WorldWideScience

Sample records for non-path-dependent european securities

  1. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  2. European [Security] Union

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    The past 20 years, since the 1992 Treaty on European Union, have seen the gradual creation of both an “Area of Freedom, Security and Justice” and a “Common Foreign and Security Policy”. More recent is the development of a “European Neighbourhood Policy” over the past 10 years. All three...... of these policies involved the navigation and negotiation of security, borders and governance in and by the European Union (EU). This article analyses these practices of bordering and governance through a five-fold security framework. The article argues that a richer understanding of EU security discourses can...

  3. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  4. European Cyber Security Perspectives 2015

    NARCIS (Netherlands)

    Baloo, J.; Geveke, H.G.; Paulissen, W.; Vries, H. de

    2015-01-01

    Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of

  5. European security framework for healthcare.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pohjonen, Hanna

    2003-01-01

    eHealth and telemedicine services are promising business areas in Europe. It is clear that eHealth products and services will be sold and ordered from a distance and over national borderlines in the future. However, there are many barriers to overcome. For both national and pan-European eHealth and telemedicine applications a common security framework is needed. These frameworks set security requirements needed for cross-border eHealth services. The next step is to build a security infrastructure which is independent of technical platforms. Most of the European eHealth platforms are regional or territorial. Some countries are looking for a Public Key Infrastructure, but no large scale solutions do exist in healthcare. There is no clear candidate solution for European-wide interoperable eHealth platform. Gross-platform integration seems to be the most practical integration method at a European level in the short run. The use of Internet as a European integration platform is a promising solution in the long run.

  6. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  7. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  8. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  9. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  10. The Evolution of the European Security Policy

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2010-06-01

    Full Text Available The process of development of the European Union’s security dimension has known a spectacular evolution in the past years, passing from political consultation to establishing objectives, then commonactions and positions; at a practical level, the Petersburg measures, carried on initially by the Western European Union as an armed branch of the European Union, have been replaced by actions of implication ofthe Union in managing some conflicts. The Lisbon Treaty confirms the commitments of the member states and mentions the fact that the European Union will dispose of the necessary measures for the defense of its objectives and to contribute to world peace and stability.

  11. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  12. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    Vasconcelos , (Paris: The European Union Institute for Security Studies, 2009), 41. 60 Ibid. 61 European Union Home Page, “Common Security and...of ESDP,” in What Ambitions for European Defense in 2020?, 2nd ed., ed. Álvaro de Vasconcelos (Paris: The European Union Institute for Security

  13. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  14. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  15. The European Security and Defence Policy

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    2009-01-01

    The European Security and Defence Policy (ESDP), which is the operational military and civilian dimension of the Common Foreign and Security Policy (CFSP), is today one of the most dynamic areas of the European Union. However, it is only recently that the EU has acquired explicit military decision....... The Union is thus gradually emerging as an important player on the international scene, with a strategic vision, as well as diplomatic, civilian and military crisis-management instruments that complement the existing economic, commercial, humanitarian and development policies on which the EU has hitherto...... built its reputation as a ‘soft power'. Despite its rapid development, many still regard the EU as weak and ineffi cient when it comes to security and defence policy. Moreover, the EU struggles with internal divisions and has a strained relationship with NATO. Nonetheless, there are good reasons...

  16. Bourdieu, International Relations and European Security

    DEFF Research Database (Denmark)

    Berling, Trine Villumsen

    2012-01-01

    Despite promising attempts to apply the sociology of Pierre Bourdieu to International Relations (IR), the field could still profit from unexplored potential in his thinking for understanding pivotal theoretical and empirical puzzles. This article takes the failure to fully grasp the paradigmatic...... case of European security after the Cold War as an example of how IR would benefit from reformulating not only its empirical research questions but also several of its central conceptual building blocks with the aid of Bourdieusian sociology. The separation between theory and practice...... and the overemphasis on military power and state actors blind IR from seeing the power struggles that reshaped European security. Instead, a Bourdieusian reformulation adds new types of agency, focuses on the social production of forms of power, and stresses the processual rather than the substantive character...

  17. Why Europe needs a new European Security Strategy

    NARCIS (Netherlands)

    Drent, M.E.; Landman, Lennart

    2012-01-01

    Next year, the European Security Strategy: A Secure Europe in a Better World will be ten years old. Both the European Union and the world around it have changed in that time. In this Clingendael Policy Brief Margriet Drent and Lennart Landman argue that the European Union's foreign and security

  18. UNDER WHOSE UMBRELLA? THE EUROPEAN SECURITY ARCHITECTURE

    Directory of Open Access Journals (Sweden)

    Teodor Lucian Moga

    2010-12-01

    Full Text Available The tragic events which occurred during the ‘90s in the Balkans have reiterated the need for the European Union (EU to assume a much more assertive role in managing security concerns in Europe, including the development of European defence capabilities. In 1998, at Saint Malo, Tony Blair and Jacques Chirac launched the European Security and Defence Policy (ESDP. This project has been generated due to the EU’s need to adopt a strategic framework within which to develop a global defence and security component, as well as due to a growing necessity for the EU to contribute effectively to North Atlantic Treaty Organization (NATO and United Nations (UN efforts of conducting defence, international crisis management and peacekeeping operations at an international level in conflict-prone areas. In recent years, ESDP has undergone a spectacular evolution, being now among the major issues discussed in Brussels. However, the creation of the ESDP has been greeted with caution by some NATO members being perceived primarily as a threat to the integrity of the North Atlantic Treaty Organization. The purpose of this paper is to examine the difficulties the ESDP has encountered since its inception and also to what extent it has affected the EU-NATO and the EU-US nexus.

  19. Revisiting the soft security debate: From European progress to ...

    African Journals Online (AJOL)

    Given the extended scope of security sectors falling within the ambit of soft security regional co-operation is indispensable – a phenomenon most visible in European security architecture and that of Northern Europe in particular. Not only European decision-makers, however, pursue the soft security option. As Africa entered ...

  20. European security and defense policy and its implications for Turkey

    OpenAIRE

    Özköse, Ö Faruk

    2002-01-01

    Cataloged from PDF version of article. The “European Security and Defense Policy” is an evolving process. Since the Maastricht Treaty (1991), the European Union members have been trying to constitute a common security and defense policy within the framework of Common Foreign and Security Policy, second pillar of the European Union. The efforts to create “separable but not separate” European forces within NATO have increased speed in the last years and changed direction towar...

  1. European Uunion Energy Security and Russia

    Directory of Open Access Journals (Sweden)

    Nodari A. Simonia

    2015-01-01

    Full Text Available The article deals with the retrospective of relations between Russia, USA and EU in the sphere of energy security, as well as their interaction regarding the current political crisis in the Ukraine. Particular attention is paid to the evolution of the key actors'positions and the development of their relations within the framework of the regulatory regimes established by the most significant agreements in the energy sphere. In conclusion the authors claim that what they say in their article not only does substantially reinforce the arguments set forth by Professor Giuseppe Guarino, who argues about the negative consequences caused by the dictatorship of the Brussels's bureaucracy within the EU, but also inflicts another blow on the Maastricht Treaty and the Treaty of Lisbon in terms of external policy and trade, since the both Treaties were designed to convert the EU in a real competitor of the United States in the then forming multipolar World. The Brussel's bureaucracy, having turned into a dutiful instrument of the US geopolitical strategy, hindered the movement of the EU in that direction, while its dictatorship in energy security aggravates the crisis situation of the EU, almost pushing the EU to the brink of collapse and disintegration. We have lately witnessed an evolving and growing phenomenon of the so called "Euroscepticism". The results of the Europarliament elections in late May, 2014, were a graphic demonstration of the symptoms of this alarming for the EU disease, when the anti-EU parties in the four out 22 EU countries won the elections (France, United Kingdom, Denmark, and Greece Those results, regardless of the panic headlines in mass media and statements like "shocking" or "earthquake" made by some politicians, were not able to significantly affect the nature of the European Parliament, though they can significantly complicate its work. This is so far the first "alarming bell" tolling for the EU.

  2. Changing principles in European social security

    NARCIS (Netherlands)

    van Oorschot, W.J.H.; Clasen, J.J.

    2002-01-01

    The provision of social security benefits rests on normative principles of social justice. Most strongly manifest in earnings-related social insurance, the principle of reciprocity has been increasingly questioned on grounds of equity, adequacy and fiscal viability, in the wake of socio-economic

  3. SECURITY STRATEGIES OF MEMBER STATES OF THE EUROPEAN UNION FROM THE LISBON TREATY AND THE EUROPEAN SECURITY STRATEGY

    Directory of Open Access Journals (Sweden)

    PABLO RIVAS PARDO

    2017-09-01

    in mind, it is possible to study the variability of the Security Strategy in relation to four strategic guidelines: strategic self-perception, the necessity to tune these postulates with the common objectives of the European Union, the statement of threats and finally the actions projected by these strategies to face the changing environment of international security. This variability will seek the fact of the existence or nonexistence of tuning and consistency between the Security Strategies and the community positions in the matter of security and defense. The selected countries are those who have published their documents after the signing of the Treaty of Lisbon and the publication of the European Security Strategy, in other words, after2009: Austria, Bulgaria, Slovenia, Spain, Estonia, Holland, Hungary, Lithuania, UK and the Czech Republic.

