7 resultados para Anonymous letters.
em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain
Resumo:
Aquest treball pretén esbrinar fins a quin punt se segueixen els criteris teòrics establerts pels autors catalans del Renaixement en la literatura catalana de ficció del segle XVI. Per examinar l'adequació als models proposats pels humanistes he triat una obra anònima de caràcter paròdic escrita en forma d'epístoles entre dos llauradors de l'Horta de València, Les estil·lades y amoroses lletres trameses per Berthomeu Sirlot a la sua senyora, y per ella a ell. El procediment de treball consistirà a analitzar com els teòrics del Renaixement de l'àrea catalanoparlant van interpretar i assimilar en la seva obra alguns dels conceptes més importants de les poètiques i les retòriques dels clàssics grecs i llatins (els principis d'imitació, decòrum, harmonia i ordre), en aquest cas Aristòtil i Horaci, i si l'autor anònim de Les estil·lades y amoroses lletres els va tenir en compte a l'hora de compondre la seva obra. A la vegada, en tractar-se d'una paròdia satírica amb clara voluntat humorística, aquesta anàlisi també pot donar compte de quina opinió tenien els intel·lectuals catalans del Renaixement sobre la ficció i l'humor.
Resumo:
One of the major problems when using non-dedicated volunteer resources in adistributed network is the high volatility of these hosts since they can go offlineor become unavailable at any time without control. Furthermore, the use ofvolunteer resources implies some security issues due to the fact that they aregenerally anonymous entities which we know nothing about. So, how to trustin someone we do not know?.Over the last years an important number of reputation-based trust solutionshave been designed to evaluate the participants' behavior in a system.However, most of these solutions are addressed to P2P and ad-hoc mobilenetworks that may not fit well with other kinds of distributed systems thatcould take advantage of volunteer resources as recent cloud computinginfrastructures.In this paper we propose a first approach to design an anonymous reputationmechanism for CoDeS [1], a middleware for building fogs where deployingservices using volunteer resources. The participants are reputation clients(RC), a reputation authority (RA) and a certification authority (CA). Users needa valid public key certificate from the CA to register to the RA and obtain thedata needed to participate into the system, as now an opaque identifier thatwe call here pseudonym and an initial reputation value that users provide toother users when interacting together. The mechanism prevents not only themanipulation of the provided reputation values but also any disclosure of theusers' identities to any other users or authorities so the anonymity isguaranteed.
Resumo:
The goal of this paper is to study the e¤ects of globalization on the workings of financial markets. We adopt a "technological" view of globalization, which consists of an exogenous reduction in the cost of shipping goods across di¤erent regions of the world. We model financial markets where agents anonymously trade securities issued by every other agent in the world. In the absence of frictions, we show how globalization creates trade opportunities among residents of different regions of the world, thereby raising welfare. In the presence of sovereign risk, however, there emerge two crucial interactions between trade among residents within a region and trade among residents of di¤erent regions. First, the more residents within a region trade with each other, the more they can trade with residents of other regions. Second, the possibility of trade with residents of other regions sometimes leads a government to not enforce payments by its residents, destroying trade opportunities among residents within the region. The net effect on welfare of this process of creation and destruction of trade opportunities is ambiguous. We argue that there are no policies governments can take to avoid the negative effects of globalization on trade among domestic residents. In a dynamic extension, we analyze how our results are a¤ected by reputational considerations.
Resumo:
Peer-reviewed
Resumo:
Spectrum is an essential resource for the provision of mobile services. In order to control and delimit its use, governmental agencies set up regulatory policies. Unfortunately, such policies have led to a deficiency of spectrum as only few frequency bands are left unlicensed, and these are used for the majority of new emerging wireless applications. One promising way to alleviate the spectrum shortage problem is adopting a spectrum sharing paradigm in which frequency bands are used opportunistically. Cognitive radio is the key technology to enable this shift of paradigm.Cognitive radio networks are self-organized systems in which devices cooperate to use those spectrum ranges that are not occupied by licensed users. They carry out spectrum sensing in order to detect vacant channels that can be used for communication. Even though spectrum sensing is an active area of research, an important issue remains unsolved: the secure authentication of sensing reports. Not providing security enables the input of false data in the system thus empowering false results. This paper presents a distributed protocol based on wireless physical layer security, symmetric cryptography and one-way functions that allows determining a final sensing decision from multiple sources in a quick and secure way, as well as it preserves users¿ privacy.
Resumo:
JXTA is a peer-to-peer (P2P) middleware whichhas undergone successive iterations through its 10 years of history, slowly incorporating a security baseline that may cater to different applications and services. However, in order to appeal to a broader set of secure scenarios, it would be interesting to take into consideration more advanced capabilities, such as anonymity.There are several proposals on anonymous protocols that can be applied in the context of a P2P network, but it is necessary to be able to choose the right one given each application¿s needs. In this paper, we provide an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message. Webase our analysis on two scenarios, with stable and non-stable peers, and three metrics: round trip-time (RTT), node processing time and reliability.
Resumo:
Peer-reviewed