Filters








346 Hits in 9.5 sec

In-Person and Remote Participation Review at IETF: Collaborating Without Borders [article]

Lucas Andrade, Juliao Braga, Stefany Pereira, Rafael Roque, Marcelo Santos
2018 arXiv   pre-print
One of the incentives for the increased participation in IETF meetings is because it is being transmitted in real time since 2015, allowing for voice and chat interaction of remote participants.  ...  Thus, in this paper, we have as objectives to give a brief vision about how to collaborate with the IETF and to analyze the importance of this new form of participation of the face-to-face meetings that  ...  As future work we intend to analyze the influence of the organizations in the participation of the IETF.  ... 
arXiv:1805.09140v1 fatcat:rqua3pij6fhr7nq7hvdapkfqzi

In-Person and Remote Participation Review at IETF: Collaborating Without Borders

Lucas Andrade, Juliao Braga, Stefany Pereira, Rafael Roque, Marcelo Santos
2018 Anais do Workshop Pré-IETF (WPIETF)   unpublished
One of the incentives for the increased participation in IETF meetings is because it is being transmitted in real time since 2015, allowing for voice and chat interaction of remote participants.  ...  Thus, in this paper, we have as objectives to give a brief vision about how to collaborate with the IETF and to analyze the importance of this new form of participation of the face-to-face meetings that  ...  As future work we intend to analyze the influence of the organizations in the participation of the IETF.  ... 
doi:10.5753/wpietf.2018.3217 fatcat:j5ntp5srurbxxfbgk3c7e4m4bq

Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace

A. Michael Froomkin
2003 Harvard Law Review  
All participants are formally equal, and in practice all have equal access to at least the email part of the discussion, which includes written reports summarizing relevant discussions at IETF in-person  ...  Johnson & David Post, Law and Borders: The Rise of Law in Cyberspace, 48 STAN. L.  ...  scheduled for December 2002. 445 Indeed, from its early days, ICANN took a number of actions designed to establish and protect itself, without great attention to whether anyone else agreed.  ... 
doi:10.2307/1342583 fatcat:7r5574mkvzfebgzadyd5ctogly

Participation, Coordination, Agreement...Action? Evaluating the Multistakeholder Model in Internet Governance

Collin Kurre
2017 Social Science Research Network  
This is because current mechanisms for managing cross-border externalities and international public goods are imperfect at best, and unilateral decision-making has become less feasible for even the most  ...  Thomas Hale and David Held continue: Without doubt, the modern nation state has been the most effective governance technology ever devised, securing, at its best, an unprecedented level of prosperity and  ...  Country Ratification/Accession In Force  ... 
doi:10.2139/ssrn.2955231 fatcat:63aydqld4fd3tpqomi2no27euu

Lessons from ICANN: Is self-regulation of the Internet fundamentally flawed?

J. MA. E. A. Caral
2004 International Journal of Law and Information Technology  
They participate in self-regulation only in the most remote sense.  ...  consists of those persons and entities that have meaningful 19 participation in the IETF, the W3C, and ICANN -most will easily qualify as 'elephants'.  ... 
doi:10.1093/ijlit/12.1.1 fatcat:sxgq7l6hlnbfnmfjxyrt4alwgi

A heterostakeholder cooperation for sustainable internet policymaking

Luca Belli
2015 Internet Policy Review  
Secondly, it presents a selection of examples of stakeholder inclusion within policy-development processes at national and international level.  ...  Such an approach may be used to assess the diversity of interests represented within internet governance processes and strengthen pluralism of ideas and interests.  ...  Individuals’ participation may be considered as the normative core of democracy, allowing all interested[1] persons to freely express themselves, providing contributions aimed at shaping those policies  ... 
doi:10.14763/2015.2.364 fatcat:hcl2lhgi6vbdpeixdzb7gd6smi

Rethinking Privacy Online and Human Rights: The Internet's Standardisation Bodies as the Guardians of Privacy Online in the Face of Mass Surveillance

Adamantia Rachovitsa
2017 Social Science Research Network  
The article demonstrates how the technical perspective on privacy informs and enriches the manner in which the legal advisor argues about privacy, the legislator articulates the interests at stake and  ...  Second, in the area of online privacy informal law-making and international law converge in a distinctive way.  ...  of information and trans-border data flows.  ... 
doi:10.2139/ssrn.2911978 fatcat:bypaxqqbjjeajjcp6lb7x2r2im

