969 resultados para security practices
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
The information-theoretic approach to security entails harnessing the correlated randomness available in nature to establish security. It uses tools from information theory and coding and yields provable security, even against an adversary with unbounded computational power. However, the feasibility of this approach in practice depends on the development of efficiently implementable schemes. In this paper, we review a special class of practical schemes for information-theoretic security that are based on 2-universal hash families. Specific cases of secret key agreement and wiretap coding are considered, and general themes are identified. The scheme presented for wiretap coding is modular and can be implemented easily by including an extra preprocessing layer over the existing transmission codes.
Resumo:
Resumen: En los últimos quince años, mientras la mayoría de los países del mundo sufrieron un aumento o estabilidad en el nivel de desempleo, algunos países han logrado mejorar significativamente su situación. Este trabajo lleva a cabo una revisión de la literatura con respecto a las políticas de empleo y del mercado laboral de esos países con el objetivo de extraer algunas lecciones de estas ‘buenas prácticas’. Cabe aclarar que el objetivo no consiste en recomendar políticas específicas para Argentina sino simplemente destacar la relevancia de algunas características comunes que presentan estos casos exitosos. Los países exitosos, además de experimentar una buena performance en términos de crecimiento económico, implementaron un conjunto de políticas que van desde políticas del mercado laboral activas a un amplio sistema de seguridad social, mayor flexibilidad laboral y políticas salariales moderadas.
Resumo:
In this paper we analyze the effects of social security policies in an unfunded, earnings-related social security system on the incentives to education investment and voluntary retirement, on growth and on income inequality. Growth is endogenously driven by human capital investment, individuals differ in their innate (learning) ability at birth, and the pension scheme includes a minimum pension. More skilled individuals spend more on education, minimum pensions reduce low skill individuals' incentives to invest in human capital, there is no monotonic relationship between per capita growth and income inequality.
Resumo:
Revised: 2006-11.-- Published as an article in: Journal of Public Economics 90(12), December, 2006, pp. 2323-2349.
Resumo:
Several local groups have come together for this project to addresses water quality concerns in the Gabilan Watershed – also known as the Reclamation Ditch Watershed (Fig. 1.1). These are Moss Landing Marine Laboratories (MLML), the Resource Conservation District of Monterey County (RCDMC), Central Coast Watershed Studies (CCoWS), Return of the Natives (RON), Community Alliance with Family Farmers (CAFF), and Coastal Conservation and Research (CC&R). The primary goal is to reduce non-point source pollution – particularly suspended sediment, nutrients, and pesticides – and thereby improve near-shore coastal waters of Moss Landing Harbor and the Monterey Bay. (Document contains 33 pages)
Resumo:
CHAP 1 - Introduction to the Guide CHAP 2 - Solution chemistry of carbon dioxide in sea water CHAP 3 - Quality assurance CHAP 4 - Recommended standard operating procedures (SOPs) SOP 1 - Water sampling for the parameters of the oceanic carbon dioxide system SOP 2 - Determination of total dissolved inorganic carbon in sea water SOP 3a - Determination of total alkalinity in sea water using a closed-cell titration SOP 3b - Determination of total alkalinity in sea water using an open-cell titration SOP 4 - Determination of p(CO2) in air that is in equilibrium with a discrete sample of sea water SOP 5 - Determination of p(CO2) in air that is in equilibrium with a continuous stream of sea water SOP 6a - Determination of the pH of sea water using a glass/reference electrode cell SOP 6b - Determination of the pH of sea water using the indicator dye m-cresol purple SOP 7 - Determination of dissolved organic carbon and total dissolved nitrogen in sea water SOP 7 en Español - Determinacion de carbono organico disuelto y nitrogeno total disuelto en agua de mar SOP 11 - Gravimetric calibration of the volume of a gas loop using water SOP 12 - Gravimetric calibration of volume delivered using water SOP 13 - Gravimetric calibration of volume contained using water SOP 14 - Procedure for preparing sodium carbonate solutions for the calibration of coulometric CT measurements SOP 21 - Applying air buoyancy corrections SOP 22 - Preparation of control charts SOP 23 - Statistical techniques used in quality assessment SOP 24 - Calculation of the fugacity of carbon dioxide in the pure gas or in air CHAP 5 - Physical and thermodynamic data Errata - to the hard copy of the Guide to best practices for ocean CO2 measurements
Resumo:
(pdf contains 265 pages)
Resumo:
(PDF has 75 pages)