WorldWideScience

Sample records for justice secured implementing

  1. Justice Secured: Implementing a Risk-Based Approach to Court Security

    Science.gov (United States)

    2008-03-01

    51 Governor Arnold Schwarzenegger , 2006-07 Budget Act (Sacramento, CA, June 30, 2006). 22 A best practice in court security management is that...52 Griebel and Phillips, “Architectural Design for Security in Courthouse Facilities,” 123-124. 53 Governor Arnold Schwarzenneger, Governor’s Budget

  2. Social Security Administration - Equal Access to Justice Act Payments

    Data.gov (United States)

    Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year data...

  3. Crime, In/Security and Mob Justice

    DEFF Research Database (Denmark)

    Orock, Rogers Tabe Egbe

    2014-01-01

    Violent crime poses important challenges for quotidian concerns over security and safety by ordinary citizens in several Africa states. This is especially so in contexts where state security agents are perceived as highly corrupt and/or where African states seem unable to “protect” their citizens...... justice is an insurgent mode of social control or securitisation as well as a contextual expression of contested sovereignty directed at the state’s unwillingness or incapacity to contain dangerous forms of violent crime.......Violent crime poses important challenges for quotidian concerns over security and safety by ordinary citizens in several Africa states. This is especially so in contexts where state security agents are perceived as highly corrupt and/or where African states seem unable to “protect” their citizens...... from violent crime. The widespread sense of anxiety over various forms of violent crime and state failure to guarantee protection for citizens generates a quest for alternative practices of safety-making that, in turn, evoke serious concerns over state power and sovereignty in Africa. Focusing on mob...

  4. Crime, In/Security and Mob Justice

    DEFF Research Database (Denmark)

    Orock, Rogers Tabe Egbe

    2014-01-01

    from violent crime. The widespread sense of anxiety over various forms of violent crime and state failure to guarantee protection for citizens generates a quest for alternative practices of safety-making that, in turn, evoke serious concerns over state power and sovereignty in Africa. Focusing on mob...... justice in Cameroon, this article argues that the political contextualisation of sovereignty must pay attention not only to the sovereign’s right to kill and let live, but also its responsibility to guarantee safety for those citizens it chooses to let live. The paper demonstrates that in Cameroon mob...

  5. DATA WAREHOUSES SECURITY IMPLEMENTATION

    Directory of Open Access Journals (Sweden)

    Burtescu Emil

    2009-05-01

    Full Text Available Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions. Later on, because of the economic tendencies and of the technological progress, the data warehou

  6. OWDP and Its Secure Implementation

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed network performance monitor and will effectively safeguard the monitor procedure against intensive attacks.

  7. Agile IT Security Implementation Methodology

    CERN Document Server

    Laskowski, Jeff

    2011-01-01

    The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted at IT security managers, directors, and architects. It is useful for anyone responsible for the deployment of IT security countermeasures. Security people with a strong knowledge of agile software development will find this book to be a good review of agile concepts.

  8. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... and international justice, with particular focus on regional arrangements. Herein “international justice” is the concept of criminal culpability and liability for internationally wrongful acts which give rise to individual criminal responsibility. The Council is unapologetically political but it is also obligated...

  9. Sécurité, justice et technologies Security, Justice and Technologies

    Directory of Open Access Journals (Sweden)

    Jean-Charles Froment

    2011-10-01

    Full Text Available Les réflexions qui structurent cet article sont issues de près de quinze années d’observation du développement du recours aux nouvelles technologies de contrôle dans le champ de la justice et de la sécurité. Elles s’appuient plus spécifiquement sur l’étude de deux d’entre elles, principalement le placement sous surveillance électronique et accessoirement la vidéosurveillance, qui ont vu leur champ d’application s’élargir considérablement en l’espace d’une vingtaine d’années. De ces travaux se dégagent neuf clés de lecture à partir desquelles on peut analyser les caractéristiques et l’impact du développement de ces technologies (la vitesse de circulation des modèles ; le jeu du marché ; la question du contrôle ; les formes de la désinstitutionnalisation du pouvoir ; la problématique des libertés ; la plasticité des usages ; les stratégies de légitimation ; les enjeux de régulation ; l’insuffisance d’évaluation.This analysis is based over 15 years of investigation about new technologies in the field of justice and security, and more specifically about electronic monitoring and CCTV which have known a strong development for the last twenty years... From these reflections, Jean-Charles Froment introduces nine analysis keys about the characteristics and the impact of the development of this technologies (speed of policy transfer; rules of market; progressive change towards a «society of control»; power conversions; human rights; plasticity of uses; legitimacy strategies; regulation challenges; weakness of evaluation.

  10. An Exploration of the Implementation of Restorative Justice in an Ontario Public School

    Science.gov (United States)

    Reimer, Kristin

    2011-01-01

    This qualitative case study explores the implementation of restorative justice within one Ontario Public School. Restorative justice is a philosophy and a process for dealing with harmful behaviour, viewing such behaviour as a violation of relationships, not rules. My research seeks to present how restorative justice has been implemented in one…

  11. EU Support for Justice and Security Sector Reform in Honduras and Guatemala

    NARCIS (Netherlands)

    van der Borgh, G.J.C.

    2016-01-01

    This desk study reviews the literature on EU programmes that supported security and justice reform in Guatemala and Honduras, focusing on two programs: the programme in support of the security sector (PASS) in Honduras and the International Commission against Impunity in Guatemala (CICIG). The

  12. What's Wrong with the Relationship between the International Court of Justice and the Security Council?

    NARCIS (Netherlands)

    Spijkers, O.

    2015-01-01

    In 1945, the drafters of the United Nations Charter provided that, whenever the UN Security Council needed advice on any legal question, it could always ask the International Court of Justice for an advisory opinion. And whenever the Council, when maintaining international peace and security, encoun

  13. Implementing Security for Active Networks in Internet

    Institute of Scientific and Technical Information of China (English)

    Tang Yin; Wang Weiran

    2003-01-01

    Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed.

  14. Information security implementations for remote monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Nilsen, C.A.

    1997-10-01

    In September 1993, President Clinton stated the United States would ensure that its fissile material meet the {open_quotes}highest standards of safety, security, and international accountability.{close_quotes} Frequent human inspection of the material could be used to ensure these standards. However, it may be more effective and less expensive to replace these manual inspections with virtual inspections via remote monitoring technologies. A successful implementation of a comprehensive remote monitoring system, however, requires significant attention to a variety of information security issues. In pursuing Project Straight-Line and the follow-on Storage Monitoring System, Sandia National Laboratories developed remote monitoring implementations that can satisfy a variety of information security requirements. Special emphasis was given to developing methods for using the Internet to disseminate the data securely. This paper describes the various information security implementations applied to the Project Straight-Line and the Storage Monitoring System. Also included is a discussion of the security provided by the Windows NT operating system.

  15. Quantum Oblivious Transfer: a secure practical implementation

    Science.gov (United States)

    Nagy, Marius; Nagy, Naya

    2016-12-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  16. Quantum Oblivious Transfer: a secure practical implementation

    Science.gov (United States)

    Nagy, Marius; Nagy, Naya

    2016-09-01

    Together with bit commitment, Oblivious Transfer is a very useful cryptographic primitive with important applications, most notably in secure multiparty computations. It has been long known that secure Quantum Oblivious Transfer can be achieved from a secure implementation of Quantum Bit Commitment. Unfortunately, it is also well known that unconditionally secure Quantum Bit Commitment is impossible, so building a secure Oblivious Transfer protocol on top of Quantum Bit Commitment is ruled out. In this paper, we propose a relatively simple quantum protocol for Oblivious Transfer which does not require qubit storage, does not rely on bit commitment as a primitive and is easily implementable with current technology, if the two actors are honest. The protocol is proven to be secure against any individual measurements and entanglement-based attacks. Any cheating attempt trying to speculate collective measurements would be considerably difficult to put in practice, even in the near future. Furthermore, the number of qubits used in our scheme (embodied as photons in a physical realization of the protocol) acts as a security parameter, making it increasingly hard to cheat.

  17. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  18. Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available The aim of this paper is to propose an approach that South Africa could follow in implementing its proposed cyber security policy. The paper proposes a Cyber Security Awareness Toolkit that is underpinned by key National Security imperatives...

  19. e-Justice Implementation at a National Scale: The Ugandan Case

    Science.gov (United States)

    Kitoogo, Fredrick Edward; Bitwayiki, Constantine

    The use of information and communications technologies has been identified as one of the means suitable for supplementing the various reforms in convalescing the performance of the justice sector. The Government of Uganda has made strides in the implementation of e-Government to effectively utilize information and communications technologies in governance. The justice players are manifested in a justice, law and order sector which is based on the the Sector Wide Approach whose basic principle is that communication, cooperation and coordination between institutions can greatly add value to service delivery within a sector. Although a subset of e-Government, e-Justice aims at improving service delivery and collaboration between all justice players through the use of ICTs and needs to be spear-headed at a sector level. This work proposes ways of harnessing the existing opportunities and methods to implement e-Justice in Uganda that will culminate into a generic framework that can be applied in similar countries.

  20. Designing, Implementing, and Evaluating Secure Web Browsers

    Science.gov (United States)

    Grier, Christopher L.

    2009-01-01

    Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…

  1. Best Implementation Practices: Disseminating New Assessment Technologies in a Juvenile Justice Agency

    Science.gov (United States)

    Young, Douglas; Moline, Karl; Farrell, Jill; Bierie, David

    2006-01-01

    Much has been written in recent years about advances in assessment technologies designed to aid decision making in the juvenile justice system. Adoption and implementation of this latest generation of actuarial tools, however, have lagged behind their development. Assessment in juvenile justice exemplifies the "science-practice gap" that…

  2. Best Implementation Practices: Disseminating New Assessment Technologies in a Juvenile Justice Agency

    Science.gov (United States)

    Young, Douglas; Moline, Karl; Farrell, Jill; Bierie, David

    2006-01-01

    Much has been written in recent years about advances in assessment technologies designed to aid decision making in the juvenile justice system. Adoption and implementation of this latest generation of actuarial tools, however, have lagged behind their development. Assessment in juvenile justice exemplifies the "science-practice gap" that…

  3. Implementation Of Law Number 11 Of 2012 Concerning Child Related Criminal Justice System Concept Restorative Justice

    National Research Council Canada - National Science Library

    Intan Karangan

    2016-01-01

    ... No. 11 of 2012 on Child Criminal Justice system. This study uses normative namely a study that discusses the problem based on the literature and legislation relating to the matter to be investigated. Law...

  4. Freedom, security and justice: the thin end of the wedge for biometrics?

    Science.gov (United States)

    Lodge, Juliet

    2007-01-01

    This paper examines an area of EU policy where the application of information and communication tecnology (ICT) poses acutely difficult problems for policymakers: freedom, security and justice. It focuses on the absence of an ethical debate about the adoption of ICT-based instruments in this area. It highlights the implausibility of simply adopting codes of ethical practice from the health sector to close the public trust deficit. It argues that health and justice professionals need to cooperate in order to create a code of ethical e-governance fit for an e-governance age.

  5. Designing and Implementing e-Justice Systems: Some Lessons Learned from EU and Canadian Examples

    Directory of Open Access Journals (Sweden)

    Giampiero Lupo

    2014-06-01

    Full Text Available Access to justice has become an important issue in many justice systems around the world. Increasingly, technology is seen as a potential facilitator of access to justice, particularly in terms of improving justice sector efficiency. The international diffusion of information systems (IS within the justice sector raises the important question of how to insure quality performance. The IS literature has stressed a set of general design principles for the implementation of complex information technology systems that have also been applied to these systems in the justice sector. However, an emerging e-justice literature emphasizes the significance of unique law and technology concerns that are especially relevant to implementing and evaluating information technology systems in the justice sector specifically. Moreover, there is growing recognition that both principles relating to the design of information technology systems themselves (“system design principles”, as well as to designing and managing the processes by which systems are created and implemented (“design management principles” can be critical to positive outcomes. This paper uses six e-justice system examples to illustrate and elaborate upon the system design and design management principles in a manner intended to assist an interdisciplinary legal audience to better understand how these principles might impact upon a system’s ability to improve access to justice: three European examples (Italian Trial Online; English and Welsh Money Claim Online; the trans-border European Union e-CODEX and three Canadian examples (Ontario’s Integrated Justice Project (IJP, Ontario’s Court Information Management System (CIMS, and British Columbia’s eCourt project.

  6. Crime Victims Support System and Restorative Justice: Possible Implementation in Malaysia

    Directory of Open Access Journals (Sweden)

    Azlinda Azman, PhD

    2013-06-01

    Full Text Available Victims’ position is increasingly acknowledged in the criminal justice system across the world. Because of that, criminal justice systems in various countries slowly transform from focusing too much on the relationship between offenders and the legal system and to between the offenders and their victims. Several programs are highlighted such as victim-offender mediation, family group conferences, reparative orders and referral orders in this article. Findings from several studies support the effectiveness of the programs on both the victims and the offenders in terms of several measurements such as satisfaction and recidivism. Looking at this revolution, Malaysian academicians and professionals are beginning to recognize restorative justice as a possible revolution to its criminal justice system, but Malaysian criminal justice system first needs to strengthen or build components that support victims of crime, as this is one of the main principles of restorative justice. Currently, Malaysia still focuses on offenders and their relationship with legal system, but not much with their own victims (physical, emotional, and psychological consequences of the crime. Several possible issues before formal implementation of restorative justice are discussed. The issues (culture, training, and attitude of Malaysian people, including the victims, offenders, and those who work with them can influence the efficiency of restorative justice programs if not identified systematically. These issues can also be the possible research areas to be ventured in the future as these researches can help in implementation.

  7. Innovation in Justice and Security by Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Myzafer ELEZI

    2013-11-01

    Full Text Available The Lisbon Treaty is a legal package which includes previous treaties, starting from the year 1957, following the Treaty of Rome and the Treaty of Nice in 2001, summarized in a single text that introduces a number of changes of the way how the European Union works, in order to make it more efficient for its citizens. This Treaty converts the European Union for the first time in a single entity, unifying pillars of its activities which are as follows: the European Communities, Common Foreign and Security Policy, and Judicial Cooperation in Criminal Matters, which so far only the European Communities had the status of judicial person. It modifies the Treaty of European Union, created by the European Union and the Treaty created by the European Community, which is in power, but do not replace them. The new Treaty gives the EU the legal framework, and necessary tools to face the future challenges and to respond to its citizen’s perspectives. The Conference will introduce all the innovations that the Treaty of Lisbon brings not only in the field of security and foreign policy of the EU, but also in those related to police and judicial cooperation regarding criminal matters.

  8. 75 FR 17622 - Equal Access to Justice Act Implementation

    Science.gov (United States)

    2010-04-07

    ...., Washington, DC 20552. The telephone number for the Telecommunications Device for the Deaf is (800) 877-8339... adjudication, without regard to whether the official is designated as a hearing examiner, administrative law... Justice Act in light of the actual relationship between the affiliated entities to consider them to...

  9. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  10. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  11. Implementation of secure AODV in MANET

    Science.gov (United States)

    Akhtar, Rizwan; Amin, Noor U.; Memon, Imran; Shah, Mohsin

    2013-03-01

    Mobile Ad hoc Networks (MANETs) comprised of autonomous and self-organizing mobile computing devices which do not have a fixed infrastructure but rather they use ad-hoc routing protocols for data transmission and reception. Ad hoc on demand distance vector (AODV) is an IP reactive routing protocol which is optimized for MANETs and it can also be used for other wireless ad-hoc networks. Nodes in network cannot perform route discovery or maintenance functions itself. This problem is resolved by using AODV as it computes the routing distance from sending node to receiving node at preset intervals. This research paper proposed Secure Routing Protocol (SRP) AODV for MANETs and its implementation. Performance of proposed SRP is compared to ordinary AODV. The simulation results reveal that proposed SRP is more efficient and secure than ordinary AODV. SRP AODV can be used for further research towards development of a commercial demand for the MANET routing protocol using Blowfish cryptosystem for encryption and decryption for secure routing in a given mobile ad hoc network.

  12. The International Court of Justice and the Legality of UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Ušiak Jaroslav

    2014-09-01

    Full Text Available Through the United Nation’s Charter, the UN Security Council represents the most powerful executive institutional body in the field of collective security. Moreover, its ultra vires acts may have distinct legal consequences. Accordingly, questions arising from these facts are whether such a large scope of competences could be abused, what are the limits of the executed power and above all, affirmation of the legality of the actions of Council. Predominantly by means of the analytical method as well as a case study of the Lockerbie case, the present study provides the related argumentative discourse. Notwithstanding the fact that the decisions of the Council appear to be without any limitations, it is obliged to act within the purposes and principles of the UN Charter. The opinion of the International Court of Justice on the legality of the SC’s actions in the field of collective security are still, however, indirectly expressed through its general function.

  13. Children in the criminal justice and secure care systems: how their mental health needs are met.

    Science.gov (United States)

    Kurtz, Z; Thornes, R; Bailey, S

    1998-10-01

    A study was made of the perceptions among relevant service providers of the mental health needs of young people considered for secure placement. Information was obtained in 1996 from 75% of departments of child and adolescent psychiatry, forensic psychiatry, social services children's services, youth justice, probation, secure units and young offender institutions in England and Wales. The findings confirm that highly disturbed young people, who may be a danger to themselves and others, may present to a wide range of services, and that their mental health needs are neither well recognized, widely understood, nor adequately met. Availability of appropriate levels and types of expertise and resource is patchy and strictly limited, within secure settings and in local community services across all agencies.

  14. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    /msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    The European Court of Justice has annulled Council Regulation (EC No 881/2002[1] freezing funds of Mr. Kadi and Al Barakaat based on Resolution 1267 (1999[2] of the United Nations Security Council[3]. In so doing, the European Court of Justice has set aside the Court of First Instance’s judgment

  15. The Evaluation of the Practical Implementation of Social Justice by the Judicial System of State

    Directory of Open Access Journals (Sweden)

    Marţian Iovan

    2015-07-01

    Full Text Available Based on a sociological research, the author of this article aims to identify the beliefs and the attitudes of a group of BA and MA students enrolled in university programs of Juridical Science, regarding their apprehension of the principles of justice - as the central value of the Romanian judicial system. This would contribute to the implementation of justice in the actual Romanian economic, political, and judicial structure. The data analysis provides the necessary information for comprehending the extensions of justice and injustice within the specific social context. A real distance between reality and the political doctrines, and the classical and post-modern philosophical theories of justice as well can be noticed. The resulting conclusions could provide solid settings in order to develop a number of strategies/public policies to shape a more honest society.

  16. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  17. Governing for Enterprise Security (GES) Implementation Guide

    Science.gov (United States)

    2007-08-01

    TR 18045: Information Technology – Security Techniques – Methodology for IT Security Evaluation (2005) • ISO/IEC 20000 : Information Technology...Infrastructure Library ( ITIL )32 • The Information Security Forum’s The Standard of Good Practice for Information Security33 • NIST Special Publications34...en.wikipedia.org/wiki/ ITIL 33 http://www.isfsecuritystandard.com/index_ns.htm 34 http://csrc.nist.gov/publications/nistpubs/index.html 35 https

  18. 77 FR 39117 - Equal Access to Justice Act Implementation Rule

    Science.gov (United States)

    2012-06-29

    ... or Social Security numbers, should not be included. Comments will not be edited to remove any..., corporation, association, or public or private organization with a net worth of not more than $7 million and... individuals, corporation or other entity that directly or indirectly controls or owns a majority of the voting...

  19. Effect of Organizational Factors on Information Security Implementations

    Science.gov (United States)

    Perez, Rafael G.

    2013-01-01

    The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…

  20. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  1. Implementing healthcare information security: standards can help.

    Science.gov (United States)

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  2. Towards a Transnational Application of the Legality Principle in the EU’s Area of Freedom, Security and Justice?

    NARCIS (Netherlands)

    Luchtman, M.J.J.P.

    2013-01-01

    The Treaty of Lisbon formulates ambitious goals for the European Union. It holds that the EU shall offer its citizens an area of freedom, security and justice, in which the free movement of citizens is guaranteed in combination with appropriate measures with respect to crime control. This wording –

  3. Reviewing the Justice and Security Hub Modality as Piloted in Liberia

    Directory of Open Access Journals (Sweden)

    Rory Keane

    2012-11-01

    Full Text Available ‘The Republic of Bangui’ or ‘the Republic of Monrovia’ are phrases we sometimes hear from practitioners to describe post conflict countries where very few services exist outside the capital city. This is especially the case for security – the critical public good in post conflict countries. In response to the need to bring security services closer to the citizens who often need them most, the Government of Liberia and the United Nations are piloting a new approach financed by the UN Peacebuilding Fund (PBF – the so-called ‘Justice and Security Hubs’. The donor community and the United Nations are watching closely. If this works, there is indication from UN officials that the model could potentially be replicated in other settings such as the East of the Democratic Republic of the Congo (DRC, Haiti and the northern states of South Sudan. If the hub concept is capable of being adapted and successful elsewhere, the United Nations will not only have added a new instrument to its peacekeeping toolkit but will also firmly demonstrate how the UN Peacebuilding Fund can in essence be catalytic in fostering long-term and comprehensive approaches to peacebuilding. This practice note outlines the process of developing and constructing the first hub in Liberia, which is due to be partly operational by the end of 2012, and provides a prognosis on its chances for success.

  4. Evolving towards a European administration of the issues of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Pablo Acosta Gallo

    2010-09-01

    Full Text Available Building Europe is a process that, for 50 years, has been characterised by a high degree of uncertainty, guided more by pragmatism than by ideological or dogmatic factors. However, the impact of the decisions adopted at the EU level on the social and legal sphere of EU citizens is one that is unquestionable and, furthermore, increasing. Among the most important aspects of EU law that have had the greatest individual impact are the measures that comprise the Area of Freedom, Security and Justice. True citizenship of the EU necessarily involves sufficient guarantees in these three areas, and the powers of the Union have committed themselves to constituting and strengthening these guarantees. Nevertheless, the successive EU enlargements have highlighted the shortcomings in this field. The entry of new countries into the EU provides economic capacity and social and cultural wealth, but it also adds new dimensions in the area of border control and of crime prevention and limitation, thereby increasing the need for greater capacity in the areas of policing and the law. Policies require institutions in order for them to be introduced. In the field of justice, Eurojust can be considered the embryo of an EU administration in this area. This is where the tension between the national and the EU is manifested.

  5. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  6. ICT Implementation Framework for Integrated National Security ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-12-01

    Dec 1, 2015 ... The role of Information, Communication and Multimedia Technology in the management of national security ... Consequently, the paper will propose a new Integrated National .... areas of the National Space Programme (NSP).

  7. Organisational justice, trust and perceptions of fairness in the implementation of agenda for change

    Energy Technology Data Exchange (ETDEWEB)

    Williamson, Keren, E-mail: williamsonk2@cardiff.ac.u [Department of Radiography, School of Healthcare Studies, Cardiff University, Heath Park, Cardiff CF14 4XN (United Kingdom); Williams, Kristy J. [Radiotherapy Department, Queen Elizabeth Hospital, Birmingham B15 2TH (United Kingdom)

    2011-02-15

    Background: Agenda for Change (AfC) was introduced to ensure equity of rewards for work of equal value, irrespective of professional background. Radiographer grades were evaluated and matched against job profiles and placed within the relevant pay bands of AfC. Equity theory suggests that individuals will make comparisons between themselves and others with regard to their rewards resulting in justice perceptions which may affect morale and work behaviours. This case study explored the justice perceptions and effect on co-worker relationships of a group of therapeutic radiographers in the process and outcomes of the implementation of AfC within their organisation. Method: An existential phenomenological approach was used and self administered questionnaires utilised for data collection. A sample of band 5-8a therapeutic radiographers from one regional Cancer Centre was questioned. Content analysis was applied to systematically and objectively categorise information into recurring themes. Findings: Open coding identified two main themes which were termed Recognition and Resentment. Data was analysed in terms of organisational justice theory and issues were identified in relation to recognition of extra-role behaviour and trust in those tasked with job matching and decision making. Conclusion: There appeared to be a perceived lack of justice in relation to the implementation of AfC, resulting in a lowering of staff morale and organisational commitment. However, no effect on co-worker relations was reported. Professional values appear to supersede issues of organisational justice, with staff asserting that patient care must override any matter of personal dissatisfaction.

  8. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  9. Hardware mechanisms and their implementations for secure embedded systems

    OpenAIRE

    QIN, JIAN

    2005-01-01

    Security issues appearing in one or another form become a requirement for an increasing number of embedded systems. Those systems, which will be used to capture, store, manipulate, and access data with a sensitive nature, have posed several unique and urgent challenges. The challenges to those embedded system require new approaches to security covering all aspects of embedded system design from architecture, implementation to the methodology. However, security is always treated by embedded sy...

  10. Implementation of Secured Car Parking Management System Using Verilog HDL

    Directory of Open Access Journals (Sweden)

    Bhavana CHENDIKA

    2015-07-01

    Full Text Available Present days usage of motor vehicles are increased day by day, it causes the pollution, traffic congestion and parking place problems. In this paper we proposed a secured car parking management system using Verilog HDL. This system has two main modules Module-1: Slot identification for parking and LCD display screens, Module-2: Security indicator will provide security to the car, if unauthorized person want to vacant the car. These modules are modeled in Verilog HDL and implemented on FPGA.

  11. Implementation of Security Facilities in Simple Network Management Protocol (SNMP)

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Simple Network Management Protocol (SNMP) is the most widely used network management protocol on TCP/IP-based networks. However, the lack of security features, notably authentication and privacy, is its weakness. To rectify this deficiency, a new version of SNMP, known as SNMPv3, is presented. The principal security facilities defined in SNMPv3 which include timeliness mechanism, authentication, privacy and access control are outlined, and a example on how to implement security features in a practical software system is given.

  12. Private cloud implementation and security : using Eucalyptus and Xen Frameworks

    OpenAIRE

    2013-01-01

    Private Cloud Implementation and Security Private cloud is a new improved way to organize and manage IT resources and services within an enterprise. This can be achieved by establishing a private cloud framework behind the corporate firewall of an enterprise. This is done in order to promote better efficiency in determining workload, usage priorities, and security threats in an enterprise as well as secure sensitive company information, which other cloud offerings may not always effective...

  13. 28 CFR Appendix D to Part 61 - Office of Justice Assistance, Research, and Statistics Procedures Relating to the Implementation...

    Science.gov (United States)

    2010-07-01

    ... Assistance, Research, and Statistics Procedures Relating to the Implementation of the National Environmental... and criminal justice by providing financial assistance and funding research and statistical programs... funded efforts; training programs, court improvement projects, research, and gathering statistical...

  14. Implementing Security in a Vulnerable CRM

    Directory of Open Access Journals (Sweden)

    Alexandru Valentin Besciu

    2015-03-01

    Full Text Available This paper work objective is to scan and analyze a web application developed in early 2013 by the author of this paperwork. The application has been improved constantly since then, but without having a security plan included. Unfortunately the application arrived at a point where the security isn’t optional anymore and it needs to be improved. In order to do this I scanned the web application files with Acunetix Web Vulnerabilities Scanner. After the analysis the results pointed which vulnerabilities the application has and how to fix them. After I had fixed the vulnerabilities I rescanned the application to see if there were any others which appeared because of the new code. After the scanning the results were good, Acunetix WVS showing only notices.

  15. Information security improving blocklist driven firewall implementation

    OpenAIRE

    2013-01-01

    The Internet has become a commodity and with it information security and privacy issues have appeared. Common threats against the end users include malware and phishing. Phishing is a social engineering technique used to mimic legit banking or social networking websites in an attempt to gain sensitive information from the user and malware is software with malicious intent. An Internet firewall is an essential component of a modern computer network and it is used to impleme...

  16. A Secure Electronic Transaction Payment Protocol Design and Implementation

    Directory of Open Access Journals (Sweden)

    Houssam El Ismaili

    2014-06-01

    Full Text Available Electronic payment is the very important step of the electronic business system, and its security must be ensured. SSL/TLS and SET are two widely discussed means of securing online credit card payments. Because of implementation issues, SET has not really been adopted by e-commerce participants, whereas, despite the fact that it does not address all security issues, SSL/TLS is commonly used for Internet e-commerce security. The three-domain (3D security schemes, including 3-D Secure and 3D SET have recently been proposed as ways of improving ecommerce transaction security. Based on our research about SSL, SET, 3D security schemes and the requirements of electronic payment, we designed a secure and efficient E-Payment protocol. The new protocol offers an extra layer of protection for cardholders and merchants. Customers are asked to enter an additional password after checkout completion to verify they are truly the cardholder, the authentication is done directly between the cardholder and card issuer using the issuer security certificate and without involving the third party (Visa, MasterCard.

  17. Towards a Transnational Application of the Legality Principle in the EU’s Area of Freedom, Security and Justice?

    Directory of Open Access Journals (Sweden)

    Michiel J.J.P. Luchtman

    2013-09-01

    Full Text Available The Treaty of Lisbon formulates ambitious goals for the European Union. It holds that the EU shall offer its citizens an area of freedom, security and justice, in which the free movement of citizens is guaranteed in combination with appropriate measures with respect to crime control. This wording – which explicitly establishes a relationship between citizenship, free movement and a common area of justice – raises certain expectations. Still, the promotion of free movement also induces conflicts of jurisdiction. EU law further encourages those conflicts by obliging Member States to establish extraterritorial jurisdiction, in order to prevent negative conflicts of jurisdiction. These types of conflict easily harm the position of the EU citizen. This contribution analyses this problem in light of the legality principle, a cornerstone of every criminal law system, which is also included in the EU Charter of Fundamental Rights. Its central argument is that with the transfer of powers from the national to the European level and the increasing horizontal intertwinement of national criminal justice systems and the resulting intensified cooperation, it is also increasingly difficult to protect EU citizens against arbitrary investigation, prosecution, conviction and punishment in Europe’s area of freedom, security and justice. EU Charter rights therefore need to be interpreted in light of their new, transnational setting. This contribution concludes with a series of recommendations for a revised European framework for choice of forum in criminal matters.

  18. Implement Security using smart card on Cloud

    Directory of Open Access Journals (Sweden)

    Amish Kumar Aman

    2013-04-01

    Full Text Available Cloud is a concept of accessing the data from theirown datacenters such that the chances ofeavesdropping have been reduced and storage costis reduced. Here in this paper we are giving a briefsurvey of various cloud based techniqueimplemented so far. Although there are varioustechniques implemented so far for the cloudcomputing but here we are giving a survey of notonly cloud based techniques but also the concept ofsmart cards for the authentication between onecloud to another cloud.

  19. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ... ADMINISTRATION Information Collection; Implementation of Information Technology Security Provision AGENCY... new information collection requirement regarding Implementation of Information Technology Security... of Information Technology Security Provision,'' under the heading ``Enter Keyword or ID''...

  20. 75 FR 733 - Implementation of the Executive Order, ``Classified National Security Information''

    Science.gov (United States)

    2010-01-05

    ... December 29, 2009 Implementation of the Executive Order, ``Classified National Security Information... entitled, ``Classified National Security Information'' (the ``order''), which substantially advances my... Information Security Oversight Office (ISOO) a copy of the department or agency regulations implementing...

  1. Access to Justice for the Wrongfully Accused in National Security Investigations

    Directory of Open Access Journals (Sweden)

    Jasminka Kalajdzic

    2009-02-01

    Full Text Available Among the casualties in the ‘war on terror’ is the presumption of innocence. It is now known that four Canadians who were the subject of investigation by the RCMP and CSIS were detained and tortured in Syria on the basis of information that originated in and was shared by Canada. None has ever been charged with a crime. On their return home, all four men called for a process that would expose the truth about the role of Canadian agencies in what happened to them, and ultimately help them clear their names and rebuild their lives. To date, in varying degrees, all four men continue to wait for that “process.” In this paper, I examine the access to justice mechanisms available to persons who are wrongfully accused of being involved in terrorist activities. Utilizing the case study of one of the four men, Abdullah Almalki, I explore the various processes available to him: (i a complaint to the relevant domestic complaints bodies, the Security Intelligence Review Committee and the Commission for Public Complaints Against the RCMP; (ii a commission of inquiry; and (iii a civil tort claim. Due in large part to the role national security confidentiality plays in these mechanisms, all three models are found to be ineffective for those seeking accountability in the national security context. Parmi les victimes de la «guerre contre le terrorisme» figure la présomption d’innocence. On sait maintenant que quatre Canadiens qui ont fait l’objet d’enquêtes par la GRC et le SCRS ont été détenus et torturés en Syrie suite à des renseignements ayant leur origine au Canada et partagés par le Canada. Nul d’entre eux n’a jamais été accusé de crime. À leur retour, tous les quatre hommes ont demandé un processus qui exposerait la vérité au sujet du rôle d’agences canadiennes dans ce qui leur est arrivé et qui éventuellement leur aiderait à rétablir leur réputation et refaire leur vie. À ce jour, à des degrés divers, tous

  2. Restorative justice in Macedonian criminal legislation and difficulties in its implementation

    Directory of Open Access Journals (Sweden)

    Bačanović Oliver

    2010-01-01

    Full Text Available The subject-matter of this paper is to provide an overview of the situation/ status within Macedonian criminal legislation as a concept whose introduction and implementation is of recent time. This issue is addressed at two levels: through the overview of the representation of restorative justice elements within the Macedonian criminal legislation and through foreseeing the difficulties considering the implementation of this concept. Regarding the second level the author especially focuses on the difficulties with which social work centers and local communities have to deal. In order to answer the posed questions the author used his own findings, as well as the findings to which he came during the direct contacts with representatives of respective institutions or on the grounds of materials that these institutions provided. In the conclusion, the author attempts to answer to the closing question: can we be satisfied with the accomplished in the area of restorative justice? The author attempts to answer on the grounds of certain indicators (political will, material assumptions, realized professional trainings and education. The author points out to the necessity of acting in the educational system as well on all levels with an aim to create indispensable critical mass within society that will have an upgraded awareness for peaceful resolution of the conflict situation.

  3. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Science.gov (United States)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  4. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Energy Technology Data Exchange (ETDEWEB)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  5. Wireless security system implemented in a mobile robot

    Directory of Open Access Journals (Sweden)

    Lemuel Uitzil

    2012-07-01

    Full Text Available This paper presents the design and implementation of a security system in which a mobile robot Lego NXT continuously monitors its surroundings while traveling in search of moving objects or people, considered unauthorized elements. An ultrasonic sensor is used for the monitoring. On suspicious movement detection, a warning signal is sent to a computer via Bluetooth technology. The mobile robot motion is observed with a camera that sends images to the computer controlling the robot remotely. The results indicate that the security system is reliable in 85% of cases.

  6. Implementation of the Juvenile Justice and Welfare Act of 2006 (RA 9344: Inputs to Policy Amendments

    Directory of Open Access Journals (Sweden)

    DR. FREDDY E. BILOG

    2014-06-01

    Full Text Available The study aimed to assess the status of implementation of RA 9433 or Juvenile Justice and Welfare Act of 2006 with respect to the various sectors namely: police; city social welfare and development and family court.. It also determine the problems encountered by the three groups of respondents and test the difference among the responses of the three groups: to determine the implication of implementation of RA 9344 to the community as perceived by three groups of respondents and based on the findings to propose inputs to policy amendments. It was found out that majority of the juvenile offenders in Batangas City are 15-17 years old, single, males, finished elementary education with crime of theft committed in 2012 and under the custody of their parents or legal guardians. Objectives, compliance, evaluation and monitoring as status of RA 9344 were implemented as a new approach in criminal justice system with juvenile offenders. Each sector experiences problems in implementing RA 9344 especially when it comes to insufficient knowledge of the child, and the parents regarding the child’s severity of crime and constitutional rights. The study found a significant relationship between the status of implementation of RA 9344 and the problems encountered. Further, there are differences between the responses of the three groups of respondents. Exemption of youth offenders in criminal responsibility has an impact on the community since the youth may repeat the crime or they could commit crime that is more severe than the previous crime committed. Additionally, compliance, evaluation and monitoring were found to be significantly related to the impact of exemption of youth offenders in criminal responsibility. Based on the findings, the study identified inputs for possible amendments of policies that govern RA 9344 towards a more efficient and effective implementation. These intervention programs such as child management training and rehabilitative program

  7. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    Science.gov (United States)

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  8. Fundamentals for immediate implementation of a quantum secured Internet

    CERN Document Server

    Barbosa, G A

    2006-01-01

    This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypted by noise at the source- are subsequently utilized for one-time-pad data encryption. The physical generated protection is not susceptible to advances in computation or mathematics. In particular, it does not depend on the difficulty of factoring numbers in primes. Also, there is no use of Linear Feed Back Shift Registers. The attacker has free access to the communication channels and may acquire arbitrary number of copies of the transmitted signal without lowering the security level. No intrusion detection method is needed.

  9. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  10. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  11. A Methodology to Implement an Information Security Management System

    Directory of Open Access Journals (Sweden)

    Alaíde Barbosa Martins

    2005-08-01

    Full Text Available Information security has actually been a major challenge to most organizations. Indeed, information security is an ongoing risk management process that covers all of the information that needs to be protected. ISO 17799 offers what companies need in order to better manage information security. The best way to implement this standard is to ease the security management process using a methodology that will define will define guidelines, procedures and tools that will be needed along the way. Hence, this paper proposes a methodology to assist companies in assessing their compliance with BS 7799/ ISO 17799 as well as planning and implementing the actions necessary to become compliant or certified to the standard. The concepts and ideas presented here had been applied in a case study involving the Cetrel S/A - Company of Environmental Protection. For this company, responsible for treatment of industrial residues generated by the Camaçari Petrochemical Complex and adjacent areas, to assure confidentiality and integrity of customers' data is a basic requirement.

