Search results for "Security Service"

showing 10 items of 23 documents

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Ksiądz prymas Stefan Wyszyński na uroczystościach milenijnych w Opolu i Kamieniu Śląskim (13-14 sierpnia 1966 r.) - historia i aktualność przesłania

2022

W dniach 13 i 14 sierpnia 1966 r. ks. prymas Stefan Wyszyński wziął udział w uroczystościach liturgicznych w Opolu i Kamieniu Śląskim w ramach obchodów milenium chrztu w Polsce. Wygłosił wtedy kazania w Opolu 13 i 14 sierpnia, a także 14 sierpnia w Kamieniu Śląskim. Zaangażowanie ówczesnych lokalnych władz, milicji czy Służby Bezpieczeństwa w niwelowanie znaczenia tych obchodów, a zarazem treść przesłania, z jakim do swoich rodaków zwrócił się w Opolu i Kamieniu Śląskim z 1966 r. prymas Wyszyński, dowodzą, że trudno było pozostać obojętnym wobec tego nauczania. Chociaż uwarunkowania społeczno-polityczne zmieniły się, postać prymasa i jego nauczanie wciąż inspirują. Artykuł pt. Ksiądz prymas…

Służba BezpieczeństwaKs. prymas Stefan WyszyńskiMillennium celebrations of the Baptism of Poland in OpolePrimate Wyszyński's sermonsFr. Primate Stefan Wyszyńskiuroczystości milenijne chrztu Polski w Opolukazania prymasa WyszyńskiegoSecurity Service
researchProduct

Rola byłych funkcjonariuszy komunistycznych służb specjalnych w cywilnym wywiadzie i kontrwywiadzie Polski i Czech w latach 1989–2018

2019

Czech civilian special services after 1989 were built by former officers of the communist services. In Poland and in the Czech Republic, at least at the beginning of the changes, participation in the services of members of the democratic opposition was symbolic. The officers of the communist services in both countries were gradually removed during subsequent reorganizations in the years 1990–2018. In the Czech Republic they have not been completely removed to this day. The Czech authorities deprived them of financial powers acquired in the service of a totalitarian system. The Polish authorities also deprived former security officers of the privileges acquired in service before systemic cha…

retirementPolish Security ServiceCzech services.Studia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Policing in the Slovak Republic: The Organization and Current Problems of Police Work

2013

The Police hold one of the most important roles within the modern society from the viewpoint of providing and maintaining peace, order and security. In the Slovak Republic the police have been in existence for a relatively short time, but legislation regulating their activities and structure has already undergone several reforms. This treatise contains information regarding the structure and tasks of the Police of the Slovak Republic, discusses the development of criminality within the Slovak Republic, and analyses the current social status of the Police.

Work (electrical)Security serviceOrder (exchange)Political scienceCrime ratelanguageLegislationSlovakCriminologylanguage.human_languageSocial status
researchProduct

A “Best Current Practice” for 3GPP-based cellular system security

2014

This paper is an attempt at formulating a Best Current Practice (BCP) for access security and a baseline for core network security in the 3GPP-based systems. This encompasses the 2G circuit-switched GSM system, the 2.5G packet-switched GPRS system, the 3G UMTS system and the 4G LTE/LTE-A system. The 3GPP have defined several security standards, but many measures are optional and there are several areas deliberately not covered by the 3GPP standards. The present document is therefore an attempt at pointing out the best available options and providing advice on how to achieve an overall system hardening, which is badly needed as the cellular systems have undoubtedly become one of the most cri…

GPRS core networkCustomised Applications for Mobile networks Enhanced LogicSecurity serviceComputer scienceGSMNetwork Access ControlGeneral Packet Radio ServiceComputer securitycomputer.software_genreBest current practicecomputerUMTS frequency bands2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)
researchProduct

Сборник всех правил и узаконений со всеми разъяснениями и дополнениями, о поступлении на службу вольноопределяющимися и охотниками в сухопутные войск…

1913

Министерство внутренних дел Российской империи - cборник циркуляров и инструкцийRecruitment of armed forces:HUMANITIES and RELIGION::History and philosophy subjects::History subjects::History [Research Subject Categories]Военная служба России - историяMilitārais dienests Krievijā - tiesību vēstureBruņoto spēku komplektēšana - Krievijas vēsture:SOCIAL SCIENCES::Other social sciences::Military intelligence and security service [Research Subject Categories]
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct

Pretaviācijas šaušanas vingrinājumi ar patšautenēm un ložmetējiem

1932

KaramākslaMilitārā zinātneMilitārā aviācijaMilitary artShooting military:SOCIAL SCIENCES::Other social sciences::Military intelligence and security service [Research Subject Categories]Šaušana militārāAeronautics military
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

Biskup Franciszek Jop w aktach bezpieki (1952-1976 [1979])

2016

Socjalistyczne państwo ludowe przez lata prowadziło szeroką siatkę agenturalną, obejmując kontrolą realnych, potencjalnych i wyimaginowanych przeciwników systemu. W sposób szczególny inwigilowano pasterzy Kościoła, których, razem z innymi duchownymi, uważano za główną siłę antysocjalistyczną w PRL. Jak każdy wyższy duchowny, tak i biskup Franciszek Jop inwigilowany był przez funkcjonariuszy komunistycznego aparatu bezpieczeństwa. Informacje o nim i jego działalności gromadzono już od pierwszych dni powojennych. Wraz z przejściem pasterza do archidiecezji krakowskiej w 1952 r. bezpieka założyła na biskupa Jopa sprawę agenturalno-operacyjną, którą kontynuowano po objęciu przez niego posługi p…

Kościół a Służba BezpieczeństwaDiocese of Opolebiskup Franciszek Jopthe Church and the Security Servicethe Church in the People’s Republic of PolandKościół w PRLbishop Franciszek Jopdiecezja opolska
researchProduct