863 resultados para Information security policy


Relevância:

80.00% 80.00%

Publicador:

Resumo:

We propose a public key cryptosystem based on block upper triangular matrices. This system is a variant of the Discrete Logarithm Problem with elements in a finite group, capable of increasing the difficulty of the problem while maintaining the key size. We also propose a key exchange protocol that guarantees that both parties share a secret element of this group and a digital signature scheme that provides data authenticity and integrity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We propose a secure full-duplex VoIP and instant messaging system on a Pocket PC platform, allowing for session key transport using a public-key protocol and encrypted text or voice communication using a private-key algorithm. The full-duplex VoIP scheme presents good performance for long duration communication over LAN networks.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Multi-party voice-over-IP (MVoIP) services provide economical and convenient group communication mechanisms for many emerging applications such as distance collaboration systems, on-line meetings and Internet gaming. In this paper, we present a light peer-to-peer (P2P) protocol to provide MVoIP services on small platforms like mobile phones and PDAs. Unlike other proposals, our solution is fully distributed and self-organizing without requiring specialized servers or IP multicast support.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Pseudorandom generators are a basic foundation of many cryptographic services and information security protocols. We propose a modification of a previously published matricial pseudorandom generator that significantly improves performance and security. The resulting generator is successfully compared to world class standards.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Most cryptographic services and information security protocols require a dependable source of random data; pseudorandom generators are convenient and efficient for this application working as one of the basic foundation blocks on which to build the required security infrastructure. We propose a modification of a previously published matricial pseudorandom generator that significantly improves performance and security by using word packed matrices and modifying key scheduling and bit extraction schemes. The resulting generator is then successfully compared to world class standards.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper investigates the factors that explain the voting cohesion of the United States (US) and the European Union (EU) on foreign policy issues in the United Nations General Assembly (UNGA). It is often argued that the EU and the US are simply too different to cooperate within international organizations and thus to vote the same way, for example, in the UNGA. However, there is still a lack of research on this point and, more importantly, previous studies have not analyzed which factors explain EU-US voting cohesion. In this paper, I try to fill this gap by studying voting cohesion from 1980 until 2011 on issues of both ‘high’ politics (security) and ‘low’ politics (human rights) not only as regards EU-US voting cohesion, but also concerning voting cohesion among EU member states. I test six hypotheses derived from International Relations theories, and I argue that EU-US voting cohesion is best explained by the topic of the issue voted upon, whether an issue is marked as ‘important’ by the US government, and by the type of resolution. On the EU level, the length of Union membership and transaction costs matter most.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The EU’s Common Foreign and Security Policy (CFSP) and its accompanying Common Security and Defence Policy (CSDP) missions can be tools used to increase the international profile of the European Union. Nevertheless, CSDP missions garner little news coverage. This article argues that the very nature of the missions themselves makes them poor vehicles for EU promotion for political, institutional, and logistical reasons. By definition, they are conducted in the middle of crises, making news coverage politically sensitive. The very act of reporting could undermine the mission. Institutionally, all CSDP missions are intergovernmental, making press statements slow, overly bureaucratic, and of little interest to journalists. Logistically, the missions are often located in remote, undeveloped parts of the world, making it difficult and expensive for European and international journalists to cover. Moreover, these regions in crisis seldom have a thriving, local free press. Using the Aceh Monitoring Mission (AMM) as a case study, the author concludes that although a mission may do good, CSDP missions cannot fulfil the political function of raising the profile of the EU.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Brazil has a dual identity as a Latin American country and one of the BRICS (Brazil, Russia, India, China and South Africa). The regional and global dimensions of Brasilia’s foreign policy have been closely intertwined. Inspired by the idea of development and autonomy in the last ten years, Brazil has assumed a stronger regional leadership role. The result has been the emergence of a South American space, with Mercosur and Unasur as the main integration schemes. For Brazil, regionalism is not only a goal in itself but also an instrument for exerting global influence and for ‘soft-balancing’ the United States. Washington’s lower profile in the region has facilitated Brazil’s rise as a regional and even continental player, with a strong influence on the Latin American puzzle composed of many different pieces or concentric circles.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

