878 resultados para Secret sharing,


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper, based on Jacques Derrida’s thoughts in Des Tours of Babel, addresses the issue regarding the (in)visible in translation, by arguing that the latter, beyond the traditional conception of communication, produces a complex set of relations between the visible and the invisible, which highlights the values of the non-dit and the secret that take place in their relation to interpretation. This line of thought underpins the discussion of my translation of two poems from Muse & Drudge (1995), by the African-American poet Harryette Mullen, whose dense poetry displays un(expected) possibilities of meanings and associations that proliferate in translation. It is argued that every act of translation entails a relationship between that which is translated (and made visible or intelligible through this act) and that which remains invisible and secret by resisting a definitive translation, which, as such, requires further interpretations in search for intelligibility (or “visibility”). We analyze the extent to which such relation between the visible and the invisible takes part in the translation of the notion of blackness raised by Mullen’s poems and how her translated poetry dialogues with issues of reception in Brazilian culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The social networks on the internet have experienced rapid growth and joined millions of users in Brazil and throughout the world. Such networks allow groups of people to communicate and exchange information. Sharing information in files is also a growing activity on the internet and is done in various ways. However, applications are not yet available to enable file sharing on Facebook, the premier social network today. This study aims to investigate how users use Facebook, and their practices for file sharing. Due to the experimental nature of this research, we opted for a data collection survey, applied over the web. From the data analysis, we have found a frequent use of file sharing, but no interest in paid services. As for Facebook, there was an extensive use of applications. The set of results shows a favourable scenario for applications that allow file sharing on Facebook.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dynamic conferencing refers to a scenario wherein any subset of users in a universe of users form a conference for sharing confidential information among themselves. The key distribution (KD) problem in dynamic conferencing is to compute a shared secret key for such a dynamically formed conference. In literature, the KD schemes for dynamic conferencing either are computationally unscalable or require communication among users, which is undesirable. The extended symmetric polynomial based dynamic conferencing scheme (ESPDCS) is one such KD scheme which has a high computational complexity that is universe size dependent. In this paper we present an enhancement to the ESPDCS scheme to develop a KD scheme called universe-independent SPDCS (UI-SPDCS) such that its complexity is independent of the universe size. However, the UI-SPDCS scheme does not scale with the conference size. We propose a relatively scalable KD scheme termed as DH-SPDCS that uses the UI-SPDCS scheme and the tree-based group Diffie- Hellman (TGDH) key exchange protocol. The proposed DH-SPDCS scheme provides a configurable trade-off between computation and communication complexity of the scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a resource-sharing scheme that supports three kinds of sharing scenarios in a WDM mesh network with path-based protection and sparse OEO regeneration. Several approaches are used to maximize the sharing of wavelength-links and OEO regenerators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper sets forth a Neo-Kaleckian model of capacity utilization and growth with distribution featuring a profit-sharing arrangement. While a given proportion of firms compensate workers with only a base wage, the remaining proportion do so with a base wage and a share of profits. Consistent with the empirical evidence, workers hired by profit-sharing firms have a higher productivity than their counterparts in base-wage firms. While a higher profit-sharing coefficient raises capacity utilization and growth irrespective of the distribution of compensation strategies across firms, a higher frequency of profit-sharing firms does likewise only if the profit-sharing coefficient is sufficiently high.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sviluppo applicazione per condividere contatti da SugarCRM con Google Contacts

