryptology is essential for security of information and communication systems. But 25 years ago, it was a classi®ed and highly con®dential activity. Presented here from the point of view of smart cards, this quick evolution of... more
The paper describes a layered approach to analysing safety and security in a structured way and creating a security-informed safety case. The approach is applied to a case studya Security Gateway controlling data flow between two... more
Safety cases are the development foundation for safety-critical systems and are often quite complex to understand depending on the size of the system and operational conditions. The recent advent of security aspects complicates the issues... more
El estoicismo como una propuesta alternativa para la contemporaneidad
In dairy farms, the human-animal interaction is intense, especially with baby calves and the animal's response is linked to the handler's behaviour. Considering that attitude of calves’ handlers can improve animal performance,... more
Plant derived medicine is an important source of life saving drugs, but the genome information of most important medicinal plants is still unavailable. The need of the hour is to identify more functional genes and enzymes that control... more
Az orvos, az ápoló és a többi, gyógyítással foglalkozó szakember egyre több időt tölt a számítógép előtt, használja a háziorvosi, szakellátási vagy integrált kórházi rendszereket. A gyógyító-betegellátó munka során kezelt adatok nagyrészt... more
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal... more
Security concerns become increasingly important in safety-critical industrial cyberphysical systems. Different options for security certification exist. We describe a Common Criteria certification for a MILS separation kernel, and IEC... more
Privacy and security requirements, and their potential conflicts, are increasingly having more and more importance. It is becoming a necessary part to be considered, starting from the very early stages of requirements engineering, and in... more
As mobile nodes move to new links, they need to resume their communications in a timely fashion. To communicate, IPv6 nodes need to complete router discovery, address auto-configuration, and other tasks. Unfortunately, this depends on... more
Novel strategies for clinical investigation and biomarker discovery: a guide to applied metabolomics
Metabolomics is an emerging technology that is increasing both in basic science and in human applications, providing a physiological snapshot. It has been highlighted as one of the most wide ranging and reliable tools for the... more
Courtesy translation of the protection profile registered and certified by the French
Verbindung von cc-schutzprofilen mit der Methode rechtlicher it-gestaltung KORA Anwendungsbeispiel: Wahlgeheimnis* Die Common Criteria sind ein in der Praxis anerkannter, internationaler Kriterienkatalog zur Evaluierung und Zertifizierung... more
One of the aims of COST C14 action is the assessment and evaluation of pedestrian wind comfort. At present there is no general rule available that is applied across Europe. There are several criteria that have been developed and applied... more
Nowadays biometrics is being used in many applications where security is required. This fact causes that new threatens have appeared and that the number of attempts to break biometric systems has increased. From all potential attacks,... more
Requirements engineering for complex software-intensive systems (and other systems) requires identifying, specifying, analyzing, and reviewing system requirements early in the system development process. However, many cases overlook... more
There are different standpoints concerning quality assurance in food indus try companies. Some people say that GMP, GHP, HACCP systems control well enough the requirements to quality and hygiene, which are so important in food production.... more
There are different standpoints concerning quality assurance in food industry companies. Some people say that GMP, GHP, HACCP systems control well enough the requirements to quality and hygiene, which are so important in food production.... more
The Center for Information Systems Security Studies and Research (CISR) is working on a project known as the Trusted Computing Exemplar (TCX). This project is developing a high assurance computing component that will be evaluated at the... more
TAJEKOZTATASI INTEZMENYEK ES SZOLGALTATASOK NFAIS Newsletter. 17. kot. 5. sz. 1975. p. 9-11.
The goal of this paper is to compare a PID controller and a Fuzzy Logic controller in terms of pitch control of an aircraft. Firstly, derivation of the mathematical model is introduced to define the dynamics of an aircraft. To inspect the... more
This study was undertaken with the aim of evaluating inter-and intraobserver variation on the pathophysiological interpretation of individual electromyographic (EMG) tests on muscles and nerve segments. Seven physicians from 6 European... more
This paper describes an architecture that filters packets within a subset of nodes on an existing shared multicast tree. The path connecting the group of nodes that want to communicate privately on the existing tree will be given a label.... more
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
The distinction between cribriform Gleason pattern 3 and 4 prostate cancer is controversial. Out of 3590 prostate cancers sent to one of the authors over 7 months, 30 needle biopsy cases were selected that possibly represented cribriform... more
Social media enhanced learning systems bring new challenges to evaluate learning environments. Many features are common with any web-based services and can be evaluated with common criteria. But with social media services users can also... more
Clinical outcomes for multiple myeloma (MM) are highly heterogeneous and it is now clear that pivotal genetic events are the primary harbingers of such variation. These findings have broad implications for counseling, choice of therapy... more
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchical naming, and what would now be called middleware, they... more