  12. Design and Implementation of GSM Based Automated Home Security System

    Directory of Open Access Journals (Sweden)

    Love Aggarwal

    2014-05-01

    Full Text Available The Automated Home Security System aims at building a security system for common households using GSM modem, sensors and microcontroller. Since many years, impeccable security system has been the prime need of every man who owns a house. The increasing crime rate has further pressed the need for it. Our system is an initiative in this direction. The system provides security function by monitoring the surroundings at home for intruders, fire, gas leakages etc. using sensors and issue alerts to the owners and local authorities by using GSM via SMS. It provides the automation function as it can control (On/Off the various home appliances while the owners are away via SMS. Thus the Automated Home Security System is self-sufficient and can be relied upon undoubtedly. Also, it is capable of establishing two way communication with its owner so that he/she can keep a watch on his/her home via sensor information or live video streaming. A camera can be installed for continuous monitoring of the system and its surroundings. The system consists of two main parts: hardware and software. Hardware consists of Microcontroller, Sensors, Buzzer and GSM modem while software is implemented by tools using Embedded ‘C’.

  13. The external dimension of the Area of Freedom, Security and Justice: The case of local consular cooperation

    Directory of Open Access Journals (Sweden)

    Ana Mar Fernández Pasarín

    2010-09-01

    Full Text Available Since the beginning of the new millennium, local consular cooperation has become a priority on the European agenda. The new challenges (expressed in terms of security and public order through phenomena such as the increase in migration flows and international terrorism have emphasised the strategic role played by local consular cooperation as a means to improve the integrated management of the EU’s external borders. This article analyses the development and the institutional modalities of this type of cooperation that has been developed outside the borders of the EU, and questions the contribution of same to the construction of an Area of Freedom, Security and Justice (AFSJ within the Union.

  14. A Charity/Justice Partnership for U.S. Food Security.

    Science.gov (United States)

    Whitaker, William H.

    1993-01-01

    Contends that it is imperative to end hunger in the United States and to go beyond a national perspective, taking a global perspective to fight hunger elsewhere in the world. Sees America's first response to hunger being charity and considers charity and justice. Discusses efforts of Campaign to End Childhood Hunger and Maine Coalition for Food…

  15. Design and Implementation of Enhanced Secured Cloud Computing

    Directory of Open Access Journals (Sweden)

    M. Gayatri

    2014-03-01

    Full Text Available Cloud computing plays a major role in providing different resources in the form of web services like tax calculation web service, e-banking web service etc., for smooth running of our daily lives. We can rely on cloud computing if these useful web services are really secure enough to use. This paper focuses on analyzing limitations of current cryptographic schemes used in providing security to data on cloud and highlights the usage of Elliptic Curve Cryptography scheme (ECC used in cloud based applications and implements Elliptic curve digital signature algorithm on cloud data and compares its performance with RSA based scheme. The performance of elliptic curve cryptosystem heavily depends on an operation called point multiplication. In this paper a new point multiplication method using modified base representation is used. This method reduces the point addition as well as pint doubling operations thereby increasing the efficiency of computing time in performing encryption and decryption operations

  16. Key Considerations in Providing a Free Appropriate Public Education for Youth with Disabilities in Juvenile Justice Secure Care Facilities. Issue Brief

    Science.gov (United States)

    Gagnon, Joseph C.; Read, Nicholas W.; Gonsoulin, Simon

    2015-01-01

    Access to high-quality education for youth is critical to their long-term success as adults. Youth in juvenile justice secure care facilities, however, too often do not have access to the high-quality education and related supports and services that they need, particularly youth with disabilities residing in such facilities. This brief discusses…

  17. Towards an integrative post-2015 sustainable development goal framework: Focusing on global justice – peace, security and basic human rights

    Directory of Open Access Journals (Sweden)

    George R. Lueddeke

    2015-12-01

    To strengthen the likelihood of realizing the post-2015 Sustainable Development Goals (SDGs, particularly with regard to “planet and population” health and well-being , UN and other decision-makers are urged to consider the adoption of an integrated SDG framework that is based on (i a vision of global justice - underpinned by peace, security and basic human rights; (ii the development of interdependent and interconnected strategies for each of the eleven thematic indicators identified in the UN document The World We Want; and (iii the application of guiding principles to measure the impact of SDG strategies in terms of holism, equity, sustainability, ownership, and global obligation. While current discussions on the SDGs are making progress in a number of areas, the need for integration of these around a common global vision and purpose seems especially crucial to avoid MDG shortcomings.

  18. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  19. Cristina Dâmboeanu, Assessments of the efficient implementation of restorative justice in Romania

    Directory of Open Access Journals (Sweden)

    Sorin M. Rădulescu

    2008-01-01

    Full Text Available During the last years, the juvenile justice system in Romania has faced many difficulties which have determined, experimentally at least, the change of the emphasis laid upon the model of retributive (official justice and the adoption of a new model based upon the increasing role played by community in the justice act and, complementarily, in the activities meant to re-socialize and re-insert juvenile offenders. In this context, more and more specialists of this field have got aware of the necessity of change with respect to criminal law policies meant for the punishment and treatment of juvenile offenders in Romania, by diversifying the intervention and prevention modalities of action conducted by the institutions meant to socialize and control youth from a social point of view, and especially by introducing principles and practices of restorative justice within the criminal law. The latter are meant to lead to the implication of community in the criminal law system and to an increasing number of juvenile offenders who should profit by punishments which are non-liberty-privative. The experience of many countries has demonstrated that the introduction of restorative justice practices within juvenile legislation may become on long term a living alternative to retributive justice. Both systems can function in parallell, thus offering much more efficient solutions to the problems concerning juvenile crime and punishments meant for juvenile offenders.

  20. ConstitutionalJustice: Cases of Protection of Freedom and Personal Security in Colombia

    Directory of Open Access Journals (Sweden)

    Viridiana Molinares Hassan

    2014-07-01

    Full Text Available In this paper we present the results of an investigation about judicial protection of freedom and personal security granted by the Constitutional Court (cc of Colombia, with a comparative analysis between the period 1992-2001, to which governments have appointed period of postconstitucionales, which coincides with the issuance of the 1991 Constitution, and the creation of constitutional jurisdiction, and the period 2002-2010, during which it ran the Democratic Security Policy (dsp as a government policy proposal by former president Álvaro Uribe, whose aim was to achieve peace through the declaration of war to the guerrilla group Revolutionary Armed Forces of Colombia (farc. Our interest is to show that the protection of freedom and personal security as the basis of the Constitutional (ec finds in the cc his greatest guarantor, even against closing courts in other jurisdictions that are still rooted in the failed legal positivist paradigm, ignoring the postulates of neoconstitutionalism dc sufficiently developed from a process of creative interpretation and decision-making. This coupled with the importance for the branches of power and knowledge associated scope of freedom and personal security developed by the cc in the difficult context of irregular warfare that exists in Colombia, yet it is, for universal constitutionalism, an example of the development of legal guarantor in the context of current constitutionalism.

  1. Design and Implementation of the Security Subsystem in Payroll Management System

    Institute of Scientific and Technical Information of China (English)

    Zeyad M.Ali Alfawaer; GuiWeihua; Chen Xiaofang

    2002-01-01

    This paper designs a security subsystem based on password protection and triggers mechanism in database management systems. Structure and function of the security subsystem is described in a payroll management system as an example of how the security subsystem gives additional security from possible intended or accidental attacks to the entire database system. The security subsystem involves password protection, triggers and improved physical storage mechanism, which combine together to be integrity to enhance security performance.Implementation of the security subsystem in a payroll database has proved its effectiveness.

  2. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  3. Globalization of water and food through international trade: impacts on food security, resilience and justice

    Science.gov (United States)

    D'Odorico, P.; Carr, J. A.; Seekell, D. A.; Suweis, S. S.

    2015-12-01

    The global distribution of water resources in general depends on geographic conditions but can be (virtually) modified by humans through mechanisms of globalization, such as trade, that make food commodities available to populations living far from the production regions. While trade is expected to improve access to food and (virtual) water, its impact on the global food system and its vulnerability to shocks remains poorly understood. It is also unclear who benefits from trade and whether it contributes to inequality and justice in resource redistribution. We reconstruct the global patterns of food trade and show with a simple model how the ongoing intensification of imports and exports has eroded the resilience of the global food system. Drawing on human rights theory, we investigate the relationship between inequality and injustice in access to water and food. We assess the fulfillment of positive and negative water and food rights and evaluate the obligations arising from the need to ensure that these rights are met throughout the world. We find that trade enhances the vulnerability to shocks but overall increase the number of people whose water and food rights are met.

  4. Advancing the Interdisciplinary Collaborative Health Team Model: Applying Democratic Professionalism, Implementation Science, and Therapeutic Alliance to Enact Social Justice Practice.

    Science.gov (United States)

    Murphy, Nancy

    2015-01-01

    This essay reframes the interdisciplinary collaborative health team model by proposing the application of 3 foundational pillars-democratic professionalism, implementation science, and therapeutic alliance to advance this practice. The aim was to address challenges to the model, enhance their functional capacity, and explicate and enact social justice practices to affect individual health outcomes while simultaneously addressing health inequities. The pillars are described and examples from the author's dissertation research illustrate how the pillars were used to bring about action. Related theories, models, and frameworks that have negotiation, capacity building, collaboration, and knowledge/task/power sharing as central concepts are presented under each of the pillars.

  5. 3 CFR - Implementation of the Executive Order, “Classified National Security Information”

    Science.gov (United States)

    2010-01-01

    ... 3 The President 1 2010-01-01 2010-01-01 false Implementation of the Executive Order, âClassified National Security Informationâ Presidential Documents Other Presidential Documents Memorandum of December 29, 2009 Implementation of the Executive Order, “Classified National Security Information” Memorandum for the Heads of Executive Departments...

  6. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  7. Implementing message systems in multilevel secure environments: Problems and approaches

    Science.gov (United States)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  8. Implementing and sustaining evidence-based practice in juvenile justice: a case study of a rural state.

    Science.gov (United States)

    Rocque, Michael; Welsh, Brandon C; Greenwood, Peter W; King, Erica

    2014-09-01

    US juvenile justice is at the forefront of experimentation with the evidence-based paradigm, whereby the best available research is utilized to help inform more rational and effective practice. Increasingly, state governments are playing a major role in this endeavor. Maine is one of these states and is the focus of this article. Using a case-study design, we set out to develop a fuller understanding of the events and processes that have contributed to the development, implementation, and sustainment of evidence-based practice in juvenile justice in the state. Four major themes emerged. First, Maine has benefited from strong and lasting leadership within its corrections department. These leaders paved the way for the implementation and sustainment of programs, including finding innovative ways to use existing resources. Second, the adoption of the Risk-Need-Responsivity model was important in laying the groundwork for the use of evidence-based programming. Third, collaborations within and among state agencies and public and private groups were essential. Finally, buy-in and support from multiple stakeholders was and continues to be essential to Maine's work. Ongoing problems remain with respect to ensuring agencies prioritize fidelity to the model and locating increasingly scarce funding. Implications for other states are discussed. © The Author(s) 2013.

  9. Design and Implementation of Web Services Security Based on Message Layer

    Institute of Scientific and Technical Information of China (English)

    WANG Cui-ru; XU Zheng-wei; YUAN He-jin; MA Hui-min

    2004-01-01

    Along with the development of Internet, Web Services technology is a new branch of Web application program, and it has become a hotspot in computer science.However, it has not made great progress in research on Web Services security.Traditional security solutions cannot satisfy the Web Services security require of selective protection, end-to-end security and application layer security.Web Services technology needs a solution integrated in Web Services framework to realize end-to-end security.Based on cryptography and Web Services technology and according to W3C, XML encryption specification, XML digital Signature specification and WS-Security, which proposed by IBM and Microsoft, a new Web services security model based on message layer is put forward in this paper.The message layer is composed of message handlers.It is inserted into the message processing sequence and provides transparent security services for Web Services.To verify the model, a Web Services security system is realized on .net platform.The implementation version of the model can provide various security services, and has advantages such as security, scalability, security controllability and end-to-end security in message level.

  10. Implementing Improved Security and Encryption for Balloon Flight Systems

    Science.gov (United States)

    Denney, Andrew; Stilwell, Bryan D.

    The Columbia Scientific Balloon Facility uses a broad array of communication techniques be-tween its balloon-borne flight systems and ground command and control systems. These com-munication mediums vary from commercially available routing such as e-mail and IP based TCP/UDP protocols to military grade proprietary line-of-sight configurations; each with their own unique benefits and shortfalls. While each new advancement in technology improves secu-rity in some capacity, it does not always address the limitation of older, less advanced security or encryption capabilities. As the proliferation of newer, more commercially viable technologies become common place, safeguarding mission critical applications from unauthorized access and improve data integrity in the process becomes ever more necessary. Therefore, this paper will evaluate several security measures and methods of data encryption; including formalizing a standardized security philosophy that improves and addresses the mixture of established and emerging technologies.

  11. IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION

    Directory of Open Access Journals (Sweden)

    MATÚŠ HORVÁTH

    2009-12-01

    Full Text Available Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions. However, smaller organizations are often discourages with the implementation of these systems, because of fear of high cost and complexity. Especially due to the fact that the standards does not strictly require implementation of all security controls it is possible to implement these systems in small-size organizations. In this article, we want to point on this fact through describing practical experience with ISMS implementation in small-size organization.

  12. Adapting and implementing an evidence-based treatment with justice-involved adolescents: the example of multidimensional family therapy.

    Science.gov (United States)

    Liddle, Howard A

    2014-09-01

    For over four decades family therapy research and family centered evidence-based therapies for justice-involved youths have played influential roles in changing policies and services for these young people and their families. But research always reveals challenges as well as advances. To be sure, demonstration that an evidence-based therapy yields better outcomes than comparison treatments or services as usual is an accomplishment. But the extraordinary complexity embedded in that assertion feels tiny relative to what we are now learning about the so-called transfer of evidence-based treatments to real world practice settings. Today's family therapy studies continue to assess outcome with diverse samples and presenting problems, but research and funding priorities also include studying particular treatments in nonresearch settings. Does an evidence-based intervention work as well in a community clinic, with clinic personnel? How much of a treatment has to change to be accepted and implemented in a community clinic? Perhaps it is the setting and existing procedures that have to change? And, in those cases, do accommodations to the context compromise outcomes? Thankfully, technology transfer notions gave way to more systemic, dynamic, and frankly, more family therapy-like conceptions of the needed process. Implementation science became the more sensible, as well as the theoretically and empirically stronger overarching framework within which the evidence-based family based therapies now operate. Using the example of Multidimensional Family Therapy, this article discusses treatment development, refinement, and implementation of that adapted approach in a particular clinical context-a sector of the juvenile justice system-juvenile detention. © 2014 FPI, Inc.

  13. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  14. HARDWARE IMPLEMENTATION OF SECURE AODV FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    S. Sharmila

    2010-12-01

    Full Text Available Wireless Sensor Networks are extremely vulnerable to any kind of routing attacks due to several factors such as wireless transmission and resource-constrained nodes. In this respect, securing the packets is of great importance when designing the infrastructure and protocols of sensor networks. This paper describes the hardware architecture of secure routing for wireless sensor networks. The routing path is selected using Ad-hoc on demand distance vector routing protocol (AODV. The data packets are converted into digest using hash functions. The functionality of the proposed method is modeled using Verilog HDL in MODELSIM simulator and the performance is compared with various target devices. The results show that the data packets are secured and defend against the routing attacks with minimum energy consumption.

  15. Security System in United Storage Network and Its Implementation

    Institute of Scientific and Technical Information of China (English)

    黄建忠; 谢长生; 韩德志

    2005-01-01

    With development of networked storage and its applications, united storage network (USN) combined with network attached storage (NAS) and storage area network (SAN) has emerged. It has such advantages as high performance, low cost, good connectivity, etc. However the security issue has been complicated because USN responds to block I/O and file I/O requests simultaneously. In this paper, a security system module is developed to prevent many types of atl~cks against USN based on NAS head.The module not only uses effective authentication to prevent unauthorized access to the system data, but also checks the data integrity.Experimental results show that the security module can not only resist remote attacks and attacks from those who has physical access to the USN, but can also be seamlessly integrated into underlying file systems, with little influence on their performance.

  16. Implementing security in computer based patient records clinical experiences.

    Science.gov (United States)

    Iversen, K R; Heimly, V; Lundgren, T I

    1995-01-01

    In Norway, organizational changes in hospitals and a stronger focus on patient safety have changed the way of organizing and managing paper based patient records. Hospital-wide patient records tend to replace department based records. Since not only clinicians, but also other non-medical staff have access to the paper records, they also have easy access to all the information which is available on a specific patient; such a system has obvious 'side effects' on privacy and security. Computer based patient records (CPRs) can provide the solution to this apparent paradox if the complex aspects of security, privacy, effectiveness, and user friendliness are focused on jointly from the outset in designing such systems. Clinical experiences in Norway show that it is possible to design patient record systems that provide a very useful tool for clinicians and other health care personnel (HCP) while fully complying with comprehensive security and privacy requirements.

  17. Multiple-Channel Security Architecture and its Implementation over SSL

    Directory of Open Access Journals (Sweden)

    Song Yong

    2006-01-01

    Full Text Available This paper presents multiple-channel SSL (MC-SSL, an architecture and protocol for protecting client-server communications. In contrast to SSL, which provides a single end-to-end secure channel, MC-SSL enables applications to employ multiple channels, each with its own cipher suite and data-flow direction. Our approach also allows for several partially trusted application proxies. The main advantages of MC-SSL over SSL are (a support for end-to-end security in the presence of partially trusted proxies, and (b selective data protection for achieving computational efficiency important to resource-constrained clients and heavily loaded servers.

  18. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Science.gov (United States)

    2010-10-01

    ... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must...

  19. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid

    OpenAIRE

    Sergio Saponara; Tony Bacchillone

    2012-01-01

    This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. A key element of Smart Grid is the energy home area network (HAN), for which an implementation is proposed, dealing with its security aspects and showing some solutions for realizing a wireless network based on ZigBee. Possible hardware-software architectures and implementations using COTS (Commercial Off The Shelf) ...

  20. The Systems Librarian: Implementing Wireless Networks without Compromising Security

    Science.gov (United States)

    Breeding, Marshall

    2005-01-01

    Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…

  1. Simulating the implementation of the administrative justice act with ThinkLets and GroupSystems: a comparative analysis from three field studies

    CSIR Research Space (South Africa)

    Phahlamohlaka, J

    2006-09-01

    Full Text Available Presented in this paper are the results of three simulation exercises performed as part of a series of field studies whose object is the implementation of the Promotion of Administrative Justice Act. The unit of analysis of the study is the process...

  2. Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules.

    Science.gov (United States)

    Choi, Young B; Capitan, Kathleen E; Krause, Joshua S; Streeper, Meredith M

    2006-02-01

    This paper discusses the challenges associated with privacy in health care in the electronic information age based on the Health Insurance Portability and Accountability Act (HIPAA) and the Security Rules. We examine the storing and transmission of sensitive patient data in the modem health care system and discuss current security practices that health care providers institute to comply with HIPAA Security Rule regulations. Based on our research results, we address current outstanding issues that act as impediments to the successful implementation of security measures and conclude the discussion and offer possible avenues of future research.

  3. PCI compliance understand and implement effective PCI data security standard compliance

    CERN Document Server

    Williams, Branden R

    2012-01-01

    The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of

  4. Securement of the indwelling urinary catheter for adult patients: a best practice implementation.

    Science.gov (United States)

    Shum, Angela; Wong, Kai Sim; Sankaran, Kalarani; Goh, Mien Li

    2017-03-01

    The evidence-based project sought to improve knowledge and practice in the care and securement of indwelling urinary catheters. The project utilized a pre and post-implementation audit strategy, with the Joanna Briggs Institute Practical Application of Clinical Evidence System and Getting Research into Practice programs. The best practice recommendations on the care and securement of indwelling urinary catheters were retrieved from the Joanna Briggs Institute Clinical Online Network of Evidence for Care and Therapeutics database. A proposed urinary catheter securement practice, which included the use of a specifically designed securement device, was developed and implemented based on these recommendations. The implemented practice was evaluated with an audit tool which comprised two criteria recommended by the Joanna Briggs Institute Practical Application of Clinical Evidence System on the topic: Appropriate Catheter Use and Management. Audit criteria outcomes included staff compliance to training for urinary catheter securement and care and effectiveness of the implemented practice utilized to secure urinary catheters. The project was conducted in a general surgical ward over a period of 14 months, from December 2013 to January 2015. A sample of 30 inpatients was recruited at each audit phase. The sample size was decided based on recommendations from the Joint Commission International guidelines. A comparison between baseline and post-implementation audit findings indicated significant improvements in both audit criteria outcomes. For the first criterion, 100% compliance (P < 0.001) was achieved with all ward nurses being trained in application and care of the proposed urinary catheter securement practice. Criterion 2, which measured the effectiveness of the implemented practice, showed a nine-fold improvement from 10 to 90% (P < 0.001). A sustenance audit conducted 6 months post-implementation showed that compliance rates maintained at 100% for criterion

  5. IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI

    Directory of Open Access Journals (Sweden)

    U. Pavan Kumar

    2013-06-01

    Full Text Available This paper is mainly based on providing security to the wireless networks through which devices likeBluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating awireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a minimum basic knowledge of NS2, C/C++ coding. The security feature followed in the paper is encryption/decryption of the data that is being exchanged. Data should be ensured as and then there will be a perfect implementation of the protocol. So, the paper throughout concentrates on adding a new security protocol to NS2 and implementation of that protocol by providing a wireless scenario.

  6. Physical Layer Security with Uncoordinated Helpers Implementing Cooperative Jamming

    CERN Document Server

    Luo, Shuangyu; Petropulu, Athina

    2012-01-01

    A wireless communication network is considered, consisting of a source (Alice), a destination (Bob) and an eavesdropper (Eve), each equipped with a single antenna. The communication is assisted by multiple helpers, each equipped with two antennas, which implement cooperative jamming, i.e., transmitting noise to confound Eve. The optimal structure of the jamming noise that maximizes the secrecy rate is derived. A nulling noise scenario is also considered, in which each helper transmits noise that nulls out at Bob. Each helper only requires knowledge of its own link to Bob to determine the noise locally. For the optimally structured noise, global information of all the links is required. Although analysis shows that under the two-antenna per helper scenario the nulling solution is sub-optimal in terms of the achievable secrecy rate, simulations show that the performance difference is rather small, with the inexpensive and easy to implement nulling scheme performing near optimal.

  7. Implementation of a secure USIM COS architecture for mobile payment applications

    Science.gov (United States)

    Xiao, Juan; Wu, Juan; Xu, Donglai

    2017-01-01

    In this paper, a secure architecture for mobile payment applications is designed, which combines public service platform, Trusted Service Manager(TSM) and Security Element Financial Certification Security Domain(SE FCSD). The architecture interconnects various platforms, authenticates the identity of transaction parties and detects the legality of applications. In the architecture, a more reliable secure channel protocol SCP10 is used to secure the confidentiality and integrity of data. Using NFC Universal Subscriber Identifier Module Card (NFC USIM card) as the hardware platform, a security element supporting the architecture is implemented, and also a USIM Chip Operating System (USIM COS) supporting both financial certification security domain and SCP10 protocol is designed. In order to improve the efficiency of identity authentication of USIM card, a compact digital certification is adopted to improve verification speed and save storage space. The experiment results and security tests show that the USIM COS has advantages of security and reliability , and it has commercial value and has achieved effective mobile payments.

  8. Design and implementation of security in a data collection system for epidemiology.

    Science.gov (United States)

    Ainsworth, John; Harper, Robert; Juma, Ismael; Buchan, Iain

    2006-01-01

    Health informatics can benefit greatly from the e-Science approach, which is characterised by large scale distributed resource sharing and collaboration. Ensuring the privacy and confidentiality of data has always been the first requirement of health informatics systems. The PsyGrid data collection system, addresses both, providing secure distributed data collection for epidemiology. We have used Grid-computing approaches and technologies to address this problem. We describe the architecture and implementation of the security sub-system in detail.

  9. CIOs' views of HIPAA Security Rule implementation--an application of Q-methodology.

    Science.gov (United States)

    Ao, Mei; Walker, Rosemary

    2005-01-01

    The purpose of this study is to uncover the attitudes held by chief information officers (CIOs) regarding the implementation of HIPAA's Security Rule. In March and April of 2004, five Chicago area CIOs were surveyed and asked to rank 26 opinion statements that presented possible implementation barriers to the Security Rule. Q-methodology, which is a powerful tool in subjective study, was employed to identify and categorize the viewpoints of CIOs toward the barriers. Two factors (opinion types) that represented two different views--socially motivated CIOs and resources-motivated CIOs--regarding the implementation barriers were extracted. The study sheds light on the attitudes and perceptions of CIOs as they begin rule implementation. Current CIOs can use this information as a way to begin to examine what the prevailing attitude may be at their institution and, therefore, how to begin building a successful implementation strategy.

  10. FPGA Implementation of Secure Force (64-Bit Low Complexity Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Shujaat Khan

    2015-11-01

    Full Text Available Field-Programmable Gate Arrays (FPGAs have turned out to be a well-liked target for implementing cryptographic block ciphers, a well-designed FPGA solution can combine some of the algorithmic flexibility and cost efficiency of an equivalent software implementation with throughputs that are comparable to custom ASIC designs. The recently proposed Secure Force (SF shows good results in terms of resource utilization compared to older ciphers. SF appears as a promising choice for power and resource constrained secure systems and is well suited to an FPGA implementation. In this paper we explore the design decisions that lead to area/delay tradeoffs in a full loop-unroll implementation of SF-64 on FPGA. This work provides hardware characteristics of SF along with implementation results that are optimal in terms of throughput, latency, power utilization and area efficiency.

  11. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  12. A survey on the approaches in honeypot for implementing network security

    Directory of Open Access Journals (Sweden)

    Niharika Srivastava

    2012-10-01

    Full Text Available Honeypot is a supplemented active defence system for network security. It traps attacks, records intrusion information about tools and activities of the hacking process, and prevents attacks outbound the compromised system. Integrated with other security solutions, honeypot can solve many traditional dilemmas. It has emerged as a prominent technology that helps learn new hacking techniques fromattackers and intruders. Honeypots can initiatively lure hackers to attack the internet, take the record of the ways and means of their invasion, and then analyze and study them. This paper discusses the client and server honeypot approaches for the implementation of network security.

  13. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  14. Accounting and information support of enterprise economic security strategy formation and implementation

    Directory of Open Access Journals (Sweden)

    O.І. Oliynychuk

    2015-03-01

    Full Text Available The article deals with accounting and information resources of enterprise economic security strategy development and realization. The aim of the article is to ground the role of accounting system in generating of information resources of enterprise economic security strategy with definition of accounting and information providing. The methodology of research was based on the dialectical method, complex system approach of processes studying, the analysis and synthesis methods, the induction and deduction methods and the modeling method. The results of the research describe the allocation of interrelated operating, tactical and strategic management subsystems in company management system. The relations between management and accounting subsystems were demonstrated. The model of formation and implementation of the enterprise economic security strategy was developed. The tasks of the accounting subsystems in the process of development and realization of the enterprise economic security strategy were defined. The accounting and information support of the enterprise economic security strategy generated by each of the accounting subsystems were identified. The ordinary of the research is reasoning of the tasks and definition of accounting subsystems information providing of each enterprise economic security strategy stage according to the developed model. The practical value of the research is the identified accounting and information support of the enterprise economic security strategy provides improvement of strategic planning information base of achievement of high level economic security.

  15. Transitional justice and aid

    OpenAIRE

    Hellsten, Sirkku K.

    2012-01-01

    This paper examines the current security-governance-development nexus, something that is often also discussed under the concept of transitional justice (TJ). The paper analyses how the ambiguous, evolving and expanding nature of the concept of TJ affects the planning, coordination, evaluation and assessment of aid given to conflict ridden, post-conflict or (post) authoritarian societies in order to strengthen their democracy. Special attention is paid to gender justice. Illustrations are draw...

  16. A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2013-01-01

    Full Text Available In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.

  17. Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC

    Directory of Open Access Journals (Sweden)

    Kaouthar Chetioui

    2012-03-01

    Full Text Available Today, Internet offers many critical applications. So, it becomes very crucial for Internet service providers to ensure traceability of operations and to secure data exchange. Since all these communications are based on the use of the Domain Name System (DNS protocol, it becomes necessary to think to enhance and secure it by proposing a secure version of this protocol that can correct the whole or a part of the DNS protocol weaknesses and vulnerabilities. In this context, DNSsec was created by the IETF to ensure the integrity of DNS data and authentication of the source of such data. DNSsec is based on the key cryptography public to provide different security services. In the present paper, we will present first the DNS protocol and its weaknesses. After that, we will be interested in studying the DNSsec implementation and data exchange, and then give a deep analysis of its weaknesses.

  18. Implementation and Evaluation of a Secure and Efficient Web Authentication Scheme using Mozilla Firefox and WAMP

    Directory of Open Access Journals (Sweden)

    Yassine SADQI

    2016-02-01

    Full Text Available User authentication and session management are two of the most critical aspects of computer security and privacy on the web. However, despite their importance, in practice, authentication and session management are implemented through the use of vulnerable techniques. To solve this complex problem, we proposed new authentication architecture, called StrongAuth. Later, we presented an improved version of StrongAuth that includes a secure session management mechanism based on public key cryptography and other cryptographic primitives. In this paper, we present an experimental implementation and evaluation of the proposed scheme to demonstrate its feasibility in real-world scenarios. Specifically, we realize a prototype consisting of two modules: (1 a registration module that implements the registration, and (2 an authentication module integrating both the mutual authentication and the session management phases of the proposed scheme. The experimental results show that in comparison to traditional authentication and session management mechanisms, the proposed prototype presents the lowest total runtime.

  19. Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business

    CERN Document Server

    Kesavaraja, D; Sasireka, D; 10.5121/ijdms.2010.2203

    2010-01-01

    Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof several ongoing researches Conventional Web Servers and its Intrusion Detection System might not be able to detect such attacks. So we implement a Cloud Data Server with Session Controller Architecture using Redundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code using MD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined by traditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Management using My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. The CDS using the Virtual Controller controls and monitors the Connections and modifications of the page so as to prevent malicious users fr...

  20. A Survey of ATM Security Implementation within the Nigerian Banking Environment

    Directory of Open Access Journals (Sweden)

    Falaye Adeyinka Adesuyi

    2013-05-01

    Full Text Available This research work reviews the current practices in Nigeria’s customer banking services with an empirical investigation into ATM fraud as well as a physical and technical implementation of security.The survey was conducted using questionnaire as the research instrument. Four hundred 400 questionnaires were distributed among Entrepreneurs, Civil servants and Students from four states of the federation namely Lagos, Abuja, Kaduna and Jos. Three hundred and twenty seven (327 were retrieved successfully while three hundred and three (303 were properly responded. The data collected was analyzed using Chi-Square test and one way ANOVA. The results obtained shows there is no statistically significant difference in the perception of entrepreneurs, civil servants and students on the positive impact of ATM on banking. The perceptions of the three variables on security challenges of ATM services are equal. It was concluded in the research that the current security implementation does not proffer the adequate security necessary to secure electronic transactions, customers’ information and funds.

  1. Economic Security of Russian Economy under the Conditions of Import Substitution Policy Implementation

    Directory of Open Access Journals (Sweden)

    Natalya Viktorovna Andreeva

    2015-12-01

    Full Text Available In the article, the authors analyze the conditions of import substitution by types of activity from the perspective of the threat to the economic security of Russia. The factors of import substitution are presented. The main factor is the increase of economic and social security by the modernization of Russian economy. Today, a critical measure of the country’s economic security increase is the implementation of import substitution policy. The issue of economic modernization remains of current interest but stays unsolved, especially in the branches where the issue of import substitution is crucial: industry, agriculture, etc. The types of economic activity that can be labeled as open to import substitution are the ones with the high or medium indicators of competitiveness, investment and innovation activity. Within those types, the import substitution policy can be implemented without a threat to economic security. The analysis of the main features of import substitution such as the levels of competitiveness, innovations and investment by the types of economic activity, — is the basis to work out a smart import substitution policy, which will carry no threat to the country’s economic security. The main types of economic activity with the high dependency on import are metallurgical production, chemical industry, wood processing, electrical machines and equipment production, machinery and equipment production, textile manufacture, fishery and fish farming. In the result of the analysis, the following conclusions are drawn: the level of investment for all the types of economic activity presented is critically law; according to the level of innovation and competitiveness, metallurgic production is seen more advantageous on the back of negative dynamics and chemical industry as less advantageous. The other types of activity will face a threat to economic security if the policy of import substitution is implemented without government financing

  2. IMPLEMENTATION OF PERVASIVE COMPUTING BASED HIGH-SECURE SMART HOME SYSTEM

    Directory of Open Access Journals (Sweden)

    Ventylees Raj.S

    2012-11-01

    Full Text Available In recent year, the home environment has seen a rapid introduction of wireless communication network enabled advance computing technologies. In this paper I mainly focus on the monitoring of smart home remotely and providing security when user is away from the home. The proposed security algorithm is combining of Biometrics, public key encryption and SMS based security alarm system. In the proposed security algorithm offered only Authenticate person monitoring home appliances via wireless networks. In the proposed pervasive monitoring system it provides security against intrusion as well as it automates various home appliances using SMS. Zigbee IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi wireless networks are embedded through a standard Home gateway. This home gateway controls the overall wireless communication of smart home systems. The pervasive computing environment created by the smart Sensors, wireless networksand context-aware routing protocol for wireless sensor networks. Each smart Sensor node should have multipath routing protocol to automatically establish the wireless networks between Smart Nodes. To develop a new ondemand context-aware routing protocol for the smart home system, here this paper introduces the pervasive computing based smart home monitoring system’s design that provides secure smart services to users, and demonstrates its implementation using a real time environment.

  3. Design and Implementation for Malicious Links Detection System Based On Security Relevance of Webpage Script Text

    Directory of Open Access Journals (Sweden)

    XING Rong

    2011-04-01

    Full Text Available With the development of web technology, spreading of Trojan and viruses via website vulnerabilities is becoming increasingly common. To solve this problem, we propose a system for malicious links detection based on security relevance of webpage script text and present the design and implementation of this system. Firstly, according to the current analysis of malicious links, we describe requirements and the general design for detection system. Secondly we describe the security-related algorithm with mathematical language, and give the data structure of this algorithm. Finally, we analyze and summarize the experimental results, and verify the reliability and rationality of system.

  4. HIPAA and information security risk: implementing an enterprise-wide risk management strategy

    Science.gov (United States)

    Alberts, Christopher J.; Dorofee, Audrey

    2001-08-01

    The Health Insurance Portability and Accountability Act (HIPAA) of 1996 effectively establishes a standard of due care for healthcare information security. One of the challenges of implementing policies, procedures, and practices consistent with HIPAA requirements in the Department of Defense Military Health System is the need for a method that can tailor the requirements to a variety of organizational contexts. This paper will describe a self- directed information security risk evaluation that will enable military healthcare providers to assess their risks and to develop mitigation strategies consistent with HIPAA guidelines.

  5. China National Unified System for Certification on Information Security Products Entering the Stage of Implementation

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ Recently, China National Administrative Committee for Certification on Information Security Products was officially established,symbolizing that the established national unified system for certification on information security products has entered the stage of implementation. Director of General Administration of Quality Supervision,Inspection and Quarantine of P. R.China (AQSIQ) Li Changjiang, Director of Certification and Accreditation Administration of P. R. China(CNCA) Wang Fengqing and Vice Director of the State Council Office for informationization work Qu Weizhi addressed at the establishing meeting.

  6. Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources

    Directory of Open Access Journals (Sweden)

    Ramya M

    2016-03-01

    Full Text Available The transmission of a traffic flows with a certain bandwidth demand over a single network path is either not possible or not cost-effective. In these cases, it is veritably periodic usable to improve focus the network's bandwidth appliance by breaking the traffic flow upon multiple qualified paths. Using multiple paths for the equivalent traffic flow increases the certainty of the network, it absorbs deluxe forwarding resources from the network nodes and also it overcomes link failure provide security. In this paper, we illustrate several problems related to splitting a traffic flow over multiple paths while minimizing the absorption of forwarding resources mitigates failures and implementing security.

  7. Implementation of DNSSEC-secured name servers for ni.rs zone and best practices

    Directory of Open Access Journals (Sweden)

    Antić Đorđe

    2016-01-01

    Full Text Available As a backbone of all communications over the Internet, DNS (Domain Name System is crucial for all entities that need to be visible and provide services outside their internal networks. Public administration is a prime example for various services that have to be provided to citizens. This manuscript presents one possible approach, implemented in the administration of the City of Niš, for improving the robustness and resilience of external domain space, as well as securing it with DNSSEC (DNS Security Extensions.

  8. The implementation of the situational control concept of information security in automated training systems

    Directory of Open Access Journals (Sweden)

    A. M. Chernih

    2016-01-01

    Full Text Available The main approaches to ensuring security of information in the automated training systems are considered, need of application of situational management of security of information for the automated training systems is proved, the mathematical model and a problem definition of situational control is offered, the technique of situational control of security of information is developed.The purpose of the study. The aim of the study is to base the application of situational control of information security by subsystem of the control and protection of information in automated learning systems and to develop implementation methods of the situational control concept.Materials and methods. It is assumed that the automated learning system is a fragment of a larger information system that contains several information paths, each of them treats different information in the protection degree from information, containing constituting state secrets, to open access information.It is considered that the technical methods, measures and means of information protection in automated learning systems implement less than half (30% functions of subsystems of control and protection information. The main part of the functions of this subsystem are organizational measures to protect information. It is obvious that the task of ensuring the security of information in automated learning systems associated with the adoption of decisions on rational selection and proper combination of technical methods and institutional arrangements. Conditions of practical application of automated learning systems change over time and transform the situation of such a decision, and this leads to the use of situational control methods.When situational control is implementing, task of the protection of information in automated learning system is solved by the subsystem control and protection of information by distributing the processes ensuring the security of information and resources of

  9. Studies on the Improvement of the Civil Securing System: on the View of Legal of Justice%论民事保全程序的完善——以司法公正为视角

    Institute of Scientific and Technical Information of China (English)

    张国桥

    2011-01-01

    司法公正是现代法治的基本要求,是民事诉讼的价值追求之一。司法公正由实体公正和程序公正两部分构成,两者是对立统一的辩证关系。民事保全程序是民事诉讼的重要组成部分,对于保护当事人合法权利、维护司法判决权威具有重要意义,民事保全程序必须满足司法公正的相关要求。从实体公证的角度来看,保全程序不应当规定必须提供担保,而民事保全的担保额应当以被申请人可能遭受的损失的数额来计算。从程序公正的角度来看,应当规定被申请人在某些情况下参与保全程序的权利,并建立保全异议程序。%Perspective of Justice is the basic requirement of the modern rule of law and the value of the pursuit of civil litigation. Justice, including procedural justice and substantive justice, and both of the dialectical relationship between the unities of opposites. Civil securing system is an important part of civil litigation for the protection of the legitimate fights of the parties and the safeguard of the judicial authority. Civil security program must meet the requirements of justice. From the perspective of substantive justice, civil security system should not be mandatory to provide security, and the guaranteed amount should be the applicant may be subject to calculate the amount of the loss. From the perspective of procedural justice, the right of the applicants to participate in civil securing system in certain circumstances should be given and orocedure of objection should be established.