  4. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  5. Elements of Social Security in 6 European Countries

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security in 6 European Countries contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain and the Nether-lands. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact...

  6. Web Interface Security Vulnerabilities of European Academic Repositories

    Directory of Open Access Journals (Sweden)

    Matus Formanek

    2017-02-01

    Full Text Available The given analysis summarizes the status quo of the level of security of web interfaces of selected European academic repositories in the field of library and information science. It focuses on the presence and qualities of the secure HTTPS protocol via SSL/TLS protocols. The security of the transmitted data is particularly important in the network environment of the Internet, especially if log-in user data is transmitted. Disclosure may have a direct impact on saved digital objects and their metadata which together represent the most valuable parts of systems of digital libraries and repositories. Furthermore, the paper points to the most noticeable vulnerabilities of protocols of web interfaces and presents practical recommendations for the expert public. These may contribute to the increase of the level of security of the discussed systems. The authors base their proposals on the currently available scientific publications and scientific articles about the given topic.

  7. European Climate - Energy Security Nexus. A model based scenario analysis

    International Nuclear Information System (INIS)

    Criqui, Patrick; Mima, Silvana

    2011-01-01

    In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)

  8. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  9. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  10. A changing European Security and defense architecture and its impact on Turkey

    OpenAIRE

    Yikilkan, Orhan.

    2001-01-01

    Since the 1991 Maastricht Treaty, the European Union countries have been trying to form a common security and defense identity as one facet of the European Union unification process. The efforts to create "separable but not separate" European forces within NATO have accelerated in the last three years and changed direction toward creating an autonomous "European Security and Defense Policy (ESDP)" within the framework of the EU. This policy concerns some non-EU European NATO allies, such as T...

  11. Energy security and European Union. Proposals for the French presidency

    International Nuclear Information System (INIS)

    Mandil, C.

    2008-04-01

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  12. European Security Organizations in the Post-Cold-War Security Environment. The New Frame of European Security

    National Research Council Canada - National Science Library

    Bugai, Veaceslav

    2006-01-01

    .... In particular, it gives an over view of the transformations that occurred within NATO and OSCE in the post-Cold War period, which have created and developed new security mechanisms and policies for dealing with crises...

  13. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  14. THE FOREIGN AND SECURITY POLICIES OF THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Anand Menon

    2003-09-01

    Full Text Available In only a decade the European Union has moved from being a new kid on the block in terms of foreign and security policies to being a high profile and surprisingly effective international actor. Certainly, it has failed to match the ambitions of some of its most enthusiastic proponents. Certainly, too, European publics know next to nothing about what the Union does in the international realm. It is because of this that, despite their potential and their effectiveness to date, EU policies in this sphere were widely derided as failures following the moment when the attacks of 11 September 2001 shook the western world to its core. The Convention on the Future of Europe and subsequent intergovernmental conference look set to make significant institutional changes to the Union’s foreign and security policy systems. In undertaking these reforms, Convention members, and national governments are doubtless motivated by the laudable objective of enabling the Union to do more on the international stage. One can only hope that these motives notwithstanding, they do not simply propose reforms for their own sake and, in the process, undermine a system that, to the surprise of many, has continued to function respectably in an ever more complex and ever more dangerous world.

  15. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  16. Importance of security and socialization in europeans life

    Directory of Open Access Journals (Sweden)

    Diana Elena Şerb

    2017-01-01

    Full Text Available The purpose of this research is to examine the importance of safety and socialization in the lives of individuals. The influence of agents of socialization (school, family, friends are manifested as differences in preferences, feelings and thoughts of people. The article is structured in two parts. The first part presents the knowledge in the field, but in the context of Maslow's hierarchy of needs. In the second part is carried out an research among Europeans about some aspect of their lives: how they spend their free time, the feeling of attachment to the community, a sense of security and availability to communicate personal matters to their group of friends. The research method was investigating the secondary sources (database obtained from the survey from a site specializing in the analysis of living conditions of Europeans - European Social Survey. After the reception and processing of results in Excel and SPSS we obtained a general conclusion that people need to socialize, to be part of a group and feel safe.

  17. Security of energy supply: Comparing scenarios from a European perspective

    International Nuclear Information System (INIS)

    Costantini, V.; Markandya, A.; Vicini, G.

    2007-01-01

    This policy compares different results from a set of energy scenarios produced by international energy experts, in order to analyse projections on increasing European external energy dependence and vulnerability. Comparison among different scenarios constitutes the basis of a critical review of existing energy security policies, suggesting alternative or complementary future actions. According to the analysis, the main risks and negative impacts in the long term could be the increasing risk of collusion among exporters due to growing dependence of industrialized countries and insufficient diversification; and a risk of demand/supply imbalance, with consequent instability for exporting regions due to insufficient demand, and lack of infrastructures due to insufficient supply. Cooperation with exporting countries enhancing investments in production capacity, and with developing countries in order to reinforce negotiation capacity of energy-importing countries seem to be the most effective policies at international level. (author)

  18. Security of energy supply: Comparing scenarios from a European perspective

    International Nuclear Information System (INIS)

    Costantini, Valeria; Gracceva, Francesco; Markandya, Anil; Vicini, Giorgio

    2007-01-01

    This paper compares different results from a set of energy scenarios produced by international energy experts, in order to analyse projections on increasing European external energy dependence and vulnerability. Comparison among different scenarios constitutes the basis of a critical review of existing energy security policies, suggesting alternative or complementary future actions. According to the analysis, the main risks and negative impacts in the long term could be the increasing risk of collusion among exporters due to growing dependence of industrialized countries and insufficient diversification; and a risk of demand/supply imbalance, with consequent instability for exporting regions due to insufficient demand, and lack of infrastructures due to insufficient supply. Cooperation with exporting countries enhancing investments in production capacity, and with developing countries in order to reinforce negotiation capacity of energy-importing countries seem to be the most effective policies at international level

  19. European Gas Market Liberalisation. Competition versus security of supply?

    International Nuclear Information System (INIS)

    Haase, N.

    2009-01-01

    The problem statement encompasses two basic questions: (1) Which variables determine regulatory regimes and economic performance in European gas markets?; and (2) Can we empirically determine the effect of regulation-for-competition, as applied in the European Union, on the economic performance in the European gas markets? In the first part (chapters 1-5), the theoretical groundwork is laid out and conceptual clarifications are provided. In chapter 2, the main concepts such as governance and regulation, and their interrelations, are determined and the public regulation approach to be followed is outlined. The third chapter discusses our theoretical framework and the support required from other New Institutional approaches to deduce expectations regarding the convergence of regulatory regimes and its effect on economic performance. The fourth chapter contributes to answering our first research question by displaying the relevant variables and outlining how these can be operationalised. Based on the concepts of regulatory comprehensiveness and policy convergence, in chapter 5, a methodology is developed to measure best-practice in terms of regulation-for-competition. The second part (chapters 6-9) covers the first empirical analysis which is quantitative in design and emphasises effects originating at the Community level. Chapter 6 summarises the evolution of European gas policy at the Community level and searches for major changes in general or energy policy objectives and examines their prioritisation. Chapter 7 addresses the formal institutions on the second layer of the fourlayer model. Chapter 8 analyses converging and diverging trends within regulatory regimes in European gas markets. Chapter 9 sets out to assess the extent to which regulation-for-competition, as prescribed by the European provisions, can be empirically studied for its effect on economic performance in the European gas sector. To answer our second main research question, we discuss the effects

  20. The European Union as a Security Actor: Moving Beyond the Second Pillar

    Directory of Open Access Journals (Sweden)

    Kamil Zwolski

    2009-04-01

    Full Text Available It is suggested in this article that there is a discrepancy between, on the one hand, literature that focuses on the European Union (EU as a security actor and, on the other, contemporary security studies literature. This difference concerns the fact that the literature on the EU as a security actor treats security in a narrower sense than how it is approached in the literature on security studies. Over the past few decades, security studies literature has begun to fully acknowledge that the concept of security has broadened beyond traditional ‘hard’ security concerns and can encompass many different issues, for example the security implications of climate change. However, the literature on the EU as a security actor very often associates security only with the second pillar of the EU’s organisational structure; in particular the intergovernmental cooperation embodied by the Common Foreign and Security Policy (CFSP and the European Security and Defence Policy (ESDP. The main purpose of this article is to utilise the broader security studies approach to security as a means to expand the understanding of security in the context of the EU’s performance on the international stage. This is important because it allows the Union’s �����actorness’ in the field of security to be examined in a more holistic manner.

