Search results
1 – 10 of over 2000Joe Garcia, Russell Shannon, Aaron Jacobson, William Mosca, Michael Burger and Roberto Maldonado
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software…
Abstract
Purpose
This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong traceability and provability concerning the SSA’s output product, known as an operational flight program (OFP). Through a secure development environment (SDE), each critical software development function performed on said OFP during its development has a corresponding record represented on a blockchain.
Design/methodology/approach
An SDE is implemented as a virtual machine or container incorporating software development tools that are modified to support blockchain transactions. Each critical software development function, e.g. editing, compiling, linking, generates a blockchain transaction message with associated information embedded in the output of a said function that, together, can be used to prove integrity and support traceability. An attestation process is used to provide proof that the toolchain containing SDE is not subject to unauthorized modification at the time said critical function is performed.
Findings
Blockchain methods are shown to be a viable approach for supporting exhaustive traceability and strong provability of development system integrity for mission-critical software produced by an NAE SSA for NAE embedded systems software.
Practical implications
A blockchain-based authentication approach that could be implemented at the OFP point-of-load would provide for fine-grain authentication of all OFP software components, with each component or module having its own proof-of-integrity (including the integrity of the used development tools) over its entire development history.
Originality/value
Many SSAs have established control procedures for development such as check-out/check-in. This does not prove the SSA output software is secure. For one thing, a build system does not necessarily enforce procedures in a way that is determinable from the output. Furthermore, the SSA toolchain itself could be attacked. The approach described in this paper enforces security policy and embeds information into the output of every development function that can be cross-referenced to blockchain transaction records for provability and traceability that only trusted tools, free from unauthorized modifications, are used in software development. A key original concept of this approach is that it treats assigned developer time as a transferable digital currency.
Details
Keywords
- Software development
- Blockchain
- Cybersecurity
- Operational flight program
- Secure development environment
- Secure virtual machine
- Zero trust
- Embedded systems
- Mission-critical systems
- OFP
- DevOps
- DevSecOps
- Software support activity
- SSA
- SDE
- Permissioned blockchain
- Cryptocurrency
- Time-limited authorization for developer action
- TADA
- Code signing
- Trusted software guard
- SGX
- Trusted eXecution technology
- TXT
- Trusted platform module
- Self-hosting
- Controlled access blockchain
- CABlock
- Role-based access control
- RBAC
Shqipe Gashi Nulleshi and Malin Tillmar
The purpose of this paper is to examine how rural entrepreneurship is discussed by analyzing articles in the leading journals of the two main research fields, entrepreneurship…
Abstract
Purpose
The purpose of this paper is to examine how rural entrepreneurship is discussed by analyzing articles in the leading journals of the two main research fields, entrepreneurship studies, and rural studies, through the concept of rural proofing.
Design/methodology/approach
The systematic literature review centers on the two main fields where rural entrepreneurship is studied and covers papers in nine leading journals in entrepreneurship studies and two leading journals in rural studies, between the years 1989 and 2020. In total, 97 papers were reviewed and we utilize and operationalize the rural proofing concept based on Fahmy et al.'s (2004) 3 characteristics of rural: remoteness, accessibility, and rural locale and sense of place. The authors take stock of the dimensions of rural proofing addressed within each of the research fields to find similarities and differences; that is, if articles are rural proofed (or not) when discussing rural entrepreneurship.
Findings
The classification of articles across the three dimensions of rural proofing shows that the field of rural entrepreneurship is being addressed mainly in the dimensions of remoteness and accessibility, while few authors in rural studies journals give priority to the rural locale and sense of place dimension. The results of the authors' review reveal that out of a total of 97 articles on rural entrepreneurship, 56 articles address at least one dimension of rural proofing and 41 articles do not address any dimension. Among the 41 articles not rural proofed, rurality is not problematized when discussing rural entrepreneurship. Instead, the authors focus on specific topics such as social capital, community entrepreneurship/networks, entrepreneurs'/farmers' identity, illegality in rural areas, and institutional framework. The number of non-rural-proofed articles in entrepreneurship journals is almost double that in rural studies journals. This means that authors in entrepreneurship journals do not problematize rurality to the same extent as authors in rural studies journals when addressing rural entrepreneurship.
Research limitations/implications
The authors emphasize the need for increased cross-fertilization between the fields of entrepreneurship and rural studies as an avenue to develop the entrepreneurship field in the direction towards rural proofing. A close collaboration with academia and policymakers is essential to promote interdisciplinary research in order to make a distinctive contribution to rural development. Scholars in either of the two fields will benefit from our review and identification of similarities and differences in the research. The review is one step towards promoting a closer dialog between the two fields.
Originality/value
Previous reviews have focused mainly on what rural entrepreneurship entails (e.g. what topics are discussed) rather than how rural entrepreneurship is discussed. This paper centers on the differences and similarities of the two main fields and provides an in-depth qualitative analysis of how rural entrepreneurship is discussed by utilizing the rural proofing concept.
Details
Keywords
The purpose of this article is to determine necessary and sufficient conditions in order that (D, K) to be an S-accr pair, where D is an integral domain and K is a field which…
Abstract
Purpose
The purpose of this article is to determine necessary and sufficient conditions in order that (D, K) to be an S-accr pair, where D is an integral domain and K is a field which contains D as a subring and S is a multiplicatively closed subset of D.