Revisiting the firewall abolition act

P. Robinson, J. Haller
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
The classical approach to computer security, typified by firewalls, is no longer suitable to encourage and facilitate the growth and nomadic collaboration foreseen for current and future corporate environs  ...  This includes a formal definition, proposed architecture, comparison to firewalls, and references to existing technologies and research in this direction.  ...  Methodology In this paper we have investigated both the strategic and technical arguments for "a world without firewalls", by firstly reviewing the history of firewalls and seeking an understanding of  ... 
doi:10.1109/hicss.2003.1174466 dblp:conf/hicss/RobinsonH03 fatcat:wdyikxdq5ffp5ppm5jjbbfay4a

Engineering and lawyering privacy by design: understanding online privacy both as a technical and an international human rights issue

Adamantia Rachovitsa
2016 International Journal of Law and Information Technology  
The analysis looks at recent developments in the standardization work of the IETF and IAB and provides evidence of a paradigm shift with respect to integrating 'privacy by design' requirements in the Internet  ...  The IETF does not have an elected board and it enjoys financial independence. 25 Participation is free and open to all interested individuals and on an equal footing for all stakeholders (including States  ... 
doi:10.1093/ijlit/eaw012 fatcat:byzn6jlffrhr5izct7r76xyp5m

5G-ROUTES: D5.9 Report on standardisation activities and spectrum allocation recommendations [article]

Duc Pham-Minh Boris Tiomela Jou
2022 Zenodo  
next steps in [...]  ...  The preliminary gap analysis shows that work is already performed in ETSI on CAM messages and service specifications.  ...  The roaming of vehicles with service continuity and without additional costs is a key aspect for the achievement of CAM in the cross-borders situations.  ... 
doi:10.5281/zenodo.6345853 fatcat:55yntx4ogvdfpnws7swnbj4fjq

The End of the Experiment: How ICANN's Foray into Global Internet Democracy Failed

John G. Palfrey
2004 Social Science Research Network  
A systematic review of over 100,000 comments by public participants in ICANN, other inputs that the Board considered, and the Election of 2000 for five ICANN Board members, reveal that ICANN has never  ...  in an increasingly networked, less clearly bordered world.  ...  However, even the most aggressive, costly video webcast in 2001 can offer at best a more or less passive experience to those persons who watch live streaming audio and video and participate in real-time  ... 
doi:10.2139/ssrn.487644 fatcat:dipatagnbvgujibsqcsulqdpua

Evolution toward an open value system for smart mobility services

Thomas R. Casey, Timo Ali-Vehmas, Ville Valovirta
2017 Competition and Regulation in Network Industries  
Network-oriented value creation blurs the borders of participating companies and requires a mixture of internal and external value creation.  ...  Without similar regulative limitations, the IETF and the W3C collaboration structures roughly follow the power law distribution as expected.  ... 
doi:10.1177/1783591717734808 fatcat:34aehqsckjckxilropvx3u3yjq

TCP/IP: The next generation

E. G. Britton, J. Tavs, R. Bournas
1995 IBM Systems Journal  
IETF Working Group Guidelines and Procedures (RFC 1603) de- scribes how the IETF, a group open to anyone who wishes to participate in person or on line, organizes working groups to specify new Internet  ...  He manages IBM’s TCP/IP Technical Strategy group, evangelizes the use of TCP/IP in IBM products, and drives IBM’s participation in the IETF.  ... 
doi:10.1147/sj.343.0452 fatcat:p2d5xc2xpva33og7sjptb5dhb4

A survey on server-based electronic identification and signature schemes to improve eIDAS: with a new proposal for Turkey

Ozgun Erdogan, Nurdan Ayse Saran
2021 PeerJ Computer Science  
In the light of these reviews, the applicability of a server-based mobile electronic signature model without disrupting local initiatives has been examined as a case study.  ...  borders.  ...  Can remote signed eIDAS be implemented in Turkey without breaking the existing structure of local initiatives?  ... 
doi:10.7717/peerj-cs.734 pmid:34722872 pmcid:PMC8530092 fatcat:guuemwwly5ay5n6jjiuxiw3jbi

Research Trends in Existing Technologies that are Building Blocks to the Internet of Things [chapter]

Nomusa Dlodlo, Mofolo Mofolo, Lionel Masoane, Stanley Mncwabe, George Sibiya, Lawrence Mboweni
2014 Lecture Notes in Electrical Engineering  
and came up with research trends in the various technologies that are building blocks to the IoT and its relevance to South Africa.  ...  The challenge that IoT faces as a new research area, is in the identification of further research areas and the way forward.  ...  Health and mobile education in remote rural areas can be enhanced through mobile technologies. Mobile health information can be dispensed to remote areas using mobile technologies.  ... 
doi:10.1007/978-3-319-06773-5_72 fatcat:4udpimj6c5a7ffo5aybv5hjpqa
« Previous Showing results 1 — 15 out of 346 results