955 resultados para private security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

It has been suggested human female breast size may act as signal of fat reserves, which in turn indicates access to resources. Based on this perspective, two studies were conducted to test the hypothesis that men experiencing relative resource insecurity should perceive larger breast size as more physically attractive than men experiencing resource security. In Study 1, 266 men from three sites in Malaysia varying in relative socioeconomic status (high to low) rated a series of animated figures varying in breast size for physical attractiveness. Results showed that men from the low socioeconomic context rated larger breasts as more attractive than did men from the medium socioeconomic context, who in turn perceived larger breasts as attractive than men from a high socioeconomic context. Study 2 compared the breast size judgements of 66 hungry versus 58 satiated men within the same environmental context in Britain. Results showed that hungry men rated larger breasts as significantly more attractive than satiated men. Taken together, these studies provide evidence that resource security impacts upon men’s attractiveness ratings based on women’s breast size.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims: The study examines the relationship between private and public investment in Zimbabwe utilizing yearly time series data for the period 1967 to 2004. Study Design: Time Series Study. Place and Duration of Study: Zimbabwe, May 2011 to July 2011. Methodology: Emphasis is placed on the direction of causality and the long run and short run effect of the two types of investment on each other. The paper constructs empirical models for both private and public investment, based on the flexible accelerator theory. Private investment is found to be cointegrated with public investment. A cointergration and VEC models are employed to assess the long and short run relationship existing between public and private investment. Conclusion: The relationship between private and public investment is found to be insignificant and the direction of causality found to be unidirectional. The results support the notion that private investment precedes public investment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private school enrolment may lead to worse subsequent performance in further education or in the labour market. If students differ in their ability not only to pay but to take advantage of educational opportunities (“talent” for short), private schools attract a worse pool of students when publicly funded schools are better suited to foster progress by more talented students. In the data we analyze, the impact of observable talent proxies on educational and labour market outcomes is indeed more positive for students who (endogenously) choose to attend public schools than for those who choose to pay for private education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper seeks to investigate the bases for resistance to arbitration in general -and investor arbitration in particular- focusing on the way in which arbitral tribunals deal with notions of public interest and the public good. The paper hypothesises that while courts have within their terms of reference the capacity to consider notions of public interest, arbitral tribunals do not. It is this core difference in the scope of decision making between the two bodies that could render privately organised dispute resolution unsuitable for disputes that have public aspects, like investor-state disputes. The paper discusses the meaning of public interest and the public good as found in the literature. It then proceeds to consider how tribunals in the investment field have dealt with these concepts. This leads to a conclusion urging not abandonment of arbitration as a component of dispute resolution, but caution. It is argued that unchecked growth in private dispute resolution can threaten perceptions of legitimacy and democratic accountability. The paper adopts a socio-legal methodology in considering the effect of legal mechanisms on social and political phenomena. It is also informed by a law and economics methodology in addressing impacts of dispute resolution mechanisms on economic efficiency. The contribution of the paper rests on theorising motivations for resistance to private dispute resolution, a topical issue in light of the TTIP debate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article challenges those perspectives which assert first, that the Security Council’s engagement with the Responsibility to Protect (R2P) during the Arab Spring evidences a generally positive trend, and second, that the response to the Arab Spring, particularly Syria, highlights the need for veto restraint. With respect to the first point, the evidence presented in this article suggests that the manner in which R2P has been employed by the Security Council during this period evidences three key trends: first, a willingness to invoke R2P only in the context of Pillar I; second, a pronounced lack of consensus surrounding Pillar III; and third, the persistent prioritisation of national interests over humanitarian concerns. With respect to veto restraint, this article argues that there is no evidence that this idea will have any significant impact on decision-making at the Security Council; the Council’s response to the Arab Spring suggests that national interests continue to trump humanitarian need.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Distribution systems are the first volunteers experiencing the benefits of smart grids. The smart grid concept impacts the internal legislation and standards in grid-connected and isolated distribution systems. Demand side management, the main feature of smart grids, acquires clear meaning in low voltage distribution systems. In these networks, various coordination procedures are required between domestic, commercial and industrial consumers, producers and the system operator. Obviously, the technical basis for bidirectional communication is the prerequisite of developing such a coordination procedure. The main coordination is required when the operator tries to dispatch the producers according to their own preferences without neglecting its inherent responsibility. Maintenance decisions are first determined by generating companies, and then the operator has to check and probably modify them for final approval. In this paper the generation scheduling from the viewpoint of a distribution system operator (DSO) is formulated. The traditional task of the DSO is securing network reliability and quality. The effectiveness of the proposed method is assessed by applying it to a 6-bus and 9-bus distribution system.