  10. [Research and implementation of the TLS network transport security technology based on DICOM standard].

    Science.gov (United States)

    Lu, Xiaoqi; Wang, Lei; Zhao, Jianfeng

    2012-02-01

    With the development of medical information, Picture Archiving and Communications System (PACS), Hospital Information System/Radiology Information System(HIS/RIS) and other medical information management system become popular and developed, and interoperability between these systems becomes more frequent. So, these enclosed systems will be open and regionalized by means of network, and this is inevitable. If the trend becomes true, the security of information transmission may be the first problem to be solved. Based on the need for network security, we investigated the Digital Imaging and Communications in Medicine (DICOM) Standard and Transport Layer Security (TLS) Protocol, and implemented the TLS transmission of the DICOM medical information with OpenSSL toolkit and DCMTK toolkit.

  11. Design and Implementation of Enhanced version of MRC6 algorithm for data security

    Directory of Open Access Journals (Sweden)

    Nanda Hanamant Khanapur

    2015-06-01

    Full Text Available In todays world data transmission through channel requires more security, since there is chance of hacking the data while transmitting through a channel. Hence gaining security is very important and challenging. This paper introduces the Enhanced Modified version of RC6 (EMRC6 block cipher. The design is implemented to meet the requirement of the Advanced Encryption Standard (AES. New features of EMRC6 include the use of 32 working registers instead of two or four, and the inclusion of integer multiplication as an additional primitive operation. EMRC6 makes essential use of data-dependent rotations like RC6. The use of multiplication greatly increases the diffusion achieved per round, allowing greater security, fewer rounds, and increased throughput. The proposed design is described with verilog, HDL and synthesized using cadence tool.

  12. LIGHTWEIGHT VIGILANT PROCEDURE TO IMPLEMENT SECURITY MEASURES IN HIGHLY ROVING MILITARY OPERATIONS

    Directory of Open Access Journals (Sweden)

    J. Udhayan

    2013-01-01

    Full Text Available The performance of Mobile Ad hoc Network (MANET becomes questionable in highly roving and mission critical application like military operation. Security measures like encryption, authentication, digital signature has been proposed for MANET. However all those mechanisms need some kind of static infrastructure and it is extremely difficult to implement such an infrastructure throughout the military mission. Therefore in this work, various zones in military operation is identified and Zone A is responsible for implementing robust security measures, Zone B and Zone C are identified to be at highly hostile and time critical environment. Therefore usage of highly complex security procedures at zone B & C may delay the operation to the extent of failure of the mission. Hence in this study, a lightweight vigilant procedure that suits the circumstances of Zone B & C is proposed, it has the capability of detecting the malicious entrant in the routing path. Moreover, it works either independently or dependently with the routing protocols like AODV based on the need. The proposed method has been compared with various successful security measures in Ad-hoc network and the results shows that the proposed method is very useful in adapting to the conditions of zone B & C.

  13. Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid

    Directory of Open Access Journals (Sweden)

    Sergio Saponara

    2012-01-01

    Full Text Available This paper discusses aims, architecture, and security issues of Smart Grid, taking care of the lesson learned at University of Pisa in research projects on smart energy and grid. A key element of Smart Grid is the energy home area network (HAN, for which an implementation is proposed, dealing with its security aspects and showing some solutions for realizing a wireless network based on ZigBee. Possible hardware-software architectures and implementations using COTS (Commercial Off The Shelf components are presented for key building blocks of the energy HAN such as smart power meters and plugs and a home smart information box providing energy management policy and supporting user's energy awareness.

  14. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    . Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).

  15. The Legal System Construction in Social Security System in the View of Justice%公正视野下社会保障制度的法制建设

    Institute of Scientific and Technical Information of China (English)

    张映芹; 张瑞锋

    2012-01-01

    Fairness and justice is the eternal theme of human history and social development, and the basic idea of establishing and perfecting the entire social system. Maintaining the social fairness and justice is always the lasting appeal and basic value of social security system. Fair social security system plays a fundamental role in the construction of the harmonious society. The formulation of the legal system and the execution of the social security system is the primary basis and basic premise of the social security system. In the view of justice, rethinking the construction of the legal system in social security system in China and rebuilding the moral system with justice as the core have the significant practical and theoretical significance.%公平与正义是人类社会发展永恒的主题,是一切社会制度建立与完善的基本理念。维护社会公平与正义始终是社会保障制度的基本蕴意和价值诉求。公正的社会保障体系在建构和谐社会中发挥着基础性的作用,而法律制度的制定与执行是社会保障制度的首要基础与基本前提。以公正的视野认真反思我国社会保障制度的法制建设,并建立以公平正义为核心价值观的社会道德体系,促进社会保障事业的稳定可持续发展。

  16. A New Security Paradigm for Anti-Counterfeiting: Guidelines and an Implementation Roadmap

    Science.gov (United States)

    Lehtonen, Mikko

    Product counterfeitingand piracy continue to plague brand and trademark owners across industry sectors. This chapter analyses the reasons for ineffectiveness of past technical anti-counterfeitingstrategies and formulates managerial guidelines for effective use of RFID in anti-counterfeiting. An implementation roadmap toward secure authentication of products tagged with EPC Gen-2 tags is proposed and possible supply chain locations for product checks are discussed.

  17. 罗尔斯正义原则对我国构建社会公平保障体系的镜鉴作用%Mirror Effects of Rawls Justice Principles on the Construction of Chinese Social Justice Security System

    Institute of Scientific and Technical Information of China (English)

    廖小明

    2015-01-01

    公平正义是全面小康社会的重要价值目标和现实诉求。中共十八大报告提出的构建社会公平保障体系的目标指明了建成全面小康社会进程中公平正义的努力方向。罗尔斯正义原则强调自由权利的平等和有差别的机会平等,强调社会制度应彰显正义价值:即必须有效彰显社会主义制度体系的正义价值;必须倡导和弘扬公平正义的社会价值观,为形成规范人们各种非正义行为的规则体系提供重要条件;必须有效创设正义的社会制度调节社会分配中的事实不平等,实现有差别的平等;必须充分发挥国家在促进社会公平正义中的重要作用。这对构建社会主义社会公平保障体系具有重要镜鉴作用。%Fairness and justice are the important value goals and the practical demands of the all-round well-off society. The report of the Eighteenth National Congress of the CPC proposes the goals of constructing the social justice security system which indicates the direction of completely constructing the fairness and justice during the process of building up well-off society. Rawls justice principles emphasizes the equality of freedom rights and differential opportunity, the necessity of highlighting the value of justice for the society system which will play a mirror role for constructing the socialist society justice security system:it's essential to effectively highlight the value of justice of socialist system; to propose and carry forward the social values of social fairness and justice for providing the important condition for forming the regulation system of the injustice; to effectively set up justicial social system to regulate the inequality in social distribution and to realize the differential equality;and to stress the important role that the state is playing in the fairness and justice.

  18. Attacking or Defending? Jurisdiction of the Court of Justice in the EU's Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    2016-01-01

    , and as a policy, is at the forefront of the Union’s external relations on both legal and political levels. The Court of Justice of the European Union (‘the Court’) has been instrumental in the consistent development of the external relations of the EU, yet the Court itself is in a peculiar situation when it comes...... that the Court would be placed in a position where it is to rule on its limited remit, and the extent of this perceived boundary within the current Treaties. External relations are an important part of the Court’s work, and cases arise from both preliminary references and direct actions. CFSP cases however......, within this grouping of external relations, are a much smaller number, and a number of recent CFSP cases have personified the legal basis dilemma for the Court. The problems arise when the Court is asked to decide whether a particular agreement is ‘principally’ CFSP or not, where it is to rule...

  19. Journals and Justice.

    Science.gov (United States)

    Curzer, Howard J.

    1996-01-01

    Addresses the process of journal deselection from the point of view of justice and argues that when journal cuts are necessary, libraries should first, reduce all departments to core holdings; second, ask departments with expensive journals for permission to implement an efficiency principle; third, if refused permission, implement an equal…

  20. The Justice of Improving Security and Confronting Poverty: The Role of Transnational NGOs and Communities in Somalia

    DEFF Research Database (Denmark)

    Farah, Abdulkadir Osman

    2017-01-01

    of such efforts in Somalia following the collapse of the state in 1991, and suggests the need for better coordination between state and non-state transnational initiatives. Methodologically, the article combines discussion of the underlying causes of poverty and insecurity in Somalia with the presentation......Following decades of postcolonial dictatorships and authoritarianism, many African countries have experienced expanded efforts by transnational organizations—from both top down and bottom up—aimed at alleviating poverty and improving security. This article provides a partial inventory...

  1. Attacking or Defending? Jurisdiction of the Court of Justice in the EU's Common Foreign and Security Policy

    DEFF Research Database (Denmark)

    Butler, Graham

    2016-01-01

    The Union’s external competence is fragmented, as are the powers of the institutional bodies involved in external relations. Despite the Union being depillarised after the Treaty of Lisbon coming into force, the ‘specific rules and procedures’ of the Common Foreign and Security Policy (CFSP...... unlimited, but have been substantially curbed as other non-CFSP external relations competences have been developed and acquired. In the third instance, the approach the Court has taken to CFSP in the case law is analysed given the Court’s competence in the limited circumstances that it is permitted...

  2. An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    CERN Document Server

    Farouk, Hala A

    2011-01-01

    The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagra...

  3. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  4. Implementation of EnhancedSecurity AlgorithmsinMobile Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    Takialddin A. Al Smadi

    2014-01-01

    Full Text Available Mobile Ad hoc Networks are wireless infrastructure less networks can beeasily formed or deployed due to its simple infrastructure. Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. The main objective of this work is to enhance the performance of the network by securing the data and to minimize the malicious nodes which disturb the stream of the network. Securing data is a critical task which can be achieved by cryptographic algorithms and disturbance detection plays as a crucial ingredient in any comprehensive security solution to address the threats.Hence a Novel Cryptographic Algorithm with a new Disturbance Detection System (DDS has been proposed for Mobile Adhoc Networks. This method prevents the outside attacks to obtain any information from any data exchange in network and also use promiscuous mode of working along with rating and collaborative decision making based on multiple threshold values.The proposed algorithm was implemented and simulated in the Glomosim and the result analysis proved that the performance of the network is increased.

  5. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  6. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  7. 76 FR 67621 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2011-11-02

    ... Protection-003 Credit/Debit Care Data System of Records'' and this proposed rulemaking. In this proposed...; ] DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 5 Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs and Border Protection DHS/CBP-003 Credit/Debit Care...

  8. Design and Hardware Implementation of a New Chaotic Secure Communication Technique.

    Science.gov (United States)

    Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag

    2016-01-01

    In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.

  9. A Study of Implementing an Information Security Management System for Open Source Cloud Computing

    Directory of Open Access Journals (Sweden)

    Cristian Cernat

    2012-09-01

    Full Text Available An Information Security Management System (ISMS contains a coordinated set of activities, processes, controls, and policies with the purpose of protecting and managing the information assets within an organization. In this paper we present the way in which an ISMS as specified in the ISO 27001 can be applied for the cloud and implemented on our test platform based on SlapOS, the first open source provisioning and billing system for distributed cloud computing. The goal of this paper is to demonstrate a new and easier way to manage security for the cloud, with a specific focus on distributed cloud computing. We will present the results measured by applying ISMS controls for ensuring levels of QoS and SLA according to contracts, moreover also optimizing the costs and resources used by the cloud platform.

  10. Implementation of a Cloud Data Server (CDS for Providing Secure Service in E-Business

    Directory of Open Access Journals (Sweden)

    D.Kesavaraja

    2010-05-01

    Full Text Available Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of usersare surfing the Cloud for various purposes, therefore they need highly safe and persistent services.Usually hackers target particular Operating Systems or a Particular Controller. Inspiteof severalongoing researches Conventional Web Servers and its Intrusion Detection System might not be able todetect such attacks. So we implement a Cloud Data Server with Session Controller Architecture usingRedundancy and Disconnected Data Access Mechanism. In this paper, we generate the hash code usingMD5 algorithm. With the help of which we can circumvent even the attacks, which are undefined bytraditional Systems .we implement Cloud Data Sever using Java and Hash Code backup Managementusing My SQL. Here we Implement AES Algorithm for providing more Security for the hash Code. TheCDS using the Virtual Controller controls and monitors the Connections and modifications of the page soas to prevent malicious users from hacking the website. In the proposed approach an activity analyzertakes care of intimating the administrator about possible intrusions and the counter measures required totackle them. The efficiency ratio of our approach is 98.21% compared with similar approaches.

  11. 75 FR 7978 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Science.gov (United States)

    2010-02-23

    ... Exemptions; Department of Homeland Security Transportation Security Administration-023 Workplace Violence... Security Administration-023 Workplace Violence Prevention Program System of Records and this proposed...-036, Transportation Security Administration, 601 South 12th Street, Arlington, VA 20598-6036....

  12. Analysis of free SSL/TLS Certificates and their implementation as Security Mechanism in Application Servers.

    Directory of Open Access Journals (Sweden)

    Mario E. Cueva Hurtado

    2017-02-01

    Full Text Available Security in the application layer (SSL, provides the confidentiality, integrity, and authenticity of the data, between two applications that communicate with each other. This article is the result of having implemented Free SSL / TLS Certificates in application servers, determining the relevant characteristics that must have a SSL/TLS certificate, the Certifying Authority generate it. A vulnerability analysis is developed in application servers and encrypted communications channel is established to protect against attacks such as man in the middle, phishing and maintaining the integrity of information that is transmitted between the client and server.

  13. PCI Compliance Understand and Implement Effective PCI Data Security Standard Compliance

    CERN Document Server

    Chuvakin, Anton

    2010-01-01

    Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant?. Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the curre

  14. Implementation guidance for industrial-level security systems using radio frequency alarm links

    Energy Technology Data Exchange (ETDEWEB)

    Swank, R.G.

    1996-07-12

    Spread spectrum (SS) RF transmission technologies have properties that make the transmitted signal difficult to intercept, interpret, and jam. The digital code used in the modulation process results in a signal that has high reception reliability and supports multiple use of frequency bands and selective addressing. These attributes and the relatively low installation cost of RF systems make SSRF technologies candidate for communications links in security systems used for industrial sites, remote locations, and where trenching or other disturbances of soil or structures may not be desirable or may be costly. This guide provides a description of such a system and presents implementation methods that may be of engineering benefit.

  15. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  16. Social Justice in Teacher Education.

    Science.gov (United States)

    Guyton, Edith

    2000-01-01

    Education is a moral enterprise and a right rather than a privilege. Teacher education should develop teachers' awareness of and concern for social justice and their capacity to teach democracy and teach democratically. The concept of social justice should guide curriculum development and implementation. (SK)

  17. Social Justice in Teacher Education.

    Science.gov (United States)

    Guyton, Edith

    2000-01-01

    Education is a moral enterprise and a right rather than a privilege. Teacher education should develop teachers' awareness of and concern for social justice and their capacity to teach democracy and teach democratically. The concept of social justice should guide curriculum development and implementation. (SK)

  18. Gendered Justice Gaps in Bosnia-Herzegovina

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Mannergren Selimovic, Johanna

    2014-01-01

    , and reparations gaps-this article examines structural constraints for women to engage in shaping and implementing transitional justice, and unmasks transitional justice as a site for the long-term construction of the gendered post-conflict order. Thus, the gendered dynamics of peacebuilding and transitional...... justice have produced a post-conflict order characterized by gendered peace and justice gaps. Yet, we conclude that women are doing justice within the Bosnian-Herzegovina transitional justice project, and that their presence and participation is complex, multilayered, and constrained yet critical. © 2013...

  19. On Secure Implementation of an IHE XUA-Based Protocol for Authenticating Healthcare Professionals

    Science.gov (United States)

    Masi, Massimiliano; Pugliese, Rosario; Tiezzi, Francesco

    The importance of the Electronic Health Record (EHR) has been addressed in recent years by governments and institutions.Many large scale projects have been funded with the aim to allow healthcare professionals to consult patients data. Properties such as confidentiality, authentication and authorization are the key for the success for these projects. The Integrating the Healthcare Enterprise (IHE) initiative promotes the coordinated use of established standards for authenticated and secure EHR exchanges among clinics and hospitals. In particular, the IHE integration profile named XUA permits to attest user identities by relying on SAML assertions, i.e. XML documents containing authentication statements. In this paper, we provide a formal model for the secure issuance of such an assertion. We first specify the scenario using the process calculus COWS and then analyse it using the model checker CMC. Our analysis reveals a potential flaw in the XUA profile when using a SAML assertion in an unprotected network. We then suggest a solution for this flaw, and model check and implement this solution to show that it is secure and feasible.

  20. Multi-Level Security for Automotive–RFID Based Technology with Lab VIEW Implementation

    Directory of Open Access Journals (Sweden)

    Priya Darshini .V

    2013-03-01

    Full Text Available Security has become a prominent parameter for all the electronic gadgets. This proposed paper aims at securing the automotive and also preventing the unauthorized persons from accessing it. The technologies such as Radio Frequency Identification (RFID, thumb registration system and face recognition will be applied for the security measures. This proposed system will also be implemented in LabVIEW using Educational Laboratory Virtual Instrumentation Suite II (ELVIS. Initially, the RFID system will be authenticated .The importance of this system is that, it gets verification from the Road Transportation Office (RTO.The user will require an authentication to get proceed to the thumb registration module by which the efficiency of the thumb is enhanced using Pattern Matching Algorithm (PMA. Face recognition system is a technique which will be used after the thumb registration system. At last, this system allows the user to drive the car. For emergency, a key insertion slot will be placed in the system through which the user can insert the key. During this emergency mode of operation the camera captures the driver’s image and sends it to the owner’s mobile as Multimedia Messaging Service (MMS. The owner will provide the authentication password; this in turn allows the user to drive the vehicle. Global System for Mobile communication (GSM module is also kept inbuilt for tracking purpose. Among the different technologies proposed, RFID technique is briefly discussed in this paper.

  1. Increasing operational command and control security by the implementation of device independent quantum key distribution

    Science.gov (United States)

    Bovino, Fabio Antonio; Messina, Angelo

    2016-10-01

    In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.

  2. Implementation of a Secured system with Roaming Server and Roaming Ports

    Directory of Open Access Journals (Sweden)

    R. Bharathi,

    2011-05-01

    Full Text Available The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS [5] attacks. This system uses more than one server forproviding security. But only one server will be active at a time. The inactive servers act as Roaming Honeypots[9]. The source address of any request that hits a honeypot is recorded and all its future requests are dropped. Thus this system acts as an Intrusion Detection System (IDS. It is impossible to identify the active servers and the honeypots at a given moment even if attackers obtain the identities of all servers. Moreover the UDP/TCP port number used by the server varies as a function of time and a shared secret between the server and the client. This mechanism simplifies both the detection and filtering of malicious packets and it does not require any change to existing protocols. This port hopping[10] or roaming porttechnique is compatible with the UDP and TCP protocols. This system can be implemented in real time successfully.

  3. [Child protection network and the intersector implementation of the circle of security as alternatives to medication].

    Science.gov (United States)

    Becker, Ana Laura Martins M M; de Souza, Paulo Haddad; de Oliveira, Mônica Martins; Paraguay, Nestor Luiz Bruzzi B

    2014-09-01

    To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child. Copyright © 2014 Sociedade de Pediatria de São Paulo. Publicado por Elsevier Editora Ltda. All rights reserved.

  4. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    OpenAIRE

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period of political renewal and reform in the governance of global food security. The Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part of this reform. Through the CFS reform process, civil society organizations secured the right to co-ordinate autonomously their engagement in the Committee as official participants and are doing so through ...

  5. Renewal through Participation in Global Food Security Governance: Implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security

    NARCIS (Netherlands)

    Duncan, J.A.B.; Barling, D.

    2012-01-01

    The food commodity price rises from 2006 to 2008 engendered a period
    of political renewal and reform in the governance of global food security. The
    Committee on World Food Security (CFS) was designated as the main international forum dealing with food security and nutrition in 2009 as part o

  6. Justice Globalism

    NARCIS (Netherlands)

    Wilson, Erin; Steger, Manfred; Siracusa, Joseph; Battersby, Paul

    2014-01-01

    The pursuit of a global order founded on universal rules extends beyond economics into the normative spheres of law, politics and justice. Justice globalists claim universal principles applicable to all societies irrespective of religion or ideology. This view privileges human rights, democracy and

  7. Justice sociale

    OpenAIRE

    Jacquemain, Marc

    2007-01-01

    At first glance "social justice" cannot be considered as a "new word of power" since all powers have been reluctant to apply social justice. But if it is used to organize the "evaporation" of the reflexion on equality, then it can take a clearly conservative tone

  8. Justice Globalism

    NARCIS (Netherlands)

    Wilson, Erin; Steger, Manfred; Siracusa, Joseph; Battersby, Paul

    2014-01-01

    The pursuit of a global order founded on universal rules extends beyond economics into the normative spheres of law, politics and justice. Justice globalists claim universal principles applicable to all societies irrespective of religion or ideology. This view privileges human rights, democracy and

  9. Organizational Justice

    Science.gov (United States)

    Burns, Travis

    2013-01-01

    Helping principals understand the importance of organizational justice is the first step in enhancing learning outcomes for all learners, regardless of their social class, race, abilities, sex, or gender. In schools, organizational justice may be defined as teachers' perceptions of fairness, respect, and equity that relate to their interactions…

  10. On the Possibility of Implementing Educational Justice in Chinese University%正义意蕴中的大学教育——大学教育正义实施可能性之探析

    Institute of Scientific and Technical Information of China (English)

    吉国宾; 赵新生

    2012-01-01

    当前,大学作为科学知识理论的最高殿堂,其学术性与教育性双重结合的组织特性,决定了它在促进我国正义发展中起着关键性的作用。因此,它力图从特殊的正义——教育正义出发,通过营造公正合理的教育氛围、强化向善爱人的人本教育、完善现代公民权利教育三个方面来探讨在我国大学实施教育正义的可能性,为推动我国社会正义的实施提供一些参考性的认识。%As the supreme palace of scientific knowledge and theories, universities have played a key role in promoting the development of justice in China. Therefore, this paper begins with the educational justice and explores the possibility of implementing educational justice in universities from aspects of shaping the educational atmosphere of justice, strengthe ning the humanistic education of benevolence and love, and improving the education of modern civil rights in order to offer some reference for promoting the implementation of social justice in China.

  11. Cyber security awareness toolkit for national security: An approach to South Africa’s cybersecurity policy implementation

    CSIR Research Space (South Africa)

    Phahlamohlaka, LJ

    2011-05-01

    Full Text Available Presidential policies and structures review on cyber security [17 ] was that the United States nation was at a crossroads. This was so because on the one hand, cyberspace underpins almost every facet of American society, providing critical support... critical disruptions to U.S. systems. There is an international drive by various governments to either develop, or review existing Cybersecurity policies. From the US point of view, the policies include strategies and standards regarding the security...

  12. AES Cardless Automatic Teller Machine (ATM) Biometric Security System Design Using FPGA Implementation

    Science.gov (United States)

    Ahmad, Nabihah; Rifen, A. Aminurdin M.; Helmy Abd Wahab, Mohd

    2016-11-01

    Automated Teller Machine (ATM) is an electronic banking outlet that allows bank customers to complete a banking transactions without the aid of any bank official or teller. Several problems are associated with the use of ATM card such card cloning, card damaging, card expiring, cast skimming, cost of issuance and maintenance and accessing customer account by third parties. The aim of this project is to give a freedom to the user by changing the card to biometric security system to access the bank account using Advanced Encryption Standard (AES) algorithm. The project is implemented using Field Programmable Gate Array (FPGA) DE2-115 board with Cyclone IV device, fingerprint scanner, and Multi-Touch Liquid Crystal Display (LCD) Second Edition (MTL2) using Very High Speed Integrated Circuit Hardware (VHSIC) Description Language (VHDL). This project used 128-bits AES for recommend the device with the throughput around 19.016Gbps and utilized around 520 slices. This design offers a secure banking transaction with a low rea and high performance and very suited for restricted space environments for small amounts of RAM or ROM where either encryption or decryption is performed.

  13. On the Security of Black-Box Implementation of Visual Secret Sharing Schemes

    Directory of Open Access Journals (Sweden)

    Adrian Atanasiu

    2012-03-01

    Full Text Available Cryptographic software and devices give users the ability to take advantage of the benefits of cryptography more easily. However, this implies that the users must totally trust the manufacturer and the authenticity of the device or software they use. Young and Yung were the first to question the correctness of the manufacturer and considered the advantage that a malicious implementation could offer to a specific attacker. In this paper, we consider a modified version of two visual secret sharing schemes and the advantage that they provide to the attacker in order to reconstruct the secret by himself, while the other participants must fulfill the honest scheme reconstruction conditions. We also analyze the security of the proposed mechanisms and the conditions in which they can be applicable.

  14. 国际法院对安理会决议的间接司法审查权之探析%Analysis on Indirect Judicial Review of Security Council's Resolutions by International Court of Justice

    Institute of Scientific and Technical Information of China (English)

    邓宁

    2014-01-01

    Due to lack of authorization of Charters of United Nations and Statute of the International Court of Justice, it is controversial whether the International Court of Justice has the power to review the Security Council's resolutions. Judicial practice and theory of implied powers can become the legal basis for the Inter-national Court's power of judicial review indirectly. Characteristic of indirect judicial review is the effective-ness of the review. Before the modification, the Court cannot declare the Security Council's resolutions invalid. The resolutions of the Security Council, according to the content, can be divided into execution, quasi legisla-tive and quasi judicial three kinds, so the International Court of Justice applies to different standard of review on three kinds of resolutions.%由于缺乏《联合国宪章》和《国际法院规约》的明示授权,国际法院是否有权审查安理会的决议,在国际法学界是有争议的。司法实践以及隐含权力的理论,可以成为国际法院间接司法审查权的法律基础,间接审查权的特点在于审查的效力,在《联合国宪章》和《国际法院规约》修改之前,国际法院不能宣告安理会决议的无效。安理会的决议按其涉及的内容,分为执行、准立法和准司法三类,国际法院对三类决议分别适用不同的审查标准。

  15. Good medical ethics, justice and provincial globalism.

    Science.gov (United States)

    Prah Ruger, Jennifer

    2015-01-01

    The summer 2014 Ebola virus outbreak in Western Africa illustrates global health's striking inequalities. Globalisation has also increased pandemics, and disparate health system conditions mean that where one falls ill or is injured in the world can mean the difference between quality care, substandard care or no care at all, between full recovery, permanent ill effects and death. Yet attention to the normative underpinnings of global health justice and distribution remains, despite some important exceptions, inadequate in medical ethics, bioethics and political philosophy. We need a theoretical foundation on which to build a more just world. Provincial globalism (PG), grounded in capability theory, offers a foundation; it provides the components of a global health justice framework that can guide implementation. Under PG, all persons possess certain health entitlements. Global health justice requires progressively securing this health capabilities threshold for every person. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  16. Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services

    Science.gov (United States)

    Watanabe, Ryu; Tanaka, Toshiaki

    scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.

  17. Ideological Repositioning: Race, Social Justice, and Promise

    Science.gov (United States)

    Hodge, Samuel R.

    2014-01-01

    In this paper, I engage in discourse centrally located in the ideology of race in the United States of America juxtaposed to social justice with promise for tomorrow in higher education and beyond. I assert that social justice in kinesiology requires that once hired, retaining, securing tenured status, and promoting faculty of color means having…

  18. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  19. Design and Implementation of an IP-Based Security Surveillance System

    Directory of Open Access Journals (Sweden)

    James Eke

    2012-09-01

    Full Text Available The tremendous loss of lives and properties that may be attributed to criminals in recent times worldwide has become a source of worry to all and sundry. The situation has come to the alarming rate that the authority has sought for the immediate means of checkmating it without delay. Therefore, this work centers on the design and implementation of an Internet Protocol (IPbased security surveillance system. It incorporates remote viewing and storage of live video feeds and also remote motion control of the camera, all monitored with the use of a Personal Computer (PC. All the designs in this paper are software based. Hence, the software applications are developed using Visual C-Sharp (C# programming language to enable the proper monitoring and control of the entire system in which video feeds from the camera are viewed and also recorded on PC. The result obtained showed that with proper implementation, the surveillance system was found to be superb in all its ramifications.

  20. Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games

    Directory of Open Access Journals (Sweden)

    Karim KONATE

    2012-08-01

    Full Text Available The present work is dedicated to the implementation of a secure mechanism’s modules in routing protocol of MANET with the theory of games. First we are doing an introduction to what the Mobile Ad hoc Networks (MANETs and a presentation of some various attacks in MANETs pertaining to fail routing protocols. We study these attacks and the mechanisms which the secured routing protocols use to counter them. In the second hand we also study a reputation mechanism and we also propose a secure algorithm based on the reputation. Our work ends with a proposal analytical model by the theorical games and an implementation to the modules of our mechanism..

  1. 76 FR 10205 - Department of Homeland Security Implementation of OMB Guidance on Drug-Free Workplace Requirements

    Science.gov (United States)

    2011-02-24

    ... unintended changes this action makes in DHS policies and procedures for drug-free workplaces. All comments or.... Adopting the OMB guidance in place of the common rule will not substantively change the drug-free workplace... Implementation of OMB Guidance on Drug-Free Workplace Requirements AGENCY: Department of Homeland Security (DHS...

  2. Health Law as Social Justice.

    Science.gov (United States)

    Wiley, Lindsay F

    2014-01-01

    Health law is in the midst of a dramatic transformation. From a relatively narrow discipline focused on regulating relationships among individual patients, health care providers, and third-party payers, it is expanding into a far broader field with a burgeoning commitment to access to health care and assurance of healthy living conditions as matters of social justice. Through a series of incremental reform efforts stretching back decades before the Affordable Care Act and encompassing public health law as well as the law of health care financing and delivery, reducing health disparities has become a central focus of American health law and policy. This Article labels, describes, and furthers a nascent "health justice" movement by examining what it means to view health law as an instrument of social justice. Drawing on the experiences of the reproductive justice, environmental justice, and food justice movements, and on the writings of political philosophers and ethicists on health justice, I propose that health justice offers an alternative to the market competition and patient rights paradigms that currently dominate health law scholarship, advocacy, and reform. I then examine the role of law in reducing health disparities through the health justice lens. I argue that the nascent health justice framework suggests three commitments for the use of law to reduce health disparities. First, to a broader inquiry that views access to health care as one among many social determinants of health deserving of public attention and resources. Second, to probing inquiry into the effects of class, racial, and other forms of social and cultural bias on the design and implementation of measures to reduce health disparities. And third, to collective action grounded in community engagement and participatory parity. In exploring these commitments, I highlight tensions within the social justice framework and between the social justice framework and the nascent health justice movement

  3. IMPLEMENTATION OF PERVASIVE COMPUTING BASED HIGH-SECURE SMART HOME SYSTEM

    OpenAIRE

    Ventylees Raj.S

    2012-01-01

    In recent year, the home environment has seen a rapid introduction of wireless communication network enabled advance computing technologies. In this paper I mainly focus on the monitoring of smart home remotely and providing security when user is away from the home. The proposed security algorithm is combining of Biometrics, public key encryption and SMS based security alarm system. In the proposed security algorithm offered only Authenticate person monitoring home appliances via wireless net...

  4. Global health justice and governance.

    Science.gov (United States)

    Ruger, Jennifer Prah

    2012-01-01

    While there is a growing body of work on moral issues and global governance in the fields of global justice and international relations, little work has connected principles of global health justice with those of global health governance for a theory of global health. Such a theory would enable analysis and evaluation of the current global health system and would ethically and empirically ground proposals for reforming it to more closely align with moral values. Global health governance has been framed as an issue of national security, human security, human rights, and global public goods. The global health governance literature is essentially untethered to a theorized framework to illuminate or evaluate governance. This article ties global health justice and ethics to principles for governing the global health realm, developing a theoretical framework for global and domestic institutions and actors.

  5. Design and Implementation of Transport Relay Translator and its security Mitigations

    Directory of Open Access Journals (Sweden)

    P. Shanmugaraja

    2013-08-01

    Full Text Available The extensive growth of the Internet in the recent years has depleted all the IPv4 address space. It results in scarcity of the IPv4 addresses and leads to design of temporary techniques like NAT. IETF developed IPv6 to overcome this issue. IPv6 is more than 7.9×1028 times as many as IPv4. Again, it leads to a new issue of compatibility. IPv6 overcomes the problem of address scarcity but it is incompatible with IPv4 address. So machines configured with IPv4 and machines configured with IPv6 cannot communicate directly. This communication is mandatory because IPv6 cannot replace IPv4 rapidly. It takes time to convert completely from IPv4 infrastructure to IPv6 infrastructure. Until then, both should cooperate. Transition technologies developed to solve this incompatibility. One suchtechnology is Transport Relay Translator. It is based on RFC-3142. A translator located in the transport layer called as transport relay translator. The relay is located somewhere between the communicatinghosts and enables IPv6-only hosts to exchange traffic with IPv4-only hosts. A TRT, which runs on a dualstack node, can use one protocol when communicating with the client and another protocol when communicating with the application server. This paper discusses the implementation of TRT and methods to solve the security issues caused due to this translation.

  6. Pilot Implementation and Preliminary Evaluation of START:AV Assessments in Secure Juvenile Correctional Facilities.

    Science.gov (United States)

    Desmarais, Sarah L; Sellers, Brian G; Viljoen, Jodi L; Cruise, Keith R; Nicholls, Tonia L; Dvoskin, Joel A

    2012-01-01

    The Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) is a new structured professional judgment guide for assessing short-term risks in adolescents. The scheme may be distinguished from other youth risk assessment and treatment planning instruments by its inclusion of 23 dynamic factors that are each rated for both vulnerability and strength. In addition, START:AV is also unique in that it focuses on multiple adverse outcomes-namely, violence, self-harm, suicide, unauthorized leave, substance abuse, self-neglect, victimization, and general offending-over the short-term (i.e., weeks to months) rather than long-term (i.e., years). This paper describes a pilot implementation and preliminary evaluation of START:AV in three secure juvenile correctional facilities in the southern United States. Specifically, we examined the descriptive characteristics and psychometric properties of START:AV assessments completed by 21 case managers on 291 adolescent offenders (250 boys and 41 girls) at the time of admission. Results provide preliminary support for the feasibility of completing START:AV assessments as part of routine practice. Findings also highlight differences in the characteristics of START:AV assessments for boys and girls and differential associations between the eight START:AV risk domains. Though results are promising, further research is needed to establish the reliability and validity of START:AV assessments completed in the field.

  7. Civil Defence and National Security: Composition and Implementation Model in National Defence

    Directory of Open Access Journals (Sweden)

    Mr. Muradi

    2017-01-01

    Full Text Available Civil Defense is inherent part of every citizen in many countries anywhere in the world, which differ only in the implementation of the program. The difference depends on the threat level and needs of each country in mobilizing citizens. However, the Civil Defense’s Governance which involvement of citizens is already regulated in a number of regulations and legislation, but as one part of an integrated program linked to the involvement of citizens in the framework of national defense, civil defense program is not enough to have its own laws. So that when applied in the form of operational, interpretation of these programs tend to be not in tune and even have precisely the opposite perspective between the state and citizens. This paper argued that the Civil Defense program is part of an integrated governance program of national security. Therefore, the state should be required to ensure that the program of Civil Defense goes well. This paper is also offer the composition and program models associated with the Civil Defense, Conscription Program (draftee and Reserve Component. The argument of this paper is that the Civil Defense Program is a linear and continuous with Conscription and Reserves Programs.

  8. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    DEFF Research Database (Denmark)

    Gehring, Tobias; Haendchen, Vitus; Duhme, Joerg

    2015-01-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State......-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our...... with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components....

  9. Design and Implementation of Corporate Actions on a Decentralized Securities Depository

    OpenAIRE

    Hedin, Jonas

    2017-01-01

    Trading securities is a process that requires multiple trusted intermediaries to ensure that the trade is done correctly. The securities industry is therefore very slow and expensive; the central securities depository (CSD) being one of the main contributors to the disruption. In an effort to fix this, financial institutions has recently started looking into the blockchain technology; the innovation behind the cryptocurrency Bitcoin. Bitcoin is a digital currency that can be traded peer-to-pe...

  10. Design and implementation of a secure workflow system based on PKI/PMI

    Science.gov (United States)

    Yan, Kai; Jiang, Chao-hui

    2013-03-01

    As the traditional workflow system in privilege management has the following weaknesses: low privilege management efficiency, overburdened for administrator, lack of trust authority etc. A secure workflow model based on PKI/PMI is proposed after studying security requirements of the workflow systems in-depth. This model can achieve static and dynamic authorization after verifying user's ID through PKC and validating user's privilege information by using AC in workflow system. Practice shows that this system can meet the security requirements of WfMS. Moreover, it can not only improve system security, but also ensures integrity, confidentiality, availability and non-repudiation of the data in the system.