Design/methodology/approach
The methods used are from the topic multiplicative ideal theory from commutative ring theory.
Findings
Let S be a strongly multiplicatively closed subset of an integral domain D such that the ring of fractions of D with respect to S is not a field. Then it is shown that (D, K) is an S-accr pair if and only if K is algebraic over D and the integral closure of the ring of fractions of D with respect to S in K is a one-dimensional Prüfer domain. Let D, S, K be as above. If each intermediate domain between D and K satisfies S-strong accr*, then it is shown that K is algebraic over D and the integral closure of the ring of fractions of D with respect to S is a Dedekind domain; the separable degree of K over F is finite and K has finite exponent over F, where F is the quotient field of D.
Originality/value
Motivated by the work of some researchers on S-accr, the concept of S-strong accr* is introduced and we determine some necessary conditions in order that (D, K) to be an S-strong accr* pair. This study helps us to understand the behaviour of the rings between D and K.
Details
Keywords
Abstract
For
Details
Keywords
In this paper, we consider a two color multi-drawing urn model. At each discrete time step, we draw uniformly at random a sample of
Abstract
In this paper, we consider a two color multi-drawing urn model. At each discrete time step, we draw uniformly at random a sample of
Details
Keywords
Phillip Baumann and Kevin Sturm
The goal of this paper is to give a comprehensive and short review on how to compute the first- and second-order topological derivatives and potentially higher-order topological…
Abstract
Purpose
The goal of this paper is to give a comprehensive and short review on how to compute the first- and second-order topological derivatives and potentially higher-order topological derivatives for partial differential equation (PDE) constrained shape functionals.
Design/methodology/approach
The authors employ the adjoint and averaged adjoint variable within the Lagrangian framework and compare three different adjoint-based methods to compute higher-order topological derivatives. To illustrate the methodology proposed in this paper, the authors then apply the methods to a linear elasticity model.
Findings
The authors compute the first- and second-order topological derivatives of the linear elasticity model for various shape functionals in dimension two and three using Amstutz' method, the averaged adjoint method and Delfour's method.
Originality/value
In contrast to other contributions regarding this subject, the authors not only compute the first- and second-order topological derivatives, but additionally give some insight on various methods and compare their applicability and efficiency with respect to the underlying problem formulation.
Details
Keywords
The initial value problem for a semi-linear high-order heat equation is investigated. In the focusing case, global well-posedness and exponential decay are obtained. In the…
Abstract
The initial value problem for a semi-linear high-order heat equation is investigated. In the focusing case, global well-posedness and exponential decay are obtained. In the focusing sign, global and non global existence of solutions are discussed via the potential well method.
Details
Keywords
Lars Mäncher, Christopher Zerres and Thomas Breyer-Mayländer
The aim of the research is to identify the factors that create an authentic company's corporate social responsibility (CSR) engagement and to investigate whether an authentic CSR…
Abstract
Purpose
The aim of the research is to identify the factors that create an authentic company's corporate social responsibility (CSR) engagement and to investigate whether an authentic CSR engagement influences the purchase intention. In addition, the study attempts to provide insights into the mediation role of attitude toward the company and frequency of purchase on purchase intention.
Design/methodology/approach
In this study, a theoretical framework is developed in which major antecedents of authentic CSR are identified. A specific example of a brand and its corporate social responsibility activities was used for the study. An online questionnaire was used to collect the data. To verify the hypothesis, structural equation modeling with the partial least squares method was used. A total of 240 people participated in the study.
Findings
The results of the study confirmed that CSR authenticity positively influences consumer purchase intention. Furthermore, the hypothesized impact of CSR authenticity on attitudes toward the company and frequency of purchase could be verified.
Originality/value
Although there is research on the antecedents influencing the consumer's perceived authenticity of CSR, it has not addressed differences in impact and has not presented a full picture of influencing antecedents. In addition, CSR proof as a new antecedent is investigated in the study. Moreover, research on outcomes of perceived CSR authenticity still lacks depth. The study therefore addresses this research gap by providing an extensive research framework including antecedents influencing CSR authenticity and outcomes of CSR authenticity.
Details
Keywords
The purpose is to develop search and detection strategies that maximize the probability of detection of mine-like objects.
Abstract
Purpose
The purpose is to develop search and detection strategies that maximize the probability of detection of mine-like objects.
Design/methodology/approach
The author have developed a methodology that incorporates variational calculus, number theory and algebra to derive a globally optimal strategy that maximizes the expected probability of detection.
Findings
The author found a set of look angles that globally maximize the probability of detection for a general class of mirror symmetric targets.
Research limitations/implications
The optimal strategies only maximize the probability of detection and not the probability of identification.
Practical implications
In the context of a search and detection operation, there is only a limited time to find the target before life is lost; hence, improving the chance of detection will in real terms be translated into the difference between success or failure, life or death. This rich field of study can be applied to mine countermeasure operations to make sure that the areas of operations are free of mines so that naval operations can be conducted safely.
Originality/value
There are two novel elements in this paper. First, the author determine the set of globally optimal look angles that maximize the probability of detection. Second, the author introduce the phenomenon of concordance between sensor images.
Details