979 resultados para Ark of secrecy


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel. ^ This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as a resource that is gradually consumed by a system. We explore this intuition through various models of min-entropy consumption. Next, we consider several composition operators that allow smaller systems to be combined into larger systems, and explore the extent to which the leakage of a combined system is constrained by the leakage of its constituents. Most significantly, we prove upper bounds on the leakage of a cascade of two channels, where the output of the first channel is used as input to the second. In addition, we show how to decompose a channel into a cascade of channels. ^ We also establish fundamental new results about the recently-proposed g-leakage family of measures. These results further highlight the significance of channel cascading. We prove that whenever channel A is composition refined by channel B, that is, whenever A is the cascade of B and R for some channel R, the leakage of A never exceeds that of B, regardless of the prior distribution or leakage measure (Shannon leakage, guessing entropy leakage, min-entropy leakage, or g-leakage). Moreover, we show that composition refinement is a partial order if we quotient away channel structure that is redundant with respect to leakage alone. These results are strengthened by the proof that composition refinement is the only way for one channel to never leak more than another with respect to g-leakage. Therefore, composition refinement robustly answers the question of when a channel is always at least as secure as another from a leakage point of view.^

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, we consider the transmission of confidential information over a κ-μ fading channel in the presence of an eavesdropper who also experiences κ-μ fading. In particular, we obtain novel analytical solutions for the probability of strictly positive secrecy capacity (SPSC) and a lower bound of secure outage probability (SOPL) for independent and non-identically distributed channel coefficients without parameter constraints. We also provide a closed-form expression for the probability of SPSC when the μ parameter is assumed to take positive integer values. Monte-Carlo simulations are performed to verify the derived results. The versatility of the κ-μ fading model means that the results presented in this paper can be used to determine the probability of SPSC and SOPL for a large number of other fading scenarios, such as Rayleigh, Rice (Nakagamin), Nakagami-m, One-Sided Gaussian, and mixtures of these common fading models. In addition, due to the duality of the analysis of secrecy capacity and co-channel interference (CCI), the results presented here will have immediate applicability in the analysis of outage probability in wireless systems affected by CCI and background noise (BN). To demonstrate the efficacy of the novel formulations proposed here, we use the derived equations to provide a useful insight into the probability of SPSC and SOPL for a range of emerging wireless applications, such as cellular device-to-device, peer-to-peer, vehicle-to-vehicle, and body centric communications using data obtained from real channel measurements.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Scott, L. (2006). Labour and the Bomb: The First Eighty Years. International Affairs. 82(4), pp.685-700 RAE2008

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cette thèse pense la place des figures littéraires (le Cantique des cantiques, Kierkegaard, Hofmannsthal) et cinématographiques (Matador d'Almodóvar) de la séduction dans la relation entre le soi et l'autre. Elle interroge le rapport au sacré et à la transcendance que pose l'écriture de la séduction. Dans le premier chapitre, les frontières établies entre littérature et philosophie (personnage conceptuel, figure esthétique) sont interrogées à travers les figures de la séduction. À ces figures sont associées les figures de matadors, qui permettent de penser la violence extrême de la séduction et l'instant au cours duquel la conscience ne peut plus se dédoubler. Le deuxième chapitre est une réflexion, à partir des figures du maître et de l'esclave, sur le désir et la conscience de soi et de l'autre dans la séduction. Les figures tauromachiques exposent le sacrifice à l'œuvre dans la séduction. Le dialogue est ici pensé au sein de la séduction, pour saisir la place de celle-ci dans la formation de la pensée. Le troisième chapitre développe le rapport entre le soi, l'autre et le monde qu'établit la séduction. Le dandysme permet d'approcher la tension entre la matière et l'esprit que posent la séduction et son écriture. Le dialogue à l'œuvre dans la séduction est présenté comme un espace de formation. La séduction est envisagée comme séduction éthique, quête de la bonne distance, exercice spirituel. La syncope, le duende, l'extase sont décrits comme des états de conscience où la distance entre le soi et le monde, le soi et l'autre, l'esprit et la matière s'abolit. À partir de ces états, l'ouverture vers l'infini et vers la transcendance que peut poser la séduction est exposée. Dans le quatrième chapitre, la séduction est pensée comme le parfum du sacré, à travers une lecture du Cantique des cantiques. Par la séduction, l'importance du corps dans le sacré est soulignée. La place du secret et de la foi dans la séduction, dans le sacré et dans le littéraire est étudiée. La séduction permet une plongée érotique dans le monde et dans le réel, par les figures et par les images qu'elle déploie. Le savoir de la séduction est un parcours, savoir du corps et de l'esprit.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Commentaire / Commentary