  11. Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation

    Directory of Open Access Journals (Sweden)

    Hongsong Chen

    2015-01-01

    Full Text Available Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography based lightweight digital signature and key transmission method are proposed to provide wireless secure communication in healthcare information system. Sunspot wireless sensor nodes are used to build healthcare secure communication network; wireless nodes and base station are assigned different tasks to achieve secure communication goal in healthcare information system. Mysql database is used to store Sunspot security entity table and measure entity table. Hadoop is used to backup and audit the Sunspot security entity table. Sqoop tool is used to import/export data between Mysql database and HDFS (Hadoop distributed file system. Ganglia is used to monitor and measure the performance of Hadoop cluster. Simulation results show that the Hadoop-based healthcare architecture and wireless security communication method are highly effective to build a wireless healthcare information system.

  12. Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks

    Science.gov (United States)

    Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman

    2015-10-01

    Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.

  13. Implementation Of The ISO/IEC 27005 In Risk Security Analysis Of Management Information System

    Directory of Open Access Journals (Sweden)

    Sri Ariyani*

    2016-08-01

    Full Text Available The study conducted and explains about analysis result of Security Management Information System (SMKI at UPT SAMSAT Denpasar. This analysis has purpose to find out the level of SMKI at UPT SAMSAT Denpasar. Framework to be used in this analysis process is the ISO/IEC 27005. Section that wants to be analyze is the main task and function at the Section of Motor Vehicle Tax (PKB and Motor Vehicle Mutation Charge (BBNKB and service process performed, in this case is which is done by the staff in the Section of PKB and BBNKB that includes determining tax, to take data of progressive tax, data slot that involves in it, supporting structure and infrastructure and, of course, the stackeholder who involve in the process. The analysis was performed by implemented the ISO/IEC 27005 framework referring to clause 7 and clause 8. Clause 7 of ISO/IEC 27005 in this analysis was performed to the organization structure, obstacles list that influence the organization, reference list of legislative and regulation that valid to the organization. Whereas clause 8 of ISO/IEC 27005 include asset identification, asset appraisal, impact assessment. Analysis result shows that asset list that has the highest risk rate include the main asset those are: the process of coding selection, determining tax, process of determining the progressive tax ownership status, process of determining the progressive tax ownership order, process to repeat data capture of progressive tax, and supporting asset that cover: staff of determination, staff of progressive data capture. Whereas asset list that has the highest threat level include main asset those are: process of tax determination coding selection, process of progressive tax ownership status determination, process of progressive tax ownership order determination, process to repeat data capture of progressive tax, and supporting asset those are: the staff of determination, staff of progressive data capture.

  14. Department of Veterans Affairs' Implementation of Information Security Education Assistance Program. GAO-10-170R

    Science.gov (United States)

    Wilshusen, Gregory C.; Melvin, Valerie C.

    2009-01-01

    The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…

  15. Design and Implementation of Intranet Security Experiment Platform%内网安全实验平台设计

    Institute of Scientific and Technical Information of China (English)

    张荣玉; 侯整风; 朱晓玲

    2015-01-01

    With the rapid development of network, internal network security problem increasingly prominent. Network security products such as firewalls, IDS, IPS focus on preventing from external network threats and attacks. This thesis designs and im-plements internal network security experiment platform based on VLAN. The platform includes access control, user/terminal health inspection, security policy customization, network status monitoring, implements control strategy such as allow, block, isolate. The experimental results show that platform can manage internal network security effectively, can be used as an experi-ment platform for undergraduate of the information securityand can also be used as a small enterprise internal security manage-ment tool.%随着网络的飞速发展,内部网络安全问题日益突出.防火墙、IDS、IPS等网络安全产品重点放在了防范来自外部网络的威胁与攻击.该文设计并实现基于VLAN的内部网络安全实验平台.该平台包括准入控制、用户/终端健康检查、安全策略定制、网络状态监控等功能模块,对终端实施允许、阻断、隔离控制策略.实验结果表明,该平台能够有效安全的管理内部网络,可以作为信息安全专业本科生网络安全实验平台,也可作为小型企业内网安全管理工具.

  16. Common criteria related security design patterns for intelligent sensors--knowledge engineering-based implementation.

    Science.gov (United States)

    Bialas, Andrzej

    2011-01-01

    Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.

  17. Comparison Analysis of Information Security Risks and Implementation of ISO27001 on Higher Educational Institutions in Indonesia

    Directory of Open Access Journals (Sweden)

    Candiwan

    2015-10-01

    Full Text Available Information on Higher Education in the form of student grades, the results of research, intellectual property, financial reporting, data to the Department of Higher Education, should always be protected with good Information Security Management (ISM. The ISM at the Higher Educational Institutions or Universities need to have serious attention. This research explains how to calculate the risk value based on the value of assets, the likelihood of threats occurrence and vulnerabilities of assets, adopting standard from ISO 27005:2011 and NIST SP800-30:2013. Based on the risk assessment of ISO 27005:2011 and the maturity level of implementation controls of ISO 27001:2013, it showed the controls that should be done to secure information on Higher Educational Institutions. From four Universities surveyed, three of them have high risk and one has medium. Based on the research result that was done for the risk valuation and implementation of controls, we can determine the priority for improvement actions. The risks that often occur were lack of supporting facility control such as loss power supply caused by susceptibility to voltage variation, and eavesdropping. Then the controls that should be enhanced were human resource security particularly in terms and conditions of employment and information security policy

  18. Implementation of a security system in the radiotherapy process; Implantacion de un sistema de seguridad en el proceso radioterapico

    Energy Technology Data Exchange (ETDEWEB)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-07-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  19. Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363.

    Science.gov (United States)

    Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao

    2010-11-01

    Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.

  20. IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION

    National Research Council Canada - National Science Library

    MATÚŠ HORVÁTH; MARTIN JAKUB

    2009-01-01

    ...) the organization can identify and reduce risks in this area. This the area of information security management covers a numbers of ISO / IEC 27000 standards, which are based on best practice solutions...

  1. Implementation Of Secure 6LoWPAN Communications For Tactical Wireless Sensor Networks

    Science.gov (United States)

    2016-09-01

    TERMS Wireless Sensor Networks (WSN), Sensor Nodes, 6LoWPAN, IEEE 802.15.4, energy constrained node, centralized routing, keying mechanism , network...encryption and authentication was not provided. The proposed routing mechanism within [1] focused on the development of an energy efficient cross... stored data. Cyber security mechanisms for the MS have already been developed and tested throughout the military (i.e., security mechanisms for the

  2. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  3. Implementing Iris in the Railway Control Office Application for Secure Saas in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Dr. K. Meena

    2015-12-01

    Full Text Available Technology plays a vital role in each and every part of the world. In particular ―Cloud‖ computing - a moderately recent term, characterizes the path to develop the advancement in the world of computer science. Further, Cloud provides an affordable environment for its users through different forms of services such as SaaS (Software as a service, PaaS (Platform as a service, and IaaS (Infrastructure as a Service. Cloud computing is also an Internet-based computing where a large pool of systems are connected in private or public networks, and provide dynamically scalable infrastructure for application data as well as file storage. Security of Cloud computing is an evolving sub-domain of network security, computer security and information security. In spite of its advantages, Cloud environment has many security flaws such as loss of important data, data leakage and something related to cloning, resource pooling etc. Security of Cloud Computing is an emerging area for study. It includes several security and privacy issues with challenges and solutions for many security issues of cloud computing. The Control Office Application (COA is the latest addition to train operations related IT application of Indian Railways. Along with the Freight Operations Information System (FOIS, COA has led to a complete transformation in train operations and facilitates all information on train operations being computer generated. It is this application that feeds the National Train Enquiry System (NTES which provides passengers with up to date information on train running. COA also provides train operations information to FOIS and ICMS. The objective of the Indian Railways is to further improve the operations by using technological aids that enable quicker data capture and intelligent applications that provide better planning and forecasting tools. To overcome these issues, in Cloud computing, we can use SaaS (software as a service. In this paper, we have proposed

  4. Implementation of Portion Approach in Distributed Firewall Application for Network Security Framework

    Directory of Open Access Journals (Sweden)

    Harleen Kaur

    2011-11-01

    Full Text Available The stimulate of this research seeks collaboration of firewalls which, could reach to the capability of distributed points of security policy; the front-end entity may much interact by the invaders so the separation between this entity and back-end entity to make the secure domain protection is necessary; collaborative security entity has the various task in the organization and there is a certain security policy to apply in; the entities like DPFF have to be protected from outsiders. Firewalls are utilized typically to be the main layer of security in the network framework. The research is presented the particular segment of the proposed framework that DPFF based on the developed iptable firewall to be the layers of defense, which is protected front and backend of the framework with a dynamic security and policy update to control the frameworks safeguard through proposed portion approach algorithm that utilize to reduce the traffic and efficiency in detection and policy update mechanism. The policy update mechanism for DPFF is given the way of its employment. The complete framework signifies a distributed firewall, where the administrator configures the policy rules set, which could be separately or else from administration nodes side.

  5. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  6. Design and implementation of modular home security system with short messaging system

    Science.gov (United States)

    Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad

    2014-03-01

    Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  7. THE IMPLEMENTATION OF QUALITY MANAGEMENT IN THE ROMANIAN JUDICIAL SYSTEM BY REDEFINING THE ROLE AND STATUS OF PERSONNEL AND ITS INVOLVEMENT IN THE ACHIEVEMENT OF JUSTICE

    Directory of Open Access Journals (Sweden)

    HULPUŞ IOANA ALEXANDRA

    2015-07-01

    Full Text Available Reforming the justice on quality and sustainability must be based on the full involvement of judicial organizations staff, magistrates, clerks and other auxiliary personnel equally by redefining the role, status and responsibilities of them.. Romanian registrar’s role in the administration of justice is not to be neglected, his work representing a real support for magistrates, their tasks contributing decisively to the smooth running of the entire activities of the courts. Improving relations between judges and support staff by restructuring the relationship and turn them into functional „teams” is the condition for restoring confidence in justice. In this respect, court managers and judges must make all efforts to identify tasks that can be transferred to regitrars with higher education to improve their own work, while helping to improve their own training at the same time.

  8. The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality

    Directory of Open Access Journals (Sweden)

    Hsien-Yu Lee

    2016-03-01

    Full Text Available Nowadays, the world is moving toward mobilized communities as the development of internet and web applications. Almost all of the daily activities and transactions can be done through the internet. Web applications become trends as e-business and e-commerce systems continue to make our lives easier and better without our noticing. These web applications were developed from various frameworks, programming languages and platforms etc. over the internet. Computer technology is a time saving and quality improving revolution. When the enterprise will build up the vision of computer digitalization, i.e. hosting e-Enterprise engineering, cloud platform or information systems integration, etc. Under the web world, the single sign-on (SSO concept was invented as problem-solving method about one login as you go authorized systems. In other words, web securities are confronting some challenges under the networked era of the emergency web. Therefore the SSO functionality based on multiple platforms and web enabling technologies is put forward and it also secures web applications developed from diverse programming. The proposed method of secure login utility is created as an obvious solution to the general functionality of SSO. Hereby, we also will reveal two application instances of the secure login utility to implement the idea of SSO realized in the enterprise systems.

  9. How to define and build an effective cyber threat intelligence capability how to understand, justify and implement a new approach to security

    CERN Document Server

    Dalziel, Henry; Carnall, James

    2014-01-01

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Amo

  10. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices.

    Science.gov (United States)

    Marin, Leandro; Pawlowski, Marcin Piotr; Jara, Antonio

    2015-08-28

    The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  11. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices

    Directory of Open Access Journals (Sweden)

    Leandro Marin

    2015-08-01

    Full Text Available The Internet of Things is integrating information systems, places, users and billions of constrained devices into one global network. This network requires secure and private means of communications. The building blocks of the Internet of Things are devices manufactured by various producers and are designed to fulfil different needs. There would be no common hardware platform that could be applied in every scenario. In such a heterogeneous environment, there is a strong need for the optimization of interoperable security. We present optimized elliptic curve Cryptography algorithms that address the security issues in the heterogeneous IoT networks. We have combined cryptographic algorithms for the NXP/Jennic 5148- and MSP430-based IoT devices and used them to created novel key negotiation protocol.

  12. The design and implementation of web mining in web sites security

    Institute of Scientific and Technical Information of China (English)

    ZHANG Guo-yin; GU Guo-chang; LI Jian-li

    2003-01-01

    The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density-Based Clustering technique is used to reduce resource cost and obtain better efficiency.

  13. A Test-Bed Implementation for Securing OLSR In Mobile Ad-Hoc Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil A. Panaousis

    2010-10-01

    Full Text Available Contemporary personal computing devices are increasingly required to be portable and mobileenabling user’s wireless access, to wired network infrastructures and services. This approach tomobile computing and communication is only appropriate in situations where a coherentinfrastructure is available. There are many situations where these requirements are not fulfilledsuch as; developing nations, rural areas, natural disasters, and military conflicts to name but a few.A practical solution is to use mobile devices interconnected via a wireless medium to form anetwork, known as a Mobile Ad-hoc Network (MANET, and provide the services normally found inwired networks. Security in MANETs is an issue of paramount importance due to the wireless natureof the communication links. Additionally due to the lack of central administration security issues aredifferent from conventional networks. For the purposes of this article we have used the “WMN testbed”to enable secure routing in MANETs. The use of cryptography is an efficient proven way ofsecuring data in communications, but some cryptographic algorithms are not as efficient as othersand require more processing power, which is detrimental to MANETs. In this article we haveassessed different cryptographic approaches to securing the OLSR (Optimised Link State Routingprotocol to provide a basis for research. We conclude the paper with a series of performanceevaluation results regarding different cryptographic and hashing schemes. Our findings clearlyshow that the most efficient combination of algorithms used for authentication and encryption areSHA-1 (Secure Hash Algorithm-1 and AES (Advanced Encryption Standard respectively. Usingthis combination over their counterparts will lead to a considerable reduction in processing timeand delay on the network, creating an efficient transaction moving towards satisfying resourceconstraints and security requirements.

  14. 75 FR 69604 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Office of...

    Science.gov (United States)

    2010-11-15

    ... (OPS), including the National Operations Center (NOC), proposes to establish a new DHS system of... Fusion System of Records.'' This system of records will allow DHS/OPS, including the NOC, to collect... natural disasters. The NOC serves as the nation's homeland security center for information sharing...

  15. 75 FR 31273 - Social Security Administration Implementation of OMB Guidance for Drug-Free Workplace Requirements

    Science.gov (United States)

    2010-06-03

    ... makes no substantive change to our policy or procedures for a drug-free workplace. DATES: This direct to... unintended changes this action makes in our policies and procedures for drug-free workplace. All comments on...-Free Workplace Requirements AGENCY: Social Security Administration. ACTION: Final rule with request for...

  16. Implementation of a RPS Cyber Security Test-bed with Two PLCs

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jinsoo; Heo, Gyunyoung [Kyung Hee Univ., Yongin (Korea, Republic of); Son, Hanseong [Joongbu Univ., Geumsan (Korea, Republic of); An, Yongkyu; Rizwan, Uddin [University of Illinois at Urbana-Champaign, Urbana (United States)

    2015-10-15

    Our research team proposed the methodology to evaluate cyber security with Bayesian network (BN) as a cyber security evaluation model and help operator, licensee, licensor or regulator in granting evaluation priorities. The methodology allowed for overall evaluation of cyber security by considering architectural aspect of facility and management aspect of cyber security at the same time. In order to emphasize reality of this model by inserting true data, it is necessary to conduct a penetration test that pretends an actual cyber-attack. Through the collaboration with University of Illinois at Urbana-Champaign, which possesses the Tricon a safety programmable logic controller (PLC) used at nuclear power plants and develops a test-bed for nuclear power plant, a test-bed for reactor protection system (RPS) is being developed with the PLCs. Two PLCs are used to construct a simple test-bed for RPS, bi-stable processor (BP) and coincidence processor (CP). By using two PLCs, it is possible to examine cyber-attack against devices such as PLC, cyber-attack against communication between devices, and the effects of a PLC on the other PLC. Two PLCs were used to construct a test-bed for penetration test in this study. Advantages of using two or more PLCs instead of single PLC are as follows. 1) Results of cyber-attack reflecting characteristics among PLCs can be obtained. 2) Cyber-attack can be attempted using a method of attacking communication between PLCs. True data obtained can be applied to existing cyber security evaluation model to emphasize reality of the model.

  17. Mathematics education for social justice

    Science.gov (United States)

    Suhendra

    2016-02-01

    Mathematics often perceived as a difficult subject with many students failing to understand why they learn mathematics. This situation has been further aggravated by the teaching and learning processes used, which is mechanistic without considering students' needs. The learning of mathematics tends to be just a compulsory subject, in which all students have to attend its classes. Social justice framework facilitates individuals or groups as a whole and provides equitable approaches to achieving equitable outcomes by recognising disadvantage. Applying social justice principles in educational context is related to how the teachers treat their students, dictates that all students the right to equal treatment regardless of their background and completed with applying social justice issues integrated with the content of the subject in order to internalise the principles of social justice simultaneously the concepts of the subject. The study examined the usefulness of implementing the social justice framework as a means of improving the quality of mathematics teaching in Indonesia involved four teacher-participants and their mathematics classes. The study used action research as the research methodology in which the teachers implemented and evaluated their use of social justice framework in their teaching. The data were collected using multiple research methods while analysis and interpretation of the data were carried out throughout the study. The findings of the study indicated that there were a number of challengesrelated to the implementation of the social justice framework. The findings also indicated that, the teachers were provided with a comprehensive guide that they could draw on to make decisions about how they could improve their lessons. The interactions among students and between the teachers and the students improved, they became more involved in teaching and learning process. Using social justice framework helped the teachers to make mathematics more

  18. Probabilistic risk analysis toward cost-effective 3S (safety, safeguards, security) implementation

    Science.gov (United States)

    Suzuki, Mitsutoshi; Mochiji, Toshiro

    2014-09-01

    Probabilistic Risk Analysis (PRA) has been introduced for several decades in safety and nuclear advanced countries have already used this methodology in their own regulatory systems. However, PRA has not been developed in safeguards and security so far because of inherent difficulties in intentional and malicious acts. In this paper, probabilistic proliferation and risk analysis based on random process is applied to hypothetical reprocessing process and physical protection system in nuclear reactor with the Markov model that was originally developed by the Proliferation Resistance and Physical Protection Working Group (PRPPWG) in Generation IV International Framework (GIF). Through the challenge to quantify the security risk with a frequency in this model, integrated risk notion among 3S to pursue the cost-effective installation of those countermeasures is discussed in a heroic manner.

  19. Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

  20. EC Visa Facilitation and Readmission Agreements: Implementing a New EU Security Approach in the Neighbourhood

    OpenAIRE

    Trauner, Florian; Kruse, Imke

    2008-01-01

    With the Eastern Enlargement successfully completed, the EU is searching for a proper balance between internal security and external stabilisation that is acceplable to all sides. This paper focuses on an EU foreign policy instrument that is a case in point for this struggle: EC visa facilitation and readmission agreements. By looking at the EU's strategy on visa facilitation and readmission, this paper aims to offer a first systematic analysis of the objectives, substance and political impli...

  1. Design and Implementation of A DICOM PACS With Secure Access Via Internet

    Science.gov (United States)

    2007-11-02

    Digital Radiology Department”. [Last access 05/28/2001]. Available URL: http://ej.rsna.org/EJ_0_96/0051-97.fin/Pacs97.html [13] B. Parker. “ Estudio ...de un caso de implantación de [Last access 05/25/2001]. Available URL: http://www.vcgimagen.com.ar./EspPACS3.htm [14] “Apache secured by SSL” [Last

  2. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  3. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    Science.gov (United States)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  4. A Testbed Implementation for Securing OLSR in Mobile Ad hoc Networks

    CERN Document Server

    Panaousis, Emmanouil A; Millar, Grant P; Ramrekha, Tipu A; Politis, Christos

    2010-01-01

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user’s wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled such as; developing nations, rural areas, natural disasters, and military conflicts to name but a few. A practical solution is to use mobile devices interconnected via a wireless medium to form a network, known as a Mobile Ad-hoc Network (MANET), and provide the services normally found in wired networks. Security in MANETs is an issue of paramount importance due to the wireless nature of the communication links. Additionally due to the lack of central administration security issues are different from conventional networks. For the purposes of this article we have used the “WMN test-bed” to enable secure routing in MANETs. The us...

  5. Sanitary justice in scarcity

    Directory of Open Access Journals (Sweden)

    Miguel Kottow

    Full Text Available Justice in health care and the allocation of scarce medical resources must be analyzed differently in affluent as compared to economically weaker societies. The protective functions of the state must be extended to cover basic needs for those too poor to meet them on their own. Medical needs are a high priority, since poor health hampers the ability to secure other basic needs. The state may operate as either a health care provider or supervisor, guaranteeing that citizens be treated fairly by nongovernmental institutions. Two-tiered systems with a vigorous private health care sector are compatible with the explicit right to health care, provided the private tier operates without directly or indirectly draining public funds.

  6. GMOs and Global Justice

    DEFF Research Database (Denmark)

    Toft, Kristian Høyer

    2012-01-01

    claims to justice. This article investigates how GMOs might generate claims to global justice and what type of justice is involved. The paper argues that the debate on GMOs and global justice can be categorized into three views, i.e., the cosmopolitan, the pluralist, and the sceptic. The cosmopolitan...... on the premise that global cooperation on GMO production provides the relevant basis for assessing the use of GMOs by the standard of global distributive justice....

  7. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Directory of Open Access Journals (Sweden)

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  8. Reforming Military Resources and the Authority of the United Nations Security Council in implementing coercive military measures

    Directory of Open Access Journals (Sweden)

    Sofia Santos

    2013-05-01

    Full Text Available The lack of a de facto military component is rather significant in normative and operational terms within the UN system. The differences among the permanent members of the Security Council, which exist since its beginning, have stopped provisions from being enforced which were included in the United Nations Charter, as well as the design of credible and effective alternatives. Considering that what is at stake are coercive military measures decided by the Security Council under Chapter VII, this becomes a decisive issue, as these measures were decided ultima ratio to maintain or restore international peace and security. Without an operational Military Staff Committee, without armed forces and without power of authority in the enforcement process, the Council is limited to approving decisions and held hostage to the options of Member-States, namely its permanent members. To ignore the urgency of a reform implies perpetuating a double paradox: on the one hand, the Security Council is required to take increasingly wider responsibility, laid down in article 24 and, in this context, in art. 42, and this body still lacks adequate military instruments; on the other hand, by correlating the reinforcement of efficiency, legitimacy and enforcement of Council decisions exclusively with the reform of its composition and work methodology, we are neglecting the fact that this change requires a reform of military instruments and of its authority within the scope of the body's multidimensional reform process. This paper begins by analyzing the enforcement mechanism established in the Charter and then addresses the issue underlying the delegation of implementing coercive military measures. Finally, the paper discusses the reform proposals, their guidelines and puts forward possible solutions.

  9. War, Law and Order - Case Study: Australian Whole-of-Government Efforts to Develop the Security and Criminal Justice Sectors in Stabilization

    Science.gov (United States)

    2012-05-01

    Peace: Report of the Commonwealth Commission on Respect and Understanding, Com- monwealth Secretariat, 2007. 75 Connable, Ben and Martin C. Libicki...154, No. 2, pp. 64-72. Feil , Scott, ‘Building Better Foundation: Security in Post-Con- flict Reconstruction’, The Washington Quarterly, Vol. 25, No. 4... Martin , The Transformation of War, Free Press, 1991. Wainwright, Elsina, Police Join the Front Line. Building Austra- lia’s International Wagner

  10. Implementation of RSA 2048-bit and AES 256-bit with Digital Signature for Secure Electronic Health Record Application

    Directory of Open Access Journals (Sweden)

    Mohamad Ali Sadikin

    2016-10-01

    Full Text Available This research addresses the implementation of encryption and digital signature technique for electronic health record to prevent cybercrime such as robbery, modification and unauthorised access. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in Java programming language. Secure Electronic Health Record Information (SEHR application design is intended to combine given services, such as confidentiality, integrity, authentication, and nonrepudiation. Cryptography is used to ensure the file records and electronic documents for detailed information on the medical past, present and future forecasts that have been given only to the intended patients. The document will be encrypted using an encryption algorithm based on NIST Standard. In the application, there are two schemes, namely the protection and verification scheme. This research uses black-box testing and whitebox testing to test the software input, output, and code without testing the process and design that occurs in the system.We demonstrated the implementation of cryptography in SEHR. The implementation of encryption and digital signature in this research can prevent archive thievery.

  11. CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK

    Directory of Open Access Journals (Sweden)

    V. S. Kolomoitcev

    2016-01-01

    Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.

  12. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  13. Implementation of a Secure Internet/Mobile Banking System in Iran

    Directory of Open Access Journals (Sweden)

    Javad Soroor

    2005-12-01

    Full Text Available Modern fast-evolving technology is constantly bringing new dimensions to our daily life. In Iran, electronic banking systems provide customers with easy access to banking services. ATMs, phone banking, Internet banking, and more recently, mobile banking have considerably improved the interaction between user and bank. This paper discusses the security of today’s electronic banking systems in Iran. We focus on Internet and mobile banking and present an overview and evaluation of the techniques that are used in current Iranian systems. The best practice is indicated, together with improvements for the future. The issues discussed in this paper are generally applicable in other electronic services such as e-commerce and e-government.

  14. Security Deployment and Implementation of DNS%DNS的安全部署与实现

    Institute of Scientific and Technical Information of China (English)

    汤剑; 胡洪新

    2015-01-01

    域名解析是互联网的一项基础服务,当DNS受到攻击或不可用时互联网服务将受到影响,分析造成域名解析服务故障的原因,应用负载均衡、服务分流、集中管理、日志分析、访问列表控制等技术,实现DNS的高可用性与安全可控。%Domain name resolution is an Internet-based service.When DNS attack or unavailable Internet services will be affected. Analyze the reasons for failure of the DNS.Apply load balancing, service diversion, centralized management, log analysis, access control lists and other technical.To achieve high availability and security of DNS controlled.

  15. Implementing the millennium development food security goals Challenges of the southern African context

    Science.gov (United States)

    Love, David; Twomlow, Steve; Mupangwa, Walter; van der Zaag, Pieter; Gumbo, Bekithemba

    The Millennium Development Goals’ target to halve the proportion of people who suffer from hunger is extremely important in southern Africa, where food security has become increasingly problematic over the last 20 years. One “quick-win” proposal is replenishment of soil nutrients for smallholder farmers, through free or subsidised chemical fertilisers. Other proposals include appropriate irrigation technology, improved inputs and interventions targeted at women. Analysis of over 10 years of agro-hydrological and agro-economic studies from southern African show that a different approach is required to interventions proposed. There are sustainability problems with free chemical fertiliser due to transport costs and ancillary costs. Furthermore, recent studies in Zimbabwe and Mozambique show that significant increases in yield can only be obtained when soil fertility management is combined with good crop husbandry, e.g. timely planting and weeding. Ongoing replenishment of fertility would be dependent on a continued free or subsidised fertiliser supply, and transport system. Increasing access to irrigation will help, but is not the only solution and cannot reach even a majority of farmers. It has been determined that short dryspells are often the major cause of low yields in sub-Saharan Africa. Soil-water conservation approaches, e.g. winter weeding and conservation tillage, can reduce risk and increase yield. The following specific recommendations are made for urgent interventions to contribute sustainably to food security in southern Africa: (i) To increases access to fertiliser, consider development of strong input markets at end-user level. (ii) Intensification of technology transfer, focusing on capacity building for transfer of existing technologies and much closer collaboration between state and NGO sectors, agronomists and water engineers. (iii) Increasing the uptake of soil-water conservation methods, including conservation tillage and weeding, and

  16. TRANSITIONAL JUSTICE AND DEMOCRATIC CHANGE: KEY CONCEPTS

    Directory of Open Access Journals (Sweden)

    ELENA ANDREEVSKA

    2013-05-01

    Full Text Available This Article proposes a genealogy of transitional justice and focuses on transitional justice as one of the key steps in peace building that needs to be taken to secure a stable democratic futureTransitional justice is a response to systematic or widespread violations of human rights. It seeks recognition for victims and promotion of possibilities for peace, reconciliation and democracy. The paper focuses on key concepts of transitional justice before addressing its traditional components: justice, reparation, truth and institutional reform. This Article meeting point on the transitional process in a society which has experienced a violent conflict and needs adequate mechanisms to deal with the legacies of the past in order to prevent future violence and cover the way for reconciliation and democratic consolidation. It provides key stakeholders with an overview of transitional justice and its different components, while examining key challenges faced by those working in this area. The present paper concludes with some remarks that challenge the traditional concept of transitional justice and its processes in order to initiate important debate on where future work in this field is needed.

  17. TRANSITIONAL JUSTICE AND DEMOCRATIC CHANGE: KEY CONCEPTS

    Directory of Open Access Journals (Sweden)

    Elena ANDREEVSKA

    2013-06-01

    Full Text Available This Article proposes a genealogy of transitional justice and focuses on transitional justice as one of the key steps in peace building that needs to be taken to secure a stable democratic future. Transitional justice is a response to systematic or widespread violations of human rights. It seeks recognition for victims and promotion of possibilities for peace, reconciliation and democracy. The paper focuses on key concepts of transitional justice before addressing its traditional components: justice, reparation, truth and institutional reform. This Article meeting point on the transitional process in a society which has experienced a violent conflict and needs adequate mechanisms to deal with the legacies of the past in order to prevent future violence and cover the way for reconciliation and democratic consolidation. It provides key stakeholders with an overview of transitional justice and its different components, while examining key challenges faced by those working in this area. The present paper concludes with some remarks that challenge the traditional concept of transitional justice and its processes in order to initiate important debate on where future work in this field is needed.

  18. Informal Justice Systems: Charting a Course for Human Rights-Based Engagement

    DEFF Research Database (Denmark)

    Kerrigan, Fergus; McKay, Anne Louise; Kristiansen, Annali

    engagement with informal justice systems can build greater respect and protection for human rights. It highlights the considerations that development partners should have when assessing whether to implement programmes involving informal justice systems, the primary consideration being that engagement...... with the informal justice systems neither directly nor inadvertently reinforces existing societal or structural discrimination – a consideration that applies to working with formal justice systems as well. The study also examines the value of informal justice systems in offering, in certain contexts, flexible...

  19. Implementation of Unclassified Controlled Nuclear Information guidelines for fixed-site safeguards and security (FSSS) at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Rood, P.L.

    1995-02-01

    Unclassified Controlled Nuclear Information (UCNI) is one type of sensitive information that DOE employees, including computer users, must now identify and protect. Guidelines to identify information as UCNI are gradually being put in place. The publication of Unclassified Controlled Nuclear Information Topical Guideline for Fixed-Site Safeguards and Security, TG-FSSS-1, is a major step in the development of UCNI guidelines. This DOE published guide cuts across and addresses many different programmatic areas including automated data processing. Our local guideline, Los Alamos National Laboratory Unclassified Controlled Nuclear Information Guideline for Fixed-Site Safeguards and Security, IG-LAFSSS-1, is based on TG-FSSS-1. In this paper, I plan to discuss the background of UCNI, the definition of UCNI, information that qualifies as UCNI, the consequences of information being UCNI, the development of UCNI guidelines, TG-FSSS-1 and IG-LAFSSS-1, the relationship of UCNI to classification, and the implementation of the IG-LAFSSS-1 at Los Alamos.

  20. A critical analysis of the implementation of social networking as an e-recruitment tool within a security enterprise

    Directory of Open Access Journals (Sweden)

    Anthony Lewis

    2015-12-01

    Full Text Available Many enterprises are operating in complex and competitive environments, and changes in the internal and external environment have prompted them to engage in better ways of doing business. In order to respond to these changes, and survive in today’s volatile business environment, enterprises need to change their strategies. Human Resource departments are under pressure to keep operating costs low whilst also ensuring they are attracting, recruiting, and retaining talent within the enterprise. To achieve this, an increasing number of enterprises have adopted social networking into their recruitment strategy. This research aims to critically analyze the implementation of social networking as an e-recruitment tool within a Security Enterprise. The research key objective is to examine the importance of attracting Generation Y through the use of social networking sites and also to develop an understanding of the advantages and disadvantages of using social networking as an e-recruitment tool. The research also looks at contemporary examples of enterprises that have implemented social networking into their recruitment strategy. A further objective of the research is to gain an understanding of the attitudes and perceptions of the use of social networking as an e-recruitment tool. To achieve this, the research has taken a mixed-methods approach whilst focusing on an interpretivist stance. Data was gathered through an interview with the HR Manager at the Security Enterprise and a questionnaire was distributed to 22 employees within the enterprise and 84 respondents on social networking sites. The overall attitudes and perceptions of respondents showed that social networking can be effectively used as an e-recruitment tool as long as a traditional recruitment method is also used.

  1. Distributive principles of economic justice: an Islamic perspective

    Directory of Open Access Journals (Sweden)

    Zakiyuddin Baidhawy

    2012-12-01

    Full Text Available Poverty and impoverishment in the world currently continue to increase as aresult of distributive justice systems and its principles that became the basis ofcontemporary economics did not succeed in allocating and distributing resourcesjustly. Based on this problem, this study aimed at describing the Islamic responseto the problem of distributive injustice, and how necessarily the state played arole in upholding distributive justice. Through the thematic-induction method andthe synthetic analysis, the study finds out several findings as follows. Firstly,Islam formulated three principles of distributive justice as follows: 1 the Distributionof natural and the environmental resources was in the framework of participation;2 the Redistribution of the wealth and the income were joint responsibilityof ascertaining social security, the increase in the capacity and the authorityfor them who were disadvantage; and 3 the Role of the state was certaintythat was complementary for the ethical market in order to guarantees the senseof justice and the achievement of public welfare. Secondly, according to Islam,the process of the redistribution of the wealth and the income aimed at givingsocial security on the fulfillment of basic needs for the poor; strove for the increasein the capacity through education and skills; and increased the poor’sbargaining position through their participation in decision making that was linkedwith their interests and the control on its implementation. Thirdly, the intention of establishing justice was to gain both individual and public welfare and the happiness(al-fala>h}.Kemiskinan dan pemiskinan di dunia kontemporer terus meningkat sebagai akibatsistem keadilan distributif dan prinsip-prinsipnya yang menjadi basis ekonomisaat ini tidak berhasil dalam mengalokasikan dan memeratakan sumber dayasecara adil. Berdasarkan masalah ini, kajian ini bertujuan untuk menjelaskanrespon Islam atas problem ketidakadilan distributif, dan

  2. Crippling Sexual Justice

    DEFF Research Database (Denmark)

    Stormhøj, Christel

    2015-01-01

    . The article develops a normative and analytical framework, encompassing the multiple structural conditions, the virtues of citizens, and the emotional dimension of belonging, which enable or hamper justice. It integrates theories of democratic citizenship, belonging, and social justice, and provides...

  3. Ethnic disparities in Dutch juvenile justice

    NARCIS (Netherlands)

    Komen, M.; van Schooten, E.

    2009-01-01

    In the Netherlands, ethnic minority boys are heavily overrepresented in prisons and secure judicial institutions for juveniles. In a sample of 324 juveniles of both native Dutch and ethnic minority origin who have come into contact with the Dutch criminal justice authorities, we compared the number

  4. Justice and medical ethics.

    Science.gov (United States)

    Gillon, R

    1985-07-20

    Justice, in the sense of fair adjudication between conflicting claims, is held to be relevant to a wide range of issues in medical ethics. Several differing concepts of justice are briefly described, including Aristotle's formal principle of justice, libertarian theories, utilitarian theories, Marxist theories, the theory of John Rawls, and the view--held, for example, by W.D. Ross--that justice is essentially a matter of reward for individual merit.

  5. Component-based Software Design and Implementation for Network Security System

    Directory of Open Access Journals (Sweden)

    Jianchao Han

    2009-12-01

    Full Text Available A computer network intrusion detection and prevention system consists of collecting network traffic data, discovering user behavior patterns as intrusion detection rules, and applying these rules to prevent malicious and misuse. Many commercial off-the-shelf (COTS products have been developed to perform each of these tasks. In this paper, the component-based software engineering approach is exploited to integrate these COTS products as components into a computerized system to automatically detect intrusion rules from network traffic data and setup IPTables to prevent future potential attacks. The component- based software architecture of this kind of system is designed, COTS components are analyzed and selected, adaptor components to connect COTS products are developed, the system implementation is illustrated, and the preliminary system experiment is presented.

  6. THE EFFECTIVENESS OF THE IMPLEMENTATION OF YOUTH POLICY AT THE INDUSTRIAL ENTERPRISES AS A CONDITION FOR ECONOMIC SECURITY OF RUSSIA

    Directory of Open Access Journals (Sweden)

    N. V. Popova

    2016-01-01

    Full Text Available The article is devoted to questions of efficiency of realization of youth policy at the industrial enterprises as a condition for economic security of Russia. Several reasons contribute to the relevance of the study, including the lack of diagnostics and a comprehensive social monitoring of the implementation of youth programs at enterprises and organizations There are the lack of system diagnostics and comprehensive social monitoring of the implementation of youth programs at the enterprises and in organization among them. The aim of the study is to develop proposals and recommendations for improving youth policy in enterprises. The authors analyze the objective and subjective indicators of effectiveness of implementation of the corporate youth programs and introduce the results of a survey of 300 young workers of industrial enterprises of the Sverdlovsk region. This study revealed a contradiction. On the one hand, the satisfaction of young workers measured aspects of work and implementation of youth programs in the enterprise is high enough. On the other hand, objective indicators of efficiency of realization of youth programs at the enterprises indicate the presence of serious problems in attracting and retaining young workers in the enterprise. Theoretical and practical significance of the research lies in the fact that the authors have made measurements of the efficiency and effectiveness of youth programs at the enterprises of the Sverdlovsk region, and also received information that allows you to enter in the action: diagnostic system for the youth sector, the implementation of youth programs in industrial enterprises; a regular diagnosis of the problems and needs of young employees (by opinion polls; monitoring of the effectiveness of work at the enterprise for adaptation of young workers and the implementation of the youth corporate programs. The study was conducted at the initiative of the Ministry of physical culture, sport and youth

  7. Juvenile Justice in Milwaukee

    Science.gov (United States)

    Williams, Gary L.; Greer, Lanetta

    2010-01-01

    Historically, there have been several attempts made to address issues surrounding juvenile delinquency. The Wisconsin Legislature outlines the objectives of the juvenile justice system in the Juvenile Justice Code in s. 939.01, ?to promote a juvenile justice system capable of dealing with the problem of juvenile delinquency, a system which will…

  8. Models of distributive justice.

    Science.gov (United States)

    Wolff, Jonathan

    2007-01-01

    Philosophical disagreement about justice rages over at least two questions. The most immediate is a substantial question, concerning the conditions under which particular distributive arrangements can be said to be just or unjust. The second, deeper, question concerns the nature of justice itself. What is justice? Here we can distinguish three views. First, justice as mutual advantage sees justice as essentially a matter of the outcome of a bargain. There are times when two parties can both be better off by making some sort of agreement. Justice, on this view, concerns the distribution of the benefits and burdens of the agreement. Second, justice as reciprocity takes a different approach, looking not at bargaining but at the idea of a fair return or just price, attempting to capture the idea of justice as equal exchange. Finally justice as impartiality sees justice as 'taking the other person's point of view' asking 'how would you like it if it happened to you?' Each model has significantly different consequences for the question of when issues of justice arise and how they should be settled. It is interesting to consider whether any of these models of justice could regulate behaviour between non-human animals.