  1. Latvia in the System of European Territorial Security: a View from the Inside and Outside

    Directory of Open Access Journals (Sweden)

    Lanko Dmitry

    2015-03-01

    Full Text Available This article focuses on Latvian contribution to European security, which, for the purposes of this study, is understood as a territorial system of regional security. Such system is a combination of interconnected institutions with Latvian participation operating in the field of security, Latvian cooperation with other European countries in the field of security, and the European perception of major security challenges and threats (that Latvia may or may not agree with. A systemic approach to studying the role of Latvia in the territorial system of European security requires a solid theoretical framework. The theories of international relations discussed in this article fall into two categories: those where territorial security systems are viewed as a product of external factors, and those that focus on internal regional factors. In this article, the authors rely on a variety of methods, including those that are characteristic of classical theories of international relations (such as realism and liberalism, and those employed in social constructivism studies. It is concluded that Latvian cooperation with institutions and countries of the territorial system of European security is rather limited, which indicates either a lack of the country’s integration into the system or a crisis of the system itself. An important result of the study is the validation of a systemic approach to studying regional security systems. This angle proves particularly useful in identifying crises of territorial systems of regional security in various regions of the world.

  2. Securing Quality in Journalism on a European Scale. An Infrastructure Analysis.

    OpenAIRE

    Anger, Heike

    2010-01-01

    The study at hand shows that in the course of European integration not only politics have been transnationalised and Europeanised but also the infrastructures securing quality in journalism. Infrastructures in journalism can be defined as those institutions and initiatives whose activities are shaping journalism regarding its quality without directly being a part of the media production: European journalism training, European media industry and trade associations and European associations of ...

  3. The Future of the European Security and Defence Policy

    National Research Council Canada - National Science Library

    Alt, Josef

    2006-01-01

    ...) at the European Union's (EU's) Helsinki summit in December 1999. They created the ESDP to allow the European Union to play a more comprehensive role in civilian and military international crisis management backed by credible military power...

  4. revisiting the soft security debate: from european progress to african ...

    African Journals Online (AJOL)

    Administrator

    implicit realisation of the importance of soft security threats increasingly ..... security is strong and quite advanced, but as surmised by Pratl (2001:34) hard .... inherently contains difficulties, its utility is eroded and disputed by the persistent.

  5. ENERGY IN THE CONTEXT OF THE PRESENT CHALLENGES TO THE EUROPEAN COMMON SECURITY AND DEFENCE POLICY

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2014-10-01

    Full Text Available The Common Security and Defence Policy is a part of the European Union’s Common Foreign and Security Policy (CFSP and establishes the policy framework for the institutional structures and military instruments which have to deal with the security challenges in Europe’s geopolitical neighborhood. The article aims to identify and analyze the role of energy as one of the present challenges to the European Common Security and Defence Policy in the context of the recent events in the world economy.

  6. Crossing borders: Security and privacy issues of the European e-passport

    NARCIS (Netherlands)

    Hoepman, J.H.; Hubbers, E.; Jacobs, B.P.F.; Oostdijk, M.D.; Wichers Schreur, R.

    2008-01-01

    The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of

  7. Presidential elections in the United States: implications for international and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-10-01

    In conclusion it should be noted that the full implementation of D. Trump’s plans for international and European security will depend on how the declared initiatives will correspond to his real actions. Perhaps this would require more than a year, but now the world and the European community must be ready for serious structural and geopolitical changes. The presence of a number of acute problems makes the role of the United States in the process of ensuring international and European security hardly predictable.

  8. Continuation or Equilibration: The Algerian Conflict and European Security

    National Research Council Canada - National Science Library

    Lynch, Michael

    1997-01-01

    .... Algeria's conflict has ramifications that travel far beyond its borders. Europe states rely upon Algerian natural gas for their energy needs, and are fearful of the impact of Islamic revivalism on their security situations...

  9. The Europeanization of Welfare - The Domestic Impact of Intra-European Social Security

    DEFF Research Database (Denmark)

    Martinsen, Dorte Sindbjerg

    2005-01-01

    Studies of Europeanization have demonstrated that the impact of European integration differs between Member States and across policies. Although Europeanization research has been expanded and clarified in recent years, we still know relatively little about the factors mediating the national...... responses to integration. It is argued that these intervening variables are decisive for how common European demands are mediated nationally and are likely to explain impact variations referring to the same cause....

  10. Liberalisation and energy security in the European Union. Success and questions

    International Nuclear Information System (INIS)

    Clastres, Cedric; Locatelli, Catherine

    2012-09-01

    The energy environment of the European Union as well as its own internal situation have undergone profound changes. The energy security of member states is therefore an important issue that should be examined. This security concerns gas and electricity markets, with infrastructures, long-term contracts, lack of investment and with the increasing use of natural gas to generate electricity. Energy market players have to manage security concerns in these two markets in order to supply socially and economically essential commodities. In this article, we examine two main topics. The first is related to the European Union's capacity to solve the problem of security of supply by finding internal solutions. The second concerns external security of supply. With the upstream structure of the gas market, a problem of investing in trans-national gas pipelines exists, besides relations with gas suppliers outside the EU. (authors)

  11. Energy supply security and geopolitics: A European perspective

    International Nuclear Information System (INIS)

    Correlje, Aad; Linde, Coby van der

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets. Regions and Empires involves a world broken up in rival political and economic blocks, competing for resources and markets via political, economic and military power. It is shown that these storylines have a significant impact on the development of the energy market, on the way in which energy supply may be secured and on the effect and applicability of the several types of instruments available. The current EU is geared towards enlargement and a deepening of economic integration, based on the tenets of the post-1945 multilateral world system. The present world tends towards Regions and Empires and suggests that the EU may have to reorient its energy security policy. Energy policy must become an integral part of EU external trade and foreign relations and security policy. The EU should develop its own strategy, actively investing in dialogues with producer countries in the Persian Gulf and Africa and with Russia. Sustainable prosperity and governance in these regions will support EU energy security

  12. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  13. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and

  14. European Security in the Balkans: The Case of Macedonia

    Science.gov (United States)

    2013-03-01

    their predecessors, the Turks.22 From the religious point of view, after the creation of the Federation of Serbs, Croats and Slovenians in 1918 , the...during the NATO summit in Bucharest, Romania , the Republic of Macedonia did not receive a deserved invitation to NATO membership due to the Republic of...integration of Bulgaria and Romania in the European Union was based on the short term political interests of the EU - to create a safe ring toward

  15. The Value of a European Security and Defense Policy

    Science.gov (United States)

    2007-05-08

    relations has lately dominated US foreign policy. Subsequently some normative and meta- ethical conceptual conclusions will be drawn upon to show how US...relations has lately dominated US foreign policy by analyzing recent 3 policy decisions. After this analysis, some normative meta ethical conclusions...old patterns or as Kagan writes: “Europeans have stepped out of the Hobbesian world of anarchy into the Kantian world of perpetual peace.”13 The fact

  16. Human rights or security? Positions on asylum in European Parliament speeches

    DEFF Research Database (Denmark)

    Frid-Nielsen, Snorre Sylvester

    2018-01-01

    parties’ general ‘right-left’ preferences, and duration of EU membership. Generally, MEPs from Central and Eastern Europe and the European People's Party take up pro-security stances. Wordfish was effective and valid, confirming the relevance of automated content analysis for studying the EU.......-2014, scaling MEPs along a unidimensional policy space. Debates on asylum predominantly concern positions for or against European Union (EU) security measures. Surprisingly, national party preferences for EU integration were not the dominant factor. The strongest predictors of MEPs' positions are their national...

  17. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  18. MIGRATION PROCESSES "EAST-WEST" IN THE CONTEXT OF THE EUROPEAN SYSTEM OF ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    S. V. Ryazantsev

    2016-01-01

    Full Text Available The article refl ects the infl uence of the migration processes to the economic security of European Union. The article underlines most common economical risks in case if there is an increase of the volume of migration and describes the ways how to reduce those risks.The main conclusions obtained from the results of the study, can be structured as follows: trends and consequences of the migration crisis in the European Union are defi ned by the set of reasons that are due on the one hand the policy of transparency being implemented by individual countries, making the whole European Union is the center of attraction of immigrants (primarily from the MENA countries and other hand, the intense and growing fl ow of migrants creates regional threats, including the European Union's economic security; the problem of ensuring the economic security of the European Union in the context of the impact of the migration crisis is most actual issue at the moment and the main reason is that the accumulation of the fl ow of migrants to the strongest European economy – Germany. In this case, not only Germany, but also France (and until recently UK had to improve the economic and social consequences of migration and also to implement measures aimed to recover from fi nancial crisis of the last few years, the consequences of which to date are shown in the many social and economic areas of the European Union; addressing the problem with migration crisis in the European Union seems to use a special system of measures, in which on the one hand realized containment of migration fl ows and on the other hand held solutions aimed at the assimilation of migrants in multicultural environment with full adoption of the latest socio-economic, democratic and moral values specifi c to European societies.

