A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trusted system concepts
1995
Computers & security
Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitates a generalization of the Trusted Computing Base paradigm. ...
This is the first of three related papers exploring how contemporary computer architecture affects security. ...
This work was supported by the National Security Agency under contract DAAB07-93-C-N651 and by the MITRE Corporation. ...
doi:10.1016/0167-4048(95)97025-6
fatcat:pip4tkhanfe5pla3kabvjrj6km
Redrawing the Line: Borders and Security in the Twenty-first Century
2003
International Security
This could eventually lead to the emergence of an informal, quasicontinental security perimeter. ...
Blatter, "Debordering the World of States: Towards a Multilevel System in Europe and a Multi-Polity System in North America? ...
doi:10.1162/016228803322761973
fatcat:qlejajczazcbhhtzob4cxfnw3a
A Macroprudential Perspective on the Regulatory Boundaries of U.S. Financial Assets
2022
Finance and Economics Discussion Series
We provide a quantitative measure of the regulatory perimeter—the boundary between the part of the financial sector that is subject to some form of prudential regulatory oversight and that which is not—and ...
This paper uses data from the Financial Accounts of the United States to map out the regulatory boundaries of assets held by U.S. financial institutions from a macroprudential perspective. ...
to pose a significant risk to the stability of the financial system following the crisis. ...
doi:10.17016/feds.2022.002
fatcat:nqeym2nydzaxlmyjepw2xyhuda
Spilling: Expanding Hand held Interaction to Touch Table Displays
2007
Second Annual IEEE International Workshop on Horizontal Interactive Human-Computer Systems (TABLETOP'07)
A technique is described for "spilling" the display of a hand held computer onto a much larger table top display surface. ...
We envision a nomadic model of interaction where the personal computer fits in your pocket. Such a computer is extremely limited in screen space. ...
The second issue is the security of the hand held computer. In a nomadic model of computing that uses devices encountered "in the wild" it is not safe to assume that such devices can be trusted. ...
doi:10.1109/tabletop.2007.11
dblp:conf/tabletop/OlsenCP07
fatcat:xbm4wt4yxngkvcsnyrnwefmnhe
Reconsidering the role of the reference monitor [computer system security]
Proceedings The Computer Security Foundations Workshop VII
This session combines a paper and a panel session to reexamine the role that the reference monitor plays in providing security for a computer system. It be- ...
gins with a presentation of the paper "Redrawing the Security Perimeter of a Trusted System" by ,Sterne, Benson, and Tajalli. ...
The authors propose redrawing the security perimeter of a trusted system so that it encompasses not only a conventional TCB but the Controlled Application Set (CAS), a collection of software components ...
doi:10.1109/csfw.1994.315937
dblp:conf/csfw/Sterne94
fatcat:32gygkmd3bfahgy2jmwmptc57i
The Fortification of the Arab States' Borders in the Sub-Regional contexts
2018
Paix et Securite Internationales
two rival states and the absence of a strong regional organization that can foster trust between them. ...
andreaS, P., "Redrawing the Line: Borders and Security in the Twenty-First Century." International Security 28, no. 2: 2003, p. 84. ...
by the chaotic regional system but also on the ability of Arab states to achieve equitable distribution of wealth and power. ...
doi:10.25267/paix_secur_int.2018.i6.08
fatcat:zychcpe4crhmvmawfa3mpxkvoa
Autonomic Computing for Pervasive ICT — A Whole-System Perspective
2004
BT technology journal
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent ...
In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation. ...
Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in ...
doi:10.1023/b:bttj.0000047132.31406.7f
fatcat:chxztjs6mfcmpg4f5ruwpy2ipm
Autonomic Computing for Pervasive ICT — A Whole-System Perspective
[chapter]
2006
Computer Communications and Networks
The design heuristics that we derive (which are often nature-inspired) are illustrated in the context of a number of examples that show how the use of the appropriate principles can lead to the inherent ...
In this paper we outline a number of design principles that can be applied to create systems that are autonomic in their operation. ...
