934 resultados para IT security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Jackson, Peter, 'France and the Problems of Security and Disarmament after the First World War', Journal of Strategic Studies (2006) 29(2) pp.247-280 Special Issue: Enforcing arms limits: Germany post 1919; Iraq post 1991 RAE2008

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Booth, Ken, and N. J. Wheeler, The Security Dilemma: Fear, Cooperation, and Trust in World Politics (Palgrave Macmillan, 2007), pp.xv+364 RAE2008

Relevância:

30.00% 30.00%

Publicador:

Resumo:

McInnes, C., Lee, K. (2006). Health, security and foreign policy. Review of International Studies, 32 (1), 5-23. RAE2008

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The paper reviews the provisions of the White Book on National Security of the Republic of Poland. It states that the issue of health security is not given adequate significance there. The accessibility of health services is considered, in general, solely in terms of their availability. The assumptions concerning the concept of providing the number of beds required in a state of threat to national security and in time of war do not take into account the current socio-economic conditions and need to be reviewed. The conclusions emphasize the dilemmas that emerge as a result of the unilateral promotion of a single category of national security, that is military security, in the context of ensuring health security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of a real-world malicious applet is given to demonstrate the efficacy of the approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The past two decades has seen a dramatic upheaval in the international world order: the end of the Cold War, the 9/11 attacks and the subsequent 'War on Terror', increased Jihadist activities, the accelerated pace of globalization, climate change and the 2008 global financial crisis have contributed to fear, uncertainty, poverty, conflict, massive displacements of populations of asylum seekers and refugees globally and a proliferation of Protracted Refugee Situations (PRS), defined as situations in which refugees have been in exile 'for 5 years or more after their initial displacement, without immediate prospects for implementation of durable solutions. In the past two decades there has been a huge proliferation of these with more than 7.2 million refugees now trapped in these PRS, with a further 16 million internally displaced persons (IDPs) trapped in camps within their own countries. The Dadaab refugee complex in Kenya, which of as March 2012, holds over 463,000 refugees, is the most significant and extreme example in recent times of a PRS. It was established in 1991 following the collapse of the Somali Government of Dictator Siad Barre, and the disintegration of Somalia into the chaos that still exists today. PRS such as Dadaab raise particular issues about humanitarianism in terms of aid, protection, security, human rights and the actions (or inaction) of the various stakeholders on an international, national and local level. This thesis investigates these issues by the use of a case study methodology on Dadaab as a PRS, framed in the context of humanitarianism and in particular the issues that arise in terms of how the international community, the UN system and individual states provide assistance and protection to vulnerable populations. Although the refugee camps have been in existence (as of 2012) for over 20 years, there has never been such a detailed study of Dadaab (or any other PRS) undertaken to date and would be of interest to academics in the areas of international relations, refugee/migration studies and global Governance as well as practitioners in both humanitarian response and development

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the struggle to assert and consolidate its power, the Hamas movement of the Palestinian territories has devised several strategies for control. In recognition that control of security remains a key goal for any power-seeker, following its election victory in January 2006, Hamas entered into a fierce and ultimately successful conflict with Fatah for control of the Palestinian Authority Ministry of Interior and Palestinian Security Forces (PSF) in the Gaza Strip. One way in which Hamas was able to achieve this objective was through the creation of its own internal ‘police’ force called the Tanfithya (Executive Force or EF). This article details an anatomy of the EF and the implications of this force in terms of Hamas' confrontation with opponents and its attempts at governance. It also examines the extent to which the EF can be considered to be a model of Islamic policing and its impact on secular rivals in the Gaza Strip.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The article suggests that while the report of the Independent Commission on Policing (ICP) provides a police reform blueprint for Northern Ireland and elsewhere, it can also be seen as an attempt to engage more elliptically with contemporary debates in security governance vis-a-vis the increasingly fragmented nature of late-modern policing and the role of the state. A decade into the reform process in Northern Ireland and in spite of the networked approach postulated by the ICP, the public police continue to enjoy a pre-eminent place and little evidence exists of any significant weakening of state steering and rowing of security. The discussion proposes a tentative typology explaining the continued colonization of security spaces by the State using constituent attendant processes of compartmentalizing, crowding out and corralling.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent and emerging security policies and practices claim a mutual vulnerability that closely links human insecurity in failed states with the threat to powerful states from illicit flows. This article first examines this ‘emerging orthodoxy’ of transnational security issues that reinforces the securitisation of poverty and the poor. It then subjects this orthodoxy to theoretical and empirical critique. Theoretically it shows that this orthodoxy is formed as a ‘geopolitical imagination’ that associates and stabilises particular views of weak states and illicit flows in a ‘netwar imagination’ by reasserting and reconfiguring traditional assumptions of the spatiality and nature of threats. A final empirical section, focusing on drug production and nuclear smuggling, argues that those assumptions and their assemblage are a partial, incomplete and often self-referential reading of illicit flows.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article argues that Critical Security Studies (CSS), exemplified by Ken Booth’s Theory of World Security, has outlined an ethics of security as emancipation of the ‘human’, but also a highly problematic security of ethics. After drawing out how the ethics of CSS operates, we examine the security of this ethics by examining it against a hard case, that of the 199899 Kosovo crisis. Confronting this concrete situation, we draw out three possibilities for action used at the time to secure the human: ‘humanitarian containment’, military intervention and hospitality. Assessing each against Booth’s requirements for ethical security action, we counter that, in fact, no option was without risks, pitfalls and ambiguities. Ultimately, if any action to promote the security and the emancipation of the human is possible, it must embrace and prioritise the fundamental insecurity of ethics, or else find itself paralysed through a fear of making situations worse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Under what conditions does successful police reform take place? Can democratic forms of policing exist within undemocratic state structures? What are the motives of donor and recipient nations, and can the norms of global civil society be cultivated in order to promote human rights, democratic governance, and fair and accountable policing? These questions are addressed in this volume, which presents a unique examination of Western-led police reform efforts by theoretically linking neoliberal globalization, police reform and development. The authors present seven country case studies based on this theoretical approach (Afghanistan, Brazil, Iraq, Northern Ireland, South Africa, Trinidad and Tobago, and Turkey) and assess the prospects for successful police reform in a global context.