942 resultados para Insider trading in securities


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern power networks incorporate communications and information technology infrastructure into the electrical power system to create a smart grid in terms of control and operation. The smart grid enables real-time communication and control between consumers and utility companies allowing suppliers to optimize energy usage based on price preference and system technical issues. The smart grid design aims to provide overall power system monitoring, create protection and control strategies to maintain system performance, stability and security. This dissertation contributed to the development of a unique and novel smart grid test-bed laboratory with integrated monitoring, protection and control systems. This test-bed was used as a platform to test the smart grid operational ideas developed here. The implementation of this system in the real-time software creates an environment for studying, implementing and verifying novel control and protection schemes developed in this dissertation. Phasor measurement techniques were developed using the available Data Acquisition (DAQ) devices in order to monitor all points in the power system in real time. This provides a practical view of system parameter changes, system abnormal conditions and its stability and security information system. These developments provide valuable measurements for technical power system operators in the energy control centers. Phasor Measurement technology is an excellent solution for improving system planning, operation and energy trading in addition to enabling advanced applications in Wide Area Monitoring, Protection and Control (WAMPAC). Moreover, a virtual protection system was developed and implemented in the smart grid laboratory with integrated functionality for wide area applications. Experiments and procedures were developed in the system in order to detect the system abnormal conditions and apply proper remedies to heal the system. A design for DC microgrid was developed to integrate it to the AC system with appropriate control capability. This system represents realistic hybrid AC/DC microgrids connectivity to the AC side to study the use of such architecture in system operation to help remedy system abnormal conditions. In addition, this dissertation explored the challenges and feasibility of the implementation of real-time system analysis features in order to monitor the system security and stability measures. These indices are measured experimentally during the operation of the developed hybrid AC/DC microgrids. Furthermore, a real-time optimal power flow system was implemented to optimally manage the power sharing between AC generators and DC side resources. A study relating to real-time energy management algorithm in hybrid microgrids was performed to evaluate the effects of using energy storage resources and their use in mitigating heavy load impacts on system stability and operational security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a method denoted as synthetic portfolio for event studies in market microstructure that is particularly interesting to use with high frequency data and thinly traded markets. The method is based on Synthetic Control Method and provides a robust data driven method to build a counterfactual for evaluating the effects of the volatility call auctions. We find that SMC could be used if the loss function is defined as the difference between the returns of the asset and the returns of a synthetic portfolio. We apply SCM to test the performance of the volatility call auction as a circuit breaker in the context of an event study. We find that for Colombian Stock Market securities, the asynchronicity of intraday data reduces the analysis to a selected group of stocks, however it is possible to build a tracking portfolio. The realized volatility increases after the auction, indicating that the mechanism is not enhancing the price discovery process.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The legitimate resolution of disputes in online environments requires a complex understanding of the social norms of the community. The conventional legal approach to resolving disputes through literal interpretation of the contractual terms of service is highly problematic because it does not take into account potential conflict with community expectations. In this paper we examine the importance of consent to community governance and argue that a purely formal evaluation of consent is insufficient to legitimately resolve disputes. As online communities continue to grow in importance to the lives of their participants, the importance of resolving disputes legitimately, with reference to the consent of the community, will also continue to grow. Real consent, however, is difficult to identify. We present a case study of botting and real money trading in EVE Online that highlights the dynamic interaction of community norms and private governance processes. Through this case study, we argue that the major challenge facing regulators of online environments is that community norms are complex, contested, and continuously evolving. Developing legitimate regulatory frameworks then depends on the ability of regulators to create efficient and acceptable modes of dispute resolution that can take into account (and acceptably resolve) the tension between formal contractual rules and complex and conflicting community understandings of acceptable behaviour.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

I have formally learned English from Year Four till the completion of my undergraduate study in China. Because of this personal history, I was keen to review this book and revisit English education in China. The list of contributors to the book includes Anwei Feng (editor) and his colleagues, who play an insider role in English language practice, research, and policy-making in ‘Greater China’. ‘Greater China’ according to Feng, can be defined as geographically close, demographically Chinese-dominated, and culturally, economically, and socio-politically interrelated countries and territories where Chinese is either the mother tongue or used as an official language.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Description Through a combination of global data analysis and focused country level analysis, this timely book provides answers to the most pertinent country and industry specific questions defining the current relationship between technology, natural resources and economic growth. Contents Contents: Preface Part I: Global Analysis 1. Economic Growth and the Environment 2. Energy Substitution and Carbon Dioxide Emissions 3. Pollution, Natural Resources, and Economic Growth 4. Trade Openness and Environmental Quality 5. Environmental Productivity 6. Energy Price-induced Technological Change 7. Trade-induced Technological Change 8. Regional Economic Integration Part II: Country-Level Analysis 9. Emissions Trading in the United States 10. Increasing Returns to Pollution Abatement in the United States 11. Policy-induced Competitiveness in the United States 12. Trade Liberalization, Technology, and the Environment 13. Policy Implementation and its Effectiveness in China 14. Clean Technological Inventions in Japan 15. Intervention of Economic Policy and its Nonlinear Effects in Japan 16. The Next Emerging Giants: India and Africa 17. Conclusion Index Further information Through a combination of global data analysis and focused country level analysis, this timely book provides answers to the most pertinent country and industry specific questions defining the current relationship between technology, natural resources and economic growth. Shunsuke Managi takes a distinctive approach by focusing on the design and implementation of environmental regulations that encourage technological progress and, in doing so, looks at ways to ensure productivity improvements in the face of increasingly stringent environmental regulations and natural resource depletion. The findings in this important book demonstrate how successful environmental policies can contribute to efficiency by encouraging, rather than inhibiting, technological innovation. Technology, Natural Resources and Economic Growth will provide a valuable resource for a wide readership including postgraduate students, researchers, academics and policy makers working in the fields of environmental and ecological economics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

