785 resultados para Governance of security


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Combat games are studied as bicriterion differential games with qualitative outcomes determined by threshold values on the criterion functions. Survival and capture strategies of the players are defined using the notion of security levels. Closest approach survival strategies (CASS) and minimum risk capture strategies (MRCS) are important strategies for the players identified as solutions to four optimization problems involving security levels. These are used, in combination with the preference orderings of the qualitative outcomes by the players, to delineate the win regions and the secured draw and mutual kill regions for the players. It is shown that the secured draw regions and the secured mutual kill regions for the two players are not necessarily the same. Simple illustrative examples are given.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Finnish society developed rapidly in the 1960´s and 1970´s. This was result of international trends. Development of education, urbanization and wide organization of society increased discontent towards prevailing social structure and towards the power elite. Development of technology created possibility to present radical perspectives in mass media. This caused widely spread discussions dividing opinions. The purpose of this thesis was to complement research on national defence and the Finnish Defence Forces especially between years 1965 and 1975. The task of research was to clarify how changes in society and how the significance of this change was interpreted in public discussion about national defence and development of the Defence Forces. The most essential points for this thesis turned out to be discourses structured from public discussion. Main research material consisted of approximately 35000 news, editorials, articles and opinions presented in mass media supplemented by literature, committee reports and other archival sources. Frame of reference for this thesis is based on relativistic worldview. According to this, social reality is relative and there is no single truth. Environment has significant influence on the issue how knowledge and truth are formed. Data analysis was based on critical discourse. The key objective was to clarify the effects of broad changes in society using discursive methods. One essential goal was to form order of discourse using linguistic analysis and also connect discourses to wider sociocultural custom. On this thesis I came to the conclusion that on the review period there were five significant ensembles of discourse. They consisted of several discussions focused on different themes. The discourse of official security policy aimed to define national defence and the position of the Defence Forces as parts of foreign policy. Foreign policy is often perceived as the most significant part of security policy. Historical memory, geographical position of Finland and also the state contracts, changes in international warfare, tasks of the Defence Forces and increasing critic of national defence and the difference in thinking between generations formed the discourse of security policy. In the discourse of the liability to military service, the issue was about individual responsibility to society and national defence. Resisters and unarmed defence demands, encouraged by international examples were the themes. The discourse pointed out how mass media is used to influence and forced the Defence Forces to develop the practices in public information. The discourses of democracy and politics were closer to internal development of the Defence Forces to integrate more into society. The discourse of democracy focused in changing power relationships of the Defence Forces that were known as authoritarian. Issues like conscript and personnel union activity had lot of similarities to general social development. The discourse of politics presented how the Defence Forces were pushed towards parliamentary decision making. The personnel was granted the same rights as other population. Themes related to the discourse on the will to national defence were development of mental national defence, increasing education on national defence and creation of more open public information culture. According to discourses presented above I can state, that the position of the Defence Forces in society was changed between years 1965-1975. This change was advanced by the Defence Forces reformed attitude towards mass media and public information in general. Active participation in public information important became important instead of only answering topics. This positive development created an atmosphere, that was easier for the public to understand and create own pictures of the armed forces. Due to this, I can describe that the defenders and supporters of the armed forces were stuck in their trenches, until discussions presented in discourses and themes developed the Defence Forces to be better fitting part of society. Key words; society, national defence, Defence Forces, discourse, mass media, security policy, liability to military service, conscription, democracy

