Dissertations / Theses on the topic 'Management of energy security'

To see the other types of publications on this topic, follow the link: Management of energy security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Management of energy security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zhong, Wanyun. "Demand Uncertainties Management in SCUC and Voltage Security Enhancement for SCED." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1554420443707557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hrubý, Martin. "ENERGY MANAGEMENT STRATEGY FOR SUSTAINABLE REGIONAL DEVELOPMENT." Doctoral thesis, Vysoké učení technické v Brně. Fakulta stavební, 2016. http://www.nusl.cz/ntk/nusl-390247.

Full text
Abstract:
Energy Management strategy for sustainable regional development has been selected as the topic of my research due to the fact that energy demand alongside with energy dependency have been continuously growing from a long term perspective. Sustainable development is defined by three imperatives – energy efficiency, ecology and security. Review of the current state and analysis of historical trends in Energetics at global and regional level are covered in this research. Results of the Multi-Criteria Decision Analysis introduce a set of implications and recommendations for Energy Management strategy in the Czech Republic.
APA, Harvard, Vancouver, ISO, and other styles
3

Mohammadi, Javad. "Distributed Computational Methods for Energy Management in Smart Grids." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/710.

Full text
Abstract:
It is expected that the grid of the future differs from the current system by the increased integration of distributed generation, distributed storage, demand response, power electronics, and communications and sensing technologies. The consequence is that the physical structure of the system becomes significantly more distributed. The existing centralized control structure is not suitable any more to operate such a highly distributed system. This thesis is dedicated to providing a promising solution to a class of energy management problems in power systems with a high penetration of distributed resources. This class includes optimal dispatch problems such as optimal power flow, security constrained optimal dispatch, optimal power flow control and coordinated plug-in electric vehicles charging. Our fully distributed algorithm not only handles the computational complexity of the problem, but also provides a more practical solution for these problems in the emerging smart grid environment. This distributed framework is based on iteratively solving in a distributed fashion the first order optimality conditions associated with the optimization formulations. A multi-agent viewpoint of the power system is adopted, in which at each iteration, every network agent updates a few local variables through simple computations, and exchanges information with neighboring agents. Our proposed distributed solution is based on the consensus+innovations framework, in which the consensus term enforces agreement among agents while the innovations updates ensure that local constraints are satisfied.
APA, Harvard, Vancouver, ISO, and other styles
4

Nair, Nirmal-Kumar. "Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3199.

Full text
Abstract:
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
APA, Harvard, Vancouver, ISO, and other styles
5

Rathinavel, Kruthika. "Design and Implementation of a Secure Web Platform for a Building Energy Management Open Source Software." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/55271.

Full text
Abstract:
Commercial buildings consume more than 40% of the total energy consumption in the United States. Almost 90% of these buildings are small- and medium-sized buildings that do not have a Building Energy Management (BEM) system. The reasons behind this are – lack of awareness, unavailability of inexpensive packaged solutions, and disincentive to invest in a BEM system if the tenant is not the owner. Several open source tools and technologies have emerged recently that can be used for building automation and energy management. However, none of these systems is turnkey and deployment ready. They also lack consistent and intuitive navigation, security, and performance required for a BEM system. The overall project - of which this thesis research is a part - addresses the design and implementation of an open source secure web based user platform to monitor, schedule, control, and perform functions needed for a BEM system serving small and medium-size buildings. The focus of this work are: principles of intuitive graphical user interface design, abstracting device functions into a comprehensive data model, identifying threats and vulnerabilities, and implementing a security framework for the web platform. Monitor and control solutions for devices such as load controllers and sensors are abstracted and their decentralized control strategies are proposed and implemented using an open source robust scalable user platform accessible locally and remotely. The user platform is open-source, scalable, provides role-based access, dynamic, and modular in design. The comprehensive data model includes a user management model, device model, session model, and a scheduling model. The data model is designed to be flexible, robust and can be extended for any new device type. Security risks are analyzed using a threat model to identify security goals. The proposed security framework includes user authentication, device approval, role-based access, secure information exchange protocols, and web platform security. Performance of the user interface platform is evaluated for responsiveness in different screen sizes, page response times, throughput, and the performance of client side entities.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Hamadi, Hamid Helal. "Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/47681.

Full text
Abstract:
Wireless sensor networks (WSNs) are frequently deployed unattended and can be easily captured or compromised. Once compromised, intrusion prevention methods such as encryption can no longer provide any protection, as a compromised node is considered a legitimate node and possesses the secret key for decryption. Compromised nodes are essentially inside attackers and can perform various attacks to break the functionality of the system. Thus, for safety-critical WSNs, intrusion detection techniques must be used to detect and remove inside attackers and fault tolerance techniques must be used to tolerate inside attackers to prevent security failure. In this dissertation research, we develop a class of dynamic redundancy management algorithms for redundancy management of multisource multipath routing for fault and intrusion tolerance, and majority voting for intrusion detection, with the goal of maximizing the WSN lifetime while satisfying application quality-of-service and security requirements, for base station based WSNs, homogeneous clustered WSNs, and heterogeneous clustered WSNs. By means of a novel model-based analysis methodology based on probability theory, we model the tradeoff between energy consumption vs. reliability, timeliness and security gain, and identify the optimal multisource multipath redundancy level and intrusion detection settings for maximizing the lifetime of the WSN while satisfying application quality-of-service requirements. A main contribution of our research dissertation is that our dynamic redundancy management protocol design addresses the issues of "how many paths to use" and "what paths to use" in multisource multipath routing for intrusion tolerance. Another contribution is that we take an integrated approach combining intrusion detection and tolerance in the protocol design to address the issue of "how much intrusion detection is enough" to prevent security failure and prolong the WSN lifetime time. We demonstrate resiliency of our dynamic redundancy management protocol design for intrusion detection and tolerance against sophisticated attacker behaviors, including selective and random capture, as well as persistent, random, opportunistic and insidious attacks, by model-based performance analysis with results supported by extensive simulation based on ns3.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jason. "Three Studies of Stakeholder Influence in the Formation and Management of Tax Policies." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5157.

Full text
Abstract:
This dissertation consists of three separate but interrelated studies examining the formation and management of tax policies. The first study uses stakeholder theory (ST) to investigate the strategic management practices of the Transport for London (TfL) during discrete stages in the adoption, implementation, and amendments of the tax policy reform known as the London Congestion Charge (LCC). Results indicate that TfL has utilized power, legitimacy, and urgency as its main policy management tactics with a significant emphasis on legitimatizing the LCC and its subsequent policy amendments. The second study draws on social exchange theory (SET) to reexamine the relationship between corporations and legislators during tax policy processes. Data for the study come from publicly available political action committee (PAC) contribution activities surrounding the Energy Independence and Security Act of 2007 (EISA07). By examining the endogeneity between legislators' voting patterns and PAC contributions by corporations, this study aims to refine empirical work on corporate political strategy, especially as it relates to crucial tax provisions embedded within an intensely debated policy proposal. Using simultaneous equations modeling (SEM), results are consistent with SET showing that an implicit and reciprocal relationship exists between corporations and legislators. This relationship affects the interdependence of how legislators vote for public policies and the amount of corporations' financial contributions to legislators. The third study investigates and aims to validate the empirical applicability of Dahan's (2005) typology of political resources in explicating the political interactions between stakeholder groups and legislators in the development of EISA07. I discuss how and why the mode of operations and various political resources employed by stakeholder groups affected the final EISA07 language concerning domestic production deduction tax credits for the oil and gas industry. Publicly available data show that both supporting and opposing stakeholder groups employ tactics consistent with Dahan's (2005) typology. However, both stakeholder groups tend to use an interactive or positive political approach to gain access and favor of legislators instead of an adversarial approach. Ultimately, the tax credits were preserved. Taken as a whole, the three studies advance the tax and public policy research literature in accounting by studying how and why relevant stakeholders affect the formation and ongoing management of public and tax policies.
ID: 031001472; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed July 15, 2013).; Thesis (Ph.D.)--University of Central Florida, 2012.; Includes bibliographical references.
Ph.D.
Doctorate
Business Administration
Business Administration; Accounting
APA, Harvard, Vancouver, ISO, and other styles
8