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Différents points de vue pour déterminer la portée du secret des délibérations dans certains tribunaux internationaux ont débouché sur le fait que les juges aient le droit de présenter des opinions séparées; alors que d’autres n’ont pas ce droit. En tenant compte du rôle et des objectifs des missions internationales, les juges devraient avoir le droit de présenter des opinions séparées, de la même façon que dans le système de common law et dans un grand nombre de tribunaux constitutionnels.Cependant, ces analogies ont joué un rôle marginal dans les travaux préparatoires du Statut de la Cour Permanente de Justice Internationale en 1920. D’autant que les Etats ne trouvaient pas  orrect qu’une opinión juridique d’un juge international soit condamnée a l’anonymat comme consequence du principe du secret des délibérations, ceci comme conséquenced’un «technicisme» relatif au fait que ladite opinion était contraire à la position majoritaire de la Cour au moment de voter le projet de la décision.Les règles générales de droit international public garantissent un pouvoir autonome au pouvoir judiciaire international. Selon les règles de procédure des tribunaux internationaux, les juges ont le droit de se prononcer avec une opinion séparée, même si ce droit ne se trouve pas typifié de façon expresse dans le Statut ou dans le traité constitutif de l’organisation. Cette règle est présumée à moins qu’il y ait eu une claire volonté des Etats dans le sens contraire.Le droit relatif aux opinions séparées peut être analysé sous la perspective des juges en tenant compte de leur droit à la liberté d’expression. En ce sens, un juge international peut avoir la liberté pour démontrer, de façon systématique, par le biais d’opinions séparées, les vides argumentatifs de la majorité, en évitant un style qui puissent être offensif envers ses collègues. Cette façon de s’exprimer est considéré inoffensive envers l’autorité judiciaire.Les effets positifs par l’absence, ou l’interdiction, d’opinions séparées, en relation avec l’indépendance des juges internationaux ne sont pas faciles à mettre de côté. Cependant, ce genre des mesures restrictives à la liberté d’expression n’est pas suffisamment effectif ni proportionné pour légitimer l’objectif du juge. Il y a des instruments bien plus effectifs y moins restrictifs qui mènent au même résultat (par exemple, un seul mandat, non renouvelable, des juges nternationaux).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Los servicios de inteligencia en Colombia han operado durante casi sesenta años sin una regulación integral que demarque sus funciones y sus límites. Recientemente fue aprobado en el Congreso de la República, y en gran parte avalado por la Corte Constitucional, un proyecto de ley que pretende poner fin a esta omisión histórica. El presente artículo tiene como propósito revisar qué tan adecuada resulta la regulación que este proyecto de ley hace de dos aspectos relacionados con los servicios de inteligencia –el alcance del secreto y los controles a su funcionamiento– de cara a la protección de derechos como la intimidad, el acceso a la información y la verdad. La tesis que se defiende es que este proyecto de ley prevé aspectos positivos con relación a los dos temas mencionados, pero deja abiertos vacíos importantes que pueden llevar a que los servicios de inteligencia se aparten de sus funciones y sean utilizados para desconocer los derechos de las personas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Na América Latina, um vasto legado de regimes militares tem contribuído para o fortalecimento de uma cultura de sigilo nos governos. Além da defesa da pátria contra a ameaça comunista, a maioria destes golpes se deveu a um senso de dever das Forças Armadas em preservar o Estado. Deste ponto de vista, os próprios militares seriam os mais qualificados para determinar quando e como intervir na ordem política interna. No entanto, justificar a intervenção militar na ordem política interna é sempre um empreendimento repleto de contradições e riscos graves para a liberdade. Este contexto levou os estudiosos e autoridades a repensarem o controle civil sobre os militares, e a redefinirem os papéis das forças armadas. Neste processo de consolidação da democracia, os militares ainda mantêm alguns poderes políticos e de veto dentro dos governos civis. O controle civil democrático das Forças Armadas na América Latina enfrenta a falta de incentivos políticos para os civis a se envolverem e se especializarem no assunto, já que não há ameaças internas, quer externas observadas. De fato, a região tem sido considerada como uma "zona de paz", onde os esforços diplomáticos prevaleceriam sobre conflitos armados. A promulgação de leis de acesso à informação pública (LAI) abre uma maneira inteiramente nova de escrutínio público – uma democracia monitorial, que afeta diretamente a autonomia militar e sua cultura organizacional. No estudo do surgimento e da força legal das LAI na América Latina, as relações entre civis e militares não foram consideradas em profundidade como um fator influente. Buscou-se traçar uma relação entre, por um lado, a existência de LAI, a data de aprovação da LAI e sua força geral e exceções, e por outro lado, as relações civis-militares na América Latina. Um número considerável de países suporta que as relações civis-militares influenciam a regulamentação das exceções e o momento em que a lei foi aprovada. Há uma tendência geral na América Latina a adotar LAI fracas na regulamentação de exceções. Também foi feito um estudo de caso do Brasil, país muito representativo da influência militar na política. Concluiu-se que as relações entre civis e militares no Brasil foram um fator de grande influência na aprovação final da LAI no país. Este estudo contribui para a construção de uma ponte entre as agendas de pesquisa de transparência e de relações civis-militares, com várias possibilidades de estudos de casos comparados.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Neste texto revisitamos a formação dos serviços de inteligência no Brasil e sua adaptação à cultura do segredo. Também avaliamos como a existência de serviços de inteligência no interior das forças armadas modificaram a estratégia de atuação castrense no âmbito interno, utilizando como exemplo a campanha Marajoara, terceira empreitada militar na guerrilha do Araguaia.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

