A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Comodo : Collaborative monitoring of commitment delegations
2018
Expert systems with applications
We propose COMODO: a framework for monitoring commitment delegations and detecting violations. ...
COMODO provides a sound and complete distributed reasoning procedure that is able to find all improper delegations of a given commitment. ...
So, X will ask Y 's collaboration (as the debtor of C m ). Accordingly, Y will run a local monitoring process about P , and report back to X. ...
doi:10.1016/j.eswa.2018.03.057
fatcat:hhqjd4haqnayvf47qirupmk3zm
Attack-Resilient TLS Certificate Transparency
2020
IEEE Access
Finally, formal security and performance evaluations prove the reliability and effectiveness of ARCT. INDEX TERMS TLS, PKI, log server, delegation of trust, collaborative identity verification. ...
However, those proposals failed to solve the root CA generous delegation of trust to intermediate CAs, non-conformant certificate-issuance by them, and lack of rigorous authentication of domain ownership ...
We envision that in an ARCT in which not just a single CA but many of them examine and collaboratively issue a certificate, stolen CA keys (e.g., Comodo and Dig-iNotar) would not by themselves be useable ...
doi:10.1109/access.2020.2996997
fatcat:y3xxu65uozd7zlr3vxty2j2vsm
DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †
2019
Sensors
Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone. ...
In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. ...
Some examples of applications that require immediate delivery can be emergency, critical system monitoring, and alert systems, among others. ...
doi:10.3390/s19153292
fatcat:bgrgjpldujctjftrxpkywnighi
Table of Contents
2016
Journal of Heredity
Reproduction and distribution by an organization or organized group without the written permission of the National Hospice and Palliative Care Organization is expressly forbidden. ...
A function may be fully or partially delegated. Full delegation allows all activities of a function to be delegated. Partial delegation allows some of the activities to be delegated. ...
Delegation of Activities or Responsibilities. ...
doi:10.1093/jhered/esv110
fatcat:kgbwielucvg4bophqhuskqd7vu
Conclusion: What Next for Privacy Seals?
[chapter]
2018
Privacy and Data Protection Seals
Comodo CA Limited which offers trust certification (Comodo Corner of Trust and Comodo Standard TrustLogo) offers Internet security software solutions, PC support and maintenance, e-mail security, back-up ...
The Institute for the Protection and Security of the Citizen of the Joint Research Centre (JRC), in collaboration with the Directorate-General for Justice (DG JUST), has launched a project on EU privacy ...
Audit/external oversight mechanisms to ensure the verification of the effectiveness of controller/processor obligations GAPP criterion 10.0 states that an entity must monitor compliance with its privacy ...
doi:10.1007/978-94-6265-228-6_9
fatcat:mpex6asr7bcwnmu7bazvkyblje
Consolidation in the DNS resolver market – how much, how fast, how dangerous?
2020
Journal of Cyber Policy
This article provides a timely analysis of the emerging trends of consolidation in the recursive DNS services market, focusing on its evolution in the last decade and discussing empirical evidence for ...
This basic, recursive function, performed in milliseconds and invisible to the user, was integrated from the beginning into the operation of Internet Service Providers (ISPs). ...
Google, Yandex) or internet security firms (Norton, Comodo Cybersecurity, etc.) . ...
doi:10.1080/23738871.2020.1722191
fatcat:n7oegmr5bnggzjieiyu3xgdhny
TLS/PKI Challenges and Certificate Pinning Techniques for IoT and M2M Secure Communications
2019
IEEE Communications Surveys and Tutorials
Considering the advent of IoT/M2M scenarios and their particularities, it is necessary to have a closer look at TLS history to evaluate the potential challenges of using TLS and PKI in these scenarios. ...
According to this, this paper provides a deep revision of several security aspects of TLS and PKI, with a particular focus on current certificate pinning solutions in order to illustrate the potential ...
Other cases as Comodo in 2011 and TurkTrust in 2013, have been also very popular examples of compromised CAs. ...
doi:10.1109/comst.2019.2914453
fatcat:lwwk7pbogfeidhc4t6wth5gvne
La experiencia de la casa de la mujer indígena Juchari Kumanchikua Michoacán, México. Una política pública de desarrollo
2021
Revista de Geografía Agrícola
of problems, operation of solutions, monitoring of impacts and results. ...