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks form a very important category of security threats that are prevalent in MIPv6 (mobile internet protocol version 6) today. Many schemes have been proposed to alleviate such threats, including one of our own [9]. However, reasoning about the correctness of such protocols is not trivial. In addition, new solutions to mitigate attacks may need to be deployed in the network on a frequent basis as and when attacks are detected, as it is practically impossible to anticipate all attacks and provide solutions in advance. This makes it necessary to validate the solutions in a timely manner before deployment in the real network. However, threshold schemes needed in group protocols make analysis complex. Model checking threshold-based group protocols that employ cryptography have not been successful so far. Here, we propose a new simulation based approach for validation using a tool called FRAMOGR that supports executable specification of group protocols that use cryptography. FRAMOGR allows one to specify attackers and track probability distributions of values or paths. We believe that infrastructure such as FRAMOGR would be required in future for validating new group based threshold protocols that may be needed for making MIPv6 more robust.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present a sound and complete decision procedure for the bounded process cryptographic protocol insecurity problem, based on the notion of normal proofs [2] and classical unification. We also show a result about the existence of attacks with “high” normal cuts. Our proof of correctness provides an alternate proof and new insights into the fundamental result of Rusinowitch and Turuani [9] for the same setting.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The highest levels of security can be achieved through the use of more than one type of cryptographic algorithm for each security function. In this paper, the REDEFINE polymorphic architecture is presented as an architecture framework that can optimally support a varied set of crypto algorithms without losing high performance. The presented solution is capable of accelerating the advanced encryption standard (AES) and elliptic curve cryptography (ECC) cryptographic protocols, while still supporting different flavors of these algorithms as well as different underlying finite field sizes. The compelling feature of this cryptosystem is the ability to provide acceleration support for new field sizes as well as new (possibly proprietary) cryptographic algorithms decided upon after the cryptosystem is deployed.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Urbanisation is a dynamic complex phenomenon involving large scale changes in the land uses at local levels. Analyses of changes in land uses in urban environments provide a historical perspective of land use and give an opportunity to assess the spatial patterns, correlation, trends, rate and impacts of the change, which would help in better regional planning and good governance of the region. Main objective of this research is to quantify the urban dynamics using temporal remote sensing data with the help of well-established landscape metrics. Bangalore being one of the rapidly urbanising landscapes in India has been chosen for this investigation. Complex process of urban sprawl was modelled using spatio temporal analysis. Land use analyses show 584% growth in built-up area during the last four decades with the decline of vegetation by 66% and water bodies by 74%. Analyses of the temporal data reveals an increase in urban built up area of 342.83% (during 1973-1992), 129.56% (during 1992-1999), 106.7% (1999-2002), 114.51% (2002-2006) and 126.19% from 2006 to 2010. The Study area was divided into four zones and each zone is further divided into 17 concentric circles of 1 km incrementing radius to understand the patterns and extent of the urbanisation at local levels. The urban density gradient illustrates radial pattern of urbanisation for the period 1973-2010. Bangalore grew radially from 1973 to 2010 indicating that the urbanisation is intensifying from the central core and has reached the periphery of the Greater Bangalore. Shannon's entropy, alpha and beta population densities were computed to understand the level of urbanisation at local levels. Shannon's entropy values of recent time confirms dispersed haphazard urban growth in the city, particularly in the outskirts of the city. This also illustrates the extent of influence of drivers of urbanisation in various directions. Landscape metrics provided in depth knowledge about the sprawl. Principal component analysis helped in prioritizing the metrics for detailed analyses. The results clearly indicates that whole landscape is aggregating to a large patch in 2010 as compared to earlier years which was dominated by several small patches. The large scale conversion of small patches to large single patch can be seen from 2006 to 2010. In the year 2010 patches are maximally aggregated indicating that the city is becoming more compact and more urbanised in recent years. Bangalore was the most sought after destination for its climatic condition and the availability of various facilities (land availability, economy, political factors) compared to other cities. The growth into a single urban patch can be attributed to rapid urbanisation coupled with the industrialisation. Monitoring of growth through landscape metrics helps to maintain and manage the natural resources. (C) 2012 Elsevier B.V. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar deficiencies in the security assurances provided by non-tight proofs when we analyze some protocols in the literature including ones for network authentication and aggregate MACs. Our observations call into question the practical value of non-tight reductionist security proofs. We also exhibit attacks on authenticated encryption schemes, disk encryption schemes, and stream ciphers in the multi-user setting.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper critically evaluates the vulnerability of Indian cities to climate change in the context of sustainable development. City-scale indicators are developed for multiple dimensions of security and vulnerability. Factor analysis is employed to construct a vulnerability ranking of 46 major Indian cities. The analysis reveals that high aggregate levels of wealth do not necessarily make a city less vulnerable. Two, cities with diversified economic opportunities could adapt better to the new risks posed by climate change, than cities with unipolar opportunities. Three, highly polluted cities are more vulnerable to the health impacts of climate change, and cities with severe groundwater depletion will find it difficult to cope with increased rainfall variability. Policy and sustainability issues are discussed for these results.