27 resultados para Network Architectures and Security
em University of Queensland eSpace - Australia
Resumo:
An increased incidence of attack has been identified as a major characteristic of the new threat posed by terrorist groups such as al Qaeda. This article considers what such a change means for Western national security systems by examining bow different parts of the system change over time. It becomes evident that Western national security systems are structured on an assumption of comparatively slow state-based threats. In contrast, terrorist franchises operate at a faster pace, are more 'lightweight' and can adapt within the operational and capability cycles of Western governments. Neither network-centric warfare nor an improved assessment of the threat, called for by some, offers a panacea in this regard. Rather, it is clear that not only do Western governments need to adjust their operational and capability cycles, but that they also need a greater diversity of responses to increase overall national security resilience and offer more tools for policy-makers.
Resumo:
Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.
Resumo:
The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.
Resumo:
Topological measures of large-scale complex networks are applied to a specific artificial regulatory network model created through a whole genome duplication and divergence mechanism. This class of networks share topological features with natural transcriptional regulatory networks. Specifically, these networks display scale-free and small-world topology and possess subgraph distributions similar to those of natural networks. Thus, the topologies inherent in natural networks may be in part due to their method of creation rather than being exclusively shaped by subsequent evolution under selection. The evolvability of the dynamics of these networks is also examined by evolving networks in simulation to obtain three simple types of output dynamics. The networks obtained from this process show a wide variety of topologies and numbers of genes indicating that it is relatively easy to evolve these classes of dynamics in this model. (c) 2006 Elsevier Ireland Ltd. All rights reserved.