Search results for "Security"

showing 10 items of 1693 documents

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

Attacks Against the WAP WTLS Protocol

1999

The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.

AuthenticationWireless Transport Layer SecurityTransport Layer Securitybusiness.industryComputer scienceData integrityComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWirelessbusinessProtocol (object-oriented programming)Stream cipherBlock cipherComputer network
researchProduct

Fuzzy Fusion in Multimodal Biometric Systems

2007

Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…

AuthenticationBiometricsComputational geometryData fusionFeature extractionSecurity of dataSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni
researchProduct

Factorial structure of recklessness: To what extent are older drivers different?

2003

This study tests whether the original factorial structure of a recklessness questionnaire can be maintained for the current Spanish population of older drivers.Our recent interest in dedicating special attention to senior citizen mobility (Monterde, 2001), is due to the impending increase of the aging population in Western countries; this has led us to reinitiate the psychometric study of the construct validity, revising and including older drivers in the psychometric aspects of those evaluation instruments that will then be used in the Spanish psycho-medical check of drivers and in research.Factorial analysis was used to determine validity.There was an appearance of a different psychologic…

Automobile DrivingEngineeringPopulation ageingPsychometricsApplied psychologyPoison controlAffect (psychology)Computer securitycomputer.software_genreTraffic psychologySurveys and QuestionnairesInjury preventionHumansPsychological testingSafety Risk Reliability and QualityAgedbusiness.industryAccidents TrafficAge FactorsConstruct validityAttitudeGeriatricsSafetyRecklessnessbusinessRisk Reduction BehaviorcomputerJournal of Safety Research
researchProduct

Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Fa…

2022

Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication and authorisation, respectively. OAuth authorisation involves four parties: client, resource owner, resource server, and authorisation server. The resource owner can access the resource server using the specific client after the authorisation server has authorised the access. The authorisation is presented using a cryptographically signed Access Token, which includes the identity of the resource owner, client, and resource. During the authorisation, Azure AD assigns Ac…

Azure Active DirectoryauthorisationpilvipalvelutpääsynvalvontatodentaminenOIDCOAuthauthenticationprivilege escalationsecurityFRTtietoturvaAzure AD
researchProduct

Intervention and peace*

2018

Abstract Intervention often does not lead to peace, but rather to prolonged conflict. Indeed, we document that it is an important source of prolonged conflicts. We introduce a theoretical model of the balance of power to explain why this should be the case and to analyse how peace can be achieved: either a hot peace between hostile neighbours or the peace of the strong dominating the weak. Non-intervention generally leads to peace after defeat of the weak. Hot peace can be achieved with sufficiently strong outside intervention. The latter is thus optimal if the goal of policy is to prevent the strong from dominating the weak.

Balance (metaphysics)021110 strategic defence & security studiesEconomics and EconometricsHegemony05 social sciences0211 other engineering and technologies02 engineering and technologyManagement Monitoring Policy and LawEvolution Balance of Power Conict Hegemony PeacePower (social and political)Intervention (law)Political economy0502 economics and businessEconomicsWar050207 economicsEconomic Policy
researchProduct

The European Courts and the Security Council: Between "Dédoublement Fonctionnel" and Balancing of Values

2009

The recent case law of various international tribunals facing questions related to UN Security Council resolutions shows the clear tendency to grant primacy to the UN legal order. This trend, far from being well founded on formal arguments, appears to be a tribute to a legal order perceived as superior, and, at the same time, is revealing of the ‘value oriented’ approach followed by the courts. Such an approach can be categorized from a theoretical perspective in the light of Scelle's theory of relations between legal orders, whereby the courts implement in their respective legal orders values stemming from the UN legal order. Various critical remarks can be advanced in relation to this att…

Balance (metaphysics)Security interestValue (ethics)Human rightsmedia_common.quotation_subjectCommon lawAppealrelations between legal orders primacy of UN legal order balancing of values human rights security interestDédoublement fonctionnelBalancing of ValuesOrder (exchange)LawPolitical Science and International Relationsprimacy of the UN legal order European Court of human Rights European Court of Justice Kadi case Behrami and Saramati case balancing of interests security interest v. human rightsEuropean Court of JusticeSociologyRelation (history of concept)European Court of Human RightsLawSettore IUS/14 - DIRITTO DELL'UNIONE EUROPEAUN Security Councilmedia_commonSettore IUS/13 - DIRITTO INTERNAZIONALE
researchProduct

The eio proposal for a directive and mafia trials: Striving for balance between efficiency and procedural guarantees

2013

PD EIO could mark a turning point in the development of “European criminal procedure.” The Proposal will obtain evidence in cross-border cases and is particularly suitable for investigations on the subject of international organized crime. From the long gestation period and the contents of the Proposal emerges, however, the difficulty of making a balance between the investigation of crimes and the guarantees of the individuals involved. The use of collected of evidence from different legal systems is often an overly neglected aspect. Doubt surrounds the regulation of banking instruments, the rules on wiretapping, and all provisions for undercover investigations.

BalancePD EIOSubject (philosophy)EfficiencyDirectiveComputer securitycomputer.software_genreMafia caseBalance (accounting)Efficiency Procedural guarantees BalancesSettore IUS/16 - Diritto Processuale PenaleTurning pointOrganised crimeBusinesscomputerProcedural guaranteeLaw and economics
researchProduct

Eiropas aizsardzības stiprināšana un Baltijas valstu izaicinājumi

2018

Kopējās drošības un aizsardzības politika ir kļuvusi par vienu no lielākajām prioritātēm un kritiski apskatītāko diskusijas tematu Eiropas Savienībā, kas automātiski izveido jaunu platformu attīstībai valstīm, kuras ir vistuvāk ES ārējām robežām. Maģistra darba galvenais izvirzītais mērķis ir identificēt Eiropas Savienības aizsardzības un drošības sektora jaunās iespējas un piedāvātās metodes, kas tiks aktualizētas un īstenotas Daudzgadu finanšu shēmas (Multiannual Financial Framework) ietvaros no 2021. –2027.gadam, un piedāvāt ieteikumus un risinājumus, plānojot to iespējamo izmantošanu un pielietojumu Baltijas valstīs. Pētījuma rezultāti parāda, ka, pirmkārt, Eiropas Savienības valstis ir…

Baltic StatesCommon Security and Defence PolicyNATOEuropean Defence FundEkonomikaEuropean Union
researchProduct

Sustainability of Pension Systems in the Baltic States

2016

Objective: The objective of the paper is to identify how the concept of sustainability is understood and ensured in the pension systems of Estonia, Latvia and Lithuania; and what implications it brings to the performance of pension schemes. Research Design & Methods: Analysis of various conceptual and methodological approaches to the notion of sustainability of pension systems. Comparative analysis of present pension legislation, as well as preceding stage of pension reforms,   accompanied by a number of numerical models. Findings: The understanding of sustainability is limited by narrow ‘fiscal’ meaning in Latvia, compared to more a multifaceted concept that includes the principle of socia…

Baltic Statespension systemsStrategy and ManagementEconomics Econometrics and Finance (miscellaneous)Social sustainabilitylcsh:Social SciencesTvarumasequityNuosavas kapitalaspolicy formulationSocialinė apsauga. Pensijos / Social security. PensionsLietuva (Lithuania)CredibilityEconomicsSustainability organizationsBusiness and International ManagementSustainable developmentFinancePensionEquity (economics)Public economicsbusiness.industryRedistribution (cultural anthropology)sustainabilityPolitika / Politicslcsh:HSustainabilitybusinessPensijos / PensionsEntrepreneurial Business and Economics Review
researchProduct