  9. An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study

    Science.gov (United States)

    Reis, David W.

    2012-01-01

    Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…

  10. An Examination of an Information Security Framework Implementation Based on Agile Values to Achieve Health Insurance Portability and Accountability Act Security Rule Compliance in an Academic Medical Center: The Thomas Jefferson University Case Study

    Science.gov (United States)

    Reis, David W.

    2012-01-01

    Agile project management is most often examined in relation to software development, while information security frameworks are often examined with respect to certain risk management capabilities rather than in terms of successful implementation approaches. This dissertation extended the study of both Agile project management and information…

  11. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  12. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  13. The European Arrest Warrant in the Italian legal system. Between mutual recognition and mutual fear within the European area of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Franco Impalà

    2005-12-01

    Full Text Available Italy was the last Member State to transpose the Framework Decision on the European Arrest Warrant. The Italian law entered into full force on 14 May 2005, a full sixteen months later than the appointed date. Conversely, whilst the Framework Decision aimed to speed up extradition between Member States, the Italian implementation law seems to complicate things, providing for dozens of new legal obstacles to surrender. In fact, the execution of an EAW in Italy threatens to become something highly unpredictable. The responsibility for this outcome is shared by the national and the European legislator. Perhaps the latter underestimated the seriousness of the conflict between Third Pillar law and domestic constitutional systems which aim to protect their acquis in the field of fundamental rights. Considering that many Member States seem to be struggling with similar problems, the first part of this article is devoted to describing the current scenario and analysing possible solutions at the supranational level, such as the establishment of a coherent system regulating the allocation of penal competences among Member States. In the next part, the problem of the Framework Decision’s incompatibility with the Italian Constitution will be discussed, and in the final part the Italian implementation law is analysed in more detail.

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. IMPLEMENTING THE ORGANIZATIONAL-ECONOMIC MECHANISM OF ENERGY SECURITY IN IVANO-FRANKIVSK

    Directory of Open Access Journals (Sweden)

    И. М. Мазур

    2014-04-01

    Full Text Available Purpose is to explore the practical experience of forming of organizationally economic mechanism to ensure energy safety based on principles of energy conservation and efficiency of fuel and energy resources use in Ivano-Francovsk city.Methodology includes мethods of synthesis, induction, deduction, analogy, wich used in the study.Results. The active policy of energy efficiency and conservation provides the increase of power safety of city's economy due to reduction of dependence on the consumption of separate types of non-renewable fuel and energy resources. The involvement of international organizations increased the possibility of financing the development and implementation of energy saving measures and improvement of the energy ensuring of the city.Conclusions. A number of organizational and economic problems to ensure power safety are solved by joining the «Agreement of Mayors on sustainable development and climate protection» and the development of Sustainable Energy Programme for 2013 - 2020 years, which includes measures to reduce carbon dioxide emissions by 20 % and local production and consumption of energy. However the efficiency of energy-saving measures and technologies of renewable energy by lowering the price of natural gas is significantly reduced, which leads to increase the payback period almost doubled. Therefore it is necessary to provide administrative and financial leverage to introduce energy-saving technologies: renewable energy in the construction of housing, financial sanctions for excessive fuel consumption and  energy and for production of energy-intensive equipment, environmental penalties for exceeding norms of greenhouse gases and others.Practical implications. The introduction of the mentioned incentives needs the development of the legislative and regulatory support and study the experience of the European countries in  their use.Purchase on Elibrary.ru > Buy now

  16. DBMS Security Independence Test Framework Design and Implementation%数据库安全功能测试自动化框架设计与实现

    Institute of Scientific and Technical Information of China (English)

    刘泊伶; 叶晓俊; 谢丰; 李斌

    2012-01-01

    数据库安全功能独立性测试是评估者使用代表性测试用例在被测数据库管理系统( DBMS)上执行,并将DBMS内部数据修改和系统输出同预期结果作比较,完成DBMS安全功能实现的评估.给出一种DBMS安全测试自动化模型及基于STAF/STAX开源框架的实现方法.最后以安全审计组件的实现为例,在Oracle和国产DBMS上给出了其用例测试及实验方法,证明了该框架的可用性.%Security function independent testing for DBMS is an security function evaluation process during which an evaluator runs typical test cases against the DBMS under test and compares DBMS internal metadata and actual outputs with expected outputs to accomplish the evaluation on DBMS security function implementation. This paper presented a DBMS security test automation framework and its implementation which is based on an open-source framework called STAF/STAX. We practiced the audit component security test case implementation against Oracle and a domestic-produced DBMS which well proves the usability of this framework.

  17. Relationships are building blocks to social justice: Cases of biblical justice and African Ubuntu

    Directory of Open Access Journals (Sweden)

    Selaelo T. Kgatla

    2016-02-01

    Full Text Available The entire Bible is full of themes calling humans to live justly with one another and fear God who is the author of justice. The first book of the Bible, Genesis, carries the story of God’s relationship with his people. Their relationship is bound by social justice and mutual love in reciprocity. This article argues that African Ubuntu has an affinity with the Bible’s message of justice and mutual caring for one another. Ubuntu presupposes that humans were created in God’s image and indicates that characteristics such as kindness, charity, equality, love of one’s neighbours and voluntarily dispensing justice to others are present in human life. God created humans to be bound to one another in caring love, coexistence and total dependence. In today’s world, social justice requires good judgement from those who are in privileged positions to implement it.

  18. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    Science.gov (United States)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  19. The design of a medical school social justice curriculum.

    Science.gov (United States)

    Coria, Alexandra; McKelvey, T Greg; Charlton, Paul; Woodworth, Michael; Lahey, Timothy

    2013-10-01

    The acquisition of skills to recognize and redress adverse social determinants of disease is an important component of undergraduate medical education. In this article, the authors justify and define "social justice curriculum" and then describe the medical school social justice curriculum designed by the multidisciplinary Social Justice Vertical Integration Group (SJVIG) at the Geisel School of Medicine at Dartmouth. The SJVIG addressed five goals: (1) to define core competencies in social justice education, (2) to identify key topics that a social justice curriculum should cover, (3) to assess social justice curricula at other institutions, (4) to catalog institutionally affiliated community outreach sites at which teaching could be paired with hands-on service work, and (5) to provide examples of the integration of social justice teaching into the core (i.e., basic science) curriculum. The SJVIG felt a social justice curriculum should cover the scope of health disparities, reasons to address health disparities, and means of addressing these disparities. The group recommended competency-based student evaluations and advocated assessing the impact of medical students' social justice work on communities. The group identified the use of class discussion of physicians' obligation to participate in social justice work as an educational tool, and they emphasized the importance of a mandatory, longitudinal, immersive, mentored community outreach practicum. Faculty and administrators are implementing these changes as part of an overall curriculum redesign (2012-2015). A well-designed medical school social justice curriculum should improve student recognition and rectification of adverse social determinants of disease.

  20. Security of Crypto Algorithms Implementation%密码算法实现方式对安全性的影响研究

    Institute of Scientific and Technical Information of China (English)

    陈大钊; 成超; 熊峙; 王津

    2016-01-01

    实际应用中,密码算法总要在软件、硬件或物理设备等环境中实现,也只有在实际应用场景中讨论密码算法的安全性才是有意义的。密码算法实现方式对其安全性有着重要影响,本文以不同实现方式在FPGA上实现SM4算法,通过对不同实现方式的SM4算法进行相关性功耗分析(Correlation Power Analysis,CPA),评估密码算法实现方式对安全性的影响。分析结果表明, SM4算法并行实现方式比串行实现方式具有更高的安全性。%The security of cryptographic algorithm draws much attention from the people.In practical application, crypto algorithm is usually implemented in the environment such as software, hardware and physical devices. There exists an essential relation of between the security and practical application of crypto algorithm. SM4 algorithm is implemented on FPGA in different implementation modes, and CPA(Correlation Power Analysis) is also done on SM4 algorithm in different implementation modes, thus to evaluate the influence of different implementations on security. Simulation indicates that the parallel implementation of SM4 is mush better than serial implementation in security.

  1. Leadership for Social Justice: Social Justice Pedagogies

    OpenAIRE

    Bogotch, Ira; Reyes-Guerra, Daniel

    2014-01-01

    The relationship between educational leadership and practices of social justice is now entering its second decade with respect to empirical research studies. There have been three distinct research agendas: the first involves attempts to define the meaning(s) of educational leadership for social justice; the second is the descriptive documentation of school leadership behaviors which address social injustices and inequities within schools; and, the third focuses on the development of leadersh...

  2. Inequality, Social Justice and Welfare

    Directory of Open Access Journals (Sweden)

    Elena S. Averkieva

    2016-09-01

    Full Text Available Researching the redistribution processes in the framework of welfare economics is primarily carried out through the analysis of implementation opportunity of the social justice principle. Distributive justice involves the redistribution of income and resources in proportion to certain criteria. However, there is still no consensus on these criteria, which would clearly judge the fairness of the distribution.Individual needs, rights, desert or specific contributions of citizens in the development of society, the product outcomes, and many others can be served as the justice criteria. According to an egalitarian tradition, if not identified relevant distinguishing criteria, we can talk about the existence of the presumption of equality. Establishing equality means the advantages elimination of one individual over others. The paper attempts to analyze the egalitarian policies measures to implementation of equal opportunities, treatment and results, which ideally should neutralize all negative effects of a high degree of social inequality and achieve the desired goals of social policy. The paper also provides the argument concerning the realization possibility of the general equality idea. The author focuses on the existence of the exclusions in the equality policy - on the idea of «positive discrimination», which determines the appearance of conflicts between individual and public interests.

  3. Electronic Data Exchange within European Justice: A Good Opportunity?

    Directory of Open Access Journals (Sweden)

    Nadia Carboni

    2012-12-01

    Full Text Available This paper analyses one of the most debated and controversial issues regarding the changes which are taking place in the Justice domain: the complexity of developing and implementing ITC systems that ‘actually work’, and doing so with a reasonable budget and in a reasonable time. While the number of studies on National experiences is slowly growing (see for example Fabri & Contini 2001, Fabri 2007, Contini & Lanzara 2009, Reiling 2012, filling an often-mentioned gap in justice sector literature, building on the European project e-CODEX case study, the authors point the attention to a somewhat new and unexplored phenomenon, the concrete attempt to build cross-border electronic data exchange within the European justice field. e-CODEX (e-Justice Communication via Online Data Exchange is the first European Large Scale Pilot in the domain of e-Justice. The project is carried out by 19 partners either being or representing their national ministries of justice of 15 European countries, plus the Council of Bars and Law Societies of Europe (CCBE, the Conseil des Notariats de l'Union Européenne (CNUE and the National Research Council of Italy (through two of its institutes - IRSIG-CNR and ITTIG-CNR. To provide a better grasp of the project scale, its overall budget is over 14 M euro and about 14 hundred person-months are committed to it. The project aims at improving cross-border access of citizens and businesses to legal means in Europe, as well as to improve the interoperability between legal authorities of different Member States. With a case based approach, e-CODEX is developing and will be soon implementing an interoperability layer to connect existing National Systems in order to provide cross border e-justice services. The project commitment includes running a live pilot in a ‘production environment’ for a duration of twelve months. The electronic services that have been so far selected are: European Payment Order (EPO, European Small

  4. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  5. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  6. Justice and Negotiation.

    Science.gov (United States)

    Druckman, Daniel; Wagner, Lynn M

    2016-01-01

    This review article examines the literature regarding the role played by principles of justice in negotiation. Laboratory experiments and high-stakes negotiations reveal that justice is a complex concept, both in relation to attaining just outcomes and to establishing just processes. We focus on how justice preferences guide the process and outcome of negotiated exchanges. Focusing primarily on the two types of principles that have received the most attention, distributive justice (outcomes of negotiation) and procedural justice (process of negotiation), we introduce the topic by reviewing the most relevant experimental and field or archival research on the roles played by these justice principles in negotiation. A discussion of the methods used in these studies precedes a review organized in terms of a framework that highlights the concept of negotiating stages. We also develop hypotheses based on the existing literature to point the way forward for further research on this topic.

  7. University Preparation of Social Justice Leaders for K-12 Schools

    Science.gov (United States)

    Woods, Rosmary Sandie M.

    2012-01-01

    The purpose of this study was to examine the social justice principles embedded in California State University (CSU) Educational Administration Preparation Programs. More specifically, this study explored the intended, implemented, and assessed curriculum relative to social justice and critical consciousness, and investigated if differences exist…

  8. Preservice Teachers' Perspectives on Their Preparation for Social Justice Teaching

    Science.gov (United States)

    Ajayi, Lasisi

    2017-01-01

    This study investigates preservice teachers' perspectives on their preparation to use social justice teaching in rural schools, how they implemented the concept in their classrooms, and the challenges they faced. The findings suggest that even though coursework may have prepared the participants to integrate social justice principles and practices…

  9. Transitional Justice and the Quality of Democracy

    Directory of Open Access Journals (Sweden)

    Anja Mihr

    2014-10-01

    Full Text Available Transitional Justice is a long-term process which seeks to address severe human rights abuses of the past through measures such as trials, commissions of inquiry, memorials, apologies, reforms of the legal or security sector, school textbook reforms, and reconciliation projects. These measures are usually applied by governments, but can also be initiated by civil society groups, such as victim groups, or the international community, for example the European Union or the UNHCR. Transitional justice measures are seen as catalysts for coming to terms with the past and establishing new, stable, and often democratic societies. As such, the measures are linked to the performance and efficacy of democratic institutions in the context of their accountability and responsiveness, transparency, and level of citizen participation. Thus, transitional justice is a process that aims to reconcile divided and conflict-torn societies by re-establishing (democratic institutions. These measures can be catalysts to leverage institutional performance.

  10. Emancipatory Nursing Praxis: A Theory of Social Justice in Nursing.

    Science.gov (United States)

    Walter, Robin R

    2016-10-28

    Emancipatory nursing praxis (ENP) is a middle-range nursing theory of social justice developed from an international, grounded theory study of the critical factors influencing nurses' perceptions of their role in social justice. The ENPs implementing processes (becoming, awakening, engaging, and transforming) and 2 conditional contexts (relational and reflexive) provide an in-depth understanding of the transformative learning process that determines nurse engagement in social justice. Interpretive findings include the voice of Privilege primarily informed ENP theory, the lack of nursing educational and organizational support in social justice role development, and the advocate role should expand to include the role of an ally.

  11. Justice implications of a proposed Medicare prescription drug policy.

    Science.gov (United States)

    Larkin, Heather

    2004-07-01

    Social justice is a core value to the mission of social work. Older people are among the most vulnerable populations for whom social workers are called on to advocate. Although Medicare prescription drug coverage has been a top legislative issue over the past few years, such a benefit expansion has yet to be implemented. This article examines the historical context of Medicare and reviews the proposals for prescription drug coverage, identifying the concerns raised. Literature critiquing the justice dimensions of health care for the elderly population is reviewed. Justice claims are identified and refined, and social justice theories are used in the analysis of the proposed policies.

  12. Investigating the effects of organizational justice on development of e-banking

    Directory of Open Access Journals (Sweden)

    Hamed Abbasi

    2014-04-01

    Full Text Available This paper investigates the effects of three components of organizational justice on development e-banking in one of Iranian banks. The proposed study uses two questionnaires, one for measuring the effects of organizational justice and the other for e-banking in Likert scale. Cronbach alphas for organizational justice and e-banking are calculated as 0.831 and 0.749, respectively. The study has been implemented among 385 regular customers of an Iranian bank. Using Spearman correlation ratio as well as stepwise regression analysis, the study has detected that two components of organizational justice including distributive justice and procedural justice influence on e-banking, positively.

  13. The notion and basic principles of restorative justice

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2007-01-01

    Full Text Available One of the most important achievements of the contemporary criminal justice system and criminal policy is development of the concept of restorative justice. Contemporary concept of restorative justice was developed in 1970s on the basis of the criticism of the traditional criminal law and criminal justice system. Since that time, it has been developing through different programs in many countries. Reform of the criminal justice system in Serbia staring from 2002 went into direction of entering elements of restorative justice into existing criminal justice system. In that sense, development of restorative justice is still at the beginning in our country. However, it can be noticed that there is a low level of awareness on the nature and importance of restorative forms of response to crime among our professionals, as well as a lack of understanding of the concept itself. Due to that, the aim of the paper is to enable better understanding of restorative concept in general through defining restorative justice and basic principles it relies on. That may put a basis for further recognition of restorative elements in our criminal justice system, which may provide adequate implementation of relevant provisions of restorative character in practice. .

  14. Informal Justice Systems: Charting a Course for Human Rights-Based Engagement

    DEFF Research Database (Denmark)

    Kerrigan, Fergus; McKay, Anne Louise; Kristiansen, Annali;

    Providing accessible justice is a state obligation under international human rights standards, but this obligation does not require that all justice be provided through formal justice systems. If done in ways to respect and uphold human rights, the provision of justice through informal justice...... systems is not against human rights standards and can be a mechanism to enhance the fulfilment of human rights obligations by delivering accessible justice to individuals and communities where the formal justice system does not have the capacity or geographical reach. This study seeks to identify how...... engagement with informal justice systems can build greater respect and protection for human rights. It highlights the considerations that development partners should have when assessing whether to implement programmes involving informal justice systems, the primary consideration being that engagement...

  15. From War to Peace: Security and the Stabilization of Colombia

    Directory of Open Access Journals (Sweden)

    María Victoria Llorente

    2015-10-01

    Full Text Available Foreword for the Special Collection Citizen Security Dialogues in Colombia: Controlling the territory and building security and justice in post-conflict contexts From war to peace: security and the stabilization of Colombia, gathers research form leading scholars and practitioners to discuss key topics regarding recent developments around the peace process, between national government and the FARC rebels, in Colombia. After taking into account the impact of security policies implemented during the first decade of the twenty-first century (demobilization of paramilitary groups, strengthening of national armed forces and the containment and weakening of guerrilla groups, this issue further explores challenges, as well as policy options, faced by the state during a post conflict scenario, given a positive outcome of the ongoing peace process. Specifically, and using a broad data analysis, issues such as the ability of organized crime to sabotage post-conflict policy implementation, the absence of state and the rule of law in isolated areas of the country or the importance of local justice as an institutional strengthening strategy for stabilization, are addressed in order to draw important conclusions regarding the problems associated to the persistence of ungoverned and unstable territories in post-conflict contexts all over the world.

  16. 28 CFR 0.72 - National Security Division.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division. 0.72 Section 0.72 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE..., investigative agencies, and foreign criminal justice entities (provided that any training of foreign...

  17. restorative justice, criminal justice and access to justice

    African Journals Online (AJOL)

    wide range of human rights that are enshrined in ... series, which tend to glorify the role of the prosecutor in a dramatic depiction of good versus bad. However, reality ... unpredictable transformation'.6 Models of practice ..... Funding and resources are also needed. 18 .... Restorative Justice Week, Protea Hotel, Umhlanga.

  18. RESEARCH AND IMPLEMENTATION OF SECURITY KERNEL SYSTEM FOR SERVER SYSTEM%服务器系统安全内核研究与实现

    Institute of Scientific and Technical Information of China (English)

    陈伟东; 王超; 张力; 徐峥; 邢希双

    2013-01-01

    Information security of server is encountering increasingly serious security menace. Viruses, worms, Trojans and other malicious programs impose the threat on the security of server system. The operating system has the needs to identify and control from kernel layer the subjects and objects imperilling the security. Mandatory access control has to be executed on files, registry, process, etc. in kernel layer. We study and address the implementation of operating system security kernel in terms of system resources and networks covert communication in this paper. The system has been applied to the corporate websites, various types of servers and other network security applications that have higher security requirement. The mandatory access control and each process, file, registry and network communications, etc. are all endued the appropriate security attributes systematically. Security attributes are set by the administrator strictly in accordance with the rules. Combined with the principle of least privilege and security auditing, security control is conducted at the application layer on the server or server cluster.%服务器信息安全面临日益严重的安全威胁.病毒和蠕虫、木马等恶意程序对服务器系统的安全造成威胁.操作系统需要从内核层对安全威胁的主题和客体等加以鉴别控制.在内核层对文件、注册表、进程等作强制访问控制.从系统资源和网络隐蔽通信方面,研究和论述了操作系统安全内核的实现.系统已应用于企业网站、各类服务器等网络安全要求较高的应用场所.强制访问控制,系统地对每个进程、文件、注册表、网络通信等都被赋予了相应的安全属性.安全属性由管理员按照严格的规则来设置.结合最小特权原则和安全审计,在应用层对服务器或集群作安全控制.

  19. 76 FR 27847 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Coast...

    Science.gov (United States)

    2011-05-13

    ....S. Coast Guard--008 Courts Martial Case Files System of Records AGENCY: Privacy Office, DHS. ACTION..., ``Department of Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records'' from... Homeland Security/U.S. Coast Guard--008 Courts Martial Case Files System of Records from one or...

  20. Incorporating environmental justice into environmental decision making

    Energy Technology Data Exchange (ETDEWEB)

    Wolfe, A.K.; Vogt, D.P.; Hwang, Ho-Ling [Oak Ridge National Lab., TN (United States)] [and others

    1995-07-01

    Executive Order 12898, signed on February 11, 1994, broadly states that federal activities, programs, and policies should not produce disproportionately high and adverse impacts on minority and low-income populations. Moreover, the Order indicates that these populations should not be denied the benefits of, or excluded from participation in, these activities, programs, and policies. Because a presidential memorandum accompanying the order said that National Environmental Policy Act (NEPA) documents should begin to address environmental justice immediately, much attention has been paid to assessment-related issues. Also important, a topic that appears to have received relatively little attention, is how decision makers should be expected to use information about environmental justice in their decision making. This paper discusses issues surrounding the use of environmental justice information in the decision-making process by focusing on the following five main topics: (1) the importance, or weight, attached to environmental justice within larger decision-making contexts; (2) the potential tension between localized environmental justice issues and regional or national issues and needs; (3) the use of environmental justice information to develop (perhaps in concert with affected minority and low-income communities) appropriate mitigation strategies, or to establish conditions under which activities, programs, and policies may be accepted locally; (4) the general implications of shifting the distribution of broadly defined risks, costs, and benefits among different population groups; and (5) the implications of implementing environmental justice on an individual, ad hoc basis rather than within a larger environmental justice framework. This paper raises the issues and discusses the implications of alternative approaches to them.

  1. What Is "Policy" and What Is "Policy Response"? An Illustrative Study of the Implementation of the Leadership Standards for Social Justice in Scotland

    Science.gov (United States)

    Ward, S. C.; Bagley, C.; Lumby, J.; Hamilton, T.; Woods, P.; Roberts, A.

    2016-01-01

    This article examines "policy" and "policy response" through documentary analysis and an illustrative study of policy implementation. Our approach is informed by Foucault's (2009) theory that power relations in society are conditioned by a culturally generated set of ideas, and that these relations contain the space for both…

  2. Citizenship and social justice

    NARCIS (Netherlands)

    A.P.J. Bernts (Ton); L. d' Anjou (Leo); D. Houtman (Dick)

    1992-01-01

    textabstractDiscussions on the problems of the welfare state are increasingly framed in terms of citizenship rather than social justice. The popularity of the concept of citizenship raises the question of its implications for social justice theory and research. In this article it is argued that wher

  3. Imagining Social Justice

    Science.gov (United States)

    McArdle, Felicity; Knight, Linda; Stratigos, Tina

    2013-01-01

    This article examines how creativity and the arts can assist teachers who teach from a social justice perspective, and how knowledge built through meaningful experiences of difference can make a difference. Just as imagining is central to visual arts practice, so too is the capacity to imagine a necessity for social justice. The authors ask what…

  4. Citizenship and social justice

    NARCIS (Netherlands)

    A.P.J. Bernts (Ton); L. d' Anjou (Leo); D. Houtman (Dick)

    1992-01-01

    textabstractDiscussions on the problems of the welfare state are increasingly framed in terms of citizenship rather than social justice. The popularity of the concept of citizenship raises the question of its implications for social justice theory and research. In this article it is argued that

  5. Justice as Europe's Signifier

    NARCIS (Netherlands)

    Roy, Suryapratim; Kochenov, Dimitry; de Burca, Grainne; Williams, Andrew

    2015-01-01

    Drawing on the fact that justice is never explained in European legal discourse, but is used in conjunction with other principles and institutional decisions, this contribution argues that justice is used as a rhetorical tool to provide legitimacy to such principles and decisions. An analogous

  6. Renewing Juvenile Justice

    Science.gov (United States)

    Macallair, Daniel; Males, Mike; Enty, Dinky Manek; Vinakor, Natasha

    2011-01-01

    The Center on Juvenile and Criminal Justice (CJCJ) was commissioned by Sierra Health Foundation to critically examine California's juvenile justice system and consider the potential role of foundations in promoting systemic reform. The information gathered by CJCJ researchers for this report suggests that foundations can perform a key leadership…

  7. Citizenship and social justice

    NARCIS (Netherlands)

    A.P.J. Bernts (Ton); L. d' Anjou (Leo); D. Houtman (Dick)

    1992-01-01

    textabstractDiscussions on the problems of the welfare state are increasingly framed in terms of citizenship rather than social justice. The popularity of the concept of citizenship raises the question of its implications for social justice theory and research. In this article it is argued that wher

  8. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  9. Technical aspects concerning the safe and secure use of drones

    NARCIS (Netherlands)

    Elands, P.J.M.; Kraker, J.K. de; Laarakkers, J.; Olk, J.G.E.; Schonagen, J.J.

    2016-01-01

    On request of the Dutch National Coordinator for Security and Counterterrorism (NCTV) of the Ministry of Security and Justice, TNO has investigated the issues and corresponding risks which arise from the introduction and use of drones in the national airspace.

  10. Technical aspects concerning the safe and secure use of drones

    NARCIS (Netherlands)

    Elands, P.J.M.; Kraker, J.K. de; Laarakkers, J.; Olk, J.G.E.; Schonagen, J.J.

    2016-01-01

    On request of the Dutch National Coordinator for Security and Counterterrorism (NCTV) of the Ministry of Security and Justice, TNO has investigated the issues and corresponding risks which arise from the introduction and use of drones in the national airspace.

  11. Department of Justice Role in Countering WMD

    Energy Technology Data Exchange (ETDEWEB)

    Prosnitz, D

    2004-01-12

    Stopping terrorist is most likely to be accomplished by state, local and federal law enforcement. With the creation of the Department of Homeland Security, the specific roles and responsibilities of the Department of Justice (DOJ) in preventing and responding to weapons of mass destruction (WMD) terrorist attacks are under reversion, but unquestionably the DOJ, as the chief federal law enforcement agency, will continue to have major responsibilities.

  12. Social Justice Perceptions of Teacher Candidates

    Science.gov (United States)

    Turhan, Muhammed

    2010-01-01

    This study aims to determine the social justice perceptions of teacher candidates being trained in an education faculty. For this purpose, national and international literature was reviewed by the researcher and a 32-item questionnaire was developed and implemented on 237 senior year education faculty students. Data from the questionnaires were…

  13. Resistance, Justice, and Commitment to Change

    Science.gov (United States)

    Foster, Rex D.

    2010-01-01

    This research focused on individual responses to organizational change by exploring the relationships among individual resistance, organizational justice, and commitment to change following organizational change implementations in three organizations. To accomplish this, Web-based questionnaires were used to gather individual-level quantitative…

  14. Resistance, Justice, and Commitment to Change

    Science.gov (United States)

    Foster, Rex D.

    2010-01-01

    This research focused on individual responses to organizational change by exploring the relationships among individual resistance, organizational justice, and commitment to change following organizational change implementations in three organizations. To accomplish this, Web-based questionnaires were used to gather individual-level quantitative…

  15. Impacts of Implementation of the Effective Maritime Security Management Model (EMSMM on Organizational Performance of Shipping Companies1

    Directory of Open Access Journals (Sweden)

    Elena Sadovaya

    2015-06-01

    Full Text Available This paper aims to examine the impacts of the Effective Maritime Security Management Model (EMSMM on organizational performance of shipping companies. For this purpose, a survey was administered to collect data from shipping and ship management companies worldwide. The hypotheses in this study were tested using the structural equation modelling (SEM. It was found that the proposed model has direct positive impacts on security, business resilience and customer performance, as well as indirect positive relationship with security-related, and time market performance. Besides, the categorization of organizational performance of shipping companies, proposed and empirically validated in this study, can be used by the companies to measure the impacts of security management.

  16. Real ID and the Security of State Identity Documents: The Long, Rocky, and Incomplete Journey Toward Full Implementation

    Science.gov (United States)

    2014-03-01

    legislation required that to cross the border between the United States and Canada, or between the United States and Mexico , persons seeking to do so...technology to enable a number of documents to be acceptable for WHITI purposes. Among those documents are 212 Udi Ofer, Ari Rosmarin, and Michael...Identifiers in 2D Barcodes for Improved Security.” Computers and Security 23, no. 8 (December 2004). Ofer, Udi , Ari Rosmarin, and Michael Cummings. No

  17. 高安全低成本保密电话设计与实现%Design and implementation of high security and low cost secure telephone

    Institute of Scientific and Technical Information of China (English)

    何乃味

    2013-01-01

    Aiming at the defects of secure telephone based on tradition cipher encryption, a solution was put forward, which based on paired carrier and chaotic encryption technology. This scheme uses offset paired carrier and echo system ensure the speech signal safety, this scheme uses cryptographic methods to ensure the safety of the whole digital communication system. Therefore, the telephone system is more secure, more practical.%  针对基于传统的密码算法保密电话数据加密存在的缺陷,提出一种基于成对载波和混沌加密技术的保密电话解决方案。该方案用成对载波和回波抵消的体制保证语音信号的安全,用密码的方法保证整个数字传输通信系统的安全性,因此,电话系统保密性更高,实用性更强。

  18. Concerning Justice and Music Education

    Science.gov (United States)

    Jorgensen, Estelle R.

    2007-01-01

    In this paper, I explore matters concerning justice and music education. I briefly sketch responses to five interrelated questions: Why should music educators be interested in justice? What is meant by the term social justice and how is it distinguished from justice of other kinds? How do liberal views of humanity, particularly the preciousness of…

  19. 农民工社会保障的分类实施研究%Study on Classified Implementation of Social Security for Migrant Workers

    Institute of Scientific and Technical Information of China (English)

    杜毅; 王孔敬

    2011-01-01

    农民工为农村发展、城市繁荣和国家现代化建设做出了贡献,但他们的社会保障仍然不充分.由于农民工群体的异质性以及现行的农民工社会保障模式的单一性,无法满足农民工对社会保障的差异性需求,因此提出应将全体农民工纳入强制性工伤保险,提高农民工的社会福利,分类实施农民工的基本医疗保险、就业保障、社会养老保险及社会救助,满足不同层次农民工对社会保障的需求.%Migrant workers have made a significant contribution to urban prosperity, rural development and modernization of the state, but their social security is still insufficiency. Because the inhomogeneity of migrant workers and unicity of migrant workers social security mode not satisfying the various demands of migrant workers to social security, several countermeasures were put forward in order to satisfy the demands of different levels migrant workers to social security, such as whole migrant workers should be bring into mandatory employment injury insurance , improving migrant workers social welfare, basic medical insurance, employment security, social endowment insurance and social assistance should be classified implementation to satisfy demands of different layers migrant workers to social security.

  20. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. [Health and justice in Germany].

    Science.gov (United States)

    Rosenbrock, R

    2007-12-01

    "What do we owe each other?" Variously grounded postulates and theories of social justice try to answer this question with regard to health. Equality of opportunity is widely acclaimed and in Germany also anchored in social security laws. From the perspective of equal opportunity, the author examines the state of affairs and the perspectives of equity in health. Although the deficiencies with regard to access and quality of health care are significant, but relatively moderate, they present serious threats to equity and fairness for the future. Regarding non-medical primary prevention, the reduction of inequality in health has barely begun. The largest obstacles to equity in health are to be found in the distribution and dynamics of opportunities for education, work and income. One of the tasks of public health professionals is to place the health consequences of existing policies on the political agenda.

  2. Variations on Justice: Argentina's pre- and -post transitional justice and justice to-come

    DEFF Research Database (Denmark)

    Vaisman, Noa

    2015-01-01

    of these three kinds of justice and the changes they underwent in the past two decades. By offering a grounded analysis of justice in the pre- and the post-transitional justice phases in Argentina the paper contributes to ongoing debates about the meaning of justice and the possibility of reconciliation in post-conflict...

  3. 智能社区安防系统的设计与实现%Design and Implementation of Intelligent Community Security System

    Institute of Scientific and Technical Information of China (English)

    林梅燕; 彭井花; 陆生贵; 王枫

    2014-01-01

    In the traditional community security system,there are some problems,such as low degree of intelligence,the difficulty of integration,no interconnection standards,islands of information in the security information system and so on.According to the latest concepts of the Internet of Things,it proposed an implementation method for the security subsystem interoperability of heterogeneous net-working which is based on the XML and TCP/IP protocol.In the security server,it uses the concept of SOA to solve the problem of information silos and publishes a variety of data services (WSDL),to provide data services (smart city,etc.)for other external systems.%传统社区安防系统存在智能化程度低、系统集成困难、没有互联互通标准、安防信息系统有信息孤岛等问题。基于最新的物联网理念,提出了一种基于XML和TCP/IP协议的异构安防子系统互联互通的物联网实施方法。在安防服务器端采用SOA的理念以解决信息孤岛问题,为其他外部系统提供数据服务。

  4. Climate change, ethics and human security

    National Research Council Canada - National Science Library

    O'Brien, Karen L; St. Clair, Asuncion Lera; Kristoffersen, Berit; Cohen, Stewart J

    2010-01-01

    "Presenting human security perspectives on climate change, this volume raises issues of equity, ethics and environmental justice, as well as our capacity to respond to what is increasingly considered...

  5. Like water for justice

    NARCIS (Netherlands)

    Joshi, D.

    2015-01-01

    The narrative of environmental justice is powerfully and passionately advocated by researchers, practitioners and activists across scale and space. Yet, because these struggles are multifaceted and pluralistic, rooted in complex, evolving “socio-material-political interminglings” the concept is

  6. Potential Environmental Justice Areas

    Data.gov (United States)

    U.S. Environmental Protection Agency — These data are from EJSCREEN, an environmental justice (EJ) screening and mapping tool that provides EPA with a nationally consistent dataset and methodology for...

  7. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  8. 统一存储网络安全研究%Security System in United Storage Network and Its Implementation

    Institute of Scientific and Technical Information of China (English)

    黄建忠; 谢长生; 韩德志

    2005-01-01

    With development of networked storage and its applications, united storage network (USN) combined with network attached storage (NAS) and storage area network (SAN) has emerged. It has such advantages as high performance, low cost, good connectivity, etc. However the security issue has been complicated because USN responds to block I/O and file I/O requests simultaneously. In this paper, a security system module is developed to prevent many types of attacks against USN based on NAS head.The module not only uses effective authentication to prevent unauthorized access to the system data, but also checks the data integrity.Experimental results show that the security module can not only resist remote attacks and attacks from those who has physical access to the USN, but can also be seamlessly integrated into underlying file systems, with little influence on their performance.

  9. Gender and Climate Justice

    OpenAIRE

    Ana Agostino; Rosa Lizarde

    2012-01-01

    Ana Agostino and Rosa Lizarde explore the concept of climate justice as a rights approach to climate change. They propose that those in the South who are most affected by environmental changes need to receive justice from those in the North who are most responsible for climate change. They apply a gender lens to climate change, analyzing how women have been specifically hit by the phenomenon and how they are responding.

  10. JUSTICE FOR DISABLED PERSONS

    OpenAIRE

    Brčić Kuljiš, Marita

    2014-01-01

    Symbol of justice is a blindfolded lady. Blind to all diversity, it provides impartial law and equal treatment for all citizens. Their rationality, cooperativeness, autonomy and independence confirm their legal equality. However, what about the people who, for various reasons, do not meet those conditions? Can a political community apply the principles of (political) justice to them? Does it relate to them unfairly excluding them from political relationships or building relationships with the...

  11. Justice, fairness, and enhancement.

    Science.gov (United States)

    Savulescu, Julian

    2006-12-01

    This article begins by considering four traditional definitions of enhancement, then proposes a fifth, the Welfarist definition. It then considers fairness-based objections to enhancement, using the example of performance enhancement in sport. In so doing it defines sport and the values proper to it, surveys alternative theories of justice, considers the natural distribution of capabilities and disabilities, and draws a distinction between social, psychological, and biological enhancement. The article advances a new argument that justice requires enhancement.

