990 resultados para Hardware IP Security
Resumo:
The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.
Resumo:
This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.
Resumo:
Brazil's security agenda during Lula's administration was not homogeneous through the two mandates: the first tenure (2002-2006) revealed a reactive approach towards security topics, while the second one (2006-2010) was more assertive. More specifically, the shift occurred in terms of both its geographical scope - once it incorporated global issues in a more systematic way -, and instruments through which the security agenda was exercised, given the multilateral initiative of Unasur's CDS
Resumo:
The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.
Resumo:
Liberal-Institutionalism and Structural Realism expectations about international organizations are confronted by looking at if and how US-controlled international aid is granted, and particularly if it is related or not to political affinity and to United Nations Security Council (UNSC) non-permanent membership. A preliminary assessment suggests that these relations only hold for the period of the Cold War, and, even then, only when UNSC non-permanent membership is in years in which the Security Council was deemed very important.
Resumo:
The United States has gone further than any country in the "privatization of security". Other countries may find the economic or financial logic in the use of contractors persuasive. The US experience with contracting out security, particularly in Iraq, was problematic, and can serve as a cautionary tale in order that other countries might learn how to avoid the pitfalls.
Resumo:
This paper proposes a wireless EEG acquisition platform based on Open Multimedia Architecture Platform (OMAP) embedded system. A high-impedance active dry electrode was tested for improving the scalp- electrode interface. It was used the sigma-delta ADS1298 analog-to-digital converter, and developed a “kernelspace” character driver to manage the communications between the converter unit and the OMAP’s ARM core. The acquired EEG signal data is processed by a “userspace” application, which accesses the driver’s memory, saves the data to a SD-card and transmits them through a wireless TCP/IP-socket to a PC. The electrodes were tested through the alpha wave replacement phenomenon. The experimental results presented the expected alpha rhythm (8-13 Hz) reactiveness to the eyes opening task. The driver spends about 725 μs to acquire and store the data samples. The application takes about 244 μs to get the data from the driver and 1.4 ms to save it in the SD-card. A WiFi throughput of 12.8Mbps was measured which results in a transmission time of 5 ms for 512 kb of data. The embedded system consumes about 200 mAh when wireless off and 400 mAh when it is on. The system exhibits a reliable performance to record EEG signals and transmit them wirelessly. Besides the microcontroller-based architectures, the proposed platform demonstrates that powerful ARM processors running embedded operating systems can be programmed with real-time constrains at the kernel level in order to control hardware, while maintaining their parallel processing abilities in high level software applications.
Resumo:
SUMÁRIO: A tomada de consciência da mulher na luta pelos seus direitos teve particular preponderância em finais do séc. XIX princípios do séc. XX, em Portugal, na sequência das movimentações republicanas. Várias personalidades se tornaram símbolos de um feminismo nascente, mas nos dias de hoje ainda se pode considerar uma especificidade feminina causa bastante para situações de exclusão? Apresentamos o caso do Instituto de Gestão Financeira da Segurança Social, IP (IGFSS, IP), caracterizado por 76% de coadjutoras num universo de 450 funcionários. Que razões haverá para esta predominância feminina, pelo menos em números? Reflectirá uma verdadeira mudança da condição feminina na sociedade? Ou constituirá antes a continuação de um preconceito que impele o sexo feminino para panoramas de exploração e subvalorização que se irão reflectir nos apoios sociais do Estado? ABSTRACT: The awareness of woman in the struggle for her rights had particular preponderance at the end of the 19th century and the beginning of the 20th century, in Portugal, in the sequence of the republican bustle. Several personalities became symbols of a growing feminism, but in nowadays can we still consider a feminine specificity cause enough for exclusion? Here we present a case-study of the Instituto de Gestão Financeira da Segurança Social, IP (IGFSS, IP), characterised by 76% of women employees in a total of 450 workers. What could be the reasons for this female predominance, at least in numbers? Does it reflect a real change in female conditions in our society? Or will be instead the maintenance of the prejudice that propels women to scenarios of exploitation and undervaluation that will have reflexes on State social supports?
