Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = FS-OpenSecurity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2320 KB  
Article
Digital Economy as a Buffer: Alleviating the Adverse Effects of Land Resource Mismatch on Food Security
by Wenjie Li, Guanyu Guo, Huangying Gu, Shuhao Lai, Yuanjie Duan and Chengming Li
Land 2024, 13(11), 1742; https://doi.org/10.3390/land13111742 - 24 Oct 2024
Cited by 1 | Viewed by 1531
Abstract
In the era of the digital economy (DE), technology factors and data factors, like a two-wheel drive, have not only redefined the mode of production but also innovatively reshaped production relations. To examine how the DE can ensure food security (FS) in China, [...] Read more.
In the era of the digital economy (DE), technology factors and data factors, like a two-wheel drive, have not only redefined the mode of production but also innovatively reshaped production relations. To examine how the DE can ensure food security (FS) in China, this study explores the negative impacts of land resource mismatch (LRM) on FS, the mechanisms of the impacts, and the critical role played by the DE in mitigating its negative impacts, based on China’s provincial-level panel data from 2011 to 2022. This study finds that, first, LRM leads to a reduction in food production, which, in turn, threatens FS, and this conclusion remains robust after a series of robustness tests. Second, the heterogeneity analysis finds that LRM has a greater negative impact on FS in regions with high urbanization levels, regions with a short tenure of officials, and regions that are not major food-producing regions. Finally, in a further analysis, the specific channels and solution paths of the negative impact of LRM on FS are explored in depth. LRM negatively affects the material base and production capacity of food production, including reducing the supply of land, labor, and capital factors for food production; the DE reduces the negative impact of LRM on FS through the use of digital technology and open government data. Full article
(This article belongs to the Special Issue Land Use Policy and Food Security)
Show Figures

Figure 1

26 pages, 2261 KB  
Article
FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing
by Yunsick Sung, Pradip Kumar Sharma, Erik Miranda Lopez and Jong Hyuk Park
Sustainability 2016, 8(9), 919; https://doi.org/10.3390/su8090919 - 9 Sep 2016
Cited by 36 | Viewed by 10743
Abstract
Software Defined Networking (SDN) has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT) infrastructure. For Future Sustainability [...] Read more.
Software Defined Networking (SDN) has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT) infrastructure. For Future Sustainability Computing (FSC), SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO) and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information. Full article
(This article belongs to the Special Issue Advanced IT based Future Sustainable Computing)
Show Figures

Figure 1

Back to TopTop