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La prova informatica richiede l’adozione di precauzioni come in un qualsiasi altro accertamento scientifico. Si fornisce una panoramica sugli aspetti metodologici e applicativi dell’informatica forense alla luce del recente standard ISO/IEC 27037:2012 in tema di trattamento del reperto informatico nelle fasi di identificazione, raccolta, acquisizione e conservazione del dato digitale. Tali metodologie si attengono scrupolosamente alle esigenze di integrità e autenticità richieste dalle norme in materia di informatica forense, in particolare della Legge 48/2008 di ratifica della Convenzione di Budapest sul Cybercrime. In merito al reato di pedopornografia si offre una rassegna della normativa comunitaria e nazionale, ponendo l’enfasi sugli aspetti rilevanti ai fini dell’analisi forense. Rilevato che il file sharing su reti peer-to-peer è il canale sul quale maggiormente si concentra lo scambio di materiale illecito, si fornisce una panoramica dei protocolli e dei sistemi maggiormente diffusi, ponendo enfasi sulla rete eDonkey e il software eMule che trovano ampia diffusione tra gli utenti italiani. Si accenna alle problematiche che si incontrano nelle attività di indagine e di repressione del fenomeno, di competenza delle forze di polizia, per poi concentrarsi e fornire il contributo rilevante in tema di analisi forensi di sistemi informatici sequestrati a soggetti indagati (o imputati) di reato di pedopornografia: la progettazione e l’implementazione di eMuleForensic consente di svolgere in maniera estremamente precisa e rapida le operazioni di analisi degli eventi che si verificano utilizzando il software di file sharing eMule; il software è disponibile sia in rete all’url http://www.emuleforensic.com, sia come tool all’interno della distribuzione forense DEFT. Infine si fornisce una proposta di protocollo operativo per l’analisi forense di sistemi informatici coinvolti in indagini forensi di pedopornografia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is primarily based on three core chapters, focused on the fundamental issues of trade secrets law. The goal of this thesis is to come up with policy recommendations to improve legal structure governing trade secrets. The focal points of this research are the following. What is the optimal scope of trade secrets law? How does it depend on the market characteristics such as degree of product differentiation between competing products? What factors need to be considered to balance the contradicting objectives of promoting innovation and knowledge diffusion? The second strand of this research focuses on the desirability of lost profits or unjust enrichment damage regimes in case of misappropriation of a trade secret. A comparison between these regimes is made and simple policy implications are extracted from the analysis. The last part of this research is an empirical analysis of a possible relationship between trade secrets sharing and misappropriation instances faced by firms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

L'elaborato si propone di indagare il tema della Sharing Economy e i relativi presupposti di sviluppo, studiando casi realmente esistenti. Si affronta la ricerca validando i modelli ipotizzati per ricercare e confrontare le soluzioni esistenti al fine di trovare le caratteristiche ritenute fondamentali per la digital sharing economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La seguente tesi tratta: nel primo capitolo la sharing economy, nel secondo si focalizza sul modello di sviluppo Android, mentre nel terzo viene presentata un'applicazione da me ideata e sviluppata che consente la condivisione di parcheggi.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sviluppo di un modello di ottimizzazione per lo scheduling dei veicoli elettrici in car sharing dell'Università di Bologna.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Questa tesi si concentra sulle traduzioni italiane del classico in lingua inglese The Secret Garden (1911) di Frances Hodgson Burnett, con particolare attenzione all'uso della lingua e all'evoluzione della prassi traduttiva. Nella prima parte di questa tesi ho approfondito temi di natura teorica, quali la sfuggente e complessa definizione di letteratura per l'infanzia, la sua duplice appartenenza al sistema letterario e a quello pedagogico, e le peculiarità della sua traduzione. Inoltre ho presentato un excursus sulla storia di questo genere letterario, con particolare attenzione alla scena italiana e all'opera di propagazione della lingua portata avanti dai libri per ragazzi. Tali basi teoriche sono state necessarie allo scopo di inquadrare il romanzo in una cornice definita e utile in riferimento all'analisi e alla comparazione delle sue traduzioni. Il corpus delle traduzioni scelte consiste nei lavori di: Maria Ettlinger Fano (1921), Angela Restelli Fondelli (1956), F. Ghidoni (1973), Giorgio van Straten (1992) e Beatrice Masini (2013). Di ciascuna opera ho dato una descrizione generale, per poi concentrarmi sugli snodi traduttivi principali: da un lato i problemi di mediazione culturale come l'onomastica, i cibi, le lingue non standard nel testo originale, la religione e così via; dall'altro le soluzioni linguistiche adottate. Al fine di presentare e comparare questi parametri, ho portato a supporto i passaggi delle diverse traduzioni significativi in tal senso. Ho concluso con alcune considerazioni finali sull'evoluzione delle traduzioni italiane di The Secret Garden, viste attraverso l'ottica del rapporto fra adulti (traduttore, editore, educatori, genitori...) e lettore bambino.