Zamudio (2011), considering planning, monitoring and budget allocation. ...
doi:10.5154/r.rga.2021.67.06
fatcat:as3af4qoyjhn5oygqf7jyea7gi
La metodología de la Evaluación Participativa de planes y acciones comunitarias. Tres experiencias de evaluación participativa en Catalunya
2014
Pedagogía Social: Revista Interuniversitaria
This involvement is what will enable the shift from dependency and delegation to proactivity taking risk and commitments (Varela, 2010) . ...
framework from the beginning of PE: a strong commitment from par-ticipants and the managers of the adequate resource's investment is necessary to be effective, as these author point out. ...
doi:10.7179/psri_2014.24.05
fatcat:zp3ajx5kp5hk7nbg27to6m7b5q
A state-of-the-art survey of malware detection approaches using data mining techniques
2018
Human-Centric Computing and Information Sciences
The fundamental commitment of this paper is taking exactness preferred standpoint of the element investigation and consolidating it into static examination keeping in mind the end goal to enlarge the precision ...
The results of both methodologies have demonstrated promising outcomes as far as discovery; they are great possibility to constitute a collaboration to expand or prove recognition frameworks as far as ...
Availability of data and materials Not applicable. ...
doi:10.1186/s13673-018-0125-x
fatcat:hagxzdxmczfe7eky5fqdgjedli
Full Issue Vol 2 No 1 (2013)
2018
Harvard Deusto Business Research
trust and commitment of human resources in achieving the organizational goals. ...
Organizations need committed employees who can maintain high levels of confidence. ...
The ability of leaders alone does not guarantee organizational performance of success. ...
doaj:402c998830d04cac999a79029472daff
fatcat:ify24exfindpdblejcczwimlhm
A decentralized framework for cross administrative domain data sharing
[article]
2020
involved in the cluster of collaborators. ...
The group membership is monitored using the IGMP -Core Based Trees (CBT) is the protocol that implements the CBT algorithm on routers. ...
doi:10.15167/camera-giancarlo_phd2020-03-19
fatcat:rf4wtwufc5bmbac7xhqllsbbsi
ESTADO Y MADUREZ DEL CONOCIMIENTO ACTUAL EN EL DEBATE ACERCA DE DIFERENCIAS Y CONVERGENCIAS DE LA CONTABILIDAD FINANCIERA Y LA CONTABILIDAD DE GESTIÓN
[chapter]
2021
Conhecimentos contemporâneos ligados a gestão de negócios
an intensive collaboration among all members of the OEMs supply chain network. ...
[...] 4.0 to getting out of control ... so this is even expected [...] [...] virtual collaboration ... so, bringing it to my area ... there will be ... a lot ... of ... collaboration with the supplier ...
Searching offline and buying online-An analysis of showrooming forms and segments. Journal of Retailing and Consumer Services, 52, 101919. Statista (2019) . ...
doi:10.35587/brj.ed.0001285
fatcat:nzmkzztebnewpaobwwnl7mreja
UN peacekeeping in Namibia
2018
Figshare
The host country, Namibia can be found on the south-western part of the African continent. ...
The United Nations Transition Assistance Group operation in Namibia in 1989 was a turning point in the shift from traditional peacekeeping procedure to a new generation of multidisciplinary process. ...
Acknowledgements The research work partly summarised in this paper was carried out in the Faculty of Mechanical Engineering and Informatics at the University of Miskolc, Hungary, as part of the TÁMOP-4.2.2 ...
doi:10.6084/m9.figshare.7022216.v1
fatcat:hvjlnc6yvjf2zhmiu6mzi35h54
Edição Completa
2020
Estudos Internacionais Revista de Relações Internacionais da PUC Minas
Brazil-
ian delegations were sent to Ghana in three different moments in 2007
to present the Brazilian experience and discuss the following topics:
Single Registry, implementation of BF, monitoring and ...
and monitor the compliance with 45 minimum thresholds. ...
Spearman's correlation coefficient can provide an overview of the relationship between the two main research parameters. ...
doi:10.5752/p.2317-773x.2020v8n2p1-120
doaj:bc00fb6e20444b86a1ceeb4465e9213f
fatcat:5mkeqlb6kbd7xgcwmihmuwetr4
« Previous
Showing results 1 — 15 out of 56 results