Vicente, Fernando Antônio da Costa Figueiredo. "Gestão estratégica da segurança do trabalho na área industrial de uma usina de etanol, açúcar e energia elétrica." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/9883.

Full text
Abstract:
Submitted by Fernando Antônio da Costa Figueiredo Vicente (fernando@altamogiana.com.br) on 2012-07-11T11:20:20Z No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5)
Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2012-07-11T12:27:50Z (GMT) No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5)
Made available in DSpace on 2012-07-11T12:32:20Z (GMT). No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5) Previous issue date: 2012-06-13
Achieve profitability in a plant ethanol producer, sugar and electric power, without accidents at work, went on to be major challenge. Therefore, the Security Management has become strategic, seeking to bring business value "security" as a fundamental instrument in the implementation of production. Raise the history of implementation of the safety management System of the power plant and also we checked through universal indicators of security, if the numbers achieved satisfactory evolution, present trying to identify the actions taken and the results. In the process of evolution of that system, the plant became the first in the world in obtaining International certification (OHSAS 18001) security sector, as well as achieve Cosan 4th cane processing in Brazil. Applying the ICOS Instrument - Organizational Climate inventory safety in 2005 and again in 2011, we evaluate whether with production growth, coupled with the increase in the number of employees, the security value remained present. Apuramos also possible factors such as company time, schooling, proportion of accidents and interviews with officials who contributed to the existence of sectors there are 16 years without losing a day of work by accident. Finally, we found that deal with security management, empowers the company to face difficulties on the market, because success can not be worth today, for the following day in the event of an accident. Prevent, educate, seeking knowledge, celebrate, collect results, and daring, define plant's administration style studied.
Conseguir lucratividade em uma usina produtora de etanol, açúcar e energia elétrica, sem acidentes do trabalho, passou a ser grande desafio. Portanto, a Gestão de Segurança transformou-se em estratégica, buscando levar o valor empresarial 'segurança' como instrumento fundamental na execução da produção. Levantamos a história da implantação do Sistema de Gestão da Segurança da usina e também checamos através de indicadores universais de segurança, se os números alcançados, apresentam evolução satisfatória, procurando identificar as ações aplicadas e os resultados. No processo de evolução desse sistema, a usina tornou-se a primeira do mundo na obtenção de uma Certificação Internacional de Segurança (OHSAS 18001) do setor sucroenergético, além de alcançar quarto lugar em processamento de cana no Brasil. Aplicando o Instrumento ICOS – Inventário de Clima Organizacional de Segurança em 2005 e novamente em 2011, avaliamos se com crescimento da produção, aliado ao aumento do número de trabalhadores, o valor segurança manteve-se presente. Também apuramos possíveis fatores como tempo de empresa, escolaridade, proporção de acidentes e entrevistas com os responsáveis que contribuíram para a existência de setores há 16 anos sem perder um dia de trabalho por acidente. Finalmente, concluímos que lidar com gestão da segurança, capacita a empresa para enfrentar dificuldades do mercado, pois sucesso hoje, pode não valer para o dia seguinte caso ocorra acidente. Prevenir, educar, buscar conhecimento, celebrar, cobrar resultados e ousadia, definem o estilo de administração da usina estudada.
APA, Harvard, Vancouver, ISO, and other styles
9

Schneider, Frédéric. "Les energies marines renouvelables face au droit." Thesis, Nice, 2013. http://www.theses.fr/2013NICE0010.

Full text
Abstract:
La question des énergies marines renouvelables dégage des problématiques juridiques complexes qui intéressent le droit tant dans sa dimension internationale, européenne que nationale. L’effervescence des initiatives publiques et privées en ce domaine implique une approche adaptée en vue d’améliorer et de développer les instruments juridiques nécessaires au développement durable des énergies de la mer. Cette approche suppose trois niveaux d’analyse. Au regard du droit international, celle-ci se caractérise par une finalité environnementale qui relève plus globalement de l’intérêt général. En ce sens, la conversion d’énergies marines n’engendre pas d’émission de gaz à effet de serre et son impact sur le milieu marin est généralement minime. Avec le concours des énergies de la mer, les États seront à même de respecter leurs engagements supranationaux, notamment en matière de changements climatiques. De surcroît, le droit de la mer offre une sécurité juridique dans l’utilisation de l’espace maritime en définissant non seulement les droits, mais les obligations des États côtiers. À l’échelle européenne, la sécurité juridique est liée à l’objectif d’une part d’au moins 20 % d’énergie produite à partir de sources renouvelables dans la consommation finale brute d’énergie de l’Union d’ici à 2020 et encouragée par l’initiative des États riverains des mers du Nord en faveur d’un réseau off-shore dans le contexte de l’émergence du marché européen des énergies renouvelables. Au plan national, l’analyse du droit interne met en lumière les meilleures pratiques relatives au développement des énergies marines renouvelables en termes de promotion des investissements et de gestion durable des mers et des océans
The issue of marine renewable energies raises complex legal problems which interest the Law in its International, European and Domestic dimension. The effervescence of public and private initiatives on the matter requires a tailored approach to improve and develop legal instruments to support development of ocean energies. This approach elicits three levels of analysis. According to the International Law, it is marked by an environmental objective resulting from public interest. In this sense, marine energy conversion does not generate greenhouse gas emissions and its impact on the marine environment is generally minimal. With the help of these renewable energies, States will be able to respect their supranational commitments, particularly regarding climate change. In addition, the Law of the Sea provides legal certainty in the use of ocean space, by defining not only rights but obligations to coastal states. At the European level, legal certainty is connected to the target of at least 20 % share of energy from renewable sources in the Union's gross final consumption of energy by 2020, and is especially encouraged by the North Seas Countries' Offshore Grid Initiative in the context of the Europe's emerging renewable energy market. On a National perspective, the analysis of Comparative Law highlights the best practices related to offshore renewable development in terms of promoting investment and sustainable ocean management
APA, Harvard, Vancouver, ISO, and other styles
10

Seslikaya, Huseyin. "Energy security and Turkey." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FSeslikaya.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Looney, Robert E. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 65-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Taramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.