  19. European Court of Justice Secures Fundamental Rights from UN Security Council Resolutions

    Directory of Open Access Journals (Sweden)

    Sebastian Recker

    2009-02-01

    /msohtml1/01/clip_header.htm" fcs; mso-endnote-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" es; mso-endnote-continuation-separator:url("file:///C:/DOKUME~1/mlippold/LOKALE~1/Temp/msohtml1/01/clip_header.htm" ecs;} @page Section1 {size:612.0pt 792.0pt; margin:70.85pt 70.85pt 2.0cm 70.85pt; mso-header-margin:36.0pt; mso-footer-margin:36.0pt; mso-paper-source:0;} div.Section1 {page:Section1;} -->

    The European Court of Justice has annulled Council Regulation (EC No 881/2002[1] freezing funds of Mr. Kadi and Al Barakaat based on Resolution 1267 (1999[2] of the United Nations Security Council[3]. In so doing, the European Court of Justice has set aside the Court of First Instance’s judgment

  20. Interest Groups and Strategic Constructivism: Business Actors and Border Security Policies in the European Union

    NARCIS (Netherlands)

    Baird, T.E.

    Evidence suggests that business lobbying shapes European Union (EU) border security policies, but there has been no detailed empirical and theoretical work detailing how interest groups exert influence in this domain. Building on strategic constructivist accounts of policy-making, the article argues

  1. Looking beyond credit ratings : Factors investors consider In pricing European asset-backed securities

    NARCIS (Netherlands)

    Fabozzi, F.; Vink, D.

    2012-01-01

    In this paper, we empirically investigate what credit factors investors rely upon when pricing the spread at issue for European asset-backed securities. More specifically, we investigate how credit factors affect new issuance spreads after taking into account credit rating. We do so by investigating

  2. European energy security: The future of Norwegian natural gas production

    International Nuclear Information System (INIS)

    Soederbergh, Bengt; Jakobsson, Kristofer; Aleklett, Kjell

    2009-01-01

    The European Union (EU) is expected to meet its future growing demand for natural gas by increased imports. In 2006, Norway had a 21% share of EU gas imports. The Norwegian government has communicated that Norwegian gas production will increase by 25-40% from today's level of about 99 billion cubic meters (bcm)/year. This article shows that only a 20-25% growth of Norwegian gas production is possible due to production from currently existing recoverable reserves and contingent resources. A high and a low production forecast for Norwegian gas production is presented. Norwegian gas production exported by pipeline peaks between 2015 and 2016, with minimum peak production in 2015 at 118 bcm/year and maximum peak production at 127 bcm/year in 2016. By 2030 the pipeline export levels are 94-78 bcm. Total Norwegian gas production peaks between 2015 and 2020, with peak production at 124-135 bcm/year. By 2030 the production is 96-115 bcm/year. The results show that there is a limited potential for increased gas exports from Norway to the EU and that Norwegian gas production is declining by 2030 in all scenarios. Annual Norwegian pipeline gas exports to the EU, by 2030, may even be 20 bcm lower than today's level.

  3. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  4. Nuclear energy and the Green Paper of the European Commission 'An European strategy for sustainable, competitive and secure energy'

    International Nuclear Information System (INIS)

    Metes, Mircea

    2006-01-01

    At present the energy is for European Union officials an issue of top priority. In the beginning of 2006 the natural gas crisis between Russia and Ukraine remembered menacingly to the Europeans that energy supply of the continent depends decisively on importation from other geographic areas and that these importation raise risks of a great variety. In addition to the power problems, disastrous effects on the economy, human life and eco-systems appeared to have the climate changes produced by fossil fuel burning. Consequently, a common energetic policy of Europe should be targeted at three main objectives: sustainability, competitiveness and security of supply. Six directions of action were identified: 1. EU must finalize the construction of internal European gas and electricity market; 2. EU should ensure that its energy market guaranties the security of supply under a solidary policy of the member states; 3. It is necessary that a large debate to have place about different sources of energy including the problems of costs and impact on climatic change, security and supply competitiveness and sustainability; 4. EU should approach the climatic change issues in agreement with the objectives established at Lisbon conference aiming at placing EU in the forefront of technological and scientific progress; 5. A strategic plan concerning the energy technology; 6. A common foreign policy in the field of energy. It is worthy to stress that the present Green Paper of EU has a manifestly different position concerning the nuclear energy with respect to the prior Green Paper of November 2000. While, in 2000 the EU Commission viewed the nuclear energy as being 'in limbo', in the 2006 version the Commission declared the nuclear energy as the most important source of power in Europe without CO 2 emissions. It is stated that all the energy options should be kept open while the Europe states have the right to establish their own energy mix, which they consider optimal, and in which

  5. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  6. European energy security analysing the EU-Russia energy security regime in terms of interdependence theory

    CERN Document Server

    Esakova, Nataliya

    2012-01-01

    Nataliya Esakova performs an analysis of the interdependencies and the nature of cooperation between energy producing, consuming and transit countries focusing on the gas sector. For the analysis the theoretical framework of the interdependence theory by Robert O. Keohane and Joseph S. Nye and the international regime theory are applied to the recent developments within the gas relationship between the European Union and Russia in the last decade. The objective of the analysis is to determine, whether a fundamental regime change in terms of international regime theory is taking place, and, if so, which regime change explanation model in terms of interdependence theory is likely to apply.

  7. European energy security. Analysing the EU-Russia energy security regime in terms of interdependence theory

    Energy Technology Data Exchange (ETDEWEB)

    Esakova, Nataliya

    2012-07-01

    Nataliya Esakova performs an analysis of the interdependencies and the nature of cooperation between energy producing, consuming and transit countries focusing on the gas sector. For the analysis the theoretical framework of the interdependence theory by Robert O. Keohane and Joseph S. Nye and the international regime theory are applied to the recent developments within the gas relationship between the European Union and Russia in the last decade. The objective of the analysis is to determine, whether a fundamental regime change in terms of international regime theory is taking place, and, if so, which regime change explanation model in terms of interdependence theory is likely to apply. (orig.)

  8. Tracing the Interface Between Numerical Flexibility and Income Security for European Youth during the Economic Crisis

    DEFF Research Database (Denmark)

    Leschke, Janine; Finn, Mairéad

    benefit schemes. This paper adopts a comparative European approach in order to shed light on the interaction between flexibility and income security, for youth. Special extracts of the aggregate European Labour Force Survey data are used to trace the development of (involuntary) temporary employment among...... duration than adults. In a majority of EU countries youth are also disadvantaged with regard to unemployment benefits. Eligibility criteria require a certain minimum period in employment before unemployment insurance benefits can be accessed; and means-testing applies to unemployment and social assistance...... underexplored. This allows us to assess if developments during the economic crisis have improved or rather deteriorated the situation of youth with regard to different dimension of flexibility and security....

  9. Secure E-Business applications based on the European Citizen Card

    Science.gov (United States)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  10. Security Economics in the European Context: Implications of the EUSECON Project

    OpenAIRE

    Michael Brzoska; Raphael Bossong; Eric van Um

    2011-01-01

    This paper presents key aspects and policy implications of a multi-annual research project on economic analyses of European security issues (EUSECON), with an emphasis on intentional threats of organised crime, piracy and terrorism. The first part argues that rational models can provide significant insights on the emergence and current patterns of terrorism and piracy. These findings could lead to new priorities or to more nuanced interventions in response to these threats. The second part fo...

  11. Britain, France and Germany: Priorities for the European Union’s Security and Defense Policy

    Science.gov (United States)

    2009-12-01

    David M. Triesman, “A Strong, Competitive Europe is Vital” ( Mansion House, London, 9 January 2007), Denis MacShane, “Enlarging the EU: Peace and...Europe” ( Humboldt University, Berlin, 16 May 2006), http://www.fco.gov.uk/en/newsroom/latest-news/?view=Speech&id=1893537 (accessed 18 April 2009... Humboldt University, Berlin, 16 May 2006. Howorth, Jolyon. Security and Defence Policy in the European Union. New York: Palgrave Macmillan, 2007

  12. HOW RESILIENT IS THE EUROPEAN SOCIAL MODEL? FLEXIBILITY OR/AND SECURITY?

    Directory of Open Access Journals (Sweden)

    Georgeta GHEBREA

    2017-12-01

    Full Text Available Our paper aims to assess the resilience of the European social model (ESM against recent challenges. Resilience depends on effectively managing the contradictions of the ESM. Flexicurity is an example of managing contradictions between security and flexibility. The contribution of flexicurity to the resilience of the ESM is determined by the development of the abilities necessary for resilience. Our research evaluates the performance of these abilities using statistical and document analyses. The results show that flexicurity policies perform satisfactorily relative to their resilience abilities. Still, the ability to respond is less effective due to significant differences among the Member States (regarding the implementation of flexicurity policies and to insufficient openness and functionality of the European labour market. Nevertheless, the European flexicurity policies redefine the ESM by adding a touch of a more mobile, autonomous and free-spirited approach, thus representing a solution to both preserve valuable tradition and modernise the ESM.