Acknowledgements The authors wish to thank other members of BT's Future Technologies Group at Adastral Park for their suggestions and feedback, which have contributed to the research described here in ...
doi:10.1007/978-1-84628-429-8_19
fatcat:r7t4fdanbjexpj65kxrxndn6cu
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols
[article]
2015
arXiv
pre-print
Most of the proposed techniques, however, require the involvement of a third party, and this by itself can be viewed as another security concern. ...
These security breaches can be avoided by following a new approach that depends on data sorted, managed, and stored in encrypted form at the remote servers. ...
Section 4.5 presents an implementation of a secure relational database system. In Section 4.6 we provide performance analysis of the proposed secure database system. ...
arXiv:1508.05411v1
fatcat:avcyrno7qbd4de52wlaj5yuchi
Quo vadis Hungaria? – Arccal egy új világ felé
2020
Polgári szemle
First, the rise of cryptocurrencies and cryptoassets calls for a redrawing of regulatory boundaries. ...
discussing the regulation of ICOs as opposed to IPOs from a US perspective, states that a "change in the structure of a securities offering does not change the fundamental point that when a security is ...
doi:10.24307/psz.2020.0703
fatcat:m53cbv7rxvaazcqasc4h5koda4
Collective Discussion: Ferocious Architecture: Sovereign Spaces/Places by Design
2016
International Political Sociology
The authors in this collective discussion engage, disaggregate and unpack the triangulation of security, technology and architecture, across a range of contemporary spaces/places. ...
From quotidian to high-tech, these interventions tease out the increasing ferocity of architecture and/in its relationship with technology and security. ...
The border security assemblage is built on these everyday "trusts" that enable the circulation of data-doubles. ...
doi:10.1093/ips/olv002
fatcat:effi5dqbe5c6fe3tpoxzefgmoy
Beyond the American Century: Walter Lippmann and American Grand Strategy, 1943–1950
2011
Diplomacy & Statecraft
States as the core of an Atlantic strategic system. ...
That ambivalent Jeremiah of the press, Walter Lippmann... 1 Dean Acheson As the United States became a world power, journalist and intellectual Walter Lippmann feared that it would become its own worst ...
Atlantic, and by redrawing the map of its own hemisphere. ...
doi:10.1080/09592296.2011.625803
fatcat:b6eszb2ggvbznna6x73giezpba
Fenced in: Common property struggles in the management of communal rangelands in central Eastern Cape Province, South Africa
2010
Land Use Policy
Empirical material drawn from three case-study communities in the region is used to examine the main barriers to management of rangeland as a 'commons'. ...
Given the limited grazing available to many communities in the region, a critical aspect of this will be finding ways to legitimise current patterns of extensive resource use, which traverse existing ' ...
Acknowledgements The authors wish to thank the communities involved for their cooperation during ...
doi:10.1016/j.landusepol.2009.04.006
fatcat:c2a2qxqiozcqjnhqh7l4dkwopu
What the Nation's Best-Educated Amateur Planners Learned from Hurricane Isaac. And Gustav. And Rita and Katrina. And Cindy, Ivan, Lili, Isidore, and Georges
2012
Places
And extending that federal system — in this era of limited public budgets — would only pass the reverberations onto the next perimeter of communities. ...
The new system promises the New Orleans area protection against a storm that has a one percent chance of occurring in any given year. ...
doi:10.22269/121011
fatcat:3nzlozvpijexrfdzgi26coarue
Europe's failed 'fight' against irregular migration: ethnographic notes on a counterproductive industry
2016
Journal of Ethnic and Migration Studies
Disclosure statement No potential conflict of interest was reported by the author. ...
peer reviewers for their very helpful comments; and the numerous colleagues and research participants who have encouraged and inspired me over the years. ...
'outsourcing' drive and the launch of an 'EU Emergency Trust Fund for Africa'. ...
doi:10.1080/1369183x.2016.1139446
fatcat:pt7674tokne7nouc6waalozhym
« Previous
Showing results 1 — 15 out of 260 results