Full text
Abstract:
The rapid growth of information and communication systems in recent years has brought with it an increased need for security. Meanwhile, encryption, which constitutes the basis of the majority of security schemes, may imply a significant amount of energy consumption. Encryption algorithms, depending on their complexity, may consume a significant amount of computing resources, such as memory, battery power and processing time. Therefore, low energy encryption is crucial, especially for battery powered and passively powered devices. Thus, it is of great importance to achieve the desired security possible at the lowest cost of energy. The approach advocated in this thesis is based on the lack of energy implication in security schemes. It investigates the optimum security mode selection in terms of the energy consumption taking into consideration the security requirements and suggests a model for energy-conscious adaptive security in communications. Stochastic and statistical methods are implemented – namely reliability, concentration inequalities, regression analysis and betweenness centrality – to evaluate the performance of the security modes and a novel adaptive system is proposed as a flexible decision making tool for selecting the most efficient security mode at the lowest cost of energy. Several symmetric algorithms are simulated and the variation of four encryption parameters is examined to conclude the selection of the most efficient algorithm in terms of energy consumption. The proposed security approach is twofold, as it has the ability to adjust dynamically the encryption parameters or the energy consumption, either according to the energy limitations or the severity of the requested service.
APA, Harvard, Vancouver, ISO, and other styles
12

Bychkova, Vladyslava. "Energy and environmental security." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Estenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.

Full text
Abstract:
The purpose of this thesis is to counterargue Simon Dalby’s claim that the national security perspective should be replaced by a global security perspective. Dalby argues that the national security is inappropriate to capture the current issues regarding the environmental security. To counterargue Dalby’s claim, I represent the national security perspective by using the perspective of states’ energy security, and compare current trends and issues regarding states’ energy security and the environmental security. This is done to argue that states can either chose to enhance their own energy security or the environmental security. Prisoners' Dilemma is then used as a theoretical framework on an explanatory example to provide insights about a dilemma, called the Energy- Environment Dilemma in this thesis, that curbs states’ ability to commit themselves to the cause of protecting the environmental security. The explanatory example used is the strategic importance of the Northwest passage for the U.S. and Canada. The results of this thesis suggests that the national security perspective, in combination with Prisoners’ Dilemma, is useful to provide insights about the Energy-Environmental Dilemma. Replacing it with a global security perspective would be to ignore a perspective which can provide insights about a challenge for states to commit to the cause of protecting the environmental security.
APA, Harvard, Vancouver, ISO, and other styles
14

Rastogi, Rahul. "Information security service management : a service management approach to information security management." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1389.

Full text
Abstract:
In today’s world, information and the associated Information Technology are critical assets for many organizations. Any information security breach, or compromise of these assets, can lead to serious implications for organizations that are heavily dependent on these assets. For such organizations, information security becomes vital. Organizations deploy an information security infrastructure for protecting their information assets. This infrastructure consists of policies and controls. Organizations also create an information security management system for managing information security in the organization. While some of the policies and controls are of a purely technical nature, many depend upon the actions of end-users. However, end-users are known to exhibit both compliant and noncompliant behaviours in respect of these information security policies and controls in the organization. Non-compliant information security behaviours of end-users have the potential to lead to information security breaches. Non-compliance thus needs to be controlled. The discipline of information security and its management have evolved over the years. However, the discipline has retained the technology-driven nature of its origin. In this context, the discipline has failed to adequately appreciate the role played by the end-users and the complexities of their behaviour, as it relates to information security policies and controls. The pervasive information security management philosophy is that of treating end-users as the enemy. Compliance is sought to be achieved through awareness programs, rewards, punishments and evermore strict policies and controls. This has led to a bureaucratic information security management approach. The philosophy of treating end-users as the enemy has had an adverse impact on information security in the organization. It can be said that rather than curbing non-compliance by end-users, the present-day bureaucratic approach to information security management has contributed to non-compliance. This thesis calls this the end-user crisis. This research aims at resolving this crisis by identifying an improved approach to information security management in the organization. This research has applied the service management approach to information security management. The resultant Information Security Service Management (ISSM) views end-users as assets and resources, and not as enemies. The central idea of ISSM is that the end-user is to be treated as a customer, whose needs are to be satisfied. This research presents ISSM. This research also presents the various components of ISSM to aid in its implementation in an organization.
APA, Harvard, Vancouver, ISO, and other styles
15

Hengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.

Full text
Abstract:
Much has been written during this century's energy security debate about the external threats the West faces to oil and natural gas supplies. This literature is often prescriptive, offering solutions to address these assumed threats. This research takes a much-needed look inward at the pressures placed on the multi-dimensional relationships within the transatlantic security community. An original contribution to knowledge is made through the exploration of these energy security tensions within the community and how they impact the two energy security prerequisites, availability and affordability. An examination of key oil and natural gas issues in the United States, Europe and the main transatlantic institutions demonstrates that the transatlantic community is very secure and often acts inadvertently to undermine its own energy security condition. Thus, the conventional wisdom that the supply of fossil fuel energy is a leading and high-priority security issue is challenged. Contrary to most literature, the conclusion is reached that energy security is actually not a high-level concern to the transatlantic security community, and that on occasions leading members of the community, who are high energy consumers, choose to put fossil fuel energy supply at risk to pursue political and strategic policies assigned a higher priority. In practice, producer states are found to be much more dependent on uninterrupted energy trade than consumer states, positively contributing to the reliability of oil and natural gas supply. In fact, through highly competitive political engagement with Russia and the Middle East North Africa region, the transatlantic states risk undermining the energy security of the community. Nevertheless, transatlantic energy security tensions have not risen to an actionable level. When placed in the overall context of transatlantic security issues, these energy security tensions do not threaten to divide the transatlantic community in any meaningful way.
APA, Harvard, Vancouver, ISO, and other styles
16

Gunduc, Yildirim. "Energy Security And Central Asian Geopolitics." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12615176/index.pdf.

Full text
Abstract:
Energy security has become an important part of national security policies in the last decades. Policies concerning energy security are designed and implemented in different ways by countries based on their geographical, political and economic imperatives. This thesis analyzes the securitization of energy resources in Central Asia and the roles of the US, China, India and Russia as major actors of the Central Asian energy politics in the post-Soviet period. The conditions shaping Central Asian countries decision making process&rsquo
as well as the policies and priorities of the US, China, India and Russia are analyzed in the light of latest energy policy developments and related pipeline projects in the region. While doing so, this thesis aims to compare and contrast the practices and policies of the US, China, India and Russia in securing access to energy resources of Central Asia.
APA, Harvard, Vancouver, ISO, and other styles
17

Vikström, Hanna. "Rare Metals: Energy Security and Supply." Thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-168130.