After the presidential elections on June 14th, the Iranian regime will continue its catch-me-if-you-can game with the international community until it has reached the nuclear threshold. Paradoxically, the key to a solution on the nuclear issue might just lie in discussions on a WMD-free Middle East, but only after Iran has obtained nuclear military capability. At that point, and in the context of a new arms race, both regional and international players may be persuaded that the Middle East has more to gain from negotiations on non-proliferation than from prolonged isolation and the prospect of intractable war.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

CEPS Senior Research Fellow Andrea Renda persuasively shows in this new CEPS Commentary the extent to which the global economy has become heavily reliant on the Internet, but observes that this phenomenon is becoming increasingly insidious. It is efficient, no doubt: but he asks whether it is also secure?

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The first year of the European External Action Service (EEAS) has already elicited much comment, both internally and externally. This contribution briefly reviews the nature of this commentary and then suggests some possible short-term ‘wins’ for the Service, as well as some challenges that will require a longer-term perspective. The main shorter-term issue considers the need to create stronger linkages and priorities between existing strategies and to start the difficult process of melding a common mindset within the Service. The longer-term challenges revolve around recruitment, balance and resources. The latter is particularly important in order to enable the delegations to assume their full roles. The barrage of criticism that greeted the EEAS’s first birthday is also a commentary on how critical the role of the Service is to achieving the core goals of the Lisbon Treaty in external relations; namely, to aim towards more coherence, effectiveness and visibility.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Over 90% of the external relations budget of the EU is processed through its external financial instruments. With the Lisbon Treaty and the creation of the new European External Action Service (EEAS), the institutional architecture of these instruments was significantly reformed. This contribution analyses strategic programming both pre- and post-Lisbon, identifies ‘winners’ and ‘losers’, and examines the potential of the new provisions to increase the coherence of EU external action. The examination shows that the instruments can be categorised into three groupings: ‘the big three’ comprising the bulk of funding characterised by joint programming and responsibilities; the ‘Commission-only’ instruments where all powers remain with the Commission; and the ‘EEAS-led rest’ in which the High Representative and the EEAS play a strong role but only have limited financial resources available. The new system calls for strong coordination of all involved actors in order to make it work. Findings of a case study on the Instrument for Stability reveal, however, that so far the establishment of the EEAS has not made a substantial impact on strategic programming in its first two years.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

From the Preface. Pursuant to Article 13(3) of Council Decision 2010/427/EU of 26 July 2010 establishing the organisation and functioning of the European External Action Service, the High Representative is held to provide a review of the organisation and functioning of the EEAS by mid-­‐2013. This review will cover, inter alia, the implementation of Article 6(6), (8) and (11), so as to ensure an adequate geographical and gender balance and a meaningful presence of nationals from all member states in the EEAS. If necessary, the review will be accompanied by appropriate proposals for the revision of the 2010 Council Decision (e.g., suggestions for additional specific measures to correct possible imbalances of staffing). In that case, the Council will, in accordance with Article 27(3) TEU, revise the Decision in light of the review by the beginning of 2014. This short and user-­‐friendly legal commentary on the 2010 Council Decision is the first of its kind and is intended to inform those involved in the review process and to serve as a reference document for practitioners and analysts dealing with the EEAS. This commentary is not an elaborate doctrinal piece, but rather a textual and contextual analysis of each article, that takes account of i) other relevant legal provisions (primary, secondary, international), ii) the process leading to the adoption of the 2010 Council Decision (i.e. travauxpréparatoires), iii) the preamble of the Council Decision, and iv) insofar as it is possible at this stage, early implementation. Wherever relevant, cross-­‐references to other provisions of the EEAS Council Decision have been made so as to tie in the different commentaries and ensure overall consistency.