Time filter

Source Type

Riihimaki, Finland

Kovalenko K.,Latvia University of Agriculture | Roasto M.,Estonian University of Life Sciences | Liepins E.,Latvia University of Agriculture | Maesaar M.,Estonian University of Life Sciences | And 2 more authors.
Food Control | Year: 2013

Campylobacteriosis in humans is caused by thermotolerant Campylobacter spp., most commonly by C. jejuni and C. coli. However, no official data for human campylobacteriosis in Latvia is available or cases are heavily under-reported. In accordance with Commission Decision 2007/516/EC the Campylobacter spp. baseline study was performed in 2008 in Latvia but there was no continuous monitoring for the Campylobacter at broiler chicken production level in 2009. The aim of the present study was to determine the occurrence of Campylobacter spp. in broiler chicken production at slaughterhouse and retail level in Latvia. Poultry samples originated from the two biggest Latvian broiler slaughterhouses. Altogether, 240 fresh broiler chicken neck skins, 2400 intact broiler chicken intestines and 240 fresh broiler chicken carcasses were collected during the year 2010. A total of 92.5% of the pooled intestine samples; 60.8% of the neck skin samples and 56.3% of carcasses were positive for Campylobacter spp. There was seasonal variation in proportions of Campylobacter positive samples with seasonal peak on summer months. © 2012 Elsevier Ltd. Source

Kiviharju M.,Finnish Defence Forces
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography | Year: 2012

Access control lies at the heart of any technical information security and information assurance system. Access control is traditionally enforced by reference monitors, which are assumed to be able to reliably monitor and mediate all traffic from users to objects. An alternative view to enforcement is cryptography, referred to as cryptographic access control (CAC). CAC has gained popularity with the emergence of distributed computing, especially cloud computing and "everything as a service". CAC is not a formal model, but an enforcement paradigm. In this paper we propose an extension to the current CAC framework and discuss the limits, where it is in general feasible to extend CAC as a paradigm over reference monitors. Source

Kiviharju M.,Finnish Defence Forces
Proceedings - IEEE Military Communications Conference MILCOM | Year: 2013

Role-based access control (RBAC) is the de facto access control model used in current information systems, also in military environments. This is because RBAC can be used to describe multi-level secure access control (AC) policies so common in military environments handling information from multiple levels of classification. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC policies cryptographically. CAC-methods are also attractive in military cloud and tactical environments due to their distributed and offline nature of operation. Combining the capabilities of both RBAC and CAC fully seems elusive, though. This paper studies the feasibility of implementing RBAC with respect to read-rights using a recent type of cryptographic schemes called attribute-based encryption (ABE). We present an implementation model based on the Extensible Access Control Markup Language (XACML) reference architecture and evaluate how the current state ABE can realize the different RBAC standard model components. We will show that it is feasible to implement at least the Core RBAC with standard XACML architecture and ABE models, and that the expressiveness of the ABE-schemes can reach nearly all the way in terms of symmetric RBAC commands and functions, such as Dynamic Separation of Duty. © 2013 IEEE. Source

Ostergard P.R.J.,Aalto University | Pottonen O.,Aalto University | Pottonen O.,Finnish Defence Forces
Designs, Codes, and Cryptography | Year: 2011

The optimal one-error-correcting codes of length 13 that are doubly shortened perfect codes are classified utilizing the results of [Östergård, P.R.J., Pottonen, O.: The perfect binary one-error-correcting codes of length 15: Part I-Classification. IEEE Trans. Inform. Theory 55, 4657-4660 (2009)]; there are 117821 such (13,512,3) codes. By applying a switching operation to those codes, two more (13,512,3) codes are obtained, which are then not doubly shortened perfect codes. © 2010 Springer Science+Business Media, LLC. Source

Turunen V.,Aalto University | Kosunen M.,Aalto University | Vaarakangas M.,Finnish Defence Forces | Ryynanen J.,Aalto University
IEEE Transactions on Vehicular Technology | Year: 2012

Spectrum sensing is an essential part of future cognitive radios, as the spectrum sensor provides information about the utilization of the surrounding radio spectrum. Several approaches to implementing spectrum sensing have been proposed in the literature, one of them being the class of feature detectors. Cyclostationary feature detectors are, in general, considered to be superior in performance but suffer from high implementation complexity. Therefore, most studies still utilize energy detectors, which may not reach the performance requirements set for practical implementations. This paper presents angular domain feature detection algorithms that are based on cyclostationary properties. Angular domain signal processing is shown to simplify the implementation considerably while preserving comparable performance. Moreover, a new detection algorithm that leads to multiplier-free implementation and reduces the memory requirements, compared with any previous approaches, is proposed. © 2006 IEEE. Source

Discover hidden collaborations