  12. Measuring the Perception of Travel Security – Comparative Analysis of Students in Two Different Fields: Tourism and Security

    Directory of Open Access Journals (Sweden)

    Sebastjan Repnik

    2015-01-01

    Full Text Available The aim of the research was to determine how students/respondents perceive security on their travels in Europe. The respondents belong to two different study programmes, one focusing on the field of security (Faculty of Criminal Justice and Security, University of Maribor and the other on the field of tourism (Higher Vocational School for Catering and Tourism. Our main presumption was that students of the two institutions developed a different attitude towards travel security since their studies focus on two substantively different academic-professional fields. We examined their attitude towards security factors such as: security climate, self-protection and collective security. In our research we included a sample of 100 students/respondents. We used an instrument in the form of a questionnaire for the quantitative measurement of responses on a 5-point Likert scale. To portray the results of the research we also used various statistical indicators in the computer programme SPSS such as: arithmetic mean, Man-Whitney test, frequency distribution of responses, where independent variables are displayed. The findings suggest that the students/respondents attitude towards safety and their expectations on individual elements of all three security factors differ in the two target groups. The expectations of students/respondents of FCJS regarding the implementation and provision of security are higher compared to students/respondents of HVC. Respondents have different experience with security on their travels, as the number of travels varies quite substantially between students. Both institutions can use the results of the research in the evaluation processes of their study programmes. On the basis of the results of the research it is substantiated that the field and content of study have an impact on the students’ attitude to elements of security while travelling. The findings are intended to all researchers in the field of security and tourism, as

  13. The Space for Restorative Justice in the Ethiopian Criminal Justice System

    Directory of Open Access Journals (Sweden)

    Endalew Lijalem Enyew

    2014-12-01

    Full Text Available Restorative Justice (RJ is an alternative way of apprehending crime and justice which views crime as a violation of a relationship among victims, offenders and community, and which allows the active participation of the crime’s stakeholders. It has the objective of ‘putting right’ the wrong done, to restore the broken relationship and to reintegrate the offender back into society. The Ethiopian criminal justice system views crime primarily as a violation of the state’s criminal laws, either in the form of a commission or omission. It excludes the community from participation, and gives no opportunity to the victim to fully participate in the process. Nor is there a satisfactory legal procedure which enables the public prosecutor to adequately protect the victim’s interest. The focus of the public prosecutor is to have the accused convicted and punished, instead of encouraging them to take responsibility to undo the wrong they have committed. This article thus examines whether restorative justice has a place in the formal legal framework of the existing Ethiopian criminal justice system; and analyses the prospects for, and the challenges that may hinder, the implementation of restorative justice practice in this framework.

  14. 78 FR 15889 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Science.gov (United States)

    2013-03-13

    ... provided in the SCSP is a narrative description of the procedures the applicant business uses to adhere to each C-TPAT Security Criteria or Guideline articulated for their particular business type (importer... the subject of the inquiry could also permit the subject to avoid detection or apprehension....

  15. 75 FR 5487 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/U.S. Customs...

    Science.gov (United States)

    2010-02-03

    ... and the intelligence landscape. However, the use of ATS is governed by a number of policy and... rules in ] ATS, which are based on current intelligence or past case experience. Travelers may also be... Identity Theft: A Strategic Plan'' at http://www.identitytheft.gov ) to address security breaches...

  16. Implementing Network Video for Traditional Security and Innovative Applications: Best Practices and Uses for Network Video in K-12 Schools

    Science.gov (United States)

    Wren, Andrew

    2008-01-01

    Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…

  17. Secure DTN Communications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight proposes to implement and perform an on-orbit demonstration of a Secure DTN communications suite on the SCaN Testbed aboard the ISS. Secure DTN is a...

  18. The Struggle for Justice and Reconciliation in Post-Suharto Indonesia

    Directory of Open Access Journals (Sweden)

    Kimura Ehito

    2015-04-01

    Full Text Available What explains the failure of transitional justice and reconciliation measures in post-authoritarian Indonesia? One explanation is that domestic political elites have effectively stymied the efforts of civil society to implement global norms of transitional justice. However, as Indonesia has embraced a democratic and decentralized system of government, even the most corrupt and entrenched elites cannot merely veto or reject calls for justice. Instead, opponents have used a variety of strategies including legislative, religious, and cultural strategies to undermine justice initiatives. Examining the recent experiences in Indonesia, this paper shows the effects that a limited transition has had on the justice agenda.

  19. Environmental justice: a criminological perspective

    Science.gov (United States)

    Lynch, Michael J.; Stretesky, Paul B.; Long, Michael A.

    2015-08-01

    This article examines studies related to environmental justice in the criminological literature and from a criminological perspective. Criminologists have long been concerned with injustices in the criminal justice system related to the enforcement of criminal law. In the 1990s, following the emergence of green criminology, a handful of criminologists have drawn attention to environmental justice as an extension of more traditional criminological studies of justice and injustice. Relevant criminological studies of environmental justice are reviewed, and suggestions for future environmental justice research are offered.

  20. A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

    Directory of Open Access Journals (Sweden)

    Nishaal J. Parmar

    2017-01-01

    Full Text Available This paper presents a comparative evaluation of possible encryption algorithms for use in a self-contained, ultra-secure router-to-router communication system, first proposed by El Rifai and Verma. The original proposal utilizes a discrete logarithm-based encryption solution, which will be compared in this paper to RSA, AES, and ECC encryption algorithms. RSA certificates are widely used within the industry but require a trusted key generation and distribution architecture. AES and ECC provide advantages in key length, processing requirements, and storage space, also maintaining an arbitrarily high level of security. This paper modifies each of the four algorithms for use within the self-contained router-to-router environment system and then compares them in terms of features offered, storage space and data transmission needed, encryption/decryption efficiency, and key generation requirements.

  1. Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2010-01-01

    Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

  2. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment

    OpenAIRE

    2015-01-01

    Computer security students benefit from having hands-on experience with hacking tools and with access to vulnerable systems that they can attack and defend. However, vulnerable VMs are static; once they have been exploited by a student there is no repeatable challenge as the vulnerable boxes never change. A new novel solution, SecGen, has been created and deployed. SecGen solves the issue by creating vulnerable machines with randomised vulnerabilities and services, with constraints that ensur...

  3. 教育公正与个体发展相互融合的可能性及其实现途径%The Possibility to Integration of Education Justice and Individual Development and Relevant Implementing Approaches

    Institute of Scientific and Technical Information of China (English)

    钟震颖; 余沁芳

    2014-01-01

    Education justice is the important branch in social justice system and the important founda-tion to create an atmosphere of social justice,to achieve a more comprehensive and extensive social jus-tice.In the process of pursuing education justice,individual personalized development is related to it. Solving the problems between the two is helpful to achieve the goals of education justice and individual development.According to the study,important measures to realize the integration of education justice and individual development can be taken by adjusting public policy to promote the policy justice and e-qual opportunity,respecting the individual's right to education,upholding diversity education idea and so on.%教育公正既是社会公正体系中的重要分支与延伸,又是营造社会公正氛围,实现更全面、更广泛社会公正的重要基础。在追求教育公正的过程中,个体的个性化发展需求与教育公正存在相关关系,努力解决两者之间存在的问题,有助于教育公正和个体发展双重目标的实现。研究得出,调整公共政策,促进政策公正和机会均等;尊重个体的受教育权利;秉持差异性发展教育理念等,是实现教育公正和个体发展相互融合的重要保障措施。

  4. 41 CFR 102-81.25 - Do the Interagency Security Committee Security Design Criteria apply to all new Federally owned...

    Science.gov (United States)

    2010-07-01

    ... facilities such as those classified by the Department of Justice Vulnerability Assessment Study as Level V... Security Committee Security Design Criteria apply to all new Federally owned and leased facilities? 102-81... Interagency Security Committee Security Design Criteria apply to all new Federally owned and leased facilities...

  5. Special Justice for Peace: A Transitional Justice Model According to Modern Tendencies and Orientations of Law and Justice

    Directory of Open Access Journals (Sweden)

    Carlos Arturo Gómez Pavajeau

    2016-06-01

    Full Text Available The article analyses the constitutional implications of the peace agreement about Colombia’s armed conflict. It examines constitutional rules and international instruments about human rights, confronting the agreement with justice criteria in the national and international context, to underline the role of justice for the definitive solution of the conflict. By using the methodology of opposing concepts, it reviews the implications of formal justice and material justice, to establish the superiority of the last one and it’s relation with social justice; it analyses the differences between individual justice and global justice, to demonstrate the need to obtain an integral justice; it contrasts alternative justice and traditional justice, to propose an integrated justice; it explains that justice based upon the formal syllogism should be overcome by a justice based upon equity, to obtain a justice anchored in the Constitution, universal and concentrated in the human rights; it hypothesizes that justice supported in the atonement and retribution should be overcome by a justice that is preventive and restorative, that allows the construction of a justice focused in the future, without ignoring the past; it clarifies that justice with one jurisdiction and special justice are the components of a integrative transitional justice; it explains the presence of justice in different institutions with different functions and justice concentrated in one institution, although with different functions, because there is a search for an integrative justice; it exposes the search for a constitutional and political justice, discussing the vision of justice as a triumph of the force or the scandalous concession of benefits; it exalts that it is a justice in search of a positive discrimination, not a negative discrimination, overcoming the discussion between justice for the powerful and justice for the weak; finally, it considers that it is a justice

  6. What´s the monetary value of distributive justice

    OpenAIRE

    Corneo, Giacomo; Fong, Christina M.

    2007-01-01

    This paper develops a simple theoretical model that can be implemented to estimate the willingness to pay for distributive justice. We derive a formula that allows one to recover the willingness to pay for distributive justice from the estimated coefficients of a probit regression and fiscal data. Using this formula and data from a 1998 Gallup Social Audit, we find that the monetary value of justice in the United States is about one fifth of GDP. We also generalize the model to estimate the v...

  7. Toward A Buddhist Theory of Justice

    Directory of Open Access Journals (Sweden)

    James Blumenthal

    2015-02-01

    Full Text Available For more than twenty years key thinkers of Engaged Buddhism have used terms like “justice” and “social justice” quite freely.  Yet despite more sophisticated discussions of other philosophical topics, Engaged Buddhists have  not clearly defined what they mean by the term justice. Given that the term is one with a rich philosophical history in the West and has no direct parallel in Buddhist thought, it is incumbent upon Engaged Buddhist theorists to define what they mean when they use this term if they are to engage in any sort of meaningful dialog on justice and related issues in the international community. In this paper, to illustrate how Engaged Buddhists might begin this important line of work, I would focus on two cases. First, I will discuss John Rawls' theory of "justice as fairness" and compare that with some traditional Buddhist ideas and explore potential Buddhist thinking, responses, and adaptations. Second, I will discuss a relatively new model known as restorative justice in opposition to the pervasive use of retributive models implemented around the globe and consider the ways that Buddhism seems to lend itself quite well to "restorative" models, particularly with regard to criminal justice.  Both examples are merely beginning points for discussion used to illustrate how and why Engaged Buddhists ought to participate more directly in global philosophical discourse on justice.

  8. Organizational Justice in Schools: No Justice without Trust

    Science.gov (United States)

    Hoy, Wayne K.; Tarter, C. John

    2004-01-01

    The concept of organizational justice is defined, and, based on a review of the literature, ten principles of organizational justice are elaborated. Similarly, the elements of faculty trust are conceptualized and discussed. Then, a model of organizational justice and trust is proposed and tested using path analysis. The results underscore the…

  9. toward a curriculum for justice

    African Journals Online (AJOL)

    profound justice; i.e. justice that is based on reasonableness and, more ... way to conduct a curriculum enquiry, since it acknowledges the crisis of ..... The principle of having a caring curriculum necessitates that we create learning-teaching.

  10. 云安全综合分析系统的设计与实现%Design and implementation of cloud security comprehensive analysis system

    Institute of Scientific and Technical Information of China (English)

    张伟; 董群锋

    2014-01-01

    In view of the shortcomings of current mainstream cloud security analysis system whose intelligence is not high or processing capacity is not strong, the paper puts forward a parallel processing ability of streamline PF_RING model, the biological sequence matching algorithm is introduced into the cloud intrusion detection model, with the combination of state matching algorithm and vulnerability assessment algorithm, so the Cloud Security Comprehensive Analysis System (CSAS)is designed and implemented. Experiments show that the system can carry out flow analysis, intrusion detection and vulnerability scanning under huge amounts of data, compared with the similar system, its processing capacity is pro-moted nearly 10 times and the capacity of security protection is improved 65.43%. This system has effectively improved the ability of cloud security analysis system for intrusion detection, and provides effective protection for the security of cloud platform.%针对当前主流的云安全分析系统存在智能化不高,处理能力不强等缺点,提出了具有并行处理能力的流水化PF_RING的模型,将生物序列匹配算法引入到云入侵检测模型中,并将其与多状态匹配算法、脆弱性评估算法相结合,设计并实现了云安全综合分析系统(Cloud Security Comprehensive Analysis System,CSAS)。实验表明,系统可在海量数据下,对云安全进行流量分析、入侵检测和漏洞扫描,与同类系统相比,处理能力提升近10倍,安全防护提升了65.43%。该系统有效地提高了云安全分析系统入侵检测能力,为云平台的安全性提供了有效的保障。

  11. Security Design and Implementation of Enterprise Local Area Network%企业局域网安全设计与实现

    Institute of Scientific and Technical Information of China (English)

    汤水根

    2014-01-01

    Taking the enterprise LAN upgrade project of a large American food company in dongguan as an example, this paper discusses the security design and implementation of enterprise LAN. The network security solution is proposed from four aspects:the physical security, enterprise LAN architecture, anti-virus and spam and network management, following the cask principle, the integrity principle, the validity principle and the practicability principle, and making the best use of the existing mature technology of network security. The upgraded LAN has started running in the company. Results show that it basically meets the design require-ments and performs well.%文章以东莞某一大型美资食品公司的企业局域网升级项目为案例,讨论了企业局域网的安全设计与实现。从企业局域网的物理安全、网络体系结构、防病毒及垃圾邮件和网络管理四个方面给出了相关的网络安全解决方案,在设计中考虑并遵循了网络信息安全系统的木桶原则、整体性原则、有效性和实用性原则,并尽量利用现有的网络安全方面的成熟技术。完成安全升级后的局域网已经开始在该公司运行,运行结果表明,基本满足设计需求,是一个运行良好可管理的安全局域网络。

  12. The Implementation of the National Economic Security Audit Path%国家经济安全审计实施路径研究

    Institute of Scientific and Technical Information of China (English)

    曹越; 吕亦梅; 伍中信

    2015-01-01

    国家经济安全审计是指审计机关依赖有效的审计制度对被审单位财政、财务收支和经济活动的真实性、合法性和效益性进行审计的基础上,针对经济安全的关键领域,识别、评估、预警和报告危害经济安全的风险,确保财产权益安全完整的一种审计模式。该模式奠定了审计监督在国家经济安全体系中的基础性地位。创新审计模式及审计策略、变革国家审计体制、构建以审计监督为基础的新型国家经济安全体系是国家经济安全审计的三大实施路径。%National economic security audit is that audit institutions audit the fiscal and finan-cial revenues and expenditures of the audited units and the authenticity,legitimacy and efficiency of economic activity.It is an audit model that gives recognition,assessment,early warning and reporting the risk endangering the safety of economic basis.This auditing approach affirms the au-dit supervision a foundational position in the national economic security system.This article will explore the implementation of national economic security audit path from these three aspects:in-novation for the audit mode and audit strategy,reform of the national audit system and construct the new national economic security system based on audit supervision.

  13. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  14. Empowering Energy Justice.

    Science.gov (United States)

    Finley-Brook, Mary; Holloman, Erica L

    2016-09-21

    The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure "just" transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1) fossil fuel divestment; (2) carbon taxes and social cost of carbon measurements; (3) cap-and-trade; (4) renewable energy; and (5) energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between "green" and "just", as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics.

  15. Empowering Energy Justice

    Directory of Open Access Journals (Sweden)

    Mary Finley-Brook

    2016-09-01

    Full Text Available The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1 fossil fuel divestment; (2 carbon taxes and social cost of carbon measurements; (3 cap-and-trade; (4 renewable energy; and (5 energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics.

  16. Empowering Energy Justice

    Science.gov (United States)

    Finley-Brook, Mary; Holloman, Erica L.

    2016-01-01

    The U.S. is experiencing unprecedented movement away from coal and, to a lesser degree, oil. Burdened low-income communities and people of color could experience health benefits from reductions in air and water pollution, yet these same groups could suffer harm if transitions lack broad public input or if policies prioritize elite or corporate interests. This paper highlights how U.S. energy transitions build from, and contribute to, environmental injustices. Energy justice requires not only ending disproportionate harm, it also entails involvement in the design of solutions and fair distribution of benefits, such as green jobs and clean air. To what extent does the confluence of state, civic, and market processes assure “just” transitions to clean, low-carbon energy production involving equitable distribution of costs, benefits, and decision-making power? To explore this question we assess trends with (1) fossil fuel divestment; (2) carbon taxes and social cost of carbon measurements; (3) cap-and-trade; (4) renewable energy; and (5) energy efficiency. Current research demonstrates opportunities and pitfalls in each area with mixed or partial energy justice consequences, leading to our call for greater attention to the specifics of distributive justice, procedural justice, and recognition justice in research, policy, and action. Illustrative energy transition case studies suggest the feasibility and benefit of empowering approaches, but also indicate there can be conflict between “green” and “just”, as evident though stark inequities in clean energy initiatives. To identify positive pathways forward, we compile priorities for an energy justice research agenda based on interactive and participatory practices aligning advocacy, activism, and academics. PMID:27657101

  17. Ten tendencies of criminal justice

    Institute of Scientific and Technical Information of China (English)

    HE Jiahong

    2007-01-01

    A study of the global tendencies of criminal justice will help us design a more scientific and rational pathway for the reformation of existing criminal justice system of China. In the forthcoming several hundred years to come, theworld's criminal justice is to take on ten tendencies, that is, the tendency toward unity, civilization, science, rule of law, human rights, justice, efficiency,specialization, standardization and harmony.

  18. 28 CFR 0.78 - Implementation of financial disclosure requirements.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Implementation of financial disclosure requirements. 0.78 Section 0.78 Judicial Administration DEPARTMENT OF JUSTICE ORGANIZATION OF THE DEPARTMENT OF JUSTICE Justice Management Division § 0.78 Implementation of financial disclosure requirements....

  19. Childhood, Agency and Youth Justice

    Science.gov (United States)

    Smith, Roger

    2009-01-01

    This article seeks to reframe debates in the sphere of youth justice in order to move away from narrow and one-sided conceptualisations of young people who offend and appropriate forms of intervention with them. Whilst different positions have been adopted within the field of youth justice, largely around "justice" or "welfare" models of practice,…

  20. Juvenile Justice in Rural America.

    Science.gov (United States)

    Jankovic, Joanne, Ed.; And Others

    Producing a much-needed organized body of literature about rural juvenile justice, 14 papers (largely from the 1979 National Symposium on Rural Justice) are organized to identify current issues, identify forces causing changes in current systems, review programs responding to rural juvenile justice problems, and provide planning models to aid…

  1. English Only and Social Justice.

    Science.gov (United States)

    Corson, David

    1999-01-01

    Sketches the strengths and weaknesses of the approach to social justice offered by John Rawls, an approach that continues to dominate discussions about social justice and public policy. Contrasts that conception with a critically realistic approach to judging social justice, and argues that the latter is more respectful of minority group…

  2. Understanding Education for Social Justice

    Science.gov (United States)

    Hytten, Kathy; Bettez, Silvia C.

    2011-01-01

    It has become increasingly common for education scholars to claim a social justice orientation in their work. At the same time, education programs seem to be adding statements about the importance of social justice to their mission, and a growing number of teacher education programs are fundamentally oriented around a vision of social justice.…

  3. Corrective Justice vs. Social Justice in the Aftermath of War

    Directory of Open Access Journals (Sweden)

    Pablo Kalmanovitz

    2010-11-01

    Full Text Available How do we justify the practice of corrective justice for losses suffered during armed conflicts? This article seeks to show the force and relevance of this question, and to argue that, in cases of massively destructive wars, social justice should gain priority over corrective justice. Starting from a liberal Rawlsian conception of the relationship between corrective and social justice, it is argued that, paradoxically, the more destructive a war is, the less normative force corrective rights have and the higher priority policies of social justice, which guarantee basic rights to all citizens, should have.

  4. Adding positive reinforcement in justice settings: acceptability and feasibility.

    Science.gov (United States)

    Rudes, Danielle S; Taxman, Faye S; Portillo, Shannon; Murphy, Amy; Rhodes, Anne; Stitzer, Maxine; Luongo, Peter F; Friedmann, Peter D

    2012-04-01

    Although contingency management (CM) approaches are among the most promising methods for initiating drug abstinence (S. T. Higgins, S. M. Alessi, & R. L. Dantona, 2002; S. T. Higgins, S. H. Heil, & J. P. Lussier, 2004), adoption and implementation of CM protocols into treatment programs are both challenging and infrequent. In criminal justice agencies, where roughly 70% of clients report substance abuse issues (F. S. Taxman, K. L. Cropsey, D. W. Young, & H. Wexler, 2007), CM interventions are virtually nonexistent. The Justice Steps (JSTEPS) study uses a longitudinal, mixed-method design to examine the implementation of a CM-based protocol in five justice settings. This article presents qualitative data collected during Phase 1 of the JSTEPS project regarding the acceptability and feasibility of CM in these justice settings. The study finds a level of acceptability (find CM tolerable) and feasibility (find CM suitable) within justice agencies, but with some challenges. These challenges are reflected in the following: (a) incorporating too many desired target behaviors into CM models; (b) facing intraorganizational challenges when designing CM systems; and (c) emphasizing sanctions over rewards despite the evidence-base for positive reinforcers. These findings have implications for advancing the dissemination, adoption, and implementation of evidence-based treatments (and CM in particular) in criminal justice settings.

  5. Implementation of Digital Signature Using Aes and Rsa Algorithms as a Security in Disposition System af Letter

    Science.gov (United States)

    Siregar, H.; Junaeti, E.; Hayatno, T.

    2017-03-01

    Activities correspondence is often used by agencies or companies, so that institutions or companies set up a special division to handle issues related to the letter management. Most of the distribution of letters using electronic media, then the letter should be kept confidential in order to avoid things that are not desirable. Techniques that can be done to meet the security aspect is by using cryptography or by giving a digital signature. The addition of asymmetric and symmetric algorithms, i.e. RSA and AES algorithms, on the digital signature had been done in this study to maintain data security. The RSA algorithm was used during the process of giving digital signature, while the AES algorithm was used during the process of encoding a message that will be sent to the receiver. Based on the research can be concluded that the additions of AES and RSA algorithms on the digital signature meet four objectives of cryptography: Secrecy, Data Integrity, Authentication and Non-repudiation.

  6. FPGA-Based Network Traffic Security:Design and Implementation Using C5.0 Decision Tree Classifier

    Institute of Scientific and Technical Information of China (English)

    Tarek Salah Sobh; Mohamed Ibrahiem Amer

    2013-01-01

    In this work, a hardware intrusion detection system (IDS) model and its implementation are introduced to perform online real-time traffic monitoring and analysis. The introduced system gathers some advantages of many IDSs: hardware based from implementation point of view, network based from system type point of view, and anomaly detection from detection approach point of view. In addition, it can detect most of network attacks, such as denial of services (DoS), leakage, etc. from detection behavior point of view and can detect both internal and external intruders from intruder type point of view. Gathering these features in one IDS system gives lots of strengths and advantages of the work. The system is implemented by using field programmable gate array (FPGA), giving a more advantages to the system. A C5.0 decision tree classifier is used as inference engine to the system and gives a high detection ratio of 99.93%.

  7. Preemptive Transitional Justice Policies in Aceh, Indonesia

    Directory of Open Access Journals (Sweden)

    Suh Jiwon

    2015-04-01

    Full Text Available The peace agreement for Aceh included standard post-conflict measures, such as a human rights court and a truth and reconciliation commission (TRC. Why were they neglected? If they were going to be neglected, why did the negotiators initially agree on them instead of choosing amnesty or nothing? I argue that their nature as preemptive policies is key to understanding why they were introduced but not implemented. Preemptive transitional justice policies are adopted when reluctant policymakers attempt to trump “tougher” options with more acceptable alternatives, such as the following preemption in reformasi Indonesia: a domestic human rights court against an international tribunal, and reconciliation through amnesty against a domestic court. Preemptive policies are also mobilized to redirect pressure for other goals, such as a referendum for independence in reformasi Aceh. The process whereby preemptive policies were practically disabled in post-authoritarian Indonesia crucially influenced the non-implementation of transitional justice mechanisms in post-conflict Aceh. Meanwhile, aid measures have been implemented since the reformasi period, originally as attempts of preemption against the demands of the local society, and later as a less costly alternative to justice and truth.

  8. Military Justice Study Guide

    Science.gov (United States)

    1990-07-01

    Island Paralegal (Student) Command Division N/A TAD from/to until (give date) Naval Justice School, Newport, Rhode Island 3255 Whereabouts for next 30...If a lesser forum is desired, handle according to procedures set out elsewhere in this book. I IV-41 LEGAL OFFICER RELIEVING CHECKLIST A. GEN t . One

  9. Justice under uncertainty

    NARCIS (Netherlands)

    Cettolin, E.; Riedl, A.M.

    2013-01-01

    An important element for the public support of policies is their perceived justice. At the same time most policy choices have uncertain outcomes. We report the results of a first experiment investigating just allocations of resources when some recipients are exposed to uncertainty. Although, under c

  10. Reflexivity and social justice

    DEFF Research Database (Denmark)

    Maksimovic, Tijana; Jakobsen, Helle Nordentoft

    2017-01-01

    Career practitioners’ reflexive understanding of their professional role as change agents in career guidance and counselling practices has a major impact on how social justice can be achieved. This entitles an awareness of the way in which guidance and counselling practices are embedded in the co...

  11. Sociology of justice

    NARCIS (Netherlands)

    Liebig, S.; Sauer, C.G.

    2016-01-01

    In this chapter, we provide an overview of the empirical justice research done so far within sociology and aim to contribute to a clearer understanding of what constitutes a sociological approach. In order to do so, we first introduce the multilevel model of sociological explanation and derive four

  12. Rethinking Restorative Justice: When the Geographies of Crime and of Healing Justice Matter

    National Research Council Canada - National Science Library

    Jarem Sawatsky

    2007-01-01

    .... Despite the rhetoric that restorative justice is an alternative to the criminal justice system, this article demonstrates that restorative justice does not sufficiently challenge the underlying logic...

  13. Design and Implementation of Android Security Data Storage Platform%Android数据安全存储平台的设计与实现

    Institute of Scientific and Technical Information of China (English)

    田伟; 高能; 王平建; 张令臣

    2015-01-01

    As mobile devices of Android are becoming very prevalent, more and more personal privacy data is stored in the Android mobile terminal. Due to the openness of Android, lots of malicious programs are attacking the system, which result in problems of privacy data leakage. Private data protection is necessary to be resolved. This paper designs and implement a kind of Android security data storage platform, which used a key protection scheme with the collaboration of Android APP and cloud server. Simultaneously, the technology of key split and multiple-key system is used to ensure the security. The platform can ensure the data security storage based on the above. The Third-party APP can store privacy data securely in the terminal through this platform. Also user can login cloud server to control of all privacy data in Android, which shows a very high security and scalability.%近年来,随着Android系统在移动设备的加速普及,越来越多的个人隐私数据存储于Android终端.Android系统的开放性滋生了诸多恶意程序,移动终端隐私数据泄露的问题经常发生,隐私数据的保护问题亟待解决.文章设计并实现了一种Android数据安全存储平台,该平台采用了Android终端和云端合作计算的密钥保护方案,同时使用密钥拆分和双重密钥技术,在保证密钥安全性的同时实现了隐私数据的安全存储.第三方APP通过此平台可以在终端安全存储隐私数据,同时用户登录云端对终端所有隐私数据进行管控,有极高的安全性和扩展性.

  14. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  15. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination.

    Science.gov (United States)

    Kyne, Dean; Bolin, Bob

    2016-07-12

    Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP) reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  16. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination

    Directory of Open Access Journals (Sweden)

    Dean Kyne

    2016-07-01

    Full Text Available Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  17. A simple 1-byte 1-clock RC4 design and its efficient implementation in FPGA coprocessor for secured ethernet communication

    CERN Document Server

    Paul, Rourab; Zaman, Jkm Sadique Uz; Das, Suman; Chakrabarti, Amlan; Ghosh, Ranjan

    2012-01-01

    In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design [1], while the 1-byte in 3clocks is the best known implementation [2,3]. The design algorithm of 1-byte in 1-clock is complex since it takes two consecutive bytes together. The design of 1-byte in 3-clocks is too much modular and clock hungry. In this paper a simpler embedded system design of RC4 in 1-byte in 1-clock is proposed where two successive sequential tasks are executed as two independent events by using rising and falling edges of the same clock and swapping is done using a MUX-DEMUX combination, thereby increasing its throughput. The encryption and decryption designs are respectively implemented on two FPGA boards to achieve Ethernet communication.

  18. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  19. Equality in the Framework of Justice

    OpenAIRE

    Aşik, Kübra

    2015-01-01

    This thesis assesses the relation between equality and justice by exploring and identifying the relation between equality and justice in Rawls's theory of justice, Sandel's communitarian account of Justice and Sen's capability approach. And these accounts of justice are evaluated from an egalitarian point of view. The main argument defended in the thesis is that justice requires equality. Accordingly, these three accounts of justice are evaluated by taking their understanding of equality into...

  20. 自主可控的安全RTU设计与实现%Design and implementation of a self-control secure RTU

    Institute of Scientific and Technical Information of China (English)

    南亚希; 展巍; 裴后宣

    2016-01-01

    工业控制系统广泛应用于电力行业,成为维护电力系统安全、平稳运行的基础。为改进电力工业控制系统在电力设备信息安全技术上的不足,介绍了一种具有自主知识产权的配电自动化远方终端(RTU)的设计与实现方法。安全RTU采用自主可控的国产芯片作为核心处理器,通过外扩电能计量芯片提高采样精度,简化设计。基于国产加密算法的安全机制能实现数据在VPN隧道密文传输和用户认证访问。在实验室模拟工业现场测试表明该方法可以有效防止信息泄露以及木马病毒的攻击。%Industrial control system is widely used in power industry, which has become the base of maintaining power system running safely and steadily. To improve the deficiency of power industry control system in power equipment information security technology, this paper introduces a design and implementation method of distribution automation remote terminal (RTU) which is based on independent intellectual property rights. Secure RTU chooses a self-control homebred chip as the core processor, an energy measurement chip is extended to improve the acquisition accuracy and simplify the design. The security mechanism based on homebred encryption algorithm allows the cryptograph transfer in the VPN channel and credentials access. Test in the laboratory shows that this method can prevent information leakage and the Trojans virus.

  1. Checking Security Policy Compliance

    CERN Document Server

    Gowadia, Vaibhav; Kudo, Michiharu

    2008-01-01

    Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

  2. Transformation toward a Secure and Precaution-Oriented Energy System with the Guiding Concept of Resilience—Implementation of Low-Exergy Solutions in Northwestern Germany

    Directory of Open Access Journals (Sweden)

    Urte Brand

    2015-07-01

    Full Text Available Climate changes, incidents like nuclear disasters, and associated political objectives call for significant changes to the current energy system. Despite these far-reaching transformation processes, within the intended changes security of supply and precautions against the possible consequences of climate change must be ensured. Consequently, the question arises how to direct energy systems. In this context the processes of guiding orientations with the help of the guiding concept of “resilient systems” and feasible and addressee-oriented guiding design principles can be an option to provide guidance in transformation processes. However, it is questionable whether and how such processes are effective in the long term and if they are able to give direction by doing so. Within the framework of empirical studies of a regional guiding orientation process for the energy system of Northwestern Germany, the long-term effectiveness of the process and its spread resilient guiding design principles of “low-exergy solutions” and “climate-adapted and energy-efficient refrigeration” has been confirmed. Such effectiveness requires the implementation of a four-phase guiding orientation process which takes content-related and process-related effectiveness factors into account. Therefore, the study shows how regional energy systems can be designed toward the major challenges of ensuring security and precaution.

  3. 基于SSL协议的VPN系统实现及安全性研究%Security Research and Implementation of VPN System Based on SSL Protocol

    Institute of Scientific and Technical Information of China (English)

    李长春

    2016-01-01

    通过对SSL协议的分析研究,在Linux操作系统环境下,利用开源软件OpenVPN实现基于SSL协议的VPN系统。使用Wireshark抓包分析工具对OpenVPN系统性能进行测试分析,结果表明该系统有效解决了数据传输的安全性和可靠性问题。最后采用Grails开发框架设计了基于Web的文件分发系统,解决OpenVPN系统用户端证书、密钥等文件的安全分发问题。%Based on the analysis of SSL protocol ,under the Linux operating system environment ,open source software OpenVPN was utilized to implement the VPN system based on the SSL protocol. The performance of OpenVPN system was tested and analyzed by using Wireshark capture tool ,the results showed that the system can effectively solve the problem of security and reliability of data transmission. Finally ,using Grails development framework to design a file distribution system based Web ,and to solve the security problems of the OpenVPN system ,such as the user′s certificate ,key ,etc.

  4. Office of Command Security Total Quality Management Plan

    Science.gov (United States)

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM ( Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  5. 电力调度数据网安全防护设计及实现%Security Design and Implementation of Electric Power Dispatching Data Network

    Institute of Scientific and Technical Information of China (English)

    王晓英

    2012-01-01

    发电厂电力调度数据网是网局电力调度数据网的一个接人节点,传输发电厂与网局之间实时调度数据业务和非实时调度数据业务。为了确保调度数据业务稳定、快速、安全、高效率地传输,防止调度数据网遭到黑客、病毒、恶意代码等各种形式的恶意破坏和攻击,致使电力调度系统崩溃或瘫痪,必须要加强电力调度数据网的安全防护工作。这里介绍了发电厂调度数据网安全防护的设计及实现,供调度数据网设计和维护人员参考。%Power plant dispatching data network is an access node to the net bureau power dispatching data network and implements the transmission of real-time scheduling data service and non-real-time scheduling data service between the Power plant and the net bureau. In order to ensure the stable, fast, safe, efficient transmission of scheduling data service, to prevent scheduling data network malicious code and other from being attacked and so electric power dispatching system from being collapsed or paralyzed by hackers, viruses, malicious code and others, the security of power dispatching data network must be strengthened. This paper gives the security design and implementation of the plant scheduling data network, and all this could serve as a reference for the design and maintenance personnel of scheduling data network.

  6. Research and implementation of database security protocol%数据库安全协议研究与实现

    Institute of Scientific and Technical Information of China (English)

    凃云杰

    2016-01-01

    With provision for the multiple access modes of Cache database,the Antlr grammar generating tool is used to convert the Cache object script grammar and SQL script grammar into the intermediate representation language,so as to set the uniform audit rule. The main functions of the system include Cache protocol analysis and Cache object script grammar transfor-mation mainly. The manual method is used to compile and collect massive test cases in realization process. It is determined that the protocol analysis module can play a role in security audit of Cache database.%鉴于Cache数据库多种访问方式,利用Antlr语法产生工具完成Cache对象脚本语法和SQL脚本语法向中间表示语言的转换以便于设置统一的审计规则.该系统的主要功能包括Cache协议分析和Cache对象脚本语法转换等.在实现过程中用人工方法编写和收集大量测试用例,确定了协议分析模块能够起到对Cache数据库进行安全审计的作用.

  7. Design Methods for Embedded Security

    Directory of Open Access Journals (Sweden)

    I. Verbauwhede

    2009-11-01

    Full Text Available Embedded devices need both an efficient and a secure implementation of cryptographic algorithms. In this overview paper we show a typical top-down approach for secure and efficient implementation of embedded systems. We outline the security pyramid by illustrating the five primary abstraction levels in an embedded system. Focusing only on two levels - architecture and circuit level - we show how the design can be implemented to be both efficient and secure.

  8. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  9. Information Security Management

    OpenAIRE

    Huang, Lu

    2015-01-01

    The main purpose of the thesis was to present different areas of information security controls based on the international information security standard ISO 27001. The thesis also describes the methods of risk analysis and how to establish, implement, maintain and improve information security system in organizations. Most of the material was collected from books and various online resources. Some information was taken also from the teaching materials of the information security course. ...

  10. Transitional Justice versus Traditional Justice: The Basque Case

    Directory of Open Access Journals (Sweden)

    Joxerramon Bengoextea

    2013-03-01

    Full Text Available Transitional justice is often understood as a field or toolkit that facilitates the establishment of "justice" and rule of law in post-conflict societies. It is also the interdisciplinary understanding and study of that toolkit or field. This article explores to what extent transitional justice is a relevant way of understanding the transformations taking place in the Basque Country in the post-conflict situation created since the final ceasefire was declared by ETA on October 20, 2011. The article analyses different aspects of the field of transitional justice and the experience in Spain and the Basque Country. It underlines the prevalence of truth-seeking processes (over amnesia and of addressing violations and victims' suffering to conclude with the need to enhance the rule of law and traditional-individualised-justice and transitional justice.

  11. 信息安全素养测评系统的设计与实现%Design and Implementation of Information Security Literacy Evaluation System

    Institute of Scientific and Technical Information of China (English)

    沈霞娟; 高东怀; 郭佳; 宁玉文

    2016-01-01

    为了有效增强人们的信息安全意识,实现信息安全素养的科学测量,文中设计并开发了一套在线信息安全素养测评系统。文中首先从测评目标、内容、方法和指标体系四个方面阐明了信息安全素养测评的标准体系,然后提出了信息安全素养测评系统的结构模型,详细论述了题库管理、智能组卷、在线测评、成绩管理、统计分析等核心功能模块,最后结合第四军医大学的实践提出了一套可行的系统实施方案和必要的安全防护措施。结果表明,该系统可以详细测量出个体信息安全意识、知识、技能与伦理四个维度的素养水平,能够满足信息安全专项教育和人才选拔的需求。%In order to enhance people’s information security awareness and effectively measure people’s Information Security Literacy ( ILS) ,an online ILS evaluation system is designed and developed. Firstly,an ILS evaluation standard system including evaluation target, content,method and index is elaborated. Then,an construction model for ILS evaluation system is proposed. The main functions of the system,such as test database management,intelligent evaluation paper building,online evaluation,score management,statistics&analysis, are described in detail. Lastly,the implementation plan and necessary safety measures are carried out by taking the Fourth Military Medi-cal University as an example. The results show that the system can measure the literacy level of information security awareness,knowl-edge,skills and ethics. The system can meet the needs of information security special education and talents selection.

