244 resultados para Security international -- Islamic countries


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As the end of the Cold War approached in 1989, Caroline Thomas argued: “It is important that the discipline [International Relations, IR] should address the issue of disease and more broadly, health, not simply to facilitate containment of disease transmission across international borders but also because central notions of justice, equity, efficiency and order are involved” (1989:273).1 Ten years later, Craig Murphy echoed these sentiments. Murphy (2001: 352) proposed that IR had yet to grapple with the political consequences of growing inequality between the world’s rich and poor, and areas such as health—where these inequalities were most stark—should become the field’s core business. How IR’s theories and methods would approach these issues was less clear. Bettcher and Yach (1998) cautioned that IR would be unable to develop progressive research projects that explored global health diplomacy as a global public good without adopting new perspectives and methods. Others warned that the expansion of security studies into areas such as global health would weaken the intellectual coherency of the field (Walt 1991:213). Taking its cue from the recent Ng and Prah Ruger (2011) study, this paper returns to these concerns to briefly explore key trends and potential future concerns of research in IR on health...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In his sweeping survey of the Australian study of international relations, Martin Indyk1 claimed that ‘a common set of assumptions tends to underpin the work of almost all Australian scholars in the discipline’. If that assertion could have been plausibly extended to the whole region one generation ago, it certainly cannot now. The International Relations scholarship emanating from the Oceanic region regales in a diversity of theoretical, methodological and ethical assumptions. This diversity certainly emerged before the first Oceanic Conference on International Studies (OCIS) was convened in Canberra in 2004, however, subsequent conferences in Melbourne (2006) and Brisbane (2008) have galvanised and enriched that diversity. The state of the discipline in the region is as strong and healthy now as it has ever been, as is its integration into the global discipline, something we believe is reflected in the contributions collected in this Special Issue of Global Change, Peace and Security....

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents two approaches that have dominated International Relations in their approach to the international politics of health. The statist approach, which is primarily security-focused, seeks to link health initiatives to a foreign or defence policy remit. The globalist approach, in contrast, seeks to advance health not because of its intrinsic security value but because it advances the well-being and rights of individuals. This article charts the evolution of these approaches and demonstrates why both have the potential to shape our understanding of the evolving global health agenda. It examines how the statist and globalist perspectives have helped shape contemporary initiatives in global health governance and suggests that there is evidence of an emerging convergence between the two perspectives. This convergence is particularly clear in the articulation of a number of UN initiatives in this area—especially the One World, One Health Strategic Framework and the Oslo Ministerial Declaration (2007) which inspired the first UN General Assembly resolution on global health and foreign policy in 2009 and the UN Secretary-General's note ‘Global health and foreign policy: strategic opportunities and challenges'. What remains to be seen is whether this convergence will deliver on securing states’ interest long enough to promote the interests of the individuals who require global efforts to deliver local health improvements.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

International Relations’ engagement with global health governance has proliferated in the last decade. There are a number of excellent works that seek to understand how the relationship between politics and health shapes and informs people’s lives and governments’ policies. However, the overt securitization of health by the IR field has, Biosecurity interventions argues, remained relatively unproblematized...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Association of South East Asian Nations (ASEAN) Secretariat and its member states have repeatedly professed their commitment to the protection and advancement of women’s economic and human rights. Such commitments have included the Declaration on the Advancement of Women in ASEAN in 1988, the ASEAN Declaration on the Elimination of Violence Against Women in 2004, and the ASEAN Declaration of Human Rights in 2012, as well as the establishment of the ASEAN Committee on Women in 2002 and the ASEAN Commission on the Promotion and Protection of Women and Children in 2009. However, none of these regional commitments or institutions expressly take up the core concern of the Women, Peace and Security (WPS) agenda set out in United Nations Security Council (UNSC) Resolution 1325 in 2000. ASEAN has no 1325 regional action plan and amongst the ASEAN membership, the Philippines is the only state that has adopted a 1325 National Action Plan (NAP). We explore the possible reasons for lack of ASEAN institutional engagement with 1325, outline the case for regional engagement, and suggest specific roles for ASEAN Secretariat, donor governments and individual member states to commit to UNSCR 1325 as a regional priority.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The terrorist attacks of 11 September 2001 marked a turning point in international politics, representing a new type of threat that could not easily be anticipated or prevented through state-based structures of security alone. Opening up interdisciplinary conversations between strategic, economic, ethical and legal approaches to global terrorism, this edited book recognises a fundamental issue: while major crises initially tend to reinforce old thinking and behavioural patterns, they also allow societies to challenge and overcome entrenched habits, thereby creating the foundations for a new and perhaps more peaceful future. This volume addresses the issues that are at stake in this dual process of political closure, and therefore rethinks how states can respond to terrorist threats. The contributors range from leading conceptual theorists to policy-oriented analysts, from senior academics to junior researchers. The book explores how terrorism has had a profound impact on how security is being understood and implemented, and uses a range of hitherto neglected sources of insight, such as those between political, economic, legal and ethical factors, to examine the nature and meaning of security in a rapidly changing world.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pandemics are for the most part disease outbreaks that become widespread as a result of the spread of human-to-human infection. Beyond the debilitating, sometimes fatal, consequences for those directly affected, pandemics have a range of negative social, economic and political consequences. These tend to be greater where the pandemic is a novel pathogen, has a high mortality and/or hospitalization rate and is easily spread. According to Lee Jong-wook, former Director-General of the World Health Organization (WHO), pandemics do not respect international borders. Therefore, they have the potential to weaken many societies, political systems and economies simultaneously.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security and privacy in the healthcare domain is a complex and challenging problem for computer scientists, social scientists, law experts and policy makers. Appropriate healthcare provision requires specialized knowledge, is information intensive and much patient information is of a particularly sensitive nature. Electronic health record systems provide opportunities for information sharing which may enhance healthcare services, for both individuals and populations. However, appropriate information management measures are essential for privacy preservation...

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper tested the effects of the 2005 vehicle emission-control law issued in Japan on the market linkages between the U.S. and Japanese palladium futures markets, To determine these effects, we applied a cointegration test both with and without break points in the time series and found that the market linkages between the two countries changed after the break in October 2005. Our results show that the 2005 long-term regulation of vehicle emissions enacted in Japan influenced the international palladium futures market.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The international shipping sector is a major contributor to global greenhouse gas (GHG) emissions. The International Maritime Organisation (IMO) has adopted some technical and operational measures to reduce GHG emissions from international shipping. However, these measures may not be enough to reduce the amount of GHG emissions from international shipping to an acceptable level. Therefore, the IMO Member States are currently considering a number of proposals for the introduction of market-based measures (MBMs). During the negotiation process, some leading developing countries raised questions about the probable confl ict of the proposed MBMs with the rules of the World Trade Organisation (WTO). This article comprehensively examines this issue and argues that none of the MBM proposals currently under consideration by the IMO has any confl ict with the WTO rules.