Resumo:
One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
O presente estudo visou caraterizar as representações que técnicos de intervenção precoce têm sobre famílias que vivem em meio rural e em meio urbano que recebem apoio das equipas. Foram realizadas entrevistas semi-diretivas, os participantes e entrevistados foram dez docentes com intervenção educativa nas equipas, cinco em apoio direto a famílias de meio rural e cinco a realizar intervenções com famílias de meio urbano. Deste estudo resultaram vários dados qualitativos que depois de analisados e discutidos, levaram a diversas conclusões que vem dar respostas às questões e problemática iniciais. As famílias inseridas nestes contextos têm características que as diferenciam; habilitações, recursos, necessidades e comportamentos em comunidade. Tem aspetos culturais que influenciam as suas atitudes, participação e autonomia e são ou não decisivas no desenvolvimento da criança. Em contexto rural as famílias apresentam um maior número de necessidades comparativamente às famílias de meio urbano. As maiores necessidades das famílias em contexto rural situam-se nas questões financeiras, de formação e apoio técnico e especializado. As maiores necessidades das famílias de contexto urbano situam-se ao nível do fraco apoio familiar e das redes sociais. As necessidades comuns situam-se nas necessidades de informação e promoção da autonomia e competências parentais. As visitas e intervenções domiciliares podem permitir melhorar a identificação das necessidades e recursos das famílias e compreender melhor os critérios de referência de algumas crianças. As oportunidades de aprendizagem são maiores nestes encontros em domicílio, estão presentes em muitos casos, elementos da família alargada, que muitas vezes tem um papel fundamental na educação e estimulação destas crianças. Os docentes de IP em intervenção em contexto urbano, comparativamente com os docentes inseridos em contexto rural, apoiam famílias que na generalidade abrangem áreas profissionais mais vantajosas financeiramente. Estas famílias terão á partida melhores condições para aceder a mais recursos e apoios. Nos dois contextos existe uma necessidade comum, falta de informação e alguma autonomia e competências parentais em relação ao crescimento das crianças. A realização de iii encontros de pais ou criação de grupos de pais que tenham por base a partilha de experiencias e informação, estão planeadas mas não são uma realidade nestas equipas. Nas práticas de qualidade, o profissional deve atuar nos contextos naturais como, a família, ou a comunidade, mas pode incluir também rotinas, brincadeiras, festas etc. cenários que facilitem o dia-a-dia. As famílias têm contextos e rotinas próprias que os profissionais devem identificar, os dados que recolhemos indicam essa necessidade de proceder a avaliação mais atenta das necessidades das famílias. As práticas recomendadas e o enquadramento legislativo são tidos em conta pelos docentes e profissionais das equipas, os recursos documentais são na sua maioria comuns, a todas as equipas participantes, seguindo as orientações e documentos/minutas facultadas pela comissão coordenadora do SNIPI (Sistema Nacional de Intervenção Precoce na Infância) Apesar das recomendações teóricas para práticas de qualidade centradas na família, verificamos que estas fazem parte das preocupações destes docentes, mas nem sempre são implementadas. A problemática da criança parece ser ainda o ponto mais importante dos programas e planos de intervenção e mesmo o critério decisivo para delinear a duração e frequência das intervenções, seja em contexto urbano ou rural. - ABSTRACT This study aimed to characterize the families of rural and urban areas that receive support from Early Intervention Teams. It has been proposed yet whether professionals IP suit their practices to the characteristics of these families and communities integrated in different cultural contexts. Interviews were conducted semidirective, participants were ten respondents and teachers with educational intervention teams, five in direct support to families in rural areas and five interventions with families in urban areas. This study resulted in a number of qualitative data that then analyzed and discussed, led to several conclusions that comes to answer the questions and problems early. The families included in these contexts have characteristics that differentiate them; qualifications, resources, needs and behaviors in the community. Has cultural aspects that influence their attitudes, participation and autonomy and are not decisive in the development of the child. In the rural households have a greater number of needs compared to urban families. The greatest needs of families in rural settings are located in financial matters, training and technical support and expertise. The greatest needs of the urban households are located at the level of weak family support and social networks. Common needs lie in information needs and promoting autonomy and parenting skills. The home visits and interventions may allow improved identification of needs and resources of families and understand the benchmarks of some children. Learning opportunities are greater in these meetings at home, are present in many cases, elements of the extended family, which often plays a key role in education and stimulation of these children. Teachers IP intervention in the urban compared with rural teachers placed in context, support families in general include professional areas more financially advantageous. These families will have better starting conditions for access to more resources and support. In both contexts there is a common need, lack of information and some autonomy and parenting skills in relation to the growth of children. The meetings of parents or creating parent groups that are based on the sharing of information and experiences are planned but are not a reality in these teams. In quality practices, the professional must act in natural contexts like the family or the community, but may also include routines, jokes, and parties’ etc. scenarios that v facilitate the day-to-day. Families have their own contexts and routines that professionals should identify, collect the data indicate that the need for more careful assessment of the needs of families. Best practices and legislative environment are taken into account by teachers and professional teams, the documentary resources are mostly common to all participating teams, following the guidelines and documents / drafts provided by the coordinating committee SNIPI (National Intervention Early Childhood) Despite the theoretical recommendations for quality practices family-centered, we see that these are part of the concerns of teachers, but are not always implemented. The issue of child seems to be still the most important programs and plans and even the decisive criterion for delineating the duration and frequency of interventions whether in urban or rural.
Resumo:
Distribution systems are the first volunteers experiencing the benefits of smart grids. The smart grid concept impacts the internal legislation and standards in grid-connected and isolated distribution systems. Demand side management, the main feature of smart grids, acquires clear meaning in low voltage distribution systems. In these networks, various coordination procedures are required between domestic, commercial and industrial consumers, producers and the system operator. Obviously, the technical basis for bidirectional communication is the prerequisite of developing such a coordination procedure. The main coordination is required when the operator tries to dispatch the producers according to their own preferences without neglecting its inherent responsibility. Maintenance decisions are first determined by generating companies, and then the operator has to check and probably modify them for final approval. In this paper the generation scheduling from the viewpoint of a distribution system operator (DSO) is formulated. The traditional task of the DSO is securing network reliability and quality. The effectiveness of the proposed method is assessed by applying it to a 6-bus and 9-bus distribution system.
Resumo:
Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.