  13. Successes and Shortfalls of European Union Common Security and Defence Policy Missions in Africa

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Nervanto, Elisa

    This brief synthesises the IECEU project’s most essential findings on the effectiveness of European Union (EU) missions in four Africa countries: Libya, South Sudan, the Democratic Republic of the Congo (DRC) and the Central African Republic (CAR). It describes the main elements and impact...... and context. However, the EU missions presented in this brief share the main characteristic that they have all been deployed under the union’s Common Security and Defence Policy (CSDP)2 with the explicit intent of improving the overall security situation and addressing conflicts in Africa. This brief...... will start by providing a short overview of each case, describing the conflict(s), security situation, mission objectives and obstacles. In this way, it compares the overall effectiveness of EU operational conflict prevention across the four African countries and discusses what lessons can be learned from...

  14. The Migration Crisis from the East-Central European Perspective: Challenges for Regional Security

    Directory of Open Access Journals (Sweden)

    Renata Podgórzańska

    2017-12-01

    Full Text Available Nowadays, the common denominator of involvement of the EastCentral Europe in the international arena, and above all, the premise determining community of interest expressed in the European Union is the migration crisis. Despite the different circumstances of activity in the context of the migration crisis, states in the region express similar opinions on the consequences of immigration for security in the region. Above all, they emphasise the implications of immigration for the internal security of states. Given the complex nature of migration, this article focuses on the phenomenon of immigration in the EU, determining the causes of the escalation of the influx of immigrants and, above all, identifying the consequences for the security of states of East-Central Europe.

  15. Methodological Bases for Ranking the European Union Countries in Terms of Macroeconomic Security

    Directory of Open Access Journals (Sweden)

    Tymoshenko Olena V.

    2015-11-01

    Full Text Available The fundamental contradictions of existing methodical approaches to assessing the level of the state economic security have been substantiated and proposals on the introduction of a unified methodology for its assessment, which would be acceptable for use at the international level or for a specific cluster of countries, have been developed. Based on the conducted researches it has been found that the there are no unified signs for such classification of countries. To determine the most significant coefficients and critical values of the indicators of economic security, it is appropriate that the countries should be grouped in terms of the level of the economic development proposed by the UN Commission and the IMF. Analysis of the economic security level has been conducted for the countries-members of the European Union as a separate cluster of countries on the example of macroeconomic security indicators. Based on the evaluation it has been found that the proposed list of indicators and their critical values is economically sound and built on the principle of adequacy, representativeness and comprehensiveness. In 2004 the most secure countries of the EU corresponding to the macroeconomic security standards were Austria, Denmark, Sweden, Finland, and as in 2014 the percentage of absolutely secure countries decreased from 14.3 to 7.1%, only Denmark and Sweden remained in the ranking. During the analyzed period Bulgaria and Croatia got into the risk zone, Estonia, Lithuania, Latvia, Romania were in a danger zone. In 2014 Ukraine in terms of its macroeconomic security was in a critical state, which testified about serious structural and system imbalances in its development.

  16. Role of Global Food Security in the Common Agrarian Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Igor N. Shcherbak

    2014-01-01

    Full Text Available The author devoted his research to the role of the global food security in the priorities of the Common Agricultural Policy of the European Union (CAP. The research sheds light on the parameters of the Common Agricultural Policy and the basic steps on the path of its reform. The research demonstrates that the priorities of the EC are mainly concentrated on achieving food security for the member-states of the EC, its population and the interests of the agricultural sector. The modern challenges to the Global Food Security (global food crises of 2007-2009, acute food shortages and hunger in crises regions of Africa and chronic malnutrition are placed high on the agenda of the CAP. In this situation, the EU is trying in the interests of stabilization of the world agricultural market to solve simultaneously the tasks of providing assistance for development and mitigation of the threats to the Global Food security. The deepening rift between the strategy of the CAP oriented towards promotion of agricultural export and real contribution of the EC to the Global Food Security and assistance for development is becoming more and more the most «vulnerable» place of the CAP.

  17. The institutional dimension of the European Union’s combat transnational crime, as one of the main threats to European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the role of the leading institutions of European Union in the fight with transnational crime. It was determined that the problem of transnational crime occupies one of the central places in the field of European security. This is due to the fact that the overall level of crime in Europe in recent years has increased several times compared with the beginning of the XXI century. It was found that today transnational crime is becoming a serious obstacle on the way of building stability and sustainable development. It is nothing less than terrorism, illegal immigration affects the state of European security, creating the new center of a danger in Europe. It is proved that each institution has its own specific of struggle, but the unifying factor is that all of them are working on the same thing – the elimination of the threat in order to increase the level of security in Europe in general and in EU in particular. Substantiated the thesis that it is important to further developing of close and constructive cooperation between the main European institutions, as well as mutual exchange of information and data regarding the recent changes and the manifestations of transnational crime. This will give an opportunity to strengthen the European security system, as well as implement common practical methods of counteraction. It was determined that the actualization of the practical component in the framework of EU institutional dimension in the future will contribute to strengthening European.

  18. The EU as black widow; Devouring the WEU to give birth to a European Security and Defence Policy

    NARCIS (Netherlands)

    Wessel, Ramses A.; Kronenberger, Vincent

    2001-01-01

    The Treaty of Nice will finally turn the European Union into a security and defence organisation. Alongside its tasks in all other areas the Union will be given the competence to strengthen its contribution to the maintenance of international peace and security in accordance with the UN Charter.

  19. Study evaluating the status quo and the legal implications of third party liability for the European Security Industry

    NARCIS (Netherlands)

    Bergkamp, L.; Faure, M.G.; Hinteregger, M.; Philipsen, N.J.

    2013-01-01

    Third party liability has been identified as an issue that could adversely impact the European security industry. Limitless third party liability for security product and services is believed to have the potential to reduce investments in innovation. In the US, the Safety Act (discussed in this

  20. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    Energy Technology Data Exchange (ETDEWEB)

    Guerin, Emmanuel; Spencer, Thomas

    2011-10-11

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  1. Strengthening the European Union Climate and Energy Package to build a low carbon, competitive and energy secure european union

    International Nuclear Information System (INIS)

    Guerin, Emmanuel; Spencer, Thomas

    2011-01-01

    Immediate action to strengthen the European Union Climate and Energy Package (EU CEP) is needed to ensure Europe's sustained growth, competitiveness and energy security. Indeed, the current 20% emissions reduction target is too low to reach the European long-term goal of reducing emissions by at least 80% by 2050 at acceptable costs. But the EU CEP is also inefficient to address sustainable potential competitiveness losses and carbon leakages in some carbon intensive industries, and most importantly to boost fully the competitiveness of firms producing low-carbon products and services. Moving to 30% by 2020 could induce significant long-term GDP gains and only marginal GDP short-term costs, increase the competitiveness of European firms producing innovative low-carbon technologies, and reduce both final energy consumption and EU energy dependency. But for these objectives to be met, the contents of policies to reach this 30% target is as important as the target itself. There are three main areas in which the EU CEP needs strengthening: (1) Improvement of the energy efficiency of the existing building stocks, and limitation of the absolute level of energy consumption in the transport sector are needed to reach the 20% energy efficiency target. Binding targets should only be used when absolutely necessary and when helpful. (2) From an economic, environmental and political perspective, setting a stringent European Union Emission Trading System (EU ETS) 2030 cap between -45 and -50% from 2005 levels is probably the most relevant, efficient, and realistic option in the short term. It would increase the predictability of the carbon price signal, and therefore the credibility of the regulator. Banking would ensure that this stringent mid-term target translates into a short-term increase of the carbon price. (3) In some cases, direct public financial support is justified and efficient: to overcome market failures and non-market barriers; to support innovation in low

  2. The security of energy supply. The European Commission's Green Paper stimulates debate

    International Nuclear Information System (INIS)

    2000-01-01

    The growing dependence of the European Union (EU) on external supplies of energy is the central focus of a ''Green Paper'' issued in late November 2000 by the Commission of the European Communities in Brussels. Entitled ''Towards a European Strategy for the Security of Energy Supply'', the Green Paper is intended to stimulate debate on the EU's energy policies and strategies. European member States are ''interdependent'', the Green Paper states, ''both because of climate change issues and the creation of the internal energy market. Any energy policy decision taken by a Member State will inevitably have repercussions on the functioning of the market in other Member States. Energy policy has assumed a new, Community dimension.'' Three main points emerge from the Green Paper: The EU will become increasingly dependent on external energy sources; its enlargement will not change this situation. Based on current forecasts, energy dependence will reach 70% by the year 2030. - The EU has very limited scope to influence energy supply conditions; it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector. - The EU presently is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. Featured here is the Executive Summary of the Green Paper

  3. The Primacy of Alliance: Deterrence and European Security - Proliferation Papers No. 46

    International Nuclear Information System (INIS)

    Freedman, Lawrence

    2013-03-01

    Since the end of the Cold War, the international security environment has been transformed and nuclear weapons have been marginalized in the West. However, the NATO security policies remain almost unchanged: deterrence is still considered as a principle guiding the Atlantic Alliance, even though the actual policy statements lack target, direction and urgency. Questioning the credibility of deterrence in Europe and its future, this text recalls that it lies first and foremost with solidarity and political cohesion among members of the Alliance, and only secondly with the threat of nuclear retaliation. As a consequence, the decreasing salience of nuclear weapons in the West seems less worrying for the robustness of deterrence in Europe than a long-term and lasting shift of US foreign policy away from the European continent. (author)

  4. Study on the Evaluation of the European Union Agency for Network and Information Security

    DEFF Research Database (Denmark)

    Attström, Karin; Ludden, Vanessa; Lessmann, Franziska

    The European Union Agency for Network and Information Security (ENISA) was established in 2004. The Agency provides advice and recommendations, data analysis, and supports awareness raising and cooperation by the EU bodies and Member States in the field of cybersecurity. ENISA uses its expertise...... and assesses their financial implications. The findings of the evaluation study show that ENISA has made some important achievements towards increasing NIS in the EU. However, a fragmented approach to cybersecurity across the EU and issues internal to the Agency, including limited financial resources, hinder...

