Search results for "Security"
showing 10 items of 1693 documents
Joint Border of Ukraine and the European Union: Political and Legal Aspects of Cooperation in the Field of Integrated Border Management
2020
W artykule przeanalizowano polityczne i prawne aspekty oraz dynamikę stosunków Ukrainy z UE i jej państwami członkowskimi w zakresie zintegrowanego zarządzania granicami w celu usprawnienia współpracy międzyagencyjnej i międzynarodowej, ustanowienia wspólnej kontroli celnej i przejść granicznych, organizacji wspólnych patroli, zwiększenia bezpieczeństwa i otwartości granic państwowych oraz poprawy ich funkcji integracyjnej. Zbadano zagadnienia związane ze stworzeniem i modernizacją przejść granicznych, wprowadzaniem europejskich standardów ochrony granic, kontroli celnej i innych rodzajów kontroli na granicy państwowej Ukrainy i krajów UE. Zarysowano perspektywy przystąpienia Ukrainy do sys…
A general framework for group authentication and key exchange protocols
2014
Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…
Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture
2021
To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…
Terveydenhuolto ja kyberuhkat
2019
Kyberturvallisuusstrategian vision mukaan Suomen tulee kyetä suojaamaan elintärkeät toimintonsa kyberuhkaa vastaan kaikissa tilanteissa. Terveydenhuolto on yksi elintärkeistä toiminnoista. Terveystoimiala on kyberhyökkäysten top-5-listalla ensimmäisenä. Hyökkäysten keskeisin motivaatio on potilastietojen arvo pimeillä markkinoilla. Vuonna 2015 varastettiin yli satamiljoonaa potilastietoa, jotka sisältävät rikollisille arvokkaita tietoja, kuten luottokorttinumeroita, työnantajatietoja ja sairaushistoriatietoja. Tässä artikkelissa kuvataan terveydenhuoltoon liittyviä kyberuhkia, kyberhaavoittuvuuksia ja toteutuneita kyberhyökkäyksiä kybermaailman eri ulottuvuudet kattaen. Tarkastelussa käytet…
Indicadores para la Evaluación de las Instituciones Universitarias: Validación a través del Método Delphi
2012
Artículo distribuido bajo una licencia de uso y distribución “Creative Commons Reconocimiento-No Comercial 3.0 España”.
Right to Food and Geoengineering
2023
AbstractClimate change poses grave risks to food security, and mitigation and adaptation actions have so far been insufficient to lessen the risk of climate-induced violations of the right to food. Could safeguarding the right to food, then, justify some forms of geoengineering? This article examines geoengineering through the analytical lens of the right to food. We look at the components of food security and consider how the acceptability of geoengineering relates to the right to food via its impacts on these components. Our examination shows that results vary greatly between different forms of geoengineering: while some forms of geoengineering fail to respect the right to food, certain o…
Prasa endecka wobec przejęcia władzy w Niemczech przez Adolfa Hitlera a kwestia bezpieczeństwa w Europie (styczeń-lipiec 1933)
2019
Wielki kryzys gospodarczy oraz rozgoryczenie społeczeństwa niemieckiego postanowieniami traktatu wersalskiego pomogły Adolfowi Hitlerowi w objęciu władzy w państwie, co skutkowało poważnymi zmianami w polityce wewnętrznej i zewnętrznej Rzeszy. Sytuacji w Niemczech bacznie przyglądała się również polska opinia publiczna. W artykule zbadane zostało zainteresowanie prasy endeckiej wydarzeniami, które miały miejsce bezpośrednio po upadku Republiki Weimarskiej.
Tilgangsstyring av elektronisk pasientjournal : en Delphistudie av dagens utfordringer og synliggjøring av potensielle forbedringer
2014
Masteroppgave i helse- og sosialinformatikk HSI 500 Universitetet Agder 2014 In health care, access to sensitive information about patients is a necessity in order to offer care to the patient, and maintain patient safety. At the same time it is important that the information is protected against unauthorized access, to ensure patient privacy. Access control is an essential function in electronic health records (EHR) to maintain the duality between patient safety and patient privacy by ensuring that authorized personnel are allowed access to information they need. However, care processes are often unpredictable, and a number of end users can be involved in treatment across organizational un…
I diritti umani come tema conflittuale nel Consiglio di Sicurezza delle Nazioni Unite
2019
With the end of the Cold War and the expansion of the international liberal order, human rights have entered the UN Security Council agenda. However, this has become a divisive issue. In a context of greater influence of the US and its Western allies over the decision-making process of the most important multilateral institutions, the UN above all, the interpretation allowing intrusive practices by the Security Council promoted by the Western permanent members has clashed with the defense of sovereignty promoted by Russia and China. Analyzing divisive resolutions with reference to human rights in the period 2001-2017 (Lebanon, Myanmar, Zimbabwe, Libya and Syria) and the only thematic meetin…
Sicurezza e populismo. I migranti alla frontiera del diritto penale
2023
Il presente lavoro di ricerca ha ad oggetto la criminalizzazione delle migrazioni nell'èra del cosiddetto populismo, e in particolare del populismo penale. Invero, negli ultimi anni si è assistito ad una espansione incontrollata del potere punitivo che, sotto la pressione di un bisogno collettivo di sicurezza, ha condotto ad una vera e propria disumanizzazione del diritto penale (e punitivo-amministrativo), nel duplice significato che quest’ultima espressione rivestiva secondo la giurispoeta Mireille Delmas-Marty: "quello di un diritto penale che si sta deumanizzando, e quindi deumanizzato, in quanto sempre più distante dai principi dell'umanesimo giuridico; e quello di un diritto penale de…