Full text
Abstract:
Lithium and neodymium are two critical materials in our modern society, many technological solutions depend on them. Lithium is used in batteries, which are used in cars and portable electronics. Neodymium, which is a rare earth element, is mainly used in permanent magnets which are used in smartphones, hard disc drives and turbines. There are many reports regarding the availability of the metals, with different results. The available data on the reserves varies considerably, from the few sources there are. In this report, based on geological availability, forecasts are done to investigate how much the production can increase and when it will peak. The prognoses are based on historic production to which different functions, the logistic, gompertz and richards, are fitted with the least square method. The production will peak in the end of this century and in the beginning of the next century for both metals. The production of lithium does not seem to be sufficient for both producing electric and hybrid cars with only li-ion batteries along with fusion. The neodymium production will be sufficient for producing a lower percentage of direct driven wind turbines and electric cars with NiMH batteries. Lithium in seawater is sometimes considered a future source. Since the lithium concentration is low, large volumes have to be processed in order to extract a reasonable amount of lithium. Currently it is not economic to extract lithium from seawater.
APA, Harvard, Vancouver, ISO, and other styles
18

Dorlhiac, Gabriella de Figueiredo. "Ethanol's impact on Brazilian energy security." Connect to Electronic Thesis (CONTENTdm), 2010. http://worldcat.org/oclc/647971342/viewonline.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Xu, Chen. "EU Energy Situations and Supply Security." Thesis, KTH, Energy Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9131.

Full text
Abstract:

Energy supply security is a hot topic today. It highly influences energy market, national security and also residents’ daily lives. However, due to different aims and study strategies, definitions of energy supply security are different. In this report, it is defined as stable energy supply processes that result from good infrastructure, delivery of energy sources, carriers and services, which are sturdily controlled by effective energy policies. Prices of energy supply system

are also maintained on a reasonable level over a continuous period thanks to the efficient crises assessment and management.

In order to make a comprehensive research, energy situation has been deeply investigated on worldwide, EU and Swedish levels, respectively. Results from these investments obviously certify that due to the big amount of populations, there are significant imbalances between energy supply and demands in developing countries. To make things better, these imbalances don’t exist in developed world, like EU Members including Sweden because of applications of advanced technologies and wide utilizations of renewable energy carriers. Oppositely, greenhouse gases emission is a severe problem in the world, which gives rise to temperature increasing year by year! Besides the global warming, some other factors also bring about uncertainties to energy supply security, so that efficient policies are necessary in order improve the recent

situations and to create a secure atmosphere for energy supply, such as

Directive 98/30/EC for natural gas supply security, Directive 2003/55/EC for integration and compatibility of the energy regulation and Directive 2003/54/EC, the first policy that regulates EU electricity market as well as IEM Directive, which is the improvement of Directive 2003/54/EC, etc.

Although several policies aiming at creation of competitive energy markets and achieving energy supply security, vulnerabilities still exist in EU energy supply system, such as limited primary energy sources and high dependence on nuclear powers, energy network capacity inadequacy, high voltage electricity transmission, etc. Concerning Swedish energy supply system, extreme low temperatures in winter, drilling technologies and high economic budgets for heat sources from underground, hurricanes, thunderstorms to wind turbines and man-made disruptions are all potential vulnerabilities. Regarding these negative aspects, recommendations are given on four different levels, which are global, EU, Swedish and individual perspectives. Specific suggestions to achieve energy supply security include independence of different energy supplies, to enhance international cooperation, periodic assessments and inspections for energy facilities, population control, to keep original energy policies updated, to enhance abilities to resist abnormal weather conditions, to develop heat pump technologies and try to use energy in efficient ways, etc.

APA, Harvard, Vancouver, ISO, and other styles
20

Deutch, John M. "Future United States Energy Security Concerns." MIT Joint Program on the Science and Policy of Global Change, 2004. http://hdl.handle.net/1721.1/5544.

Full text
Abstract:
Without energy, the economy can neither function nor grow. However, for at least the next half-century, the U.S. will not have an inexhaustible supply of inexpensive, clean energy. Dependence on energy imports, vulnerability to energy supply disruption, and issues of proliferation of nuclear material are cause for special concern. This paper addresses the geopolitical realities of and connections between energy and security, especially how the energy security issues that we face in the future differ from those we faced in the past.
Abstract in HTML and technical report in PDF available on the Massachusetts Institute of Technology Joint Program on the Science and Policy of Global Change website (http://mit.edu/globalchange/www/).
APA, Harvard, Vancouver, ISO, and other styles
21

Borzi, Eleonora, and Djiar Salim. "Energy Consumption and Security in Blockchain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285901.

Full text
Abstract:
Blockchain is a Distributed Ledger Technology that was popularized after the release of Bitcoin in 2009 as it was the first popular blockchain application. It is a technology for maintaining a digital and public ledger that is decentralized, which means that no single authority controls nor owns the public ledger. The ledger is formed by a chain of data structures, called blocks, that contain information. This ledger is shared publicly in a computer network where each node is called a peer. The problem that arises is how to make sure that every peer has the same ledger. This is solved with consensus mechanisms which are a set of rules that every peer must follow. Consensus mechanisms secure the ledger by ensuring that the majority of peers can reach agreement on the same ledger and that the malicious minority of peers cannot influence the majority agreement. There are many different consensus mechanisms. A problem with consensus mechanisms is that they have to make a trade-off between low energy consumption and high security. The purpose of this report is to explore and investigate the relationship between energy consumption and security in consensus mechanisms. The goal is to perform a comparative study of consensus mechanisms from an energy consumption and security perspective. The consensus mechanisms that are compared are Proof of Work, Proof of Stake and Delegated Proof of Stake. The methodology used is literature study and comparative study by using existing work and data from applications based on those consensus mechanisms. The results conclude that Proof of Work balances the trade-off by having high energy-consumption and high security, meanwhile Proof of Stake and Delegated Proof of Stake balance it by having low energy consumption but lower security level. In the analysis, a new factor arose, decentralization. The new insight in consensus mechanisms is that decentralization and security is threatened by an inevitable centralization where the ledger is controlled by few peers.
Blockchain är en så kallad distribuerad huvudbok teknologi som fick ett stort genombrott med den populära blockchain applikationen Bitcoin i 2009. Teknologin möjliggör upprätthållandet av en digital och offentlig huvudbok som är decentraliserad, vilket betyder att ingen ensam person eller organisation äger och kontrollerar den offentliga huvudboken. Huvudboken i blockchain är uppbyggt som en kedja av block, dessa block är datastrukturer som innehåller information. Huvudboken distribueras i ett nätverk av datorer som kallas för noder, dessa noder ägs av en eller flera personer. Problemet är att alla noderna i nätverket måste ha identiska huvudbok. Detta problem löses med en uppsättning av regler som noderna måste följa, denna uppsättning kallas för konsensus mekanism. Konsensus mekanismer säkrar huvudboken genom att möjliggöra en överenskommelse bland majoriteten av noderna om huvudbokens innehåll, och ser till att oärliga noder inte kan påverka majoritetens överenskommelse. Det finns flera olika konsensus mekanismer. Ett problem med konsensus mekanismer är att de är tvungna att göra en avvägning mellan låg energianvändning och hög säkerhet. Syftet med denna rapport är att undersöka och utreda relationen mellan energianvändning och säkerhet i konsensus mekanismer. Målet är att utföra en komparativ analys av konsensus mekanismer utifrån energianvändning och säkerhet. Konsensus mekanismerna som jämförs är Proof of Work, Proof of Stake och Delegated Proof of Stake. Metodologin som används är litteraturstudier och komparativ analys med hjälp av existerande metoder och data från applikationer som använder konsensus mekanismerna. Resultatet visar att Proof of Work väljer hög säkerhet på bekostnad av hög energianvändning, medan Proof of Stake och Delegated Proof of Stake väljer låg energianvändning men på bekostnad av lägre säkerhet. Analysen ger en ny inblick som visar att centralisering är en oundviklig faktor som hotar säkerheten.
APA, Harvard, Vancouver, ISO, and other styles
22

Winzer, Christian. "Defining, measuring and regulating energy security." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/265609.