  5. Green paper. Towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  6. Green paper. Towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-01-01

    This Green Paper is the response to an observable fact: Europe growing future energy dependence. Its aim is to initiate a debate on the security of energy supply, an issue that is still very much alive. Three main points emerge from the Green Paper: the European Union will become increasingly dependent on external energy sources; enlargement will not change the situation; based on current forecasts, dependence will reach 70 % in 2030; the European Union has very limited scope to influence energy supply conditions (it is essentially on the demand side that the EU can intervene, mainly by promoting energy saving in buildings and the transport sector); at present, the European Union is not in a position to respond to the challenge of climate change and to meet its commitments, notably under the Kyoto Protocol. In these circumstances, the Commission would like the debate on the future strategy to be structured around the following principal questions: 1. Can the European Union accept an increase in its dependence on external energy sources without compromising its security of supply and European competitiveness? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on the others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Are tax and State aid policies in the energy sector an obstacle to competitiveness in the European Union or not? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investments be guaranteed? 5. Should more reserves be stockpiled, as already done for oils, and should other energy sources be included, such as gas or coal? Does the risk of physical disruption to energy supplies justify more onerous measures for

  7. Green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  8. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  9. Bypassing Russia: Nabucco project and its implications for the European gas security

    International Nuclear Information System (INIS)

    Erdogdu, Erkan

    2010-01-01

    Restrictions on CO 2 emissions, the nuclear phase-out announced by some member states, high emissions from coal-fired power plants, and barriers to rapid development of renewable generation are factors that make the European Union (EU) highly dependent on natural gas. With three non-EU countries (Russia, Algeria and Norway) currently supplying more than half the gas consumed within the EU and with projections pointing out that by 2030 internal sources will only be able to meet 25% of demand, the EU desperately looks for means to secure new sources of gas supply. In this context, the Nabucco pipeline is planned to deliver gas from Caspian and Middle East regions to the EU market. It runs across Turkey and then through Bulgaria, Romania and Hungary before connecting with a major gas hub in Austria. On paper, Nabucco project makes perfect sense, offering a new export route to the EU markets for Caspian gas producers (Azerbaijan, Turkmenistan and Kazakhstan) as well as Iran and, in time, Iraq. The project is backed by the EU and strongly supported by the United States. Perhaps most importantly, Nabucco would completely bypass Russia. This paper addresses issues surrounding Nabucco project and their implications for the European gas security. (author)

  10. Energy planning and security of supply in Spain and their compliance with the European legal framework

    International Nuclear Information System (INIS)

    Dolader, J.

    2004-01-01

    The electricity and gas markets in Spain were liberalized by the 1997 Electricity Act and the 1998 Hydrocarbons Act, respectively. The final step of the liberalization process was completed in January 2003 with the full eligibility of Spanish electricity and gas consumers. The liberalization Acts include in addition a two-way long-term energy planning process within a ten-year time scope. On the one hand the planning process involves binding planning concerning the so called 'basic infrastructures' (which include the electricity and gas transmission networks plus the total re-gasification capacity), and on the other hand, an indicative energy planning aimed at facilitating the decision making of administrations and agents by forecasting energy demand, and analyzing its coverage under the premises of security of supply. The present paper describes the current energy planning system in Spain, the provisions to ensure the security of supply and their compliance with the new European legislation - both the proposed and the existent one - regarding the security of supply in the EU.(author)

  11. Publicity in secured transactions law: Towards a European public notice filing system for non-possessory security rights in movable assets?

    NARCIS (Netherlands)

    Hamwijk, D.J.Y.

    2014-01-01

    There is a growing call to introduce a European public notice filing system for security rights in movable goods comparable to the notice filing system of Art. 9 UCC. A proposal to this effect has been adopted in Book IX DCFR, which represents a comprehensive framework of rules for proprietary

  12. The impact of the European insolvency regulation on lenders, lending decisions, the structuring of transactions and enforcement of security

    OpenAIRE

    Sharma, R

    2011-01-01

    This Thesis seeks to shed light on the issue of how far secured creditor rights are protected in EU cross-border insolvencies by focusing on the perspective and position of English lenders. The main thread throughout is the legal concerns faced by lenders when lending to a company incorporated in England and Wales which operates across the European Union and has assets and creditors spread across various Member States. The initial stages of the structuring of a cross-border security arrangeme...

  13. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  14. Panorama 2014 - The importance of underground storage in the security of European gas supplies

    International Nuclear Information System (INIS)

    Cornot-Gandolphe, Sylvie

    2013-12-01

    While European capacity for underground gas storage has increased by 16% over the last three years, levels of stock at the beginning of the 2013/2014 winter, in relation to capacity, are the lowest that have been seen since 2010; they represent only 84% of storage capacity. The suppliers of gas have no incentive to reserve storage capacity, for which the cost is considered too high in relation to the spread, currently very low, between the price of gas in winter and in summer. They also rely on sufficient gas supply thanks to other sources of flexibility available on the market: flexibility of production or imports, spot LNG purchases, purchases in the spot market... or even use of the storage capacities of neighbouring countries via European network interconnections. Yet, the 2013/2014 winter is beginning in a gas supply context in Europe that is more difficult: imports of LNG, which had already dropped sharply in 2012, have continued to contract, faced with increased competition from Asian buyers on the international LNG market. Gas imports from Norway are also declining following production limits in that country. Only Russia has strongly increased its exports to Europe in 2013. However, the dispute between Ukraine and Russia about the price of Russian gas delivered to Ukraine still raises the spectre of a threat to the European supply of Russian gas, nearly 60% of which transits via Ukraine. Under these circumstances, as demonstrated by the gas crises of 2006 and 2009 and the cold conditions of February 2012 and March/April 2013, storage is the most efficient means of securing the supply of gas providing, of course, that the storage sites are filled at the beginning of winter. (author)

  15. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    International Nuclear Information System (INIS)

    2005-01-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  16. Commentary and contributions to green paper (alphabetical sort. Towards a European strategy for the security supply)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document provides the answers formulated by the nuclear industry operators to the thirteen following questions: 1. Can the European Union accept an increase in its dependence on external energy sources without undermining its security of supply and European competitiveness? If this were the case, for which sources of energy would it be appropriate to contemplate a framework policy for imports? In this case, is it appropriate to favour an economic approach, in terms of energy cost, or a geopolitical approach in terms of the risk of disruption? 2. Does not Europe increasingly integrated internal market, where decisions taken in one country have an impact on others, call for a consistent and coordinated policy at Community level? What should such a policy consist of and where should competition rules fit in? 3. Do tax and State aid policies in the energy sector impair competitiveness in the European Union or not? Given the failure of attempts to harmonize indirect taxation, should the whole issue of energy taxation not be re-examined in view, in particular, of the energy and environmental targets? 4. In the framework of an ongoing dialogue with producer countries, what should supply and investment promotion agreements contain? Given the importance of a partnership with Russia in particular, how can stable quantities, prices and investment be guaranteed? 5. Should more reserves be stockpiled and should other energy sources be included, such as gas or coal? Should the Community take on a greater role in stock management and, if so, what should the objectives and modalities be? Does the risk of physical disruption to energy supply justify more onerous measures for access to resources? 6. How can we ensure the development and better operation of energy transport networks in the European Union and neighbouring countries that enable the internal market to function properly and guarantee security of supply? 7. The development of some renewable energy sources calls for

  17. European Energy Security and Nord Stream: A Case Study of the Nord Stream Pipeline, Its Opportunities and Risks for Europe, and Its Impact on European Energy Security

    Science.gov (United States)

    2011-06-01

    2010, 5.75% of all petrol -driven cars will run on bio- fuels. This target will not be achieved. 119 Ibid., 22–23. 120 Belkin, The European Union’s...insecurity, as is the case with Algeria, Egypt, Tunisia and Libya. This possible risk has already been identified by the European Commission in 2006.273

  18. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  19. Production from Giant Gas Fields in Norway and Russia and Subsequent Implications for European Energy Security

    International Nuclear Information System (INIS)

    Soederbergh, Bengt

    2010-01-01

    70 bcm In addition, there are a number of potential downside factors for future Russian gas supplies to the European markets. Consequently, a 90% increase of import volumes to the EU by 2030 will be impossible to achieve. From a European energy security perspective the dependence of pipeline gas imports is not the only energy security problem to be in the limelight, the question of physical availability of overall gas supplies deserves serious attention as well. There is a lively discussion regarding the geopolitical implications of European dependence on imported gas from Russia. However, the results of this thesis suggest that when assessing the future gas demand of the EU it would be of equal importance to be concerned about diminishing availability of global gas supplies

  20. Security of energy supply under the laws of the European Union / European Community; Energieversorgungssicherheit im Recht der Europaeischen Union, Europaeischen Gemeinschaft

    Energy Technology Data Exchange (ETDEWEB)

    Proefrock, M.C.

