29 resultados para Usable privacy and security
Resumo:
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.
Resumo:
Present book collects some of the thoughts developed during the 5 years (2004-2009) of work in the frame of the CHALLENGE project, "The Changing Landscape of European Liberty and Security". The project has related academic knowledge and research with the analysis of the policies and practices of the member States of the European Union [EU] around the couple liberty and security
Resumo:
JXTA is a mature set of open protocols, with morethan 10 years of history, that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Throughout its lifecycle, ithas slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message privacy and authentication. However, undersome contexts, more advanced security requirements should be met, such as anonymity. There are several methods to attain anonymity in generic P2P networks. In this paper, we proposehow to adapt a replicated message-based approach to JXTA, by taking advantage of its idiosyncracies and capabilities.
Resumo:
Proyecto de investigación realizado a partir de una estancia en The Center of Law and Security de la New York University, Estados Unidos, entre junio y diciembre del 2007. El fenómeno del terrorismo desde una perspectiva jurídico-penal es el tema de una futura tesis doctoral. Desde los atentados del 11 de septiembre de 2001, Estados Unidos ha encabezado la denominada guerra contra el terrorismo, en la que las libertades individuales han cedido todo su espacio a la seguridad, hasta ser legítimo el uso de la tortura. Se ha planteado si el terrorismo es una actividad delictiva a la que tiene que hacerse frente con los mecanismos característicos del Derecho penal; o, si, por el contrario, este fenómeno constituye una nueva modalidad de guerra contra la que tienen que utilizarse medidas más drásticas, como la invasión de países, la detención indefinida de los presos de guerra y la tortura. Concretamente, la cuestión de la tortura ha sido el segundo gran eje estudiado. Como es sabido, el Gobierno de los EEUU ha autorizado el uso de prácticas constitutivas de tortura para conseguir información, esgrimiendo una serie de argumentos que vulneran las convenciones internacionales que prohíben esta práctica. Se concluye que la lucha contra el terrorismo tienen que realizarse dentro del marco de los ordenamientos penales, es decir, que este fenómeno es una forma de delincuencia, pero no constituye una nueva modalidad de guerra. Por tanto, tienen que respetarse los límites del ius puniendi de un Estado democrático de Derecho a la hora de hacerle frente. La práctica de la tortura es plenamente ilegítima.
Resumo:
Aquest projecte mira de reflectir els coneixements adquirits en les assignatures pròpies de la carrera, com ara Fonaments de programació, Sistemes operatius i Ampliació de sistemes operatius, Xarxes, Estructura de xarxes de computadors i Seguretat en xarxes de computadors.
Resumo:
El sistema implementado utiliza las redes sociales para proteger la privacidad de los usuarios e impedir que los motores de búsqueda de Internet (WSE) elaboren un perfil de usuario. Sin embargo, los WSE serán capaces de elaborar un perfil distorsionado pero útil hasta un cierto nivel para poder proveer un servicio apropiado al usuario.
Resumo:
Un portal comunitari configurat de tal manera que asseguri el flux, la privadesa i confidencialitat de la informació. Les eines del portal no són res de nou: Fòrum públic i privat, gestió de fitxers, flux d'informació, calendari d'esdeveniments i configuracions de grups (i.g. Proveïdors de confiança); la novetat està en l'enfocament.
Resumo:
Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan.
Resumo:
Seminar proceedings about the Seminar “Companies in Confict Situations”, organized by ICIP, with the aim of reflecting on the causes, the dynamics and the consequences of the participation of companies in armed conflicts. Over thirty international experts will be participating in the conferences to analyze the role and responsibilities of companies in connection with the international arms market (especially regarding small arms, light weapons and conventional weapons), the provision of military and security services, and the exploitation of, and trade in, natural resources.
Resumo:
The representation of women in top corporate officer positions is steadily increasing. However, little is known about the impact this will have. A large literature documents that women are different from men in their choices and in their preferences, but most of this literature relies on samples of college students or workers at lower levels in the corporate hierarchy. If women must be like men to break the glass ceiling, we might expect gender differences to disappear among top executives. In contrast, using a large survey of all directors of publicly-traded corporations in Sweden, we show that female and male directors differ systematically in their core values and risk attitudes. While certain population gender differences disappear at the director level, others do not. Consistent with the findings for the Swedish population, female directors are more benevolent and universally concerned, but less power-oriented than men. However, they are less traditional and security-oriented than their male counterparts. Furthermore, female directors are slightly more risk-loving than male directors. This suggests that having a women on the board need not lead to more risk-averse decision-making.
Resumo:
Using an event-study methodology, this paper analyzes the aftermath of civil war in a cross-section of countries. It focuses on those experiences where the end of conflict marks the beginning of a relatively lasting peace. The paper considers 41 countries involved in internal wars in the period 1960-2003. In order to provide a comprehensive evaluation of the aftermath of war, the paper considers a host of social areas represented by basic indicators of economic performance, health and education, political development, demographic trends, and conflict and security issues. For each of these indicators, the paper first compares the post- and pre-war situations and then examines their dynamic trends during the post-conflict period. It conducts this analysis both in absolute and relative terms, the latter in relation to control groups of otherwise similar countries. The paper concludes that, even though war has devastating effects and its aftermath can be immensely difficult, when the end of war marks the beginning of lasting peace, recovery and improvement are indeed achieved.
Resumo:
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.
Resumo:
Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched.
Resumo:
Network neutrality is a growing policy controversy. Traffic management techniques affect not only high-speed, high-money content, but by extension all other content too. Internet regulators and users may tolerate much more discrimination in the interests of innovation. For instance, in the absence of regulatory oversight, ISPs could use Deep Packet Inspection (DPI) to block some content altogether, if they decide it is not to the benefit of ISPs, copyright holders, parents or the government. ISP blocking is currently widespread in controlling spam email, and in some countries in blocking sexually graphic illegal images. In 1999 this led to scrutiny of foreclosure of Instant Messaging and video and cable-telephony horizontal merger. Fourteen years later, there were in 2013 net neutrality laws implemented in Slovenia, the Netherlands, Chile and Finland, regulation in the United States and Canada , co-regulation in Norway, and self-regulation in Japan, the United Kingdom and many other European countries . Both Germany and France in mid-2013 debated new net neutrality legislation, and the European Commission announced on 11 September 2013 that it would aim to introduce legislation in early 2014. This paper analyses these legal developments, and in particular the difficulty in assessing reasonable traffic management and ‘specialized’ (i.e. unregulated) faster services in both EU and US law. It also assesses net neutrality law against the international legal norms for user privacy and freedom of expression