Filters








260 Hits in 2.5 sec

Trusted system concepts

Marshall D. Abrams, Michael V. Joyce
1995 Computers & security  
Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitates a generalization of the Trusted Computing Base paradigm.  ...  This is the first of three related papers exploring how contemporary computer architecture affects security.  ...  This work was supported by the National Security Agency under contract DAAB07-93-C-N651 and by the MITRE Corporation.  ... 
doi:10.1016/0167-4048(95)97025-6 fatcat:pip4tkhanfe5pla3kabvjrj6km

Redrawing the Line: Borders and Security in the Twenty-first Century

Peter Andreas
2003 International Security  
This could eventually lead to the emergence of an informal, quasicontinental security perimeter.  ...  Blatter, "Debordering the World of States: Towards a Multilevel System in Europe and a Multi-Polity System in North America?  ... 
doi:10.1162/016228803322761973 fatcat:qlejajczazcbhhtzob4cxfnw3a

A Macroprudential Perspective on the Regulatory Boundaries of U.S. Financial Assets

David M. Arseneau, Board of Governors of the Federal Reserve System, Grace Brang, Matt Darst, Jacob M. M. Faber, David E. Rappoport, Alexandros Vardoulakis, Board of Governors of the Federal Reserve System, Board of Governors of the Federal Reserve System, Board of Governors of the Federal Reserve System, Board of Governors of the Federal Reserve System, Board of Governors of the Federal Reserve System
2022 Finance and Economics Discussion Series  
We provide a quantitative measure of the regulatory perimeterthe boundary between the part of the financial sector that is subject to some form of prudential regulatory oversight and that which is not—and  ...  This paper uses data from the Financial Accounts of the United States to map out the regulatory boundaries of assets held by U.S. financial institutions from a macroprudential perspective.  ...  to pose a significant risk to the stability of the financial system following the crisis.  ... 
doi:10.17016/feds.2022.002 fatcat:nqeym2nydzaxlmyjepw2xyhuda

Spilling: Expanding Hand held Interaction to Touch Table Displays

Dan R. Olsen Jr., Jeffrey Clement, Aaron Pace
2007 Second Annual IEEE International Workshop on Horizontal Interactive Human-Computer Systems (TABLETOP'07)  
A technique is described for "spilling" the display of a hand held computer onto a much larger table top display surface.  ...  We envision a nomadic model of interaction where the personal computer fits in your pocket. Such a computer is extremely limited in screen space.  ...  The second issue is the security of the hand held computer. In a nomadic model of computing that uses devices encountered "in the wild" it is not safe to assume that such devices can be trusted.  ... 
doi:10.1109/tabletop.2007.11 dblp:conf/tabletop/OlsenCP07 fatcat:xbm4wt4yxngkvcsnyrnwefmnhe

Reconsidering the role of the reference monitor [computer system security]

D. Sterne, G. Benson, C. Landwehr, L. LaPadula, R. Sandhu
Proceedings The Computer Security Foundations Workshop VII  
This session combines a paper and a panel session to reexamine the role that the reference monitor plays in providing security for a computer system. It be-  ...  gins with a presentation of the paper "Redrawing the Security Perimeter of a Trusted System" by ,Sterne, Benson, and Tajalli.  ...  The authors propose redrawing the security perimeter of a trusted system so that it encompasses not only a conventional TCB but the Controlled Application Set (CAS), a collection of software components  ... 
doi:10.1109/csfw.1994.315937 dblp:conf/csfw/Sterne94 fatcat:32gygkmd3bfahgy2jmwmptc57i

The Fortification of the Arab States' Borders in the Sub-Regional contexts

Said Saddiki
2018 Paix et Securite Internationales  
two rival states and the absence of a strong regional organization that can foster trust between them.  ...  andreaS, P., "Redrawing the Line: Borders and Security in the Twenty-First Century." International Security 28, no. 2: 2003, p. 84.  ...  by the chaotic regional system but also on the ability of Arab states to achieve equitable distribution of wealth and power.  ... 
doi:10.25267/paix_secur_int.2018.i6.08 fatcat:zychcpe4crhmvmawfa3mpxkvoa

Autonomic Computing for Pervasive ICT — A Whole-System Perspective

M Shackleton, F Saffre, R Tateson, E Bonsma, C Roadknight
2004 BT technology journal  
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent  ...  In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation.  ...  Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in  ... 
doi:10.1023/b:bttj.0000047132.31406.7f fatcat:chxztjs6mfcmpg4f5ruwpy2ipm

Autonomic Computing for Pervasive ICT — A Whole-System Perspective [chapter]