Full text
Abstract:
Energy security is one of the three pillars of energy policy next to environmental sustainability and economic efficiency. Despite its importance for policy making, there is no agreement about the definition of energy security and the metrics that could be used to measure the efficiency of different policies. As a result of this, it may be that both a political intervention in one direction and an intervention in the opposite direction could be justified on grounds of energy security. In our thesis we review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. In order to reduce the overlap between security of supply and other policy objectives we propose the definition of energy security as the continuity of energy supplies relative to demand. The choice of the conceptual boundaries along the other dimensions remains a subjective decision that has to be taken by policy makers in a dialogue with society. Based on the definition of energy security as the continuity of supplies relative to demand, we examine how accurately different modelling approaches and metrics capture this concept. We find most of the wide-spread indicators, such as import shares, concentration measures and composite indicators based on expert elicitation are very rough heuristics that can easily be shown to produce inaccurate results. Simple modelling approaches such as analysis based on portfolio theory, or electricity system simulations offer some improvement, but still suffer from structural shortcomings and limitations in the way they model interdependencies. In this thesis we suggest a modelling approach which allows us to capture the interdependencies between natural, technical and human risk sources and quantify their combined impact on the continuity of energy supplies within a fixed infrastructure system. We use a case study of Italy to compare the outputs of our model with alternative metrics and simplified modelling approaches. Finally, we investigate the degree and the cost at which regulatory interventions in the form of so-called capacity mechanisms may increase the continuity of supplies in the electricity market. In contrast to previous research we find that the choice of a capacity mechanism may both be influenced by the extent to which it should be robust towards different regulatory errors as well as by the question whether it is evaluated from the perspective of consumer cost or from a welfare perspective.
APA, Harvard, Vancouver, ISO, and other styles
23

Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.

Full text
Abstract:
IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. To keep data reliable, various   security aspects have to be considered. Constrained devices are limited by   memory size and battery life, a security solution has to be developed with   this in mind. In this study an IoT security solution was developed in collaboration   with a research group in environmental science at Umeå University. We   selected commonly used algorithms and compared them with the goal to provide   authentication and integrity for an IoT application, while minimizing energy   use running on an Atmega 1284P. The results showed that the encryption   algorithm AES-256-GCM is a good choice for a total security solution.   AES-256-GCM provides authenticated encryption with additional data while, in   relation to the other tested algorithms, using energy at a low level and   leaving a small program size footprint.
APA, Harvard, Vancouver, ISO, and other styles
24

Золотова, Світлана Григорівна, Светлана Григорьевна Золотова, Svitlana Hryhorivna Zolotova, and D. S. Volovik. "Energy management." Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/18382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Camilleri, James. "India's energy security : understanding its strategic condition." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=186862.

Full text
Abstract:
This thesis considers India's pursuit of energy security. Defining energy security within traditional parameters of supply, delivery, diversification of fuels and suppliers, and affordable prices; the work considers India's energy security condition by surveying the core energy sectors including coal, oil and gas, hydroelectricity, nuclear power and renewables. India's pursuit of energy security is then disaggregated into domestic and international arenas and both are analysed in turn. Considerable attention is paid to the international dimension where India's quest to acquire energy resources is contextualised within bilateral relations with specific countries. What the proceeding analysis makes clear is that the international arena offers considerable opportunities, but also constraints on, the realisation of greater energy security. Chapter one analyses global trends in the main energy sectors of coal, oil, natural gas, hydroelectricity, nuclear power and renewables. Historically, the fortunes of the global energy sectors have mirrored trends in the global economy. Since 2008, most of the world's major industrialised economies have experienced negative or greatly reduced levels of growth. This is primarily due to the proliferation of vast quantities of debt that have capsized several financial institutions and are adversely affecting the liquidity and solvency of many developed governments. The global energy sectors have also been deeply affected by the economic downturn with access to funds for the development of new infrastructure squeezed. The recent poor economic growth of these countries has further accentuated the downward trend they have experienced in energy consumption. Nevertheless, many parts of the developing world, including India, have only been marginally affected by the global economic downturn and continue to develop rapidly. Consequentially most of the growth in demand for energy is coming from developing countries, particularly India. Although there are slight variations depending on sector, this dual trend of stagnation in the developed world and rapid growth in the developing is one ofthe recurring themes in the global energy markets. It is within this context that the second chapter considers India's energy security condition. Detailed analysis of the coal, oil, gas, hydroelectric and renewable sectors demonstrate succinctly that India is experiencing considerable growing pains. While several challenges are unique to each sector the chapter also identifies several systemic problems, including insufficient supply, rampant demand, a tendency to import.
APA, Harvard, Vancouver, ISO, and other styles
26

Björck, Fredrik. "Discovering information security management /." Stockholm : Department of Computer and Systems Sciences, Stockholm University, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Boinapally, Kashyap. "Security Certificate Renewal Management." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18453.

Full text
Abstract:
Context. An SSL encrypted client-server communication is necessary to maintain the security and privacy of the communication. For an SSL encryption to work, there should be a security certificate which has a certain expiry period. Periodic renewal of the certificate after its expiry is a waste of time and an effort on part of the company. Objectives. In this study, a new system has been developed and implemented, which sends a certificate during prior communication and does not wait for the certificate to expire. Automating the process to a certain extent was done to not compromise the security of the system and to speed up the process and reduce the downtime. Methods. Experiments have been conducted to test the new system and compare it to the old system. The experiments were conducted to analyze the packets and the downtime occurring from certificate renewal. Results. The results of the experiments show that there is a significant reduction in downtime. This was achieved due to the implementation of the new system and semi-automation Conclusions. The system has been implemented, and it greatly reduces the downtime occurring due to the expiry of the security certificates. Semi-Automation has been done to not hamper the security and make the system robust.
APA, Harvard, Vancouver, ISO, and other styles
28

Melin, Erik. "Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making." Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353430.

Full text
Abstract:
In order to cope with the changing climate, there will be a need for mitigating transformations of a scope, speed and magnitude that are unprecedented in human history, but the consensus- and market-driven approach is inhibiting this transformation. This thesis reviews how various discourses and debates on energy policy within Swedish governments have changed between 1974 and 2017, through the lenses of energy security and depoliticisation, and how a better understanding of these debates and discourses may inform the impending large-scale transformation required to meet the challenge of climate change. Some of the main findings are that (1) nuclear power and the result of the nuclear power referendum have been decisive for energy policy, and that nuclear power will remain of vital importance in the twenty-first century. (2) Energy has become increasingly depoliticised since the 1980s, ensuing the referendum on nuclear power. (3) The discourse on energy security has shifted towards market-based solutions: in the 2000s, climate change is to be mitigated through consumer- oriented solutions such as green certificates. Through privatisation, it essentially has become up to the consumer, deciding whether to participate in mitigation of climate change.
APA, Harvard, Vancouver, ISO, and other styles
29

Strydom, John. "Energy and security : the role of renewable energy in South Africa." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52327.

