Search results for "Security"
showing 10 items of 1693 documents
L’occupation de l’Iraq. Le Conseil de sécurité, le droit de la guerre et le droit des peuples à disposer d’eux-mêmes
2004
By Resolutions No. 1483 and 1511 (2003), the Security Council authorized the occupying powers in Iraq to intervene in the political and economic affairs of the occupied territory beyond the limits provided for by international law of war. At the same time, this authorization restricts the right of the Iraqui peole to self- determination, considered in its external aspect. Thus, the problem arises whether it is within the Security Council's powers to adopt resolutions which restrict the enjoyment of rights protected by rules of jus cogens. Furthermore, because the occupying government interpreted these resolutions broadly, it may be asked whether this interpretation is lawful. From a close e…
The United Citizens Organization: Public-private partnerships in global governance
2020
Can Public-Private Partnerships be applied to global affairs and governance? This paper reviews the existing relations between public and private global actors. I argue that current international politics is largely an outcome of these relations. Although for the foreseeable future the role of traditional nation-states on the global scene should not be dismissed, they come under the constant pressure of different private actors, particularly of MNCs and NGOs. If this is the case, the question of global responsibility must be raised. It has been the traditional role of governments to stand for such societal values as security and prosperity, and be responsible for their citizens. With the ch…
PIL.20-21-Unit 7. The role of the United Nations
2020
Public International Law. Unit 7. The role of the United Nations. Powerpoint of the Academic course 2020-2021.
Evaluation of a hash-compress-encrypt pipeline for storage system applications
2015
Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.
Bot recognition in a Web store: An approach based on unsupervised learning
2020
Abstract Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots) which pose a threat to the website security, privacy, and performance. To develop efficient bot detection methods and discover reliable e-customer behavioural patterns, the accurate separation of traffic generated by legitimate users and Web bots is necessary. This paper proposes a machine learning solution to the problem of bot and human session classification, with a specific application to e-commerce. The approach studied in this work explores the use of unsupervised learning (k-means and Graded Possibilistic c-Means), followed by supervised labelling of clusters, a generative learning stra…
Sprawa operacyjnego sprawdzenia kryptonim „Zakonnik”. inwigilacja ks. Henryka Surmy przez Służbę Bezpieczeństwa w latach 1974-1977
2018
Celem opracowania jest ukazanie na przykładzie jednego z zakonników sposobu postępowania Służby Bezpieczeństwa wobec duchownych, którzy znaleźli się w spektrum zainteresowania tej instytucji, z uwagi na podejrzenie prowadzenia „antypaństwowej” działalności. Tego rodzaju sprawy operacyjnego sprawdzenia zakładane były przez Służbę Bezpieczeństwa PRL bardzo często i miały na celu sprawdzenie doniesień o prowadzeniu przez duchownych działalności uznawanej przez władze komunistyczne za wrogą ustrojowi PRL. Ks. Henryk Surma, nie godząc się na komunistyczne ograniczenia praw człowieka, ani na dążenia władz PRL zmierzające do marginalizacji Kościoła, próbował na własną rękę pozyskać środki na remon…
Platform for efficient and secure data collection and exploitation in intelligent vehicular networks
2016
Nowadays, automotive area is witnessing a tremendous evolution due to the increasing growth in communication technologies, environmental sensing & perception aptitudes, and storage & processing capacities that we can find in recent vehicles. Indeed, a car is being a kind of intelligent mobile agent able to perceive its environment, sense and process data using on-board systems and interact with other vehicles or existing infrastructure. These advancements stimulate the development of several kinds of applications to enhance driving safety and efficiency and make traveling more comfortable. However, developing such advanced applications relies heavily on the quality of the data and therefore…
Pattern recognition based authentication in mobile and wireless systems
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad During last several decades’ mobile communication has aimed a dramatically development, and brought remarkable change of people’s life. Mobile communication offer wireless connectivity that enables mobility and computing in dynamic communication environments. The market demands driving the mobile communication technology development fast ever. Numbers of communication systems have been developed and numerous service providers and equipment vendors entered this market. Therefore many new advance techniques have been introduced into it which gives subscriber a larger bandwidth, more powerful proces…
Securing Assets with RFID
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…
Privacy Violation Classification of Snort Ruleset
2010
Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…