  12. Dentistry and distributive justice.

    Science.gov (United States)

    Dharamsi, Shafik; MacEntee, Michael I

    2002-07-01

    There is a growing concern in most countries to address the problem of inequities in health-care within the context of financial restraints on the public purse and the realities of health professions that are influenced strongly by the economic priorities of free-market economies. Dental professionals, like other health professionals, are well aware that the public expects oral health-related services that are effective, accessible, available and affordable. Yet, there is remarkably little reference in the literature to the theories of distributive justice that might offer guidance on how an equitable oral health service could be achieved. This paper considers three prominent theories of distributive justice--libertarianism, egalitarianism and contractarianism--within the controversial context of basic care and quality of life. The discussion leads towards a socially responsible, egalitarian perspective on prevention augmented by a social contract for curative care with the aim of providing maximum benefit to the least advantaged in society.

  13. Climate Change Justice

    OpenAIRE

    Sunstein, Cass R.; Posner, Eric A.

    2007-01-01

    Greenhouse gas reductions would cost some nations much more than others and benefit some nations far less than others. Significant reductions would impose especially large costs on the United States, and recent projections suggest that the United States has relatively less to lose from climate change. In these circumstances, what does justice require the United States to do? Many people believe that the United States is required to reduce its greenhouse gas emissions beyond the point that is ...

  14. Security patterns in practice designing secure architectures using software patterns

    CERN Document Server

    Fernandez-Buglioni, Eduardo

    2013-01-01

    Learn to combine security theory and code to produce secure systems Security is clearly a crucial issue to consider during the design and implementation of any distributed software architecture. Security patterns are increasingly being used by developers who take security into serious consideration from the creation of their work. Written by the authority on security patterns, this unique book examines the structure and purpose of security patterns, illustrating their use with the help of detailed implementation advice, numerous code samples, and descriptions in UML. Provides

  15. Hume's Theory of Justice

    Directory of Open Access Journals (Sweden)

    Horacio Spector

    2014-01-01

    Full Text Available Hume developed an original and revolutionary theoretical paradigm for explaining the spontaneous emergence of the classic conventions of justice - stable possession, transference of property by consent, and the obligation to fulfill promises. In a scenario of scarce external resources, Hume's central idea is that the development of the rules of justice responds to a sense of common interest that progressively tames the destructiveness of natural self-love and expands the action of natural moral sentiments. By handling conceptual tools that anticipated game theory for centuries, Hume was able to break with rationalism, the natural law school, and Hobbes's contractarianism. Unlike natural moral sentiments, the sense of justice is valuable and reaches full strength within a general plan or system of actions. However, unlike game theory, Hume does not assume that people have transparent access to the their own motivations and the inner structure of the social world. In contrast, he blends ideas such as cognitive delusion, learning by experience and coordination to construct a theory that still deserves careful discussion, even though it resists classification under contemporary headings.

  16. Women, truth, justice and reparation in Colombia

    Directory of Open Access Journals (Sweden)

    María Eugenia Ibarra Melo

    2011-07-01

    Full Text Available This paper account for the main collective actions undertaken by two women networks in Colombia: Women’s Peace Route and the Colombian Women Initiative for Peace, during transition justice process and the implementation of the Justice and Peace Law (2004-2009. From a sociological approach to the political process and the gender category, this paper discusses how gender ideologies inform new ways of mobilization affecting discourses, purposes and repertoires of those claiming identities and defending human rights. The main conclusion here is that the feminist influence in redistribution and acknowledgement claims for victims from the armed conflict have encouraged collective actions that begin to modify their relationship to the State. This is proved by their achievements at Court and social acknowledgement victims have gained as social actors.

  17. Health Care Rationing and Distributive Justice

    Directory of Open Access Journals (Sweden)

    Friedrich Breyer

    2009-01-01

    Full Text Available The rapid progress in medical technology makes it unavoidable to ration health care. In the discussion how to ration many people claim that principles of justice in distributing scarce resources should be applied. In this paper we argue that medical resources are not scarce as such but scarcity is a necessary by-product of collective financing arrangements such as social health insurance. So the right question to ask is the determination of the benefit package of such an institution. Hartmut Kliemt is currently involved in a commendable interdisciplinary research project in which principles of 'prioritization' of medical care are studied. This contribution adds a specific perspective to this endeavour: we ask how the goal of distributive justice can be interpreted in this context and compare different approaches to implementing 'just' allocation mechanisms.

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  20. CORRECTING MISCARRIAGE OF JUSTICE IN THE CIVIL PROCEDURE BEING A COMPONENT TO THE RIGHT TO DEFENCE

    Directory of Open Access Journals (Sweden)

    Inna Vitalyevna BLAZOMIRSKAYA

    2014-01-01

    Full Text Available The paper considered miscarriage of justice, i.e. an adjudi-cation being wrong judgment in effect containing either denial of defense within the actual (scope of right(s or defending the unlisted right for, for instance, while an in-nocent convict or an acquitted criminal. The dominant fea-tures of miscarriage of justice are the following: 1 A mis-carriage of justice appeared at the final adjudication; 2 A miscarriage of justice was presumed; 3 An agent commis-sioned to operate by a specific ruling would ascertain and eliminate a miscarriage of justice; 4 A specific way of proving a miscarriage of justice; 5 Actual miscarriage of justice has not been subsequent upon the fault / negli-gence having been let / tolerated / omitted by the judge who passed the final adjudication. Eliminating a miscar-riage of justice by the superior court should be one of three steps required for judicial defense. The first step shall be referring to the court and the hearing of the case by the court of first instance with the final disposition of the case that should be mandatory. The second and third steps shall be eliminating a miscarriage of justice and enforcing the court‟s disposition, – should be secured by the State as the effective remedies of judicial defense, and the party con-cerned may involve these when required.

  1. Flew on Entitlements and Justice

    OpenAIRE

    Peña, Lorenzo

    1989-01-01

    In «Equality, yes, surely; but Justice?», Antony Flew argues that egalitarianism and collectivism are incompatible with the concept of justice, since the usual concept of justice is that of giving everyone his due (or his own). That concept is intrinsically backward-looking; you cannot assign everyone his own by gratuitously presupposing that nothing is his own and that a fresh start is to be made. As against such a view, I maintain that, in a fairly obvio...

  2. Three Liberal Theories of Justice

    OpenAIRE

    Jiří MACHÁČEK

    2013-01-01

    The mail goal of this thesis is to introduce the modern theory of liberal justice with a focus on distributive justice. In addition, the author addresses the issue of value neutrality in the liberal state and the concept of equality in liberal theory. The author presents the concept of "justice as fairness" described by liberal political philosopher John Rawls. Afterwards his concept is subjected to criticism of other contemporary liberal philosophers Robert Nozick and Ronald Dworkin. The aut...

  3. Middle School Science Teachers' Perceptions of Social Justice: A Study of Two Female Teachers

    Science.gov (United States)

    Upadhyay, Bhaskar

    2010-01-01

    The focus of this qualitative study is to document two middle school science teachers' perceptions of social justice and how these teachers implement various aspects of social justice in their science instruction. The two teachers teach science in an urban school that serves students from low-income, immigrant, and ethnic minority families. The…

  4. Measuring Practices of Teaching for Social Justice in Elementary Mathematics Classrooms

    Science.gov (United States)

    Reagan, Emilie Mitescu; Pedulla, Joseph J.; Jong, Cindy; Cannady, Mac; Cochran-Smith, Marilyn

    2011-01-01

    This study used the Teaching for Social Justice Observation Scale (TSJOS) of the Reformed Teaching Observation Protocol-Plus (RTOP+) to examine the extent to which twenty-two novice elementary teachers implemented practices related to teaching for social justice in their mathematics instruction. In addition, this study sought to examine the extent…

  5. A study to investigate the reasons for bank frauds and the implementation of preventive security controls in Indian banking industry

    Directory of Open Access Journals (Sweden)

    Khanna, A.

    2009-01-01

    Full Text Available This paper examines the issue of frauds from the perspective of banking industry. The study seeks to evaluate the various causes that are responsible for banks frauds. It aims to examine the extent to which bank employees follow the various fraud prevention measures including the ones prescribed by Reserve Bank of India. It aims to give an insight on the perception of bank employees towards preventive mechanism and their awareness towards various frauds. The study signifies the importance of training in prevention of bank frauds. A strong system of internal control and good employment practices prevent frauds and mitigate losses. The research reveals that implementation of various internal control mechanisms are not up to the mark. The results indicate that lack of training, overburdened staff, competition, low compliance level (the degree to which procedures and prudential practices framed by Reserve bank of India to prevent frauds are followed are the main reasons for bank frauds. The banks should take the rising graph of bank frauds seriously and need to ensure that there is no laxity in internal control mechanism.

  6. Social justice in pandemic preparedness.

    Science.gov (United States)

    DeBruin, Debra; Liaschenko, Joan; Marshall, Mary Faith

    2012-04-01

    Pandemic influenza planning in the United States violates the demands of social justice in 2 fundamental respects: it embraces the neutrality of procedural justice at the expense of more substantive concern with health disparities, thus perpetuating a predictable and preventable social injustice, and it fails to move beyond lament to practical planning for alleviating barriers to accessing care. A pragmatic social justice approach, addressing both health disparities and access barriers, should inform pandemic preparedness. Achieving social justice goals in pandemic response is challenging, but strategies are available to overcome the obstacles. The public engagement process of one state's pandemic ethics project influenced the development of these strategies.

  7. EPICS: Channel Access security design

    Energy Technology Data Exchange (ETDEWEB)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.

  8. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  9. Equality, Justice and Identity -Multiple Perspectives in Female Employment Security%平等、公正、认同——女性就业保障的多重视角

    Institute of Scientific and Technical Information of China (English)

    沈堰奇

    2011-01-01

    Female employment has become an important problem in the process of harmonious society construction. To ensure women's employment rights and achieve equality between men and women, feminism proposes specific measures to protect women' s employment according to different theories and from different viewpoints. It is advisory for us to adopt relative feminist theories, and improve them from development and practical requirement. Thus new perspectives and methods are provided in order to impulse women' s employment, promote social justice, achieve gender equality, and harmonize mutual development.%当前,女性就业问题已成为我国建设和谐社会进程中的重要问题。为了保障女性的就业权利,实现男女平等,女权主义从不同的理论基础和思维视角提出了保护女性就业的具体措施。我们可以借鉴女权主义的相关理念,根据时代的发展和现实的需要加以改进,为推动女性就业、促进社会公平、达成两性平等、协调和共同发展提供一些新的视角和思路。

  10. The Efficiency of Requesting Process for Formal Business-Documents in Indonesia: An Implementation of Web Application Base on Secure and Encrypted Sharing Process

    Directory of Open Access Journals (Sweden)

    Aris Budi Setyawan

    2014-12-01

    Full Text Available In recent business practices, the need of the formal document for business, such as the business license documents, business domicile letters, halal certificates, and other formal documents, is desperately needed and becomes its own problems for businesses, especially for small and medium enterprises. One stop service unit that was conceived and implemented by the government today, has not been fully integrated yet. Not all permits (related with formal document for business can be completed and finished in one place, businesses are still have to move from one government department to another government department to get a formal document for their business. With these practices, not only a lot of the time and cost will be sacrificed, but also businesses must always fill out a form with the same field. This study aims to assess and identify the problem, especially on applying the formal document for business, and use it as inputs for the development of a web application based on secure and encrypted sharing process. The study starts with a survey of 200 businesses that have applied the formal document for their business, to map the initial conditions of applying the formal document for business in Indonesia . With these applications that are built based on these needs, it is expected that not only the time, cost, and physical effort from both parties are becoming more efficient, but also the negative practices of bureaucratic and economic obstacles in business activities can be minimized, so the competitiveness of business and their contribution for national economy will increase.Keywords : Formal documents, Efficiencies, Web application, Secure and encrypted sharing process, SMEs

  11. Student Perceptions of Social Justice and Social Justice Activities

    Science.gov (United States)

    Torres-Harding, Susan R.; Steele, Cheronda; Schulz, Erica; Taha, Farah; Pico, Chantal

    2014-01-01

    Encouraging students to engage in activities that actively seek to promote social justice is a goal of many educators. This study analyzed college student perceptions around social justice and related activities in a medium-sized, urban university in the United States. Students' open-ended responses to questions assessing their perceptions of…

  12. Student Perceptions of Social Justice and Social Justice Activities

    Science.gov (United States)

    Torres-Harding, Susan R.; Steele, Cheronda; Schulz, Erica; Taha, Farah; Pico, Chantal

    2014-01-01

    Encouraging students to engage in activities that actively seek to promote social justice is a goal of many educators. This study analyzed college student perceptions around social justice and related activities in a medium-sized, urban university in the United States. Students' open-ended responses to questions assessing their perceptions of…

  13. Justice and Feelings: Toward a New Era in Justice Research

    NARCIS (Netherlands)

    Cremer, D. de; Bos, K. van den

    2007-01-01

    In this special issue, the relationship between feelings and justice and its consequences are highlighted. Five articles discuss the role that affect, feelings, and emotions play in justice processes across a variety of social settings. In the present introductory article, the position of past and p

  14. Implementation of Document Security Management Based on Jacob%基于Jacob的文档安全管理的实现

    Institute of Scientific and Technical Information of China (English)

    梁志罡

    2011-01-01

    The security of network is a hot problem now.Introduce a online-document management system, its goal is to protect the teacher’s intellectual property, it requires that the student role does not have permission to download or copy the document which are uploaded by teacher, and the teacher role could edit the documents with a browser on-line.Through analyzing the base characteristic and security demand of the document management system in the market, combine with my innovation and then construct a new-style document management system with Jacob and Webdav techniques.The implementation of this system indicates that it can do well in the function of document security and on-line editing, in addition, the system also can deal with a fairly request simultaneously.%网络的安全性问题是一个比较热点的问题.出于对教师的知识产权的保护,要求学生用户端不具备复制与下载ppt 和 word 等文档的权限,而教师用户端则需要具备在线实时更改文档内容的权限.通过分析当前市场上存在的文档系统的基本特点和安全性要求,并结合自己的创新,采用Jacob 以及 Webdav 等关键技术实现了一个新型的在线文档管理系统.系统实验结果表明本系统能够很好地实现文档的安全性保护以及文档在线编辑功能,同时本系统在性能上也能够应对比较大的并发访问.

  15. Day-to-day management of EU projects: Implementation of a local manager network to secure knowledge transfer

    Science.gov (United States)

    Hoffmann, Friederike; Meyer, Stefanie; de Vareilles, Mahaut

    2017-04-01

    In the past years there has been a strong push in Norway for increasing participation in the EU Framework Programmes for Research and Innovation. EU projects coordinated by the University of Bergen (UiB) usually receive management support from the central administration (mostly financial) in collaboration with a full- or part-time scientific project manager working on a fixed-term contract at the same institute as the project's principal scientist. With an increasing amount of granted EU projects, the number of scientific project managers employed across the whole university has also increased, and a need for coordination and professionalization of this service became obvious. Until recently, UiB had no unified structures and routines for training of newly recruited project managers, or for archiving and transferring routines and skills after the end of the project and the manager's employment contract. To overcome this administrative knowledge gap, the "Forum for scientific EU project managers at UiB" was founded in spring 2016 as an informal communication platform. Its purpose is to bring together current and previous scientific EU project managers from different disciplines to share their experiences. The main aim of the forum is to transfer and improve knowledge, skills and routines on effective management of EU funded projects, but also to function as a discussion forum where issues arising from handling international consortia can be reviewed. The group meets monthly and discusses current challenges from on-going EU projects as well as routines for specific project operation tasks. These routines are archived in an online best-practise guide which the group currently develops. The regular personal meetings are supplemented with an intense communication via a group mailing list and several individual mail- and phone-meetings. Since lessons learned during project implementation may improve future proposals, UiB research advisors for proposal support frequently

  16. The role of overall justice judgments in organizational justice research: a test of mediation.

    Science.gov (United States)

    Ambrose, Maureen L; Schminke, Marshall

    2009-03-01

    Organizational justice research traditionally focuses on the unique predictability of different types of justice (distributive, procedural, and interactional) and the relative importance of these types of justice on outcome variables. Recently, researchers have suggested shifting from this focus on specific types of justice to a consideration of overall justice. The authors hypothesize that overall justice judgments mediate the relationship between specific justice facets and outcomes. They present 2 studies to test this hypothesis. Study 1 demonstrates that overall justice judgments mediate the relationship between specific justice judgments and employee attitudes. Study 2 demonstrates the mediating relationship holds for supervisor ratings of employee behavior. Implications for research on organizational justice are discussed.

  17. Justice in Cyberwar

    Directory of Open Access Journals (Sweden)

    Klaus-Gerd Giesen

    2014-06-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2014v13n1p27The text aims at providing an ethical framework for cyber warfare. The latter is changing our understanding of war (and peace as well as the relationship between the human being and the machine. Rejecting Heidegger’s fatalistic stance towards technology it is argued that norms of international justice should be formulated in order to attempt to regulate this new military dimension. The potentially considerable destructive force of cyberweapon systems for civilian infrastructure is emphasized, especially as far as the « Internet of Things » (all physical objects connected to the Internet is concerned. In a foreseeable future cyberwar operations may kill many civilians. After defining the concept of cyberwar and explainig why it is a new and important moral issue, the paper heavily relies on just war ethics in order to reach norms for justice in cyberwar. It is shown that Immanuel Kant has not just been a philosopher of (perpetual peace, but (in the Metaphysics of Morals also a just war theorist who developed his normative framework in a fruitful dialog with Aquinas (against Vitoria and Suarez. His norms for jus ad bellum and jus in bello are carefully and critically applied to cyberwar. However, Kant’s major innovation in just war theory has been the concept of jus post bellum. The paper demonstrates how important this dimension of justice is in cyberwar, and how to apply it, including through recommendations for a treaty in international law.

  18. First steps toward a nonideal theory of justice

    Directory of Open Access Journals (Sweden)

    Marcus Arvan

    2014-09-01

    Full Text Available Theorists have long debated whether John Rawls’ conception of justice as fairness can be extended to nonideal (i.e. unjust social and political conditions, and if so, what the proper way of extending it is. This paper argues that in order to properly extend justice as fairness to nonideal conditions, Rawls’ most famous innovation—the original position—must be reconceived in the form of a ‘nonideal original position’. I begin by providing a new analysis of the ideal/nonideal theory distinction within Rawls’ theoretical framework. I then systematically construct a nonideal original position, showing that although its parties must have Rawls’ principles of ideal justice and priority relations as background aims, the parties should be entirely free to weigh those aims against whatever burdens and benefits they might face under nonideal conditions. Next, I show that the parties ought to aim to secure for themselves a special class of nonideal primary goods: all-purpose goods similar to Rawls’ original primary goods, but which in this case are all-purpose goods individuals might use to (a promote Rawlsian ideals under nonideal conditions, (b weigh Rawls’ principles of ideal justice and priority relations against whatever burdens and benefits they might face under nonideal conditions, and (c effectively pursue their most favored weighting thereof. Finally, I defend a provisional list of nonideal primary goods, and briefly speculate on how the parties to the nonideal original position might deliberate to principles of nonideal justice for distributing them.

  19. A novel approach to implementing digital policy management as an enabler for a dynamic secure information sharing in a cloud environment

    Science.gov (United States)

    Farroha, Bassam S.; Essman, Kristine R.; Farroha, Deborah L.; Cohen, Andy

    2011-06-01

    The traditional way of approaching the management and enforcement of information systems Policy in enterprise environments is to manually translate laws and regulations into a form that can be interpreted and enforced by enterprise devices. In other words we create system commands for routers, bridges, and firewalls to force data transfers and system access to comply with the current policies and approved rules in order to control access and protect private, sensitive, and classified information. As operational needs and threat levels change, the rules are modified to accommodate the required response. It then falls on System Administrators to manually change the configuration of the devices they manage to adapt their operations accordingly. As our user communities continue to rely more heavily on mission information, and the enterprise systems and networks that provide it, our enterprise needs to progress to more automated techniques that enable authorized managers to dynamically update and manage policies in digital formats. Automated management of access rules that control privileges for accessing secure information and enterprise resources, enabled by Digital Policy and other Enterprise Security Management (ESM) capabilities provides the means for system administrators to dynamically respond to changing user needs, threat postures and other environmental factors. With the increased popularity of virtual environments and advent of cloud enterprise services, IA management concepts need to be reexamined. Traditional ESM solutions may be subjected to new classes of threats as physical control of the assets that implement those services are relinquished to virtual environments. Additional operational factors such as invoking critical processing, controlling access to information during processing, ensuring adequate protection of transactions within virtual environments and executing ESM provisions are also affected. The paper describes the relationships among

  20. What is Graphic Justice?

    Directory of Open Access Journals (Sweden)

    Thomas Giddens

    2016-12-01

    Full Text Available This article reproduces a poster presented at the Socio-Legal Studies ­Association annual conference, 5–7 April 2016 at Lancaster University, UK. The poster outlines the emerging study of the legal and jurisprudential dimensions of comics. Seeking to answer the question ‘what is graphic justice?’, the poster highlights the variety of potential topics, questions, concerns, issues, and intersections that the crossover between law and comics might encounter. A transcript of the poster’s text is provided for easier reuse, as well as a list of references and suggested readings.

  1. Biomedical enhancements as justice.

    Science.gov (United States)

    Nam, Jeesoo

    2015-02-01

    Biomedical enhancements, the applications of medical technology to make better those who are neither ill nor deficient, have made great strides in the past few decades. Using Amartya Sen's capability approach as my framework, I argue in this article that far from being simply permissible, we have a prima facie moral obligation to use these new developments for the end goal of promoting social justice. In terms of both range and magnitude, the use of biomedical enhancements will mark a radical advance in how we compensate the most disadvantaged members of society.

  2. Security in Computer Applications

    CERN Document Server

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  3. Spheres of Justice within Schools

    DEFF Research Database (Denmark)

    Sabbagh, Clara; Resh, Nura; Mor, Michal;

    2006-01-01

    This article argues that there are distinct spheres of justice within education and examines a range of justice norms and distribution rules that characterize the daily life of schools and classrooms. Moving from the macro to micro level, we identify the following five areas: the right to education...

  4. Social Justice and School Psychology

    Science.gov (United States)

    Nastasi, Bonnie K.

    2008-01-01

    Despite attention in other social sciences and within other areas of psychology, social justice has received minimal attention in school psychology literature. The two studies by Shriberg et al. (2008) and McCabe and Rubinson (2008) represent significant developments in exploring school psychology's commitment to social justice. In this…

  5. Educational Administration and Social Justice

    Science.gov (United States)

    Bates, Richard

    2006-01-01

    After observing that texts in educational administration have largely failed to address the problem of the justice and fairness of social and educational arrangements, this article goes on to examine the necessary relationships between ethical leadership, community and the notion of social justice. Such relationships are argued to be necessarily…

  6. Juvenile Justice and Substance Use

    Science.gov (United States)

    Chassin, Laurie

    2008-01-01

    Laurie Chassin focuses on the elevated prevalence of substance use disorders among young offenders in the juvenile justice system and on efforts by the justice system to provide treatment for these disorders. She emphasizes the importance of diagnosing and treating these disorders, which are linked both with continued offending and with a broad…

  7. SOCIAL WELFARE AND RESTORATIVE JUSTICE

    Directory of Open Access Journals (Sweden)

    Darrell Fox

    2009-09-01

    Full Text Available This paper explores the links and connections between social work and restorative justice. After a brief description of social work, restorative justice and family group conferencing, I will explore some the complementary theoretical links and practice applications, critically examining the potential implications and opportunities for social work practitioners and academics in relation to practice.

  8. Social Justice Language Teacher Education

    Science.gov (United States)

    Hawkins, Margaret R.

    2011-01-01

    Social justice language teacher education conceptualizes language teacher education as responding to social and societal inequities that result in unequal access to educational and life opportunities. In this volume authors articulate a global view of Social Justice Language Teacher Education, with authors from 7 countries offering a theorized…

  9. Experiential Social Justice Judgment Processes

    NARCIS (Netherlands)

    Maas, M.

    2008-01-01

    Social justice can be thought of as an idea that exists within the minds of individuals and that concerns issues like what is right and wrong, what ought to be or not to be, and what is fair or unfair. This subjective quality of the justice judgment process makes it rather unpredictable how people w

  10. 75 FR 707 - Classified National Security Information

    Science.gov (United States)

    2010-01-05

    ... National Security Information Memorandum of December 29, 2009--Implementation of the Executive Order ``Classified National Security Information'' Order of December 29, 2009--Original Classification Authority #0... 13526 of December 29, 2009 Classified National Security Information This order prescribes a...

  11. Smart Meter (Gateways). Attacks and implementation of a cost effective security solution; Smart Meter (Gateways). Angriffe und Umsetzung einer kostenguenstigen Sicherheitsloesung

    Energy Technology Data Exchange (ETDEWEB)

    Krauss, Christoph [Fraunhofer Research Institution AISEC, Garching (Germany); Sigl, Georg [Technische Univ. Muenchen (Germany); Stumpf, Frederic

    2012-07-01

    Smart Meter (Gateways) are a central component of future Smart Grids and their secure operation must be ensured. In this paper, we first present several attacks on actual smart meter and gateway systems. Next, we describe a possible security solution which meets the requirements of the protection profile specified by the German Federal Office for Information Security (BIS) as far as possible with current available technology and includes additional security mechanisms. To realize a cost-efficient solution, we use off-the-shelf hardware for the mandatory Hardware Security Module (HSM) in form of a Trusted Platform Module (TPM). Finally, we give a brief overview on alternative approaches. (orig.)

  12. Reflections on power and justice in enabling occupation.

    Science.gov (United States)

    Townsend, Elizabeth

    2003-04-01

    This descriptive paper offers reflections on power and justice associated with occupational therapy's client-centred practice, now described as the practice of enabling occupation. Framed as a contribution to the sociology of professions, the questions addressed are: How do power and justice work in occupational therapy today? What vision of power and justice guides the profession in implementing the client-centred practice of enabling occupation? The paper opens with an overview of the analytic framework for reflections. Two sources for reflections are highlighted: the development of the Canadian guidelines and, client/consumer and occupational therapy perspectives. To illustrate the discussion of power and justice, two contrasting diagrams are presented, one on late 20th century power relations and the other on potential power relations. Recommendations for research, education, practice, and guidelines development are offered prior to a conclusion that acknowledges the dissonance facing occupational therapists who struggle to focus on occupations in client-centred practice. The paper offers insights and strategies for addressing power and justice as issues in implementing the client-centred practice of enabling occupation. The analysis may be used in raising awareness and guiding the strategic development of institutional change toward social inclusion and enabling occupation.

  13. Comparative Supreme Justice

    Directory of Open Access Journals (Sweden)

    Ditlev Tamm

    2011-12-01

    Full Text Available This article deals with the great variety of Supreme Courts in the world today and presents some selected courts. Supreme Courts are found in most countries both as only apex courts or in a courts’ system where also supreme administrative courts or constitutional courts are found. The starting point is the variation of supreme justice in the Nordic countries where one apex court is the system of Denmark and Norway whereas administrative courts are found in Sweden and Finland. Constitutional courts stem from the European tradition and are most abundant in Europe and in countries with a civil law system but especially in Africa they are also found in common law countries. Mexico is mentioned as a specific example of a Supreme Court that has taken upon itself to be a main player in the endeavour to communicate the law to a general audience. The article is a presentation with samples of what is going to be a project on comparative supreme justice in which the position of supreme courts in the various states, the recruitment scheme and competence of the courts and other such factors will be analyzed on a global basis.

  14. Effect of Organizational Justice and Job Satisfaction on Organizational Effectiveness with the Moderating Role of Strategic Commitment

    Directory of Open Access Journals (Sweden)

    Atif Kafayat

    2014-12-01

    Full Text Available In this era of highly competitive business environment every organization strives to be successful, and for that an organization pays great emphasis on organizational justice and job satisfaction of its employees in order to be effective and successful. This study investigates the impacts of organizational justice and Job Satisfaction on organizational effectiveness with moderating variable of strategic commitment. The organizational justice is subdivided into three types: Distributive Justice, Procedural justice, Interactional justice while job satisfaction is also divided into three dimensions as well: Working Condition, Job security and Autonomy. This study is an effort to contribute in the body of knowledge and helpful for organizations to improve their effectiveness. The data for this study is collected from Telecommunication sector of Pakistan via questionnaire.

  15. Design and Implementation of Mobile Security Tracking System%手机防盗追踪系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    古发辉; 赖路燕; 井福荣

    2015-01-01

    In modern life, people have been separated from the mobile phone, many important information is stored in the mobile phone. Mobile security has become an urgent need to solve the problem of modern society. This paper the design and implementa-tion of a mobile phone anti-theft tracking system is to effectively solve real-time monitoring of mobile phone status and data backup function based on GPS positioning, base station location, sensor technology, data backup and other technology.%现代生活中人们已经离不开手机,许多重要信息都存储在手机中,手机防盗已成为现代社会迫切需要解决的问题.该文基于GPS定位、基站定位、传感器技术、数据备份等技术设计了一款手机防盗追踪系统,实现了实时监听手机状态和数据备份功能,有效解决了手机防盗问题.

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Teaching for Social Justice: From Conceptual Frameworks to Classroom Practices

    Science.gov (United States)

    Dover, Alison G.

    2013-01-01

    In this article, the author presents the results of a multistate study examining how teachers, and specifically secondary English Language Arts (ELA) teachers, conceptualize and implement teaching for social justice in standards-based contexts. Additional analysis underscores how this practice both reflects and extends earlier equity-oriented…

  18. Social Justice in Practitioner Publications: A Systematic Literature Review

    Science.gov (United States)

    Meister, Samantha M.; Zimmer, Wendi Kamman; Wright, Katherine Landau

    2017-01-01

    A review of the current research literature demonstrates that teaching for social justice has been accepted by the research community as best practice for students, especially diverse students from traditionally marginalized populations and communities. However, best practices do no practical good if they are not implemented into real classroom…

  19. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  20. «Cross-border Environmental Peace» as the Interaction of Regional Norms and Local Power: Lessons from Cross-Regional Analysis of Water Security Debates

    Directory of Open Access Journals (Sweden)

    Harlan Koff

    2017-01-01

    Full Text Available This article contends that notions of «peace» and «justice» in cross-border water management vary in different world regions. Moreover, it argues that «peace» and «justice» can be explained by analyzing the interaction between «regional» interpretations and implementation of water security norms and local cross-border power structures. «Regional water security» is defined as the normative commitment to provide necessary water resources to communities within world regions. «Power,» which is defined traditionally as «the ability of actors to obtain their objectives despite opposition» is viewed as a function of political entrepreneurialism and opportunity structures. This article derives from a review of the pertinent literatures on «water security» and «water justice,» the two elements of «water peace» as well as scholarship on cross-border water management in different world regions. It discusses water governance within the framework of cross-border politics and comparative regional integration. It also includes analysis of the policy documents and websites of seventeen regional organizations as well as interviews with key actors and local experts on water management in specific cross-border case studies. The article is divided into five sections. Following this introduction, part two examines «water security» and «water justice» in international affairs. Part III then discusses «power» in cross-border water governance debates and addresses the transnational face of water security discussions. Part IV presents a comparative examination of cross-border «water justice» in selected world regions which is followed by theoretical considerations that are addressed in part V, the conclusion. In general, the article emphasizes the need to promote comparative cross-regional research on cross-border water governance in order to examine how «peace,» «security» and «justice» are framed in debates over water resources. 

  1. The Nanchang Communication about the potential for implementation of conservation practices for climate change mitigation and adaptation to achieve food security in the 21st century

    Directory of Open Access Journals (Sweden)

    Jorge A. Delgado

    2016-06-01

    adaptation to climate change to achieve food security in the 21st century. These papers (Delgado et al., 2011, Nanchang Communication, and the SWCS and WASWAC position statements, support the conclusions from the worldwide literature that without implementation of soil and water conservation practices for climate change mitigation and adaptation, the survival of life, including our own species, will be in jeopardy, since soils will be key to meeting the higher demands for food during the 21st century.

  2. The Link Between the Administrative Enforcement and Criminal Justice in the Securities Field%证券领域行政执法与刑事司法的衔接问题研究

    Institute of Scientific and Technical Information of China (English)

    叶旺春

    2012-01-01

    在我国,证券领域行政执法与刑事司法的衔接并不畅顺,大部分符合刑事追诉标准的案件仅被处以行政处罚,造成违法成本的低廉。其原因是多方面的,包括刑事与行政证明标准的差异,证据转换的困难,专业知识上的阻隔,以及监督的缺位等。建议通过推定方式转移公诉机关指控特殊类型证券犯罪的部分举证责任,减轻公诉机关的举证负担;根据不同证据的特点,完善行刑衔接证据转换规则;加强证券监管机构与公安机关、检察机关的沟通协调,建立信息共享及工作交流机制;增强规范执行力,确立有效的案件移送监督制度。%In China,the cost of illegal acts in securities market is low,because most of the cases accordant with the standard of public prosecution were only punished through the way of administrative penalty.The reasons include: the difference between the criminal proof standard and administrative proof standard,the difficulty of evidence transformation,the barrier of professional knowledge,and the lack of supervision.We suggest that the burden of proof of the public prosecution organizations should be alleviated;the regulation of evidence transformation should be established according to their characteristics;the mechanism of information sharing and communicating at work among securities regulators,public security and public prosecution should be set up,and the effective system of supervision and transform should be established.

  3. The European Commission for the Efficiency of Justice (CEPEJ - Reforming European Justice Systems - "Mission Impossible?"

    Directory of Open Access Journals (Sweden)

    Jon T. Johnsen

    2012-12-01

    Full Text Available My paper concerns the Council of Europe’s work to improve justice in Europe. It explains and exemplifies a type of policy that the Council applies in its strive for implementing the demands of the European Human Rights Convention on the judicial systems in Europe.The Convention obliges all member states to put up efficient systems for remedying violations within their own national legal systems. If such systems are missing or do not provide sufficient redress, member states now accept that everyone is free to bring their case before the European Court of Human Rights ECtHR. Over the years the Court has produced extensive case law on violations of the provisions that protect people’s access to justice that develops and concretizes the general wordings used in the text of the ECHR. However, international complaint mechanisms are only one type of instrument for disseminating human rights. In addition to judicial instruments like the ECtHR, CoE also uses policy vehicles for implementation of human rights like the one I will focus upon; namely the European Commission for the Efficiency of Justice – usually abbreviated CEPEJ – from the French version of its name. As one of several committees of CoE, it focuses on the development of the judicial systems of the member states.

  4. Information security factors systematization

    OpenAIRE

    Янченко, Вадим Николавевич; Ивченко, Александр Владимирович; Залога, Вильям Александрович; Дынник, Оксана Дмитриевна

    2015-01-01

    In this article the necessity of solving the theoretical and practical task, aimed on development the methodological basis for elaboration and implementation of information security management system, has been considered. Based on research results of scientific works and the requirements in the field of information security management the universal multilevel system of information security factors of organizations (enterprises) in the wood properties form was offered by using quality control ...

  5. 75 FR 56557 - Meeting of the Department of Justice's (DOJ's) Global Justice Information Sharing Initiative...

    Science.gov (United States)

    2010-09-16

    ... point for justice information systems integration activities in order to facilitate the coordination of... of Justice Programs Meeting of the Department of Justice's (DOJ's) Global Justice Information Sharing... meeting. SUMMARY: This is an announcement of a meeting of DOJ's Global Justice Information...

  6. Publicity and Egalitarian Justice

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2008-01-01

    Recently, the issue of publicity has surfaced in discussions of the correct interpretation of the Rawlsian principles of justice. In an intriguing critique of G.A. Cohen's preferred interpretation of the difference principle as a principle that is incompatible with incentive-based inequalities......, Andrew Williams points to a gap in Cohen's argument, alleging that Cohen's interpretation of the difference principle is unlikely to be compatible with the Rawlsian endorsement of publicity. Having explored a possible extrapolation of Cohen's critique to aggregate consumer choices and a resulting...... extension of Williams's charge that the difference principle, on Cohen's reading, fails to meet the publicity constraint because of its informational demandingness, I defend three claims: (a) it is doubtful that Rawls endorses a publicity constraint of the sort that would rule out Cohen's interpretation...

  7. An investigation into the challenges of food security policy implementation : a case study of the Barolong Boora Tshidi people of the North West Province (South Africa) / Kego Lorathu.

    OpenAIRE

    2005-01-01

    The study found that there is marked poverty in Lekoko village, and that food security is lacking. Purchasing power of household commodities and consumables is observed to be non-existent. Agriculture as a form of food security has eluded many because of drought. All those who practised subsistence fanning are unable to do so. Food security is greatly impaired; the people cannot access sufficient aid and nutritious food. This includes the problem of food production, preserva...

  8. JUSTICE AND LIBERTY IN HEGEL

    Directory of Open Access Journals (Sweden)

    Thadeu Weber

    2014-06-01

    Full Text Available This paper aims to make explicit the concept of justice in Hegel’s Philosophy of Right. It bounds it to the idea of liberty in its different ways of determination. It starts from the notion of person of right and indicates the fundamental rights that derive from the expression of this legal capacity. It highlights the right of necessity as a right to make an exception in favor of itself aiming the actualization of justice. It shows how, through the Law, in civil society, it happens the administration of justice.

