Search results for "Security"
showing 10 items of 1693 documents
A scalable platform for safe and secure decentralized traffic management of multiagent mobile systems
2006
In this paper we describe the application of wireless sensor networking techniques to address the realization of a safe and secure decentralized traffic management system. We consider systems of many heterogeneous autonomous vehicles moving in a shared environment. Each vehicle is assumed to have different and possibly unspecified tasks, but they cooperate to avoid collisions. We are interested in designing a scalable architecture capable of accommodating a very large and dynamically changing number of vehicles, guaranteeing their safety, the achievement of their goals, and security against potential adversaries. By properly distributing and revoking cryptographic keys we are able to protec…
Information Organization and Visualization for the ALS Project
2010
This work presents the adopted methodology and the realized tools for data visualization in the Linguistic Atlas Of Sicily (ALS) Project. The ALS Project has the purpose to discovery new trends and variables to track the linguistic evolution over time and space in Sicily. The project is focused on how linguistic variables are related to social and economic aspects of the evolution of population and vice-versa. The visualization tools are a relevant aspect of the project to support decisions and disseminate results. One of the major factors is the geographic dependence of data evolution. To this aim complex set of tools has been developed: some tools are stand-alone while others are collabor…
Internet of Things Law. Of Privacy, Data Protection and Some Other Stuff
2014
The presentation at hand deals with the privacy, data protection and security aspects of the Internet of Things
Striking a Balance among Security, Privacy and Competition. The Data Retention and Investigatory Powers Act 2014 (DRIP)
2015
Following the ECJ decision that declared the Data Retention Directive invalid, the Data Retention and Investigatory Powers Act 2014 (DRIP) has been enacted. It is not indisputable whether the DRIP gives more powers to the intelligence services at the detriment of both citizens’ privacy and freedom of enterprise or whether it simply clarifies the nature and extent of obligations that can be imposed on telecommunications service providers based outside the UK under Part 1 of the Regulation of Investigatory Powers Act 2000 (RIPA). The article provides news also on Data Retention Regulations 2014, R (David Davis MP and Tom Watson MP) v Secretary of State for the Home Department and the proposed…
Lavoro e sicurezza sociale dei migranti economici: l'eguaglianza imperfetta
2021
Il saggio analizza i diritti dei migranti economici in Italia alla luce dei principi di eguaglianza e non discriminazione in chiave multilivello, in relazione ad accesso al lavoro, esecuzione del contratto e prestazioni di sicurezza sociale. Nella prospettiva dei diritti fondamentali del lavoratore il quadro normativo non è per nulla confortante: è estremamente difficile un ingresso regolare dei migranti sul territorio nazionale in virtù della legislazione di riferimento. Inoltre, sul versante dell’assistenza sociale il principio paritario soffre numerose eccezioni che di recente sono state avallate da un revirement del Giudice delle leggi nella sentenza 50/2019 in materia di assegno social…
Undeclared and precarious work between “flexicurity” and "social pollution". an heterodox approach
2015
The paper critically addresses the origins of flexicurity and argues that it lacks an archetypical definition, especially in the formulation of the EU Commission. Hence, the paper, basing on a multidisciplinary literature, considers flexicurity as any balance between flexibility and security and, therefore, proposes ordering any set of contracts, providing the same balance and with the same regulatory framework, in “communities”. It is assumed, therefore, that communities can differ either in terms of a “protective” trade-off, where the differential is not a surrogate measure of security, or in terms of an economic trade-off, where it is met by the provision of social insurance or security.…
Cloud Computing e protezione dei dati nel web 3.0
2014
Il cloud computing è un ritrovato deputato all'archiviazione, elaborazione e uso di dati su computer remoti, grazie al quale gli utenti hanno a disposizione una potenza di elaborazione quasi illimitata, non sono tenuti ad investire grandi capitali per soddisfare le proprie esigenze e possono accedere ai loro dati ovunque sia disponibile una connessione Internet. Il presente scritto si propone di contribuire ad una migliore comprensione della nuova tecnologia e alla ricostruzione dell'attuale (invero scarno) quadro giuridico, ciò che può aiutare a superare i principali problemi posti dalla nuvola al diritto dei privati e riconducibili, primariamente, alla protezione dei dati, al diritto dei …
La crimmigration e l'espulsione dello straniero-massa
2017
The article primarily aims at offering a theoretical reconstruction of the fundamen- tal characteristics of the so-called crimmigration strategy, as it appears in Italian law. The author’s main thesis is that what differentiates this strategy from the ways in which Italy has traditionally dealt with undesired foreigners is not so much the instruments that are deployed, but the way in which the foreigner him/herself is conceived: not as an individual, but as a “mass-foreigner”. The paper goes on to show how this new conception has affected the legal regulation of expulsions, as it has emerged, in Italy, during the last thirty years. Finally, the author tries to locate crimmigration within th…
Emergenza sanitaria, (in)sicurezza e interventi normativi in materia di immigrazione in Italia
2020
The recent legislative measures and practices introduced in Italy in the filed of migration have highlighted many of the juridical problems that the current sanitary crisis is posing, especially with regard to the relationship between state of emergency and constitutional rights, also with regard to the State's obligations under international law. After briefly highliting the danger in opposing individual rights and undetermined political purposes, this contribution underlines the lack of reasonableness and consistency of these interventions. Particular attention is paid to the Decree 7 April, 2020, n. 150, which states that Italian ports, in time of pandemic, cannot be considered safe port…
Introduction to "Human Rights & Security: Justifying Exceptions"
2017
Since its introduction in the 1990s1, the concept of securitization has received widespread attention well beyond the field of international relations in the context of which it first appeared. The concept indicates the discursive process in which: (i) an agent claims (securitization move) the necessity to adopt exceptional measures which bring about serious violations of otherwise binding rules, in order to protect a certain value from a grave and extraordinary threat, with the scope of convincing a specific audience to accept those measures and the violations to follow; (ii) the move is successful and the audience effectively accepts the exceptional measures (securitization). One of the p…