Full text
Abstract:
Conceptualising energy security is of the upmost importance when considering any definition of energy security applicable to a country or geographical context. This conceptualisation leads to the definition and allocation of applicable influencing elements, that ultimately underpin this definition, but more importantly lead to policy and the associated legislation formulation. A major contributing factor to energy security for any country is the understanding of the relationship between economic growth and energy consumption. There are various phases (Growth, Conservation, Neutral and Feedback hypothesis) of this relationship and each is represented by a different causal direction. This relationship forms a critical factor to consider when conceptualising energy security. A Second critical factor underpinning energy security is the selection of the appropriate electricity generation mix. Currently South Africa is dominated by coal as energy source, with nuclear, gas, diesel and recently renewable sources that contribute electricity to the national grid. Much of the worlds, including South Africa, generation fleet is reaching end of life and is standing at a pivotal point having to decide on the appropriate energy mix that allows transitioning to an environmentally friendly generation fleet. This research set out to review the South African energy policies to ascertain whether the encapsulated elements are still valid and current, to review the historical 3 :2 economic growth and energy consumption relationship utilised in the Integrated Resource Plan 2010 formulation to determine its validity and ultimately to explore the possibility of a 100% renewable energy generation profile for South Africa. A case study methodology was employed, where interviews with industry experts were analysed and validity of emerging themes plaid with the introduction of secondary data. The research has found that i) the current definition of energy security, as stipulated in the South Africa Energy Master Plan (2007), is out of date and needs revision, ii) the historical 3 :2 economic growth and energy consumption relationship is out of date and it is recommended that a bottom up sectoral analysis be done to determine the current relationship and iii) the a 100% renewable energy generation profile for South Africa is not currently feasible until such time as electricity storage becomes an economical viable option.
Mini-disseration (MBA)--University of Pretoria, 2015.
nk2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
30

Fuentes, Ruiz Sergio. "Energy security in power systems within the frame of energy transitions." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672889.

Full text
Abstract:
Climate change is real. Global human population is growing as never before. Natural resources are limited. These factors have taken different countries to embrace new pathways in order to fulfill the energy needs of their population, understanding that energy is a fundamental instrument for achieving sustainable development. Since each economy decides, according to its needs, possibilities and interests, its own shift of energy production and consumption, this tendency has received the name of energy transitions. Energy transitions, through digitalization, decentralization and decarbonization of the energy system, have placed the power sector as the center of modern infrastructures, making it imperative to procure its security in the long-term. This thesis is focused on the security of electrical systems, for which, after performing a thorough review on energy policies of different economies, it presents a multi-dimensional index as a tool for policy makers aimed to assess long-term security of power systems. The composed index is subsequently applied to different nations from two different approaches: the tracking of a country’s development and the evaluation, comparison and ranking of different economies in a specific time frame. The designed tool represents a comprehensive framework for assessing -and improving- energy security in power systems, being this precisely the main contribution of the present thesis: the development and proposal of an instrument that contributes, through the betterment of energy systems by making them more secure, to achieve sustainable development.
El cambio climático es real. La población humana global está creciendo como nunca antes. Los recursos naturales son limitados. Estos factores han llevado a los distintos países a adoptar distintas rutas encaminadas a satisfacer las necesidades energéticas de su población, entendiendo a la energía como un instrumento fundamental para alcanzar el desarrollo sostenible. Debido a que cada economía decide, de acuerdo a sus necesidades, posibilidades e intereses, su propio cambio en producción y consumo de energía, esta tendencia ha recibido el nombre de transiciones energéticas. Estas, a través de la digitalización, descentralización y descarbonización del sistema energético, han colocado al sistema eléctrico como el centro de las infraestructuras modernas, haciendo imperativo el procurar su seguridad en el largo plazo. La presente tesis está enfocada en la seguridad de los sistemas eléctricos, para lo que, luego de una exhaustiva revisión de políticas energéticas de distintas economías, se presenta un índice multidimensional como herramienta para los encargados de la elaboración de políticas orientadas a procurar la seguridad de los sistemas eléctricos. El índice compuesto es posteriormente aplicado a diferentes naciones desde dos perspectivas distintas: el seguimiento temporal del desarrollo de un país y la evaluación, comparación y jerarquización de diferentes economías en un tiempo específico. La herramienta diseñada representa un marco integral para la evaluación y mejoramiento de la seguridad energética de los sistemas eléctricos, siento precisamente esta la mayor contribución de la presente tesis: el desarrollo y propuesta de un instrumento que contribuya, a través del mejoramiento de los sistemas energéticos, haciéndolos más seguros, a alcanzar el desarrollo sostenible.
Enginyeria elèctrica
APA, Harvard, Vancouver, ISO, and other styles
31

Yang, Fan, and Dongcan Wang. "Challenges and countermeasures of China's energy security." Thesis, Högskolan i Gävle, Avdelningen för bygg- energi- och miljöteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-20547.

Full text
Abstract:
To ensure energy security, the first to know what is energy, and second, what are the factors of non-security, means that the challenge of energy security. Finally, puts forward some policy or in the case of a reasonable method to solve it according to these problems. At present, energy security is facing two challenges of structural crisis and crisis management system. Concretely, main problems in that security are analyzed, which are considered to affect China and mostly embody in such four big areas as the great pressure in energy supply, the scarcity of relative energy resources, foreign oil dependence is too large, crisis management systems of energy security, the shortage of green energy. Furthermore the counter measures concerned are proposed, including saving energy and increasing the energy utilization rate, to establish strategic energy reserves, strengthening environmental protection and adjusting the primary energy structure. China's rapid economic growth lead to sharp increase in oil imports. Due to China relies on a single chokepoint, the Malacca Strait, which has caused a high degree of concern about the safety of its energy. Nearly three-quarters of its oil imports flowing through the Strait. In view of its strategic importance to China and China’s little sway on the waterway, this view is mainly focused on China’s energy demand and supply in two aspects of concern. The paper analysis of whether the current energy structure is appropriate and sustainable. Because the energy security is facing China's energy is more and more dependent on imported fuel and the need to convert energy to meet the demand of modern society and the rapid growth of the requirements of the economic challenges. Concludes that the China's new policy should focus on energy efficiency, energy saving, renewable energy and turned to the main energy source of natural gas.
APA, Harvard, Vancouver, ISO, and other styles
32

Elgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.