    2007-07-01

    Security of supply is defined as the availability and reliability of energy supply at acceptable prices. By security of energy supply we mean a globally large supply of reliable, affordable, clean energy. By virtue of its nature security of supply in the energy sector primarily requires making provisions for the future through exploration, innovation, research, diversification and investments in technology. Energy politics takes place in a tension field defined by the goals of economic efficiency, sustainability and security of supply. In the past there have been repeated shifts within this triad of goals. The task for a rational energy policy is to reconciliate these goals in a meaningful way. European energy policy is understood to comprise all sovereign measures taken by the European Union in the energy sector, in particular measures that impact on the supply and demand for energy resources. Energy law serves, or should serve, to bring energy policy to realisation and therefore presupposes the existence of the latter. Energy policy means the figuration of an economy's energy sector in such a manner that the present and future demand of the economic region is covered.

  1. ALARA issues arising for safety and security of radiation sources and security screening devices - Summary and recommendations of the 12. European ALARA network workshop

    International Nuclear Information System (INIS)

    Shaw, P.; Crouail, P.; Drouet, F.

    2010-01-01

    The 12. European ALARA Network (EAN) workshop on 'ALARA issues arising for safety and security of radiation sources and security screening devices' took place in Vienna (Austria) in October 2009. The aim of that workshop was to consider how the implementation of ALARA3, in terms of planned and emergency situations, involving worker and public doses, is affected by the introduction of security-related measures. In the case of new equipment and procedures, there was also the question of whether exposures arising from security screening devices can be justified and optimised. This workshop consisted of invited oral presentations, which highlighted the main issues, and half of the programme was devoted to discussions within working groups on specific topics. During their discussions, the working groups identified recommendations dealing with the following topics: the implementation of the Code of Conduct and HASS4 - ensuring ALARA; balancing security and safety - how to achieve an optimum solution; the management of an emergency exposure situation from an ALARA perspective; the justification and optimisation of the use of security devices. The objective of this paper is to present the main conclusions and recommendations produced during the workshop. Individual presentations (papers and slides) as well as the reports from the working groups are available to download on the EAN web site (http://www.eu-alara.net). (authors)

  2. Simulating security of supply effects of the Nabucco and South Stream projects for the European natural gas market

    Energy Technology Data Exchange (ETDEWEB)

    Dieckhoener, Caroline

    2010-12-15

    Due to the increasing European import dependency, significant additional natural gas volumes will be required. In addition to the Nord Stream pipeline, the Nabucco and South Stream pipeline are projects planned for the next decade to provide further gas supplies to the European market. As one of the European Union's energy policies' foci is security of supply, the question can be raised if and how these projects contribute to this objective not only in terms of diversification but also in case of supply disruptions such as occurred in 2009 during the Russia-Ukraine gas crisis. This paper discusses the impact of these two major gas import pipeline projects on the South-Eastern Europe gas supply and analyzes their effects on gas flows and marginal cost prices in general and in case of gas supply disruptions via Ukraine in a model-based analysis with the European natural gas infrastructure and dispatch model TIGER. (orig.)

  3. Strengthening the European Union Climate and Energy Package. To build a low carbon, competitive and energy secure European Union

    International Nuclear Information System (INIS)

    Guerin, E.; Spencer, Th.

    2011-01-01

    As the EU's climate and energy goals defined in its Climate and Energy Package (CEP) are to protect the climate, to protect EU economic competitiveness, and to protect EU energy security, the authors first define these notions (time consistency, competitiveness, energy security) and stress the importance of strengthening the CEP, notably by fostering low carbon technology investment and low carbon products and services innovation. They discuss several policy recommendations for the development of a low carbon, competitive and energy secure EU. These recommendations are notably based on the strengthening of current instruments and on the implementation of new tools to reach the 20% energy efficiency target, on an increase stringency and predictability of the EU ETS, and on the use of direct public financial support to facilitate the transition towards a EU low carbon economy

  4. Experience of the pilot implementation of the european information sharing and alerting system in the field of information security

    Directory of Open Access Journals (Sweden)

    Anatoly A. Malyuk

    2018-03-01

    Full Text Available The formation of a global information society poses a particular challenge to the development of an information security culture. In the Doctrine of Information Security of the Russian Federation, adopted in December 2016, one of the main threats is the low awareness of citizens in matters of ensuring personal information security. One of the most important mechanisms for increasing competence and forming an in-formation security culture, in addition to mass training of people, are methods of propaganda and creation of "hot lines". They allow the general public to take the initiative in monitoring and reporting computer incidents. The development of such approaches should be carried out taking into account the international experience accumulated today. To this end, the article examines the European experience of creating a system of information and advisory assistance in the field of preventing threats to the security of public and corporate information systems, primarily information and telecommunications networks, as well as eliminating the consequences of threats in the information sphere. The analysis of the experience of implementing the pilot project of the European Information Sharing and Alert System has revealed the advisability of designing such systems on the basis of a management model with four players that unites network operators, information producers (who are IT product suppliers or IT security specialists; local information intermediaries and consumers of information. As a model of the information flow, a node can be selected that runs a local web portal that provides information to end users, generates new information, adapts information to the constraints of various distribution channels, and to the characteristics of end-user target groups. The methodology of the pilot project can be used in the design and deployment of a notification and information exchange system aimed at end-users of several regions or countries

  5. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Directory of Open Access Journals (Sweden)

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  6. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  7. Current challenges of the European security caused by the refugee crisis. The EU's fight against terrorism

    Directory of Open Access Journals (Sweden)

    Andreea Florentina NICOLESCU

    2017-10-01

    Full Text Available The primary objective of this research is to identify the evolution of the terrorist attacks that appeared in Europe lately. In the article are mentioned the main causes that led to the terrorist attacks from France and Germany, emphasizing their effects over the 2 countries. The article brings forward the main types of attacks used by terrorists but also the number of injured persons or deaths. An essential aspect that was highlighted in the article refers to the results obtained after applying the EU – Turkey Statement but also to those regarding the transfer and relocation of the migrants in different countries. In this way, the analysis implied the selection of EU member states which received Syrian refugees by relocation together with the highlighting of the numeric situation of the persons returned from Greece to Turkey. A last part of this study assumes the identification of the personal categories who have been brought by Frontex and EASO in Greece in order to handle efficiently the crisis, which provide the expertise in the migration field. The primary question of this research is: “Is EU capable to administer the changes regarding migration, assuring in the same time its safety?”. To answer this question, I identified first the costs of EU securitizing its states. I consider that the approach of this matter has a high importance since it shows the necessity of some changes meant to help European states to face the events linked to migration and, implicitly, security from the last years.

  8. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  9. The European Union’s Aviation Security Mission in South Sudan

    DEFF Research Database (Denmark)

    Højstrup Christensen, Gitte; Kammel, Arnold; Rodt, Annemarie Peen

    of the security situation in the country, all EU personnel were evacuated in January 2014, and the mission was (informally) terminated after fulfilling its mandated deployment period. Even though the mission had succeeded in training 350 personnel prior to the evacuation, its contribution to the overall security......When South Sudan gained independence in 2011, the new country needed assistance from external actors during the transition to prevent the security situation from deteriorating. In 2012 the EU launched its Aviation Security Mission (EUAVSEC) in South Sudan as part of its Common Security and Defence...... Policy. This came in response to a South Sudanese request for EU support and assistance in strengthening the security in Juba International Airport, as it had proven difficult for South Sudan to establish a fully operational transport hub. The EU estimated that an improvement of the airport security...

  10. Greek National Security Concerns and the European Union’s Common Foreign and Security Policy: Consensus or Divergence?

    Science.gov (United States)

    2011-09-01

    to my tutor.” Alexander the Great, referring to his tutor, Aristotle (356–323 BC) xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION...an actual policy since the Turkish invasion of Cyprus. Despite his political rhetoric and posturing while in opposition, Papandreou’s tenure...responsibility for global security.”139 Limited in breadth within the Petersberg tasks framework, the ESS focuses its rhetoric on the internal, rather

  11. Europol’s Cybercrime Centre (EC3), its Agreements with Third Parties and the Growing Role of Law Enforcement on the European Security Scene

    DEFF Research Database (Denmark)

    Vendius, Trine Thygesen

    2015-01-01

    The European Cyber Crime Centre, EC3, established under the umbrella of Europol, started operations on January 1 2013. It is to act as the focal point in the fight against cybercrime in the European Union. Using a “shared, cross-community approach” the EC3 is concluding partnerships with member...... states, European agencies, international partners and the private sector. This article describes the coming about of EC3 and its efforts to address cybercrime. Furthermore, the article is an attempt to assess the growing role of the European law enforcement community on the European security scene...