I formally learned English from Year Four until the completion of my undergraduate study in China. Because of this personal history, I was keen to review this book and revisit English education in China. The list of contributors to the book includes Anwei Feng (editor) and his colleagues, who play an insider role in English language practice, research, and policy-making in “Greater China”. Greater China according to Feng, can be defined as geographically close, demographically Chinese-dominated, and culturally, economically, and socio-politically interrelated countries and territories where Chinese is either the mother tongue or used as an official language.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We consider online trading in a single security with the objective of getting rich when its price ever exhibits a large upcrossing, without risking bankruptcy. We investigate payoff guarantees that are expressed in terms of the extremity of the upcrossings. We obtain an exact and elegant characterisation of the guarantees that can be achieved. Moreover, we derive a simple canonical strategy for each attainable guarantee.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we exploit the idea of decomposition to match buyers and sellers in an electronic exchange for trading large volumes of homogeneous goods, where the buyers and sellers specify marginal-decreasing piecewise constant price curves to capture volume discounts. Such exchanges are relevant for automated trading in many e-business applications. The problem of determining winners and Vickrey prices in such exchanges is known to have a worst-case complexity equal to that of as many as (1 + m + n) NP-hard problems, where m is the number of buyers and n is the number of sellers. Our method proposes the overall exchange problem to be solved as two separate and simpler problems: 1) forward auction and 2) reverse auction, which turns out to be generalized knapsack problems. In the proposed approach, we first determine the quantity of units to be traded between the sellers and the buyers using fast heuristics developed by us. Next, we solve a forward auction and a reverse auction using fully polynomial time approximation schemes available in the literature. The proposed approach has worst-case polynomial time complexity. and our experimentation shows that the approach produces good quality solutions to the problem. Note to Practitioners- In recent times, electronic marketplaces have provided an efficient way for businesses and consumers to trade goods and services. The use of innovative mechanisms and algorithms has made it possible to improve the efficiency of electronic marketplaces by enabling optimization of revenues for the marketplace and of utilities for the buyers and sellers. In this paper, we look at single-item, multiunit electronic exchanges. These are electronic marketplaces where buyers submit bids and sellers ask for multiple units of a single item. We allow buyers and sellers to specify volume discounts using suitable functions. Such exchanges are relevant for high-volume business-to-business trading of standard products, such as silicon wafers, very large-scale integrated chips, desktops, telecommunications equipment, commoditized goods, etc. The problem of determining winners and prices in such exchanges is known to involve solving many NP-hard problems. Our paper exploits the familiar idea of decomposition, uses certain algorithms from the literature, and develops two fast heuristics to solve the problem in a near optimal way in worst-case polynomial time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A large volume of literature suggests that information asymmetry resulting from the spatial separation between investors and investments have a significant impact on the composition of investors’ domestic and international portfolios. I show that institutional factors affecting trading in tangible goods help explain a substantial portion of investors’ spatial bias. More importantly, I demonstrate that an information flow medium with breadth and richness directly linked to the bilateral commitment of resources between countries, that I measure by their trading intensity in tangible goods, is consistent with the prevailing country allocation in investors’ international portfolios.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Reports that the Competition and Markets Authority (CMA) began operations in "shadow form" on October 1, 2013 prior to it taking over the mandates of the Competition Commission and the Office of Fair Trading in April 2014. Outlines the CMA's draft guidance, issued for consultation on September 17, 2013, on prosecutions for the cartel offence. Presents links to other CMA communications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dissertação para obtenção do grau de Mestre em Engenharia Electrotécnica na Área de Especialização de Energia

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Portfolio diversification benefits have been extensively documented and acknowledge in the literature since 1952. However, the majority of the studies have focus on an equity context, and only very few on bonds. The study purposed tries to understand and measure the diversification benefits for a pure bond portfolio by investing in securities with different credit risks, maturities and even geographies. Diversification benefits were achieved under the proposed model and some conclusions were withdrawn.