M Shackleton, F Saffre, R Tateson, E Bonsma, C Roadknight
2006 Computer Communications and Networks  
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent  ...  In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation.  ...  Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in  ... 
doi:10.1007/978-1-84628-429-8_19 fatcat:r7t4fdanbjexpj65kxrxndn6cu

On the use of homomorphic encryption to secure cloud computing, services, and routing protocols [article]

Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-khatib
2015 arXiv   pre-print
Most of the proposed techniques, however, require the involvement of a third party, and this by itself can be viewed as another security concern.  ...  These security breaches can be avoided by following a new approach that depends on data sorted, managed, and stored in encrypted form at the remote servers.  ...  Section 4.5 presents an implementation of a secure relational database system. In Section 4.6 we provide performance analysis of the proposed secure database system.  ... 
arXiv:1508.05411v1 fatcat:avcyrno7qbd4de52wlaj5yuchi

Quo vadis Hungaria? – Arccal egy új világ felé

György Matolcsy
2020 Polgári szemle  
First, the rise of cryptocurrencies and cryptoassets calls for a redrawing of regulatory boundaries.  ...  discussing the regulation of ICOs as opposed to IPOs from a US perspective, states that a "change in the structure of a securities offering does not change the fundamental point that when a security is  ... 
doi:10.24307/psz.2020.0703 fatcat:m53cbv7rxvaazcqasc4h5koda4

Collective Discussion: Ferocious Architecture: Sovereign Spaces/Places by Design

Benjamin Muller, Thomas N. Cooke, Miguel de Larrinaga, Philippe M. Frowd, Deljana Iossifova, Daniela Johannes, Can E. Mutlu, Adam Nowek
2016 International Political Sociology  
The authors in this collective discussion engage, disaggregate and unpack the triangulation of security, technology and architecture, across a range of contemporary spaces/places.  ...  From quotidian to high-tech, these interventions tease out the increasing ferocity of architecture and/in its relationship with technology and security.  ...  The border security assemblage is built on these everyday "trusts" that enable the circulation of data-doubles.  ... 
doi:10.1093/ips/olv002 fatcat:effi5dqbe5c6fe3tpoxzefgmoy

Beyond the American Century: Walter Lippmann and American Grand Strategy, 1943–1950

Patrick Porter
2011 Diplomacy & Statecraft  
States as the core of an Atlantic strategic system.  ...  That ambivalent Jeremiah of the press, Walter Lippmann... 1 Dean Acheson As the United States became a world power, journalist and intellectual Walter Lippmann feared that it would become its own worst  ...  Atlantic, and by redrawing the map of its own hemisphere.  ... 
doi:10.1080/09592296.2011.625803 fatcat:b6eszb2ggvbznna6x73giezpba

Fenced in: Common property struggles in the management of communal rangelands in central Eastern Cape Province, South Africa

James Bennett, Andrew Ainslie, John Davis
2010 Land Use Policy  
Empirical material drawn from three case-study communities in the region is used to examine the main barriers to management of rangeland as a 'commons'.  ...  Given the limited grazing available to many communities in the region, a critical aspect of this will be finding ways to legitimise current patterns of extensive resource use, which traverse existing '  ...  Acknowledgements The authors wish to thank the communities involved for their cooperation during  ... 
doi:10.1016/j.landusepol.2009.04.006 fatcat:c2a2qxqiozcqjnhqh7l4dkwopu

What the Nation's Best-Educated Amateur Planners Learned from Hurricane Isaac. And Gustav. And Rita and Katrina. And Cindy, Ivan, Lili, Isidore, and Georges

Richard Campanella
2012 Places  
And extending that federal system — in this era of limited public budgets — would only pass the reverberations onto the next perimeter of communities.  ...  The new system promises the New Orleans area protection against a storm that has a one percent chance of occurring in any given year.  ... 
doi:10.22269/121011 fatcat:3nzlozvpijexrfdzgi26coarue

Europe's failed 'fight' against irregular migration: ethnographic notes on a counterproductive industry

Ruben Andersson
2016 Journal of Ethnic and Migration Studies  
Disclosure statement No potential conflict of interest was reported by the author.  ...  peer reviewers for their very helpful comments; and the numerous colleagues and research participants who have encouraged and inspired me over the years.  ...  'outsourcing' drive and the launch of an 'EU Emergency Trust Fund for Africa'.  ... 
doi:10.1080/1369183x.2016.1139446 fatcat:pt7674tokne7nouc6waalozhym
« Previous Showing results 1 — 15 out of 260 results