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Automated security is one of the major concerns of modern times. Secure and reliable authentication systems are in great demand. A biometric trait like the finger knuckle print (FKP) of a person is unique and secure. Finger knuckle print is a novel biometric trait and is not explored much for real-time implementation. In this paper, three different algorithms have been proposed based on this trait. The first approach uses Radon transform for feature extraction. Two levels of security are provided here and are based on eigenvalues and the peak points of the Radon graph. In the second approach, Gabor wavelet transform is used for extracting the features. Again, two levels of security are provided based on magnitude values of Gabor wavelet and the peak points of Gabor wavelet graph. The third approach is intended to authenticate a person even if there is a damage in finger knuckle position due to injury. The FKP image is divided into modules and module-wise feature matching is done for authentication. Performance of these algorithms was found to be much better than very few existing works. Moreover, the algorithms are designed so as to implement in real-time system with minimal changes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple-access channel (MAC), and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the problem under an additional security constraint, which requires that each user's message be kept secure from the relay. We consider two types of security constraints: 1) perfect secrecy, in which the MAC channel output seen by the relay is independent of each user's message and 2) strong secrecy, which is a form of asymptotic independence. We propose a coding scheme based on nested lattices, the main feature of which is that given a pair of nested lattices that satisfy certain goodness properties, we can explicitly specify probability distributions for randomization at the encoders to achieve the desired security criteria. In particular, our coding scheme guarantees perfect or strong secrecy even in the absence of channel noise. The noise in the channel only affects reliability of computation at the relay, and for Gaussian noise, we derive achievable rates for reliable and secure computation. We also present an application of our methods to the multihop line network in which a source needs to transmit messages to a destination through a series of intermediate relays.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The power of X-ray crystal structure analysis as a technique is to `see where the atoms are'. The results are extensively used by a wide variety of research communities. However, this `seeing where the atoms are' can give a false sense of security unless the precision of the placement of the atoms has been taken into account. Indeed, the presentation of bond distances and angles to a false precision (i.e. to too many decimal places) is commonplace. This article has three themes. Firstly, a basis for a proper representation of protein crystal structure results is detailed and demonstrated with respect to analyses of Protein Data Bank entries. The basis for establishing the precision of placement of each atom in a protein crystal structure is non-trivial. Secondly, a knowledge base harnessing such a descriptor of precision is presented. It is applied here to the case of salt bridges, i.e. ion pairs, in protein structures; this is the most fundamental place to start with such structure-precision representations since salt bridges are one of the tenets of protein structure stability. Ion pairs also play a central role in protein oligomerization, molecular recognition of ligands and substrates, allosteric regulation, domain motion and alpha-helix capping. A new knowledge base, SBPS (Salt Bridges in Protein Structures), takes these structural precisions into account and is the first of its kind. The third theme of the article is to indicate natural extensions of the need for such a description of precision, such as those involving metalloproteins and the determination of the protonation states of ionizable amino acids. Overall, it is also noted that this work and these examples are also relevant to protein three-dimensional structure molecular graphics software.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Resumen: ¿Qué imágenes de Egipto encontramos en la Biblia Hebrea, además del éxodo? Los textos bíblicos miran a su vecina Egipto como país de refugio (del hambre o la persecución). Pero por ser grande y fuerte, Egipto es también proveedor de armamento militar. Puede tornarse una falsa seguridad para un pueblo que debe confiar solo en Yavé. La literatura sapiencial es más benévola. En la descripción de la cama lujosa a la que una mujer descarada atrae a su amante, Proverbios 7 ofrece un homenaje indirecto a la riqueza egipcia.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

[ES] El objetivo del artículo es explorar la potencialidad de la Evaluación Multi-criterio Social como enfoque metodológico para evaluar Espacios Naturales Protegidos (ENP) e iniciar un proceso de discusión sobre la conveniencia de incorporar esta metodología para la gobernanza de la Red Natura 2000 de la Comunidad Autónoma de Euskadi. Del caso de estudio analizado se desprende que la inclusión de la población local en un proceso participativo dirigido a la planificación y manejo de los ENP contribuiría a reducir el número y calado de conflictos potenciales. Asimismo, facilitaría la gobernanza efectiva de los ENP, lo que parece un reto ineludible para que las áreas protegidas logren sus objetivos y funciones.