  9. Juvenile justice mental health services.

    Science.gov (United States)

    Thomas, Christopher R; Penn, Joseph V

    2002-10-01

    As the second century of partnership begins, child psychiatry and juvenile justice face continuing challenges in meeting the mental health needs of delinquents. The modern juvenile justice system is marked by a significantly higher volume of cases, with increasingly complicated multiproblem youths and families with comorbid medical, psychiatric, substance abuse disorders, multiple family and psychosocial adversities, and shrinking community resources and alternatives to confinement. The family court is faced with shrinking financial resources to support court-ordered placement and treatment programs in efforts to treat and rehabilitate youths. The recognition of high rates of mental disorders for incarcerated youth has prompted several recommendations for improvement and calls for reform [56,57]. In their 2000 annual report, the Coalition for Juvenile Justice advocated increased access to mental health services that provide a continuum of care tailored to the specific problems of incarcerated youth [58]. The specific recommendations of the report for mental health providers include the need for wraparound services, improved planning and coordination between agencies, and further research. The Department of Justice, Office of Juvenile Justice and Delinquency Prevention has set three priorities in dealing with the mental health needs of delinquents: further research on the prevalence of mental illness among juvenile offenders, development of mental health screening assessment protocols, and improved mental health services [59]. Other programs have called for earlier detection and diversion of troubled youth from juvenile justice to mental health systems [31,56]. Most recently, many juvenile and family courts have developed innovative programs to address specific problems such as truancy or substance use and diversionary or alternative sentencing programs to deal with first-time or nonviolent delinquents. All youths who come in contact with the juvenile justice system

  10. Cognitive Computing for Security.

    Energy Technology Data Exchange (ETDEWEB)

    Debenedictis, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rothganger, Fredrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Marinella, Matthew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Evans, Brian Robert [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Warrender, Christina E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mickel, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  11. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  12. Lemnos interoperable security project.

    Energy Technology Data Exchange (ETDEWEB)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  13. 75 FR 68812 - Notice of Submission of Proposed Information Collection to OMB; Implementation of the Violence...

    Science.gov (United States)

    2010-11-09

    ... Violence Against Women and Department of Justice Reauthorization Act of 2005 AGENCY: Office of the Chief...: Implementation of the Violence Against Women and Department of Justice Reauthorization Act of 2005. OMB...

  14. Perception des institutions de sécurité et de justice par les abidjanais

    Directory of Open Access Journals (Sweden)

    Antoine Nassoua Okpo

    2016-07-01

    Full Text Available This study aims at knowing the Abidjanian perception and the induced representation of Ivorian institutions of security and justice. We used theories of motivation, in particular the one concerning motivational content, in order to understand the Abidjanian judgments. Data from a questionnaire and some interviews have provided information that highlight a negative image among citizens of the Ivorian system of security and justice. This discrediting of the system is mainly the result of different dissatisfaction experiences and other complaints towards the system and its agents.

  15. Research and Implementation of a Secure Two-dimensional Code%安全实用的二维码研究与实现

    Institute of Scientific and Technical Information of China (English)

    高彦受; 许春根

    2012-01-01

      Two-dimensional code is carried large amounts of information in the form of pictures, to achieve the purpose of fast and convenient. So far, It is widely used in e-commerce and ticketing systems. However, two-dimensional codes is also faced with security threats such as information disclosure and information altered. Our article research the main problem faced by the two-dimensional code. For example, when we generated the QR code, we encrypt the source data to prevent information leakage. The encryption method is RC4. Finally, designed and implemented a QR code. This design will not disclose personal information and generate high efficiency. The important is application value in practice.%  二维码是将大量信息以图片的形式承载,达到快捷方便的目的,目前广泛运用于电子商务、票务系统等。然而,二维码也面临着信息泄露和信息涂改等安全威胁,文章对二维码所面临的主要问题进行了研究,以QR码为例,为防止信息泄露,在进行QR码生成时对数据进行了加密处理,主要是RC4加密,最后设计并实现了QR码的生成,该设计方案不仅不会泄露个人信息,而且生成效率很高,在实际中具有应用价值。

  16. Design and Implementation of Security Monitor for Mobile Internet%移动互联网监控仪的设计与实现

    Institute of Scientific and Technical Information of China (English)

    李军; 张清盛

    2014-01-01

    移动互联网监控仪由嵌入式硬件和监控软件两部分组成,嵌入式硬件由CPU、Flash存储器、以太网接口卡、无线网卡组成,监控软件由基于Linux内核的主程序和分析程序组成,主程序捕捉经过网络终端传输的数据包,分析程序把过滤所得的数据包发送给后台服务器存储。在移动互联网中进行数据链路层监控,用户自定义需要监控的关键字,对数据进行关键字和主题领域的列表进行字符匹配,对敏感信息数据包或者不和谐内容的数据包进行监控并存储。%Designs and implements mobile Internet security monitor based on embedded Linux, by listening on the network packets, containing a set of sensitive information packet uploaded to the storage server for evidence. The embedded development board used for network monitor client, based on system kernel Linux 2.6.30, CPU S3C2440(400MHz), with Ethernet interface, the equipment has low cost, small volume and light weight, convenient carrying and installation, especially suitable for public sites and small office. The monitor does not affect the speed of Internet access, and the energy consumption is low, more energy saving and environmental protection.

  17. Allegheny County Environmental Justice Areas

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — Environmental Justice areas in this guide have been defined by the Pennsylvania Department of Environmental Protection. The Department defines an environmental...

  18. Polarization of perceived Procedural Justice.

    Science.gov (United States)

    Flint, Douglas H; Hernandez-Marrero, Pablo; Wielemaker, Martin

    2006-02-01

    This study examined polarization of perceptions of Procedural Justice. Two polarization mechanisms are examined, Persuasive Arguments and Social Comparisons. Participants were students enrolled in a first-year introductory business class. There were 216 participants in the Persuasive Arguments study, 429 in the Social Comparisons study. The average age of all participants was 22.3 yr. (SD = 2.1); 56% were women. Fields of study represented were business, engineering, information technology, and sports. Analysis showed under conditions of low Procedural Justice, polarization effects were only found with the Persuasive Arguments mechanism. Under conditions of high Procedural Justice, polarization effects were only found with Social Comparisons. Implications for group polarization and Procedural Justice theories are considered.

  19. Justice orientation as a moderator of the framing effect on procedural justice perception.

    Science.gov (United States)

    Sasaki, Hiroyuki; Hayashi, Yoichiro

    2014-01-01

    Justice orientation is a justice-relevant personality trait, which is referred to as the tendency to attend to fairness issues and to internalize justice as a moral virtue. This study examined the moderating role of justice orientation in the relationship between justice perception and response to a decision problem. The authors manipulated procedural justice and the outcome valence of the decision frame within a vignette, and measured justice orientation of 174 Japanese participants. As hypothesized, the results indicated an interaction between procedural justice and framing manipulation, which was moderated by individual differences in justice orientation. In negative framing, justice effects were larger for individuals with high rather than low justice orientation. The results are explained from a social justice perspective, and the contributions and limitations of this study are also discussed with respect to our sample and framing manipulation.

  20. 我国开展供应链安全项目的挑战与对策%Challenges and Suggestions for Implementing Supply Chain Security Programs in China

    Institute of Scientific and Technical Information of China (English)

    周欣; 吴正威; 李彦和; 任金珠

    2013-01-01

      首先介绍了供应链安全项目的内涵以及世界各国的实施现状,然后从海关和企业两个角度出发,分析了我国供应链安全项目的开展的现状,着重阐述实施的重要性以及实施过程中面临的困境,最后给出了相关政策建议。%First the concept of supply chain security programs is introduced and the current worldwide implementing situations is presented. Then, from both the customs and the business point of view, the current implementing situations in China is discussed. Finally, recognized the importance and problems for China in supply chain security programs, policies and suggestions are proposed.

  1. Laser security systems

    Science.gov (United States)

    Kolev, Ivan S.; Stoeva, Ivelina S.

    2004-06-01

    This report presents the development of single-beam barrier laser security system. The system utilizes the near infrared (IR) range λ=(850-900)nm. The security system consists of several blocks: Transmitter; Receiver; Logical Unit; Indication; Power Supply. There are four individually software programmable security zones Z1 - Z4. The control logic is implemented on a PIC16F84 MCU. The infrared beam is a pulse pack, coded and modulated in the transmitter with frequency of 36 kHz. The receiver demodulates and decodes the beam. The software for the MCU is developed along with the electrical circuits of the security system.

  2. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  3. Victims and the criminal justice system in India: Need for a paradigm shift in the justice system

    Directory of Open Access Journals (Sweden)

    Srinivasan Murugesan

    2007-01-01

    Full Text Available Until 1970s the victims of crime were a forgotten entity in the criminal justice system. The attitude began to change as the discipline of victimology came into its own. The past few decades have witnessed a revolution in the way society deals with victims of crime. Many countries have now recognized the need to provide services to victims to help them recover from the effects of crime and assist them in their dealings with the criminal justice system. But in India, there has not been any significant improvement in the position of victims in the criminal justice system. The present paper has attempted to examine the position of victims of crime in India and the criminal justice system. The paper also emphasizes the need to provide assistance to crime victims. The authors of the present paper have also suggested some of the immediate steps that are to be implemented by the law enforcement agencies in India to improve the position of victims in the criminal justice system. .

  4. Global Health Justice and the Right to Health.

    Science.gov (United States)

    Widdows, Heather

    2015-12-01

    This paper reflects on Lawrence Gostin's Global Health Law. In so doing seeks to contribute to the debate about how global health justice is best conceived and achieved. Gostin's vision of global health is one which is communal and in which health is directly connected to other justice concerns. Hence the need for health-in-all policies, and the importance of focusing on basic and communal health goods rather than high-tech and individual ones. This paper asks whether this broadly communal vision of global health justice is best served by making the right to health central to the project. It explores a number of reasons why rights-talk might be problematic in the context of health justice; namely, structurally, rights are individual and state-centric and politically, they are oppositional and better suited to single-issue campaigns. The paper argues that stripping rights of their individualist assumptions is difficult, and perhaps impossible, and hence alternative approaches, such as those Gostin endorses based on global public goods and health security, might deliver much, perhaps most, global health goods, while avoiding the problems of rights-talk.

  5. 加强SOAP消息安全通信平台的分析及实现%Analysis and Implementation on Communication Platform for Enhanced the Security of SOAP Message

    Institute of Scientific and Technical Information of China (English)

    李林静; 赵建伟

    2011-01-01

    This article has deeply analyzed Implementation of SOAP message passing in Intemet, puts forward the time of enhanced the security of SOAP message, it is AfterSerialize and BeforeDeserialize SOAP message stage. Then, in. NET Framework, puts up with communication platform to capture SOAP message using SOAP extension, analyses important code, lastly study on implementation the security of SOAP message by using this communication platform-take, for Instance,a way to encrypt SOAP message. the research platform is built for study on implementation the security of SOAP message.%通过对SOAP消息传递的各个阶段分析,提出了加强SOAP消息安全的时机是在AfterSerialize和BeforeDe-serialize这两个阶段,然后在.NET平台下,利用SOAP扩展搭建了一个实现截获SOAP消息通信平台,以加密SOAP消息为例,探讨借助这个通信平台加强SOAP消息安全的方法.该截获SOAP消息通信平台的实现为研究SOAP消息的安全提供了一个研究的基础平台.

  6. Secure Method Invocation in JASON

    NARCIS (Netherlands)

    Brinkman, Richard; Hoepman, Jaap-Henk

    2002-01-01

    We describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewe

  7. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  8. ADMINISTRATIVE JUSTICE IN POLAND

    Directory of Open Access Journals (Sweden)

    J. Turłukowski

    2016-01-01

    Full Text Available This article begins with an analysis of the development of administrative justice in Poland over the last centuries. In particular, the author examines administrative jurisdiction before 1918, when Poland regained its independence, the period of the Duchy of Warsaw, the Kingdom of Poland, and the practice on Polish territory under Austrian and Prussian control. The author then moves to modern law by presenting the judicial system in Poland in general, especially the differences between the separate systems of general courts and administrative courts, and analyses the jurisdiction of voivodship (regional administrative courts, and the basic principles of judicial and administrative proceedings. The focus of study is mainly devoted to judicial and administrative procedure, rather than an administrative process of citizens before administrative authorities regulated in a separate Code of Administrative Procedure. The article describes the role of the judge (pointing out the differences between the active role of first instance judges and the limited capabilities of the judges of the appeal and the powers of the Supreme Court, in particular its power to adopt resolutions, which has agreat importance for the unification of the jurisprudence. A brief analysis is given to class actions, which in the Polish legal system are inadmissible in court and administrative proceedings. The articles provides a statistical cross-section illustrating the role of administrative jurisdiction. The author concludes with observations pointing up the progress of administrative jurisdiction in Poland, not only in the legal sense, but also in the cultural sense.

  9. Technical aspects concerning the safe and secure use of drones

    NARCIS (Netherlands)

    Elands, P.J.M.; Kraker, J.K. de; Laarakkers, J.; Olk, J.G.E.; Schonagen, J.J.

    2016-01-01

    On request of the Dutch National Coordinator for Security and Counterterrorism (NCTV) of the Ministry of Security and Justice, TNO has investigated the issues and corresponding risks which arise from the introduction and use of drones in the national airspace. The issues identified are primarily rel

  10. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  11. New rules revamp national security prosecutions

    Science.gov (United States)

    Gwynne, Peter

    2016-06-01

    Following the collapse of recent prosecutions of Chinese-American scientists on national security grounds, the US Department of Justice (DOJ) has issued new rules on such lawsuits that will require top officials in Washington to review and supervise all cases that implicitly involve spying - rather than leaving decisions to local prosecutors.

  12. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic cha

  13. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  14. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  15. NOT A MILITARY ALLIANCE——The SCO should continue to implement its founding principles,based on security and economic cooperation,rather than expanding its membership

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In reinventing itself, the Shanghai Cooperation Organization should stick to being a regional cooperative organization guided by a new concept and prioritizing security and economic cooperation. Meanwhile, brash expansion of the organization will cause a lot of problems.

  16. Information Security Service Branding – beyond information security awareness

    OpenAIRE

    Rahul Rastogi; Rossouw Von Solms

    2012-01-01

    End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, i...

  17. Community-based rehabilitation in Jordan: challenges to achieving occupational justice.

    Science.gov (United States)

    AlHeresh, Rawan; Bryant, Wendy; Holm, Margo

    2013-10-01

    This paper presents theories of occupational and social justice and applies the theoretical tenets to a community-based rehabilitation (CBR) program in a Palestinian refugee camp in Jordan. The example of building a playground for children with disabilities, and other aspects of the social, political and cultural context in Jordan are described in relation to the theory and practice of CBR, occupational and social justice. Key concepts are explained, analyzed and applied, namely occupational justice, social justice, occupational form and occupational deprivation (a strong determinant of occupational injustice), all of which were relevant in the refugee camp where children with disabilities were deprived of resources and chances to play. Grounding CBR in an occupational justice framework offers justification and inspiration for occupational therapy in similar settings deprived of resources and opportunities wherein both individuals and communities could benefit. Occupational deprivation, such as that seen in refugee camps, is associated with poor mental health and physical frailty. CBR in refugee camps can lead to both occupational justice and social justice for persons with disabilities. Disability laws and legislation must be implemented, not just stated on paper, in order to address the rights of persons with disabilities and social justice.

  18. Post Implementation Review Framework and Procedures

    Data.gov (United States)

    Social Security Administration — This template outlines the Social Security Administration's (SSA) approach to initiating, conducting, and completing Post Implementation Reviews (PIRs). The template...

  19. Design and Implementation of Multi-grade Agent System Security Architecture%多级Agent系统安全体系设计与实现

    Institute of Scientific and Technical Information of China (English)

    李爱宁; 唐勇; 孙晓晖

    2012-01-01

    Aiming at the multi-grade characteristics and the security problems of the Agent system, a set of security mechanisms is designed. The security of Agent system is actualized by making communication rules, establishing an upper to lower mechanism and using encryption algorithm. By using Python language, this paper develops a Graphical User Interface(GUl) as the Agent platform, and the performance of the security mechanism is analyzed in theory and practice. Results show that the security mechanism can effectively ensure the security of Agent system.%针对多级Agent系统的特点和系统中存在的安全问题,通过制定通信规则、建立自上而下的认证体系、使用加/解密算法等安全技术,设计实现一个多级Agent系统的安全体系.使用由Python语言搭建的系统平台,对安全体系的安全性及时效性进行测试,结果证明了该安全体系的有效性.

  20. A Survey on Mobile Payment Systems Security

    Directory of Open Access Journals (Sweden)

    Leila Esmaeili

    2012-09-01

    Full Text Available In recent years, increasing use of mobile devices and the emergence of new technologies have changed mobile commerce and mobile payment in all over the world. Although many attempts have been made to implement secure mobile payment systems and services, growing forgery, fraud and other related electronic crimes as well as security attacks and threats prove the necessity of paying special attention to security issues for development and extension of such systems. In this paper, we investigate classification of security threats and attacks in mobile payment and discuss security issues in three related areas of mobile payment; including network security, transmission security and mobile device security. Network security includes WLAN and WWAN security; transmission security includes WAP, SMS, wave channel and USSD security; and mobile device security includes hardware and software platforms and operating system security.

  1. Integrated Justice: An Information Systems Approach to Justice Sector Case Management and Information Sharing

    Directory of Open Access Journals (Sweden)

    Adam Curtis Watson

    2017-07-01

    Full Text Available Automated Case Management Systems are still at an early stage of adoption in many developing countries. These are frequently standalone systems implemented with donor financing, and they often fail due to capacity constraints or as a consequence of short-term, project-based funding. But there are examples of developing countries overcoming these pitfalls and producing innovative solutions that surpass government practices in more developed countries. The Integrated Electronic Case Management System (IECMS, developed and implemented by the Ministry of Justice of Rwanda from 2015-2016, is one such innovation. This system has progressed rapidly in its level of adoption and integration between law enforcement, the prosecutor’s office, courts, and corrections. This paper will discuss the key system functionalities and the implementation methodology, including both the benefits and shortcomings of this approach, with the goal of applying lessons learned in future installations. Foremost among the successes of this project were the integrated Sector Wide Approach, the thorough business process re-engineering, and strong ownership by the Rwandan Justice Sector staff. Particularly instructive will be the analysis of the integrated approach, covering five institutions with a single system in less than two years. However, the particular success in this case may not be replicable for governments with a more decentralized approach.

  2. Environmental justice and healthy communities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    The environmental justice movement has come a long way since its birth a decade ago in rural and mostly African American Warren County, North Carolina. The selection of Warren County for a PCB landfill, they brought national attention to waste facility siting inequities and galvanized African American church and civil rights leaders` support for environmental justice. The demonstrations also put {open_quotes}environmental racism{close_quotes} on the map and challenged the myth that African Americans are not concerned about or involved in environmental issues. Grassroots groups, after decades of struggle, have grown to become the core of the multi-issue, multiracial, and multi-regional environmental justice movement. Diverse community-based groups have begun to organize and link their struggles to issues of civil and human rights, land rights and sovereignty, cultural survival , racial and social justice, and sustainable development. The impetus for getting environmental justice on the nations`s agenda has come from an alliance of grassroots activists, civil rights leaders, and a few academicians who questioned the foundation of the current environmental protection paradigm--where communities of color receive unequal protection. Whether urban ghettos and barrios, rural {open_quotes}poverty pockets,{close_quotes} Native American reservations, or communities in the Third World, grassroots groups are demanding an end to unjust and nonsustainable environmental and development policies.

  3. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  4. Social Justice and Adaptation in the UK

    Directory of Open Access Journals (Sweden)

    Magnus Benzie

    2014-03-01

    Full Text Available Adaptation strategies and policies are normally based on climate impact assessments that fail to take account of the social nature and distribution of vulnerability to climate change. This is largely a product of the dominant assessment techniques that are used to inform such strategies and the limits of existing evidence. In this paper I contribute to filling gaps in the current adaptation literature by exploring the social nature of vulnerability and the potential for socially just adaptation. It does so by reviewing studies from the UK, in particular those under the Joseph Rowntree Foundation's Climate Change and Social Justice programme. It finds that vulnerability to high temperatures and fluvial and coastal flooding, in terms of sensitivity, exposure, and the capacity to anticipate, respond, and recover, is concentrated in certain disadvantaged and socially marginalized groups, including those on low incomes. It also finds that both autonomous and planned adaptation may fail to protect the most vulnerable individuals and groups, and may even reinforce existing patterns of vulnerability in some cases, i.e., mal-adaptation, especially where they rely on unmediated market forces or where they fail to explicitly recognize aspects of social vulnerability in their design and implementation. I argue that social justice should be an explicit objective of adaptation strategy.

  5. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  6. justice and the voice of learners?

    African Journals Online (AJOL)

    bodies, learners' involvement in decision making and in curriculum issues, and .... participation is encouraged, freedom of expression and a sense of justice and ... Democratic theory and theories of social justice cannot be divorced from.

  7. Occupational justice-bridging theory and practice.

    Science.gov (United States)

    Nilsson, Ingeborg; Townsend, Elizabeth

    2010-01-01

    The evolving theory of occupational justice links the concept to social justice and to concerns for a justice of difference: a justice that recognizes occupational rights to inclusive participation in everyday occupations for all persons in society, regardless of age, ability, gender, social class, or other differences. The purpose of this descriptive paper is to inspire and empower health professionals to build a theoretical bridge to practice with an occupational justice lens. Using illustrations from a study of leisure and the use of everyday technology in the lives of very old people in Northern Sweden, the authors argue that an occupational justice lens may inspire and empower health professionals to engage in critical dialogue on occupational justice; use global thinking about occupation, health, justice, and the environment; and combine population and individualized approaches. The authors propose that taking these initiatives to bridge theory and practice will energize health professionals to enable inclusive participation in everyday occupations in diverse contexts.

  8. Organizational justice and health; review of evidence.

    Science.gov (United States)

    Elovainio, Marko; Heponiemi, Tarja; Sinervo, Timo; Magnavita, Nicola

    2010-01-01

    Organizational justice is a construct defining the quality of social interaction at work. Organizational justice can be divided into three categories: procedural justice (fairness of the decision-making procedures), distributive justice (fairness of outcomes) and relational justice (equity and fairness in the interpersonal treatment of employees by their supervisors). Organizational justice is related to employees' health and well-being. Low perceived justice has been shown to be associated with experienced stress reactions and related physiological and behavioral reactions, such as inflammation, sleeping problems, cardiovascular regulation and cognitive impairments, and with a high rate of work absenteeism. This paper is a review of the literature on organizational justice and its impact on workers' health.

  9. Transitional Justice, Culture and Society: Beyond Outreach

    Directory of Open Access Journals (Sweden)

    Elise Ketelaars

    2014-12-01

    Full Text Available This article reviews Transitional Justice, Culture and Society: Beyond Outreach, edited by Clara Ramírez-Barat, International Center for Transitional Justice, New York: Social Science Research Council, 2014 ISBN 978-0-911400-02-1

  10. Doing Justice Today: A Welcoming Embrace for LGBT Students in Christian Schools

    Science.gov (United States)

    Joldersma, Clarence W.

    2016-01-01

    The article argues for welcoming LGBT students in Christian schools. The article develops an idea of justice based on Nicholas Wolterstorff's idea of claim-rights of vulnerable groups that have been wronged, and applies this to the security and recognition of LGBT students in Christian schools. The article presents empirical evidence about the…

  11. Doing Justice Today: A Welcoming Embrace for LGBT Students in Christian Schools

    Science.gov (United States)

    Joldersma, Clarence W.

    2016-01-01

    The article argues for welcoming LGBT students in Christian schools. The article develops an idea of justice based on Nicholas Wolterstorff's idea of claim-rights of vulnerable groups that have been wronged, and applies this to the security and recognition of LGBT students in Christian schools. The article presents empirical evidence about the…

  12. Does Social Justice Ground Democracy in Education or Does Democracy Ground Social Justice?

    Science.gov (United States)

    Fraser-Burgess, Sheron

    2013-01-01

    The author examines one particular systematic and normative theorization of social justice in Barry Bull's "Social Justice in Education." Bull embarks on a timely and ambitious theory-to-practice project of grounding an educational theory of social justice in Rawls's seminal, liberal, distributive justice tome. The author…

  13. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  14. Design and Implementation of Android OS Security Enhancement Scheme%Android系统安全增强方案的设计与实现

    Institute of Scientific and Technical Information of China (English)

    丁汨; 于琳

    2015-01-01

    针对Android手机越来越多的安全威胁,该文介绍了一种基于远程服务控制Binder通信机制的安全增强方案,本方案中所有应用程序只能根据管理端安全策略规定运行,对于权限不允许的操作,Android安全增强模块将进行拦截,并将违规操作上报到管理后台,供管理员进行审核.最后实验证明,Android系统的安全性得到了明显提高.%With more and more security threats of Android mobile phone, this paper aims to introduce a security enhancement scheme based on remote service control ,Binder communication mechanism. The program can only run according to the security policy of the management. The illegal operations will be intercepted by Android security enhancement module, and will be re-ported to the management for auditing by administrators. The experimental results show that the security of Android system is improved obviously.

  15. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  16. The Lisbon Treaty and the Police and Justice Cooperation: Special Emphasis to the European Public Prosecutor's Office

    OpenAIRE

    Josifovic, Ivica

    2016-01-01

    Criminal law at the European Union level has traditionally been dealt through the concept of intergovernmental cooperation and gains its legal designation in the Maastricht Treaty, as part of the Justice and Home Affairs. The Amsterdam Treaty created the Area of Freedom, Security and Justice, but the Tampere Council and the Hague Programme took the notion of European criminal law through the process of mutual recognition. This paper is two-fold. First, the purpose of this paper is to prese...

  17. 基于Web的高校安全信息管理系统设计与实现%Design and Implementation on Web of University Security Information Management System

    Institute of Scientific and Technical Information of China (English)

    许镭; 许华

    2014-01-01

    Security and stability in relation to the stability of the entire university community,the current campus security management to ignore the existence of information management,information materials and information submitted is not standardized,information management tools behind many other issues.From the universities to facilitate the safe management perspective proposed structure and implementation of information security management system for colleges and universities based on the internet,in order to build institutions of higher learning and practical application of network security management systems make meaningful recommendations.%高校的安全和稳定关系到整个社会的稳定,当前的校园安全管理存在着忽视信息管理、信息材料及信息报送不规范、信息管理手段落后等诸多问题。本文从便于高校进行安全管理的角度提出了基于互联网的高校安全信息管理系统的结构和实现方法,以期为高等院校构建实用安全管理方面的网络应用系统提出有意义的建议。

  18. Editors' Introduction: Justice, Rights, Literature

    Directory of Open Access Journals (Sweden)

    Joxerramon Bengoetxea

    2014-12-01

    Full Text Available The articles gathered in this issue are the result of papers presented at the workshop held at the Oñati International Institute for the Sociology of Law on 20-21 May 2013 on Perspectives of Justice in Literature: Perspectives from Justice and Fundamental Rights in Literature: an Approach from Legal Culture in a European context. Literature and literary fiction can act as a thread that helps different disciplines to communicate with each other and can thus help go beyond the strictly legal field opening up to questions of justice and rights. These papers deal with issues of justice - mainly Fundamental Rights, but also procedural aspects of justice and its administration, philosophical perspectives of justice - and of legal culture - local, European, Universal - as reflected through and by literature. Los artículos que conforman este número son el resultado de las ponencias presentadas en el workshop celebrado en el Instituto Internacional de Sociología Jurídica de Oñati el 20 y 21 mayo de 2013 sobre las perspectivas de la justicia en la literatura: Perspectivas desde la Justicia y los Derechos Fundamentales en la Literatura: un Enfoque de Cultura Jurídica en el Contexto Europeo. La literatura y la ficción literaria pueden ser un hilo que favorece que diferentes disciplinas se comuniquen entre sí y pueden de esta forma ayudar a ir más allá del campo jurídico estricto, planteando cuestiones sobre justicia y derechos. Estos artículos tratan sobre aspectos de la justicia (principalmente derechos fundamentales, pero también sobre procedimiento judicial y administración de la justicia, perspectivas filosóficas de la justicia y de cultura jurídica (local, europea, universal, de la forma en la que se han reflejado en la literatura.DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=2543450

  19. Support for Afghanistan’s Justice Sector: State Department Programs Need Better Management and Stronger Oversight

    Science.gov (United States)

    2014-01-01

    component from the contractor that previously implemented the JSSP— PAE Incorporated ( PAE )—to IDLO. This audit assesses (1) INL’s management of...from PAE to IDLO affects INL’ s oversight of the program, and (3) State’s efforts to coordinate justice sector programs in Afghanistan across...management and oversight of the Justice Sector Support Program (JSSP) contract with PAE Incorporated ( PAE ) limited its ability to assess the

  20. Climate justice is not just ice

    OpenAIRE

    Forsyth, Tim

    2014-01-01

    Discussions about climate change and justice frequently employ dichotomies of procedural and distributive justice, and inter- and intra-generational justice. These distinctions, however, often fail to acknowledge the diverse experience of climate risks, or the contested nature of many proposed solutions. This paper argues for a reassessment of debates about climate justice based upon a greater diversity of risks and solutions such as integrating the reduction of social vulnerability simultane...

  1. Gendering agency in transitional justice

    DEFF Research Database (Denmark)

    Björkdahl, Annika; Selimovic, Johanna Mannergren

    2015-01-01

    . To address this lacuna we conceptualize and unpack the meaning of gendered agency, by identifying its critical elements and by locating it in space and in time. The conceptual work that we undertake is underpinned by empirical mapping of the transitional justice spaces in post-conflict Bosnia....... Such research enables us to engage with the subjects of post-conflict peacebuilding and transitional justice processes directly and in their own spaces. This article thus renders women’s agency visible and attempts to grasp its contributions and consequences for transformations from war to peace....

  2. Green justice in the city

    DEFF Research Database (Denmark)

    Rutt, Rebecca Leigh; Gulsrud, Natalie Marie

    2016-01-01

    tIn this short communication, we discuss European urban green space (UGS) research from an environ-mental justice perspective. We show that European UGS scholarship primarily focuses on functionalvalues and managerial aspects of UGS, while paying less attention to equity in the enjoyment...... of anddecision-making around UGS. On this basis we discuss potentials for European urban green space researchto take up a more explicit environmental justice framing to shed much-needed light on injustices inEuropean cities and inspire change in policy and practice....

  3. Exploration of the financing and management model of a children's critical disease security system in China based on the implementation of Shanghai Children Hospital Care Aid

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhi-ruo; WEN Zhao-jun; CHEN Sai-juan; CHEN Zhu

    2011-01-01

    This study is designed to serve as a reference for the establishment of health security systems for children's critical diseases. Through analysis of the operation of Shanghai Children Hospital Care Aid (SCHCA), this study explored the financing model and management of a children's critical disease healthcare system and analyzed the possibility of expanding this system to other areas. It is found that a premium as Iow as RMB 7 per capita per year under SCHCA can provide high-level security for children's critical diseases. With the good experience in Shanghai and based on the current basic medical insurance system for urban residents and the new rural cooperative medical scheme (NRCMS), it is necessary and feasible to build a health security system for children's critical diseases at the national level.

  4. Research of the Taxation Justice and the Social Responsibility

    Directory of Open Access Journals (Sweden)

    Ilona Skačkauskienė

    2016-06-01

    Full Text Available The article deals with the content of taxation justice, it’s value and compatibility with other principles of taxation, analyses the features of the Lithuanian tax system formation. The article ex¬amines the conception of social responsibility and it’s possibilities for assessment too. The research findings show that the principle of taxation justice is implemented only partially in Lithuania. The assessment of social responsibility through quantitative and qualitative indexes shows that some of its principles in Lithuania are being implemented more successful. However, it should be noted that significant amounts of funds for these initiatives and projects are received from the EU. It is very important to continue all the projects when funding from the EU runs out.

  5. Climate Change, Human Rights, and Social Justice.

    Science.gov (United States)

    Levy, Barry S; Patz, Jonathan A

    2015-01-01

    The environmental and health consequences of climate change, which disproportionately affect low-income countries and poor people in high-income countries, profoundly affect human rights and social justice. Environmental consequences include increased temperature, excess precipitation in some areas and droughts in others, extreme weather events, and increased sea level. These consequences adversely affect agricultural production, access to safe water, and worker productivity, and, by inundating land or making land uninhabitable and uncultivatable, will force many people to become environmental refugees. Adverse health effects caused by climate change include heat-related disorders, vector-borne diseases, foodborne and waterborne diseases, respiratory and allergic disorders, malnutrition, collective violence, and mental health problems. These environmental and health consequences threaten civil and political rights and economic, social, and cultural rights, including rights to life, access to safe food and water, health, security, shelter, and culture. On a national or local level, those people who are most vulnerable to the adverse environmental and health consequences of climate change include poor people, members of minority groups, women, children, older people, people with chronic diseases and disabilities, those residing in areas with a high prevalence of climate-related diseases, and workers exposed to extreme heat or increased weather variability. On a global level, there is much inequity, with low-income countries, which produce the least greenhouse gases (GHGs), being more adversely affected by climate change than high-income countries, which produce substantially higher amounts of GHGs yet are less immediately affected. In addition, low-income countries have far less capability to adapt to climate change than high-income countries. Adaptation and mitigation measures to address climate change needed to protect human society must also be planned to protect

  6. Teaching for social justice and social action.

    Science.gov (United States)

    Torres-Harding, Susan R; Meyers, Steven A

    2013-01-01

    Social justice education involves promoting critical awareness of social inequalities and developing skills that work against these inequalities. This article describes a general theoretical framework for social justice education, describes general strategies for facilitating students' social justice awareness and engagement, identifies challenges to social education, and highlights articles in the special issue that address these themes.

  7. Conceptualizing Social Justice: Interviews with Principals

    Science.gov (United States)

    Wang, Fei

    2015-01-01

    Purpose: Today, as the understanding of diversity is further expanded, the meaning of social justice becomes even more complicated, if not confusing. The purpose of this paper is to explore how school principals with social justice commitment understand and perceive social justice in their leadership practices. Design/methodology/approach: A…

  8. A Nonviolent Approach to Social Justice Education

    Science.gov (United States)

    Wang, Hongyu

    2013-01-01

    This article advocates a nonviolent approach to social justice education. First, social justice education literature is reviewed, and two contrasting and influential approaches--critical theory and poststructural theory--are the focus of critical analysis. A nonviolent approach is proposed as an alternative. Second, the notion of social justice is…

  9. Six Considerations for Social Justice Group Work

    Science.gov (United States)

    Singh, Anneliese A.; Salazar, Carmen F.

    2010-01-01

    This article describes "courageous conversations" in social justice group work and a continuum of action for social justice interventions. It analyzes themes from 20 contributions to 2 consecutive special issues of "The Journal for Specialists in Group Work" on social justice group work. Implications for future development in group leadership and…

  10. Common Frame of Reference and social justice

    NARCIS (Netherlands)

    Hesselink, M.W.; Satyanarayana, R.

    2009-01-01

    The article "Common Frame of Reference and Social Justice" by Martijn W. Hesselink evaluates the Draft Common Frame of Reference (DCFR) of social justice. It discusses the important areas, namely a common frame of Reference in a broad sense, social justice and contract law, private law and democracy

  11. Reforming Our Expectations about Juvenile Justice

    Science.gov (United States)

    Rodriguez, Pamela F.; Baille, Daphne M.

    2010-01-01

    Typing the term "juvenile justice reform" into a Google[TM] search will result in 60 pages of entries. But what is meant by juvenile justice reform? What does it look like? How will one know when it is achieved? This article defines juvenile justice reform, discusses the principles of effective reform, and describes the practice of juvenile…

  12. Washington State Juvenile Justice Code: An Experiment in Justice.

    Science.gov (United States)

    Illinois Univ., Champaign. Community Research Center.

    In the Washington State juvenile justice system, serious or repeat offenders receive the full panoply of due process rights and procedures, with the exception of jury trials; minor offenders are diverted to community boards that require community service or victim restitution; and status offenders are removed from the courts' jurisdiction and…

  13. Juvenile Justice Bulletin: Aftercare Services. Juvenile Justice Practices Series.

    Science.gov (United States)

    Gies, Steve V.

    This bulletin examines aftercare services that provide youth with comprehensive health, education, family, and vocational services upon their release from the juvenile justice system. Aftercare can be defined as reintegrative services that prepare out-of-home placed juveniles for reentry into the community by reestablishing the necessary…

  14. 国际私法的形式正义与实质正义探讨%On the Formal Justice and Substantive Justice of Private International Law

    Institute of Scientific and Technical Information of China (English)

    孙妍

    2016-01-01

    传统国际私法主要关注形式正义的内容,即在司法程序的执行过程中,有着一系列公平公正的运行程序与规则。而现代国际私法追求的价值取向为实质正义,即在司法制度与政策的执行过程中,必须实现终极状态的正义,必须完成内容与目的的正义追求。本文主要探讨国际私法的形式正义与实质正义,通过分析国际私法的价值取向、正义观,指出未来国际私法将会从形式正义转变为实质正义的发展方向。%Traditional private international law mainly focus on the content of the form justice,that is,in the process of the im-plementation of the judicial process,there are a series of fair and impartial operation procedures and rules.And the value ori-entation of modern private international law is real justice,that is,in the process of the implementation of the judicial system and policy,we must realize the justice of the final state.This paper mainly discusses the private international law of formal jus-tice and substantive justice,through the analysis of the value orientation of private international law,justice view,pointed out that the future private international law will be from the form justice change the direction for the development of substantive jus-tice.

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  17. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  18. Banking Software Applications Security

    Directory of Open Access Journals (Sweden)

    Ioan Alexandru Bubu

    2015-03-01

    Full Text Available Computer software products are among the most complex artifacts, if not the most complex artifacts mankind has created. Securing those artifacts against intelligent attackers who try to exploit flaws in software design and construct is a great challenge too.The purpose of this paper is to introduce a secure alternative to banking software applications that are currently in use. This new application aims to cover most of the well-known vulnerabilities that plague the majority of current software.First we will take a quick look at current security methods that are in use, and a few known vulnerabilities. After this, we will discuss the security measures implemented in my application, and finally, we will the results of implementing them.

  19. Summary of Executive Order 12898 - Federal Actions to Address Environmental Justice in Minority Populations and Low-Income Populations

    Science.gov (United States)

    Summarizes E.O. 12898, which focuses on the environmental and human health effects of federal actions on minority and low-income populations. It directs each agency to develop a strategy for implementing environmental justice.

  20. Framework for Flexible Security in Group Communications

    Science.gov (United States)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.