Search results for "Security"
showing 10 items of 1693 documents
A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks
2020
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…
Introduction: Security, Criminal Justice and Human Rights in Countering Terrorism in the Post 9/11 Era
2012
In the aftermath of the 9/11 attacks on New York and Washington, many commentators claimed that the world had changed ‘forever’ with international terrorism constituting one of the defining global security challenges of the twenty-first century. The renewed focus on counter-terrorism law and policy also called into question whether the lessons drawn from previous terrorism emergencies are pertinent to the post-9/11 environment. Indeed, to what extent, if at all, are the principles identified for the liberal democratic response to traditional forms of terrorism applicable to a response to contemporary international terrorism? The historical, political and security implications of 9/11 notwit…
Properties and constraints of cheating-immune secret sharing schemes
2006
AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…
Attachment representations of professionals − Influence on intervention and implications for clinical training and supervision
2015
Abstract This study focuses on the attachment background of facilitators carrying out STEEP intervention, which may be a possible source of effectiveness variation. The attachment status of 161 professionals was assessed before STEEP training. 18 were followed up to evaluate the programme’s effectiveness regarding mother infant attachment. In the larger sample ( n =161), 76% of trainees had insecure attachment representations. While attachment security had no impact on intervention efficacy, professionals with an unresolved attachment trauma were 4.4 times less effective than professionals with no unresolved attachment status. This study highlights the importance of including professional w…
One-Class Classifiers : A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection
2007
One-class classifiers employing for training only the data from one class are justified when the data from other classes is difficult to obtain. In particular, their use is justified in mobile-masquerader detection, where user characteristics are classified as belonging to the legitimate user class or to the impostor class, and where collecting the data originated from impostors is problematic. This paper systematically reviews various one-class classification methods, and analyses their suitability in the context of mobile-masquerader detection. For each classification method, its sensitivity to the errors in the training set, computational requirements, and other characteristics are consi…
Optimal Hedging of Option Portfolios with Transaction Costs
2006
One of the most successful approaches to option hedging with transaction costs is the utility based approach pioneered by Hodges and Neuberger (1989). However, this approach has one major drawback that prevents the broad application of this approach in practice: the lack of a closed-form solution. The direct numerical computations of the utility based hedging strategy are cumbersome in a practical implementation. Despite some recent advances in finding an explicit description of the utility based hedging strategy by using either asymptotic, approximation, or other methods, so far they were concerned primarily with hedging a single plain-vanilla option. However, in practice one often faces t…
Multilateral Security and the Transatlantic Coalition at the UN Security Council
2012
Reliability of Data Transmission of UAVs
2018
Drones have been recently an interesting subject of research due to their roles in accomplishing missions. Flying in a formation fleet, they form a cooperative communication system in order to improve the efficiency of the mission. For this reason, the reliability of the communication is essential to guarantee the overall performance of the fleet although the link conditions, the external factors and the hardware failures of a drone. The drones capture several images or videos of the geographical area of the mission and send them to other drones in the fleet or to the Ground Station Control (GSC). The importance is to ensure that all the data transmitted is received. In this article, we aim…
Data Mining Approach for Detection of DDoS Attacks Utilizing SSL/TLS Protocol
2015
Denial of Service attacks remain one of the most serious threats to the Internet nowadays. In this study, we propose an algorithm for detection of Denial of Service attacks that utilize SSL/TLS protocol. These protocols encrypt the data of network connections on the application layer which makes it impossible to detect attackers activity based on the analysis of packet payload. For this reason, we concentrate on statistics that can be extracted from packet headers. Based on these statistics, we build a model of normal user behavior by using several data mining algorithms. Once the model has been built, it is used to detect DoS attacks. The proposed framework is tested on the data obtained w…
A Battery-free Asset Monitoring System based on RF Wireless Power Transfer
2020
In the Internet of Things (IoT) era, asset monitoring represents an appealing implementation of Wireless Sensor Networks due to the enormous benefits associated with being able to monitor and record the exact position and transportation conditions of assets, personal objects, and the like. This kind of infrastructure enables the provision of increasingly advanced services, including the ability to measure the movement speed of a monitored asset using relatively inexpensive nodes with sensing capabilities and wireless transmission and reception. These nodes would ideally employ battery-free sensors that do not require any maintenance, but conventional power supply management systems cannot s…