I offer a new cartography of ethical resistance. I argue that there is an uncharted interaction between managerial secrecy and organizational silence, which may exponentially increase the incidence of corruption in ways not yet understood. Current methods used to raise levels of moral conduct in business and government practice appear blind to this powerful duo. Extensive literature reviews of secrecy and silence scholarships form the background for an early stage conceptual layout of the co-production of secrecy and silence.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we investigate the secrecy performance of an energy harvesting relay system, where a legitimate source communicates with a legitimate destination via the assistance of multiple trusted relays. In the considered system, the source and relays deploy the time-switching-based radio frequency energy harvesting technique to harvest energy from a multi-antenna beacon. Different antenna selection and relay selection schemes are applied to enhance the security of the system. Specifically, two relay selection schemes based on the partial and full knowledge of channel state information, i.e., optimal relay selection and partial relay selection, and two antenna selection schemes for harvesting energy at source and relays, i.e., maximizing energy harvesting channel for the source and maximizing energy harvesting channel for the selected relay, are proposed. The exact and asymptotic expressions of secrecy outage probability in these schemes are derived. We demonstrate that applying relay selection approaches in the considered energy harvesting system can enhance the security performance. In particular, optimal relay selection scheme outperforms partial relay selection scheme and achieves full secrecy diversity order, regardless of energy harvesting scenarios.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we investigate the secrecy outage performance of spectrum sharing multiple-input multiple-output networks using generalized transmit antenna selection with maximal ratio combining over Nakagami-m channels. In particular, the outdated channel state information is considered at the process of antenna selection due to feedback delay. Considering a practical passive eavesdropper scenario, we derive the exact and asymptotic closed-form expressions of secrecy outage probability, which enable us to evaluate the secrecy performance with high efficiency and present a new design insight into the impact of key parameters on the secrecy performance. In addition, the analytical results demonstrate that the achievable secrecy diversity order is only determined by the parameters of the secondary network, while other parameters related to primary or eavesdropper’s channels have a significantly impact on the secrecy coding gain.