6 resultados para security architecture
em CentAUR: Central Archive University of Reading - UK
Resumo:
This chapter examines the importance of legitimacy for international organizations, and their efforts to legitimate themselves vis-à-vis different audiences. Legitimacy, which for decades barely featured in the scholarly analysis of international organizations, has since the late 1990s been an increasingly important lens through which the processes, practices, and structures of international organizations have been examined. The chapter makes three main arguments. First, it argues that in most international organizations the most important actors engaging in legitimation efforts are not the supranational bureaucracies, but member states. This has important implications for our understanding of the purposes of seeking legitimacy, and for the possible practices. Second, legitimacy and legitimation serve a range of purposes for these states, beyond achieving greater compliance with their decisions, which has been one of the key functional logics highlighted for legitimacy in the literature. Instead, legitimacy is frequently sought to exclude outsiders from the functional or territorial domains affected by an international organization’s authority, or to maintain external material and political support for existing arrangements. Third, one of the most prominent legitimation efforts, institutional reforms, often prioritizes form over function, signalling to important and powerful audiences to encourage their continued material and political support. To advance these arguments, the chapter is divided into four sections. The first develops the concept of legitimacy and its application to international organizations, and then asks why their legitimacy has become such an important intellectual and political concern in recent years. The second part will look in more detail at the legitimation practices of international organizations, focusing on who engages in these practices, who the key audiences are, and how legitimation claims are advanced. The third section will look in more detail at one of the most common forms of legitimation – institutional reform – through the lens of two such reforms in international organizations: efforts towards greater interoperability in NATO, and the establishment of the African Peace and Security Architecture in the African Union (AU). The chapter will conclude with some reflections of the contribution that a legitimacy perspective has made to our understanding of the practices of international organizations.
Resumo:
This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.
Resumo:
Reflecting on the strategic commitment outlined in the Plan of Action for Gender Equality (2005-2015) and the priority issues of the Commonwealth Women’s Forum, this article assesses the extent to which the Commonwealth as an institution is supporting troop and police-contributing member states in addressing the gender imbalance in peacekeeping operations. Drawing on desk-based research, interviews with international policymakers and a statistical analysis of the International Peace Institute Peacekeeping Database, the article first outlines the Commonwealth’s gender and security policy perspective before examining data sets to determine the success of Commonwealth member states in integrating women into uniformed peacekeeping contingencies between 2009 and 2015. The article observes that, in spite of a renewed optimism and drive to propel women into leadership positions in politics, the judiciary, public bodies and private companies, security sector reform and the implementation of pillar one of the UN Security Council Resolution 1325, is notably absent from the Commonwealth’s gender agenda. It is argued that this policy gap suggests that national and international security architecture is regarded as an accepted domain of masculine privilege. A lack of political will among Commonwealth Heads of Government to mainstream gender equality and facilitate structural transformation of national security organs, and a chronically under resourced Commonwealth Secretariat limits the influence of the institution to that of arms-length promoter of international norms on women, peace and security.
Resumo:
Since the advent of the internet in every day life in the 1990s, the barriers to producing, distributing and consuming multimedia data such as videos, music, ebooks, etc. have steadily been lowered for most computer users so that almost everyone with internet access can join the online communities who both produce, consume and of course also share media artefacts. Along with this trend, the violation of personal data privacy and copyright has increased with illegal file sharing being rampant across many online communities particularly for certain music genres and amongst the younger age groups. This has had a devastating effect on the traditional media distribution market; in most cases leaving the distribution companies and the content owner with huge financial losses. To prove that a copyright violation has occurred one can deploy fingerprinting mechanisms to uniquely identify the property. However this is currently based on only uni-modal approaches. In this paper we describe some of the design challenges and architectural approaches to multi-modal fingerprinting currently being examined for evaluation studies within a PhD research programme on optimisation of multi-modal fingerprinting architectures. Accordingly we outline the available modalities that are being integrated through this research programme which aims to establish the optimal architecture for multi-modal media security protection over the internet as the online distribution environment for both legal and illegal distribution of media products.
Resumo:
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of innovative features in terms of real-time programmable embedded hardware (FPGA) deployment as well as in the integrated management station. These have been devised so as to deliver enhanced detection of attacks and contextualised alerts against threats that can arise from both the network layer and the application layer protocols. The resulting architecture represents an efficient and effective framework for the future deployment of network security systems.