56 Hits in 3.7 sec

Comodo : Collaborative monitoring of commitment delegations

Özgür Kafalı, Paolo Torroni
2018 Expert systems with applications  
We propose COMODO: a framework for monitoring commitment delegations and detecting violations.  ...  COMODO provides a sound and complete distributed reasoning procedure that is able to find all improper delegations of a given commitment.  ...  So, X will ask Y 's collaboration (as the debtor of C m ). Accordingly, Y will run a local monitoring process about P , and report back to X.  ... 
doi:10.1016/j.eswa.2018.03.057 fatcat:hhqjd4haqnayvf47qirupmk3zm

Attack-Resilient TLS Certificate Transparency

Salabat Khan, Liehuang Zhu, Zijian Zhang, Mussadiq Abdul Rahim, Khalid Khan, Meng Li
2020 IEEE Access  
Finally, formal security and performance evaluations prove the reliability and effectiveness of ARCT. INDEX TERMS TLS, PKI, log server, delegation of trust, collaborative identity verification.  ...  However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conformant certificate-issuance by them, and lack of rigorous authentication of domain ownership  ...  We envision that in an ARCT in which not just a single CA but many of them examine and collaboratively issue a certificate, stolen CA keys (e.g., Comodo and Dig-iNotar) would not by themselves be useable  ... 
doi:10.1109/access.2020.2996997 fatcat:y3xxu65uozd7zlr3vxty2j2vsm

DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †

Daniel Díaz-Sánchez, Andrés Marín-Lopez, Florina Almenárez Mendoza, Patricia Arias Cabarcos
2019 Sensors  
Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.  ...  In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation.  ...  Some examples of applications that require immediate delivery can be emergency, critical system monitoring, and alert systems, among others.  ... 
doi:10.3390/s19153292 fatcat:bgrgjpldujctjftrxpkywnighi

Table of Contents

2016 Journal of Heredity  
Reproduction and distribution by an organization or organized group without the written permission of the National Hospice and Palliative Care Organization is expressly forbidden.  ...  A function may be fully or partially delegated. Full delegation allows all activities of a function to be delegated. Partial delegation allows some of the activities to be delegated.  ...  Delegation of Activities or Responsibilities.  ... 
doi:10.1093/jhered/esv110 fatcat:kgbwielucvg4bophqhuskqd7vu

Conclusion: What Next for Privacy Seals? [chapter]

Rowena Rodrigues
2018 Privacy and Data Protection Seals  
Comodo CA Limited which offers trust certification (Comodo Corner of Trust and Comodo Standard TrustLogo) offers Internet security software solutions, PC support and maintenance, e-mail security, back-up  ...  The Institute for the Protection and Security of the Citizen of the Joint Research Centre (JRC), in collaboration with the Directorate-General for Justice (DG JUST), has launched a project on EU privacy  ...  Audit/external oversight mechanisms to ensure the verification of the effectiveness of controller/processor obligations GAPP criterion 10.0 states that an entity must monitor compliance with its privacy  ... 
doi:10.1007/978-94-6265-228-6_9 fatcat:mpex6asr7bcwnmu7bazvkyblje

Consolidation in the DNS resolver market – how much, how fast, how dangerous?

Roxana Radu, Michael Hausding
2020 Journal of Cyber Policy  
This article provides a timely analysis of the emerging trends of consolidation in the recursive DNS services market, focusing on its evolution in the last decade and discussing empirical evidence for  ...  This basic, recursive function, performed in milliseconds and invisible to the user, was integrated from the beginning into the operation of Internet Service Providers (ISPs).  ...  Google, Yandex) or internet security firms (Norton, Comodo Cybersecurity, etc.) .  ... 
doi:10.1080/23738871.2020.1722191 fatcat:n7oegmr5bnggzjieiyu3xgdhny

TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications

Daniel Diaz-Sanchez, Andres Marin-Lopez, Florina Almenarez, Patricia Arias, R. Simon Sherratt
2019 IEEE Communications Surveys and Tutorials  
Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios.  ...  According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential  ...  Other cases as Comodo in 2011 and TurkTrust in 2013, have been also very popular examples of compromised CAs.  ... 
doi:10.1109/comst.2019.2914453 fatcat:lwwk7pbogfeidhc4t6wth5gvne

La experiencia de la casa de la mujer indígena Juchari Kumanchikua Michoacán, México. Una política pública de desarrollo

