The methods and solutions are based on security patterns that capture the security expertise in the form available for automated processing. By means of the patterns and their integration into a run-time environment it is possible to timely identify potential threats or attacks and adapt the under-threat and attacked system or applications. Research results were successfully applied to the field of long-term trusted archiving. In the chapter we provide the relevant S&D properties, classes and patterns on, and describe how S&D patterns are integrated into a trusted long-term archiving service.
COBISS.SI-ID: 22684455
This paper analyses technologies of broadband access networks for usage in remote rural areas. First, advantages and disadvantages of the technologies are presented. Then, a proposal for public-private partnership business model is given and foreign best practices are analysed. We present the criteria for recognising the best practice, the implementation process of the project and advantages of public-private partnerships, and describe concrete examples of the best foreign practices. The paper ends by describing the current state in Slovenia and giving recommendations for future actions.
COBISS.SI-ID: 18427878