  12. Economic separatism in the European Union member states as a factor of regional security

    Directory of Open Access Journals (Sweden)

    A A Shakhina

    2014-12-01

    Full Text Available The article is devoted to the examination of the economic separatism problem in the European Union member states. It considers specific of the regional separatist movements as exemplified by the conflicts in Scotland, Catalonia, Bavaria, Flanders. Various points of view on the relevance of the budgetary separatism for the European integration process are given in the article.

  13. Human rights or security? Positions on asylum in European Parliament speeches

    DEFF Research Database (Denmark)

    Frid-Nielsen, Snorre Sylvester

    2018-01-01

    This study examines speeches in the European Parliament relating to asylum. Conceptually, it tests hypotheses concerning the relation between national parties and Members of European Parliament (MEPs). The computer-based content analysis method Wordfish is used to examine 876 speeches from 2004-2...

  14. The issue of energy security in relations between the European Union and Azerbaijan

    Directory of Open Access Journals (Sweden)

    O V Shabelnikova

    2014-12-01

    Full Text Available The article focuses on cooperation between the European Union and the Republic of Azerbaijan on energy issues. The author analyzes the EU initiatives and projects for the Black Sea and Caspian Sea region as well as the questions of delivery diversification of the Azerbaijani gas to the European markets.

  15. Privacy and security perceptions of european citizens: A test of the trade-off model

    NARCIS (Netherlands)

    Friedewald, M.; Lieshout, M. van; Rung, S.; Ooms, M.; Ypma, J.

    2015-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional “trade-off” paradigm that argues that citizens might be willing to sacrifice some privacy for more security. Academics have long argued against the trade-off paradigm, but these arguments have

  16. Asylum migration and the construction of the European Common Foreign and Security Policy: evidence from the Greek case

    Directory of Open Access Journals (Sweden)

    Silvia Lucía Forero Castañeda

    2015-12-01

    Full Text Available This article examines how the recent evolution of asylum migration has affected the construction of the European Common Foreign and Security Policy (EU-CFSP, taking the Greek case during the 2001-2012 period as a starting point. With this in mind, the normative progress of the EU-CFSP facing the reception of asylum seekers in Greece is analyzed, under the scope of what Barry Buzan and Ole Waever would call Securitization Process. Both legal and political frameworks on asylum migration in Greece and in the European Union are approached, in the context of the evolution of the EU-CFSP in three main areas: Neighborhood Policy, Development and Cooperation Policy, and Human Rights Protection. The conclusión points toward the partial influence of asylum migration in the configuration of the UE-CFSP during the studied period.

  17. European Security through EU-Russian Relations: Towards a New Multilateral Order?

    Directory of Open Access Journals (Sweden)

    Sandra Fernandes

    2011-05-01

    Full Text Available Since the end of the Cold War, the EU and Russia have managed to create an original framework for institutionalised cooperation despite asymmetric characteristics. Yet, the way these two main security actors interact has an impact on the (non-resolution of security issues in Europe, ranging from ‘‘frozen conflicts’’ to the discussion of the security architecture. Since the second mandate of President Putin, the relation has been characterised by two paradoxical features. On the one hand, the methodology and the domains of cooperation have reached a high degree of achievement. On the other hand, the political quality of the relationship has deteriorated and it is not able to achieve the desired ‘‘strategic partnership’’ that should be based on a common set of values and principles. This article aims to define multilateralism as a paradigm applicable to EU-Russian relations. It examines their relationship in the security and defence realm and the Union’s reactions to a new security approach by Russia since the 2008 Medvedev proposal. The article questions how the EU-Russian political dialogue impacts on multilateralism in the security field. The conclusion considers EU-Russian relations as a peculiar multilateral playground addressing common security challenges, which still needs to be developed further in order to be instrumental in the search for collective and legitimate solutions.

  18. Energy security and European Union. Proposals for the French presidency; Securite energetique et Union Europeenne. Propositions pour la presidence francaise

    Energy Technology Data Exchange (ETDEWEB)

    Mandil, C

    2008-04-15

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  19. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The first section looks into the past actions and strategic culture of Russia to determine if there exists a threat that Russia will deny energy resources to European countries for political or economic gain...

  20. Russian Oil and Natural Gas: Strategic Culture and Security Implications of European Dependence

    National Research Council Canada - National Science Library

    Phillips, William M

    2007-01-01

    .... The third section investigates the importance of revenues that Russia receives from consumption of oil and natural gas exports to Europe on their Gross National Product and economic growth for the future. By understanding Russia's strategic culture and the interdependence of European demand and Russian supply, conclusions are made that determine the threat, risk, and circumstances that Russia will deny energy resources to European countries.

  1. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    International Nuclear Information System (INIS)

    2002-06-01

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  2. Communication from the commission to the council and the European parliament. Final report on the green paper: towards a European strategy for the security of energy supply

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-06-15

    The Green Paper on the security of energy supply, adopted by the Commission more than a year ago, opened up a debate on energy policy unprecedented in 30 years. In most of the Member States this debate revived discussion on national options in the energy field. Looking ahead to the next twenty to thirty years, the Green Paper drew attention to the structural weaknesses and geopolitical, social and environmental shortcomings of the EU energy supply, notably as regards European commitments in the Kyoto Protocol. The European economy, steadily demanding more and more energy, is essentially based on fossil fuels. The Green Paper offers a clear strategy based on demand management. It has the merit of pointing out that the EU has little room for manoeuvre with regard to energy supply notably due to its low, or in certain cases less competitive (e.g. coal), energy resources. Therefore it is appropriate for the Union to concentrate on guiding and steering demand, unlike the United States which, in the energy plan it announced in May 2001, seeks to meet demand by constantly boosting supply. The Green Paper put 13 questions as a framework for the general debate. The conclusion is that there is virtually unanimous agreement on the strategic axis of demand management: energy consumption must be guided and steered. The conclusions of the Barcelona European Council, stressing in particular the need for better energy efficiency by 2010 and rapid adoption of energy taxation proposals, clearly give political backing to this priority. Without waiting for the debate to end, the Commission made some very well received proposals along these lines, involving actual legislation and not just encouraging words or exchange of good practice, some of which have already been adopted by the Council and the European Parliament. One of these proposals in particular was the Directive on electricity production from renewable sources, adopted in 2001. Another was the proposal for a Directive on

  3. LNG REGASIFICATION TERMINALS ACCESS CAPACITY ANALYSIS FOR SECURITY OF EUROPEAN NATURAL GAS SUPPLY

    Directory of Open Access Journals (Sweden)

    Matija Veselić

    2011-12-01

    Full Text Available Increasing natural gas consumption, declining North Sea gas reserves, increased production costs and the deregulation of European gas and electricity markets have all combined to create new opportunities for LNG in Europe. In these circumstances, LNG represents an opportunity for many European countries to diversify their natural gas supply, while decreasing their dependence on Russian natural gas import at the same time. The largest exporters of LNG to Europe are Qatar, Algeria, Nigeria, Trinidad & Tobago, Egypt and Oman. Spain, Great Britain and France are the largest European importers of LNG. Spain has six LNG regasification terminals, followed by four in Great Britain, three in France, two in Italy and Turkey and finally Greece and Portugal with one terminal each. New LNG regasification terminals are currently under construction in Italy, Spain, Sweden and Netherlands. In addition, more than 30 new LNG terminal projects have been proposed around Europe. Italy plans to construct as many as 10 new regasification terminals, due to the strong orientation of its national energy policy towards LNG. Many European countries are strongly considering participating in the LNG chain for the first time, namely Albania, Cyprus, Ireland, Lithuania, Germany, Poland, Romania, Ukraine and Croatia. This paper focuses on a specific aspect of the LNG supply chain: the import facility (the paper is published in Croatian.

  4. The European Union as an Area of Freedom, Security and Justice

    NARCIS (Netherlands)

    Fletcher, Maria; Herlin-Karnell, Ester; Matera, Claudio

    2016-01-01

    Europe’s area of freedom, security and justice is of increasing importance in contemporary EU law and legislation. It is worthy of special research attention because of its high-stakes content (particularly from an individual and a state perspective) and because its development to date has

  5. Measuring the security of external energy supply in the European Union

    DEFF Research Database (Denmark)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political...

  6. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  7. The European Union’s Human Security Doctrine: A Critical Analysis

    Science.gov (United States)

    2009-03-01

    Symbolism: Europe Takes on Human Security,” 92. 91 Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism (New York: Signet Press, 1964). 92 Bailes...New Concept of Egoism . New York: Signet Press, 1964. Report of the International Commission on Intervention and State Sovereignty. The Responsibility

  8. Flexibility and security for older workers