933 resultados para server-side


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Correspondence regarding the donation of several collections to the Boston Medical Library, including the John Winthrop papers

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In today's internet world, web browsers are an integral part of our day-to-day activities. Therefore, web browser security is a serious concern for all of us. Browsers can be breached in different ways. Because of the over privileged access, extensions are responsible for many security issues. Browser vendors try to keep safe extensions in their official extension galleries. However, their security control measures are not always effective and adequate. The distribution of unsafe extensions through different social engineering techniques is also a very common practice. Therefore, before installation, users should thoroughly analyze the security of browser extensions. Extensions are not only available for desktop browsers, but many mobile browsers, for example, Firefox for Android and UC browser for Android, are also furnished with extension features. Mobile devices have various resource constraints in terms of computational capabilities, power, network bandwidth, etc. Hence, conventional extension security analysis techniques cannot be efficiently used by end users to examine mobile browser extension security issues. To overcome the inadequacies of the existing approaches, we propose CLOUBEX, a CLOUd-based security analysis framework for both desktop and mobile Browser EXtensions. This framework uses a client-server architecture model. In this framework, compute-intensive security analysis tasks are generally executed in a high-speed computing server hosted in a cloud environment. CLOUBEX is also enriched with a number of essential features, such as client-side analysis, requirements-driven analysis, high performance, and dynamic decision making. At present, the Firefox extension ecosystem is most susceptible to different security attacks. Hence, the framework is implemented for the security analysis of the Firefox desktop and Firefox for Android mobile browser extensions. A static taint analysis is used to identify malicious information flows in the Firefox extensions. In CLOUBEX, there are three analysis modes. A dynamic decision making algorithm assists us to select the best option based on some important parameters, such as the processing speed of a client device and network connection speed. Using the best analysis mode, performance and power consumption are improved significantly. In the future, this framework can be leveraged for the security analysis of other desktop and mobile browser extensions, too.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although Portugal does not have a significant radical right presence in its party system, in the last decades the country did witness the development of a neo-Nazi skinhead movement that expresses its white nationalist nature and goals through the musical genres of Rock Against Communism (RAC) and the related Oi!. Utilizing various historical sources and theoretical analysis, this study contextualizes the development of nationalist music in Portugal, both before and especially during the democratic period (1974-2015). It focuses on its protagonists, domestic and international networks, as well as on the few attempts to establish a common cause with radical right-wing political parties at the turn of the century and in present times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Policy Contribution...discusses how Europe's financial system could and should be reshaped. It starts from two basic points: First, the banking system needs to be credibly de-linked from the sovereigns and banks should operate across borders. Europe needs fewer national champions. Second, other forms of financial intermediation need to be developed. Both steps require a significant stepping up of the policy system, including a single resolution mechanism. Together, this will render Europe’s financial system more stable, more efficient and more conducive to growth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper criticises the neo-classical assumptions of perfect factor markets and of complete information, which constitute central elements in labour market theory. Based on literature review and on economic reports from transition economies, as well as developing countries and more advanced economies, this deliverable focuses on the structural impediments and imperfections which often characterise rural labour markets and which may prevent an efficient allocation of labour. According to empirical studies, transactions costs and rigidities hinder the well-functioning of labour markets and constrain labour adjustments. The paper attempts to classify the various limitations of rural labour markets from both supply and demand side, although the distinction is not always clear-cut as some problems occur on both sides. The identification of these issues is extremely important as it allows us to highlight the inefficiencies and the failures in labour markets and to understand their impact on labour allocation. In this context, market intervention is desirable and the paper provides particular support for rural development policies such as investments in human capital. Lastly, labour institutions can play a key role in promoting the well functioning of labour markets, thus it is fundamental that they are well in place.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In response to the sustained pressure recently experienced by the Danish krone, Denmark may be forced to abandon its 30-year old peg to the euro. If this scenario unfolds, this CEPS Commentary argues that it will be no bad thing for the eurozone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the overall negotiations on the Transatlantic Trade and Investment Partnership (TTIP), the digital chapter appears to be growing in importance. This is due to several factors, including the recent Datagate scandal that undermined trust between the negotiating parties and led to calls to suspend the US-EU Safe Harbour agreement as well as the furious debate currently ongoing in both legal systems on key issues such as policies to encourage broadband infrastructure deployment, network neutrality policies and the application of competition policy in cyberspace. This paper explores the current divergences between the two legal systems on these key issues and discusses possible scenarios for the ultimate agreement to be reached in the TTIP: from a basic, minimal agreement (which would essentially include e-labelling and e-accessibility measures) to more ambitious scenarios on network neutrality, competition rules, privacy and interoperability measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to investigate how university students perceive their involvement in the cyberbullying phenomenon, and its impact on their well-being. Thus, this study presents a preliminary approach of how college students’ perceived involvement in acts of cyberbullying can be measured. Firstly, Exploratory Factor Analysis (N = 349) revealed a unidimensional structure of the four scales included in the Cyberbullying Inventory for College Students. Then, Item Response Theory (N = 170) was used to analyze the unidimensionality of each scale and the interactions between participants and items. Results revealed good item reliability and Cronbach’s α for each scale. Results also showed the potential of the instrument and how college students underrated their involvement in acts of cyberbullying. Additionally, aggression types, coping strategies and sources of help to deal with cyberbullying were identified and discussed. Lastly, age, gender and course-related issues were considered in the analysis. Implications for researchers and practitioners are discussed.