Julieta Escobedo Barajas, Miriam Aidé Nuñez Vera, Maricruz Barajas Pérez
2021 Revista de Geografía Agrícola  
of problems, operation of solutions, monitoring of impacts and results.  ...  Zamudio (2011), considering planning, monitoring and budget allocation.  ... 
doi:10.5154/r.rga.2021.67.06 fatcat:as3af4qoyjhn5oygqf7jyea7gi

La metodología de la Evaluación Participativa de planes y acciones comunitarias. Tres experiencias de evaluación participativa en Catalunya

Anna Planas Lladó, Pilar Pineda-Herrero, Esther Gil Pasamontes, Laia Sánchez Casals
2014 Pedagogía Social: Revista Interuniversitaria  
This involvement is what will enable the shift from dependency and delegation to proactivity taking risk and commitments (Varela, 2010) .  ...  framework from the beginning of PE: a strong commitment from par-ticipants and the managers of the adequate resource's investment is necessary to be effective, as these author point out.  ... 
doi:10.7179/psri_2014.24.05 fatcat:zp3ajx5kp5hk7nbg27to6m7b5q

A state-of-the-art survey of malware detection approaches using data mining techniques

Alireza Souri, Rahil Hosseini
2018 Human-Centric Computing and Information Sciences  
The fundamental commitment of this paper is taking exactness preferred standpoint of the element investigation and consolidating it into static examination keeping in mind the end goal to enlarge the precision  ...  The results of both methodologies have demonstrated promising outcomes as far as discovery; they are great possibility to constitute a collaboration to expand or prove recognition frameworks as far as  ...  Availability of data and materials Not applicable.  ... 
doi:10.1186/s13673-018-0125-x fatcat:hagxzdxmczfe7eky5fqdgjedli

Full Issue Vol 2 No 1 (2013)

Harvard Deusto Business Research
2018 Harvard Deusto Business Research  
trust and commitment of human resources in achieving the organizational goals.  ...  Organizations need committed employees who can maintain high levels of confidence.  ...  The ability of leaders alone does not guarantee organizational performance of success.  ... 
doaj:402c998830d04cac999a79029472daff fatcat:ify24exfindpdblejcczwimlhm

A decentralized framework for cross administrative domain data sharing [article]

involved in the cluster of collaborators.  ...  The group membership is monitored using the IGMP -Core Based Trees (CBT) is the protocol that implements the CBT algorithm on routers.  ... 
doi:10.15167/camera-giancarlo_phd2020-03-19 fatcat:rf4wtwufc5bmbac7xhqllsbbsi


Christian R. Kuster Nieves, Ana María Golpe Cervelo
2021 Conhecimentos contemporâneos ligados a gestão de negócios  
an intensive collaboration among all members of the OEMs supply chain network.  ...  [...] 4.0 to getting out of control ... so this is even expected [...] [...] virtual collaboration ... so, bringing it to my area ... there will be ... a lot ... of ... collaboration with the supplier  ...  Searching offline and buying online-An analysis of showrooming forms and segments. Journal of Retailing and Consumer Services, 52, 101919. Statista (2019) .  ... 
doi:10.35587/brj.ed.0001285 fatcat:nzmkzztebnewpaobwwnl7mreja

UN peacekeeping in Namibia

Besenyő János, Molnár Erik
2018 Figshare  
The host country, Namibia can be found on the south-western part of the African continent.  ...  The United Nations Transition Assistance Group operation in Namibia in 1989 was a turning point in the shift from traditional peacekeeping procedure to a new generation of multidisciplinary process.  ...  Acknowledgements The research work partly summarised in this paper was carried out in the Faculty of Mechanical Engineering and Informatics at the University of Miskolc, Hungary, as part of the TÁMOP-4.2.2  ... 
doi:10.6084/m9.figshare.7022216.v1 fatcat:hvjlnc6yvjf2zhmiu6mzi35h54

Edição Completa

Estudos Internacionais
2020 Estudos Internacionais Revista de Relações Internacionais da PUC Minas  
Brazil- ian delegations were sent to Ghana in three different moments in 2007 to present the Brazilian experience and discuss the following topics: Single Registry, implementation of BF, monitoring and  ...  and monitor the compliance with 45 minimum thresholds.  ...  Spearman's correlation coefficient can provide an overview of the relationship between the two main research parameters.  ... 
doi:10.5752/p.2317-773x.2020v8n2p1-120 doaj:bc00fb6e20444b86a1ceeb4465e9213f fatcat:5mkeqlb6kbd7xgcwmihmuwetr4
« Previous Showing results 1 — 15 out of 56 results