Search results for "Secrecy"
showing 10 items of 22 documents
The evolutionary ecology of deception
2015
Through dishonest signals or actions, individuals often misinform others to their own benefit. We review recent literature to explore the evolutionary and ecological conditions for deception to be more likely to evolve and be maintained. We identify four conditions: (1) high misinformation potential through perceptual constraints of perceiver; (2) costs and benefits of responding to deception; (3) asymmetric power relationships between individuals and (4) exploitation of common goods. We discuss behavioural and physiological mechanisms that form a deception continuum from secrecy to overt signals. Deceptive tactics usually succeed by being rare and are often evolving under co-evolutionary a…
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs
2010
Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…
Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information
2017
In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…
Don't Tell Us: The Demand for Secretive Behaviour
2009
The matter studied here is how, and with what implications, people may decide that they do not want to be let into secrets that concern them. They could get the information at no cost but they refuse to know. The reasoning is framed in terms of principals and agents, with the principals assumed not to want to know the agents' secrets. For convenience, the context chosen for the exposition is mainly that of voters as principals and the government or the office-holders as agents. After some exploration of the motivations underlying the attitude of the principals, the paper focuses on the case when neither total secrecy nor total disclosure prevails. The demand for partial secrecy is analysed …
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs
2013
Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges.…
Beauty and the Cosmetic Secret
2018
Cosmetic surgery is often linked to the perception that women who resort to cosmetic interventions to alter their physical appearance are vain, superficial, and narcissistic. Few investigations have acknowledged and explored the individual’s personal motivations and experiences of her action and choice with regards to aesthetic surgery. By focusing on subjective experience, alternative insights can be gained on the cosmetic procedure(s) and on how their reshaped body influences an individual’s lifeworld experience. The article explores the perceived benefits and consequences of reshaping, enhancing, and/or reducing a perceived flaw or shortcoming of the body. From this exploration the focus…
Time pressure in acquisition negotiations: Its determinants and effects on parties’ negotiation behaviour choice
2008
Abstract Although negotiation literature suggests that time pressure influences negotiation behaviour, and in strategy literature, time appears as a key factor in acquisition formation, its impact on negotiation behaviour choice has not been the subject of a great deal of in-depth research. This paper focuses on the determinants of the amount of time pressure perceived by negotiation parties during acquisition negotiations and the impact on communication. The effect of cultural differences in both relationships is also analysed. The theoretical model proposed is explored by examining three acquisition negotiation cases involving Spanish firms. The evidence suggests that, contrary to expecta…
An efficient Chinese remainder theorem based node capture resilience scheme for Mobile WSNs
2010
Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion attacks. Detailed analysis shows that our scheme indeed achieves the expected design goals.
Open Government – A Long Way Ahead for Romania
2014
Abstract Although the topic of OPEN Government isn’t quite as new, the citizens of the world seem not to have acknowledged the responsibility they share with the authorities in really implementing it. Thus some progress has been made, there is still a long way ahead with regard of the active participation of the citizens, on one hand and the mitigation of the still existing extensive state secrecy, on the other. Romania has committed to achieve the goals stated in the Open Government Partnership, but there are still many things to be considered. The main aspects analyzed in this paper are: fiscal transparency, access to information, Disclosures Related to Elected or Senior Public Officials …
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…