Full text
Abstract:
L’utilisation des réseaux de capteurs offre de nouvelles perspectives dans de nombreux domaines (médecine, militaire, etc.). Les données récoltées par ces capteurs circulent en clair sur les réseaux de capteurs et peuvent être interceptées par un espion. Selon le domaine d’utilisation, le niveau de sécurité souhaité peut être élevé, ce qui peut provoquer une hausse de la consommation d’énergie sur les nœuds. Ces deux contraintes, sécurité et énergie, sont difficilement conciliables. Il y a donc un compromis à trouver entre l’économie d’énergie qui va conditionner la durée de vie du réseau, et le niveau de sécurité souhaité par l’application. L’objectif de cette thèse est d’étudier les compromis à trouver entre ces deux contraintes, à la fois d’un point de vue théorique et d’un point de vue pratique (par une implémentation des algorithmes et des tests réels sur des réseaux de capteurs par choisissant les algorithmes DES et AES). L’algorithme de cryptographie symétrique DES a ´ et ´e choisi comme objet d’étude. Les résultats obtenus sur la plateforme académique Senslab ont permis de déterminer une relation précise entre la consommation d’énergie et le nombre de rondes de DES et donc le niveau de sécurité. Ces expériences ont été renouvelées avec l’algorithme AES, plus récent et plus sûr, mais aussi plus consommateur en énergie. Puis, à partir des résultats obtenus, un modèle générique de consommation pour les algorithmes cryptographiques a été construit pour un réseau complet. L’utilisation complémentaire de la compression des données a permis de réduire cet impact de manière intéressante. Enfin, l’utilisation de la mémoire et l’évaluation du temps de chiffrement et de compression ont été évalué de manière à rester dans des fourchettes réalistes d’utilisation réaliste
Wireless sensor networks give us opportunities to improve many applications in many fields(medicine, military, etc.). The data collected by sensor node flies as plain text on sensor networkand can be intercepted by a spy. Depending on the importance of data, the wanted level of securitycould be high which may impact the energy consumption of sensor nodes. These two constraints,security and energy are difficult to combine. There is a trade-off between energy savings that willdetermine the lifetime of the network and the level of security desired by the application.The objective of this thesis is to study the trade-off between these two constraints, both from atheoretical perspective and from a practical point of view (with an implementation of algorithms andreal tests on sensor networks). The DES symmetric cryptographic algorithm was chosen as a casestudy. The results obtained on the academic platform Senslab have shown a clear relationshipbetween energy consumption and the number of rounds of DES and therefore the level of security.These experiments were repeated with the AES algorithm, newer and safer, but also more energyconsumer.Then, from the results, a generic model of consumption for cryptographic algorithms has been builtfor a complete network. The complementary use of data compression has reduced this impact ofenergy consumption in an interesting way. Finally, the memory usage and the time of encryption andcompression were evaluated in order to stay within realistic ranges of use
APA, Harvard, Vancouver, ISO, and other styles
33

Sjöblom, Karl. "Energy Security Scenarios in the Baltic States." Thesis, KTH, Energiteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Dixon, David D. "Leveraging knowledge management tools to support security risk management in the Homeland Security." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10593.

Full text
Abstract:
CHDS State/Local
This thesis examines Knowledge Management (KM) initiatives at the Canadian Institutes of Health Research (CIHR), the United Kingdom (UK), and the National Aeronautics and Space Administration (NASA). The first goal was to identify existing KM approaches that would foster higher levels of knowledge sharing and collaboration among security risk management practitioners within Homeland Security (DHS) agencies to enhance risk-informed decision-making activities. Through the analysis of the three case studies, it was discovered that organizational culture, more than any particular KM process or enabling technology is responsible for moderating the level of knowledge sharing. The KM strategies, policies and implementation mechanisms explored in the three case studies are good models for DHS to consider in order to reduce agencies' uncertainty, aiding decision making and bolstering effectiveness. The Risk Knowledge Management System (RKMS) called for in the DHS Integrated Risk Management Directive will require similar implementation and support structures for DHS to overcome the cultural, process, security, and funding obstacles experienced by the United Kingdom, Canada, and NASA. By using these case studies as models and reflecting on their experiences, DHS will be better positioned to effectively implement and adopt proven KM policies on an agency-wide basis.
APA, Harvard, Vancouver, ISO, and other styles
35

Mohd, Amin Mohd Farid. "Energy planning and energy policy analysis for Malaysia." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Guta, Dawit [Verfasser]. "Bio–Based Energy, Rural livelihoods, and Energy Security in Ethiopia / Dawit Guta." Bonn : Universitäts- und Landesbibliothek Bonn, 2015. http://d-nb.info/1077269528/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Onder, Hulusi. "A Security Management System Design." Thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608515/index.pdf.

Full text
Abstract:
This thesis analyzes the difficulties of managing the security of an enterprise network. The problem that this thesis study deals with is the central management of a large number and variety of services that provide organization-wide network and information security. This study addresses two problem areas: how to better manage the security of a network, and how to explain the security issues to upper management better. The study proposes a Security Management System (SMS) to be used for network security management, monitoring and reporting purposes. The system is a custom made, central management solution, which combines the critical performance indicators of the security devices and presents the results via web pages.
APA, Harvard, Vancouver, ISO, and other styles
38

Eggert, Sandy. "Das aktuelle Stichwort : Security management." Universität Potsdam, 2008. http://opus.kobv.de/ubp/volltexte/2010/4446/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cheng, C. S. "Security management in ATM networks." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597574.

Full text
Abstract:
Authentication and key exchange protocol is vital to the operation of a secure control plane. An inefficiency in the CCITT X.509 protocol is identified and an improvement is proposed so that the extra protocol run is eliminated. This dissertation proposes that the open control model of devolving control from the network equipment offers greatest flexibility for the implementation of secure control functions. An instance of a open signalling based control architecture was outlined and a solution to the secure bootstrap process in such a distributed processing environment is presented. With this flexible and open control model, multiple secure control architectures are possible. This dissertation presents two control architectures which offer secure multicast services and anonymous communication services. The proposed secure ATM multicast control architecture seamlessly integrates naming, dynamic membership, access control and routing architecture with security protection for multipoint-to-multipoint communications. A key element of the architecture is the trusted multicast authority framework which assists group creation control and network access control with the use of the Membership Card. The previously proposed user plane protection mechanisms is also extended to handle multicast channel confidentiality and integrity protection, group key management and dynamic group key change. Anonymous communication is a useful network service of great potential. This dissertation shows how anonymous ATM communication can be built on the infrastructure of the ATM Forum P-NNI framework.
APA, Harvard, Vancouver, ISO, and other styles
40

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized trust evaluation architecture (without a separate infrastructure) within a platoon, and a method to develop trust in the communication between the fellow platoon members with the help of a feedback system in place which is used to evaluate the trust of the platoon members and the platoon leader on the vehicle which joins the platoon newly. This trust model has been implemented in the case of VANET’s initially, for the purpose of group leader selection this model also includes the concept of direct and indirect trust among the vehicles. The results obtained show that the stability and the performance of the platoon drastically improve in the case of a decentralized mechanism, compared to a normal platoon with general characteristics. Keywords: Trust management, Feedback system, Platoon, Decentralized architecture, VANET, Trust model.
APA, Harvard, Vancouver, ISO, and other styles
41

Ergen, Gaye. "Eu Energy Security And The Middle East Oil." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609089/index.pdf.

Full text
Abstract:
This thesis aims to analyze oil as a security challenge for the European Union. The energy security policy is getting more and more important with the decrease of energy sources, which holds and shapes the balance of power in the world. Especially in the future, energy sources will be the key to political strategies. The European nations have created energy security policies in order to protect their benefits. The central argument of this thesis is that although the EU has attempted to create a common EU energy policy throughout its history, it could not escape from the impact of the national energy policy of the member states. The main focus is on the oil policy of the community. Thus, the aim of the thesis is to explore the policies created for oil security, especially in the Middle East, and why the EU could not implement these policies it created.
APA, Harvard, Vancouver, ISO, and other styles
42

Winterroth, Seth D. "U.S. Energy Security: Reducing Dependence on Foreign Oil." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/481.

Full text
Abstract:
U.S. energy security and the need for greater energy independence is one of the most important issues facing the United States today. Failure to address the U.S.’s energy dependence has undermined foreign policy, increased threats to national security, and created an inflexible hydrocarbon dependent economy. In 2010 the Energy Information Administration reported that U.S petroleum consumption had reached an average of 19.15 million barrels per day.[1] More importantly, 49 percent of daily consumption is imported and this creates an energy dependency that cannot be presently avoided. Dependence on foreign oil imports has resulted in America’s politics, economic vitality, environmental sustainability, and social culture being directly influenced by the countries that control our oil supply. [1] "Petroleum Statistics," Energy Information Administration, Updated July 2011
APA, Harvard, Vancouver, ISO, and other styles
43

Bindhammer, Anita. "EU Energy Security Europe's difficult relationship with Russia /." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06608145001/$FILE/06608145001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Thibeaux, Allen L. "Nuclear and solar energy implications for homeland security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FThibeaux.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Moran, Daniel ; Nussbaum, Daniel. "December 2008." Description based on title screen as viewed on February 17, 2009. Includes bibliographical references (p. 91-101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
45

Bechkit, Walid. "Security and energy saving in wireless sensor networks." Compiègne, 2012. http://www.theses.fr/2012COMP2045.

Full text
Abstract:
Les réseaux de capteurs sans fil (RCSF) présentent de nos jours des avantages indéniables dans plusieurs domaines. Compte tenu des champs d'application critiques d'une part et des limitations de ressources (énergie. Mémoire, etc. ) d'autre part, un compromis doit être trouvé entre la sécurité ct l'efficacité dans ces réseaux. C'est dans ce cadre que s'inscrit cette thèse qui s'attaque à ces deux volets majeurs des RCSF: la sécurité et l'efficacité énergétique. Dans le premier volet, nous nous sommes intéressés à la gestion de clés, une brique de base pour les autres services de sécurité. Nous avons proposé une nouvelle approche scalable de sécurité basée sur une théorie de la conception combinatoire dite "unital design". Notre solution offre une bonne couverture sécurisée des RCSF à grande échelle avec un faible coût de stockage. Nous avons aussi proposé une classe générique de gestion de clés qui améliore la résilience des schémas existants. Dans le deuxième volet qui traite la conservation d'énergie dans les RCSF, nous avons modélisé l'impact de la température sur les communications et proposé des solutions permettant d'économiser l'énergie en adaptant l'activité des émetteurs-récepteurs en fonction de la température. Nous avons, par ailleurs, proposé un protocole de routage efficace qui prend mieux en compte la nature concentrique des RCSF afin d'économiser l'énergie. Nous présentons enfin le projet AgroSens (Picardie / FEDER) dans lequel nous avons conçu et dévelopé une plateforme de RCSF pour l'agriculture. Nous discutons les différentes étapes du projet ainsi que l'implémentation de notre architecture et les fonctionnalités du prototype que nous avons mis en place
Wireless sensor networks (WSN) arc set to become one of the technologies which invade our everyday life. These networks suffer from several constraints mainly related to the resource limitations (energy, memory, etc. ) and to the harsh deployment environment. These limitations, coupled with the required security levels and network autonomy, create a clash between two key design issues : security and efficiency. Ln this thesis, we tackle these two design objectives and propose secure and energy saving solutions for smooth operation of WSN. We focus in the first part on key management which lays the foundation of security in WSN. We develop a new scalable key management scheme which makes use of unital design theory. Our scheme provides a good secure coverage of large scale networks with a low key storage overhead. We also address the problem of network resiliency through a generic class of hash-chain based key management schemes. Ln the second part, we address the energy saving challenging issue. We model the impact of the temperature on the radio communications in WSN and we propose new fully distributed temperature-aware connectivity-driven algorithms for energy saving in WSN. Furthermore, we address the energy aware routing and we propose a new weighted shortest path tree for convergecast traffic routing in WSN. We finally present AgroSens project funded by the ERDF and the Picardy regional council. Ln this project, we design and develop a WSN system for agriculture in Picardy. We present in this thesis the main project phases and we discuss the implementation of our architecture and communication protocols. We also present the main features of the testbed that we set up
APA, Harvard, Vancouver, ISO, and other styles
46

Gutta, Ramamohan. "Managing Security Objectives for Effective Organizational Performance Information Security Management." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7147.

Full text
Abstract:
Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. The sample was made up of 12 information security practitioners, information security experts, and managers responsible for the enterprise information security management. Participants were from Fortune 500 companies in the United States. Selection was based on their level of experience and knowledge of the topic being studied. Data were collected using a 3 round Delphi study of 12 experts in information security and risk management. Statistical analysis was performed on the collected data during a 3 round Delphi study. The mean, standard deviation, majority agreement, and ranges were used to determine the final concensus for this research study. Findings of this study included the need for managerial support, risk management strategies, and developling the managerial and technical talent to mitigate and respond to cyberattacks. Findings may result in a positive social change by providing information that helps managers to reduce the number of data breaches from cyberattacks, which benefits companies, employees, and customers.
APA, Harvard, Vancouver, ISO, and other styles
47

Cauchi, Savona Silvano. "Energy absorbing composites for crash energy management." Thesis, Queen Mary, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.409297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Литвиненко, Олексій Семенович, Алексей Семеновмч Литвиненко, Oleksii Semenovych Lytvynenko, and N. Bunkovska. "Energy management as constituent of energy saving." Thesis, Видавництво СумДУ, 2006. http://essuir.sumdu.edu.ua/handle/123456789/8503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chisom, Christopher M., and Jack C. II Templenton. "Analysis of Marine Corps renewable energy planning to meet installation energy security requirements." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/38899.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The purpose of this thesis is to analyze Marine Corps installation energy consumption and the pursuit of increased renewable energy generation goals across Marine Corps installations. The main objective of this report is to determine the cost of interruption and the net present value (NPV) of renewable energy generation needed to meet the Marine Corps energy security objectives. First, we determine installation-specific energy consumption, resource requirements, and current renewable energy generation projects. Second, we analyze current Marine Corps installation energy portfolios to determine shortfalls from minimum energy targets and the cost to generate those shortfalls through renewable energy technologies. Finally, we identify installation energy security requirements, determine cost of interruption, and conduct a sensitivity analysis of the cost-benefit of renewable energy generation alternatives to meet energy security requirements. This study determines how investment in renewable energy to meet baseline energy consumption requirements increases energy security across Marine Corps installations. Furthermore, considering the cost of interruption, the investment in renewable energy technologies yields a positive NPV at the majority of Marine Corps installations. Based on this research, we recommend that the Marine Corps develops a quantitative method for assessing energy security and invest to meet energy security goals at each installation.
APA, Harvard, Vancouver, ISO, and other styles
50

Guta, Dawit Diriba [Verfasser]. "Bio-Based Energy, Rural Livelihoods and Energy Security in Ethiopia / Dawit Diriba Guta." Frankfurt : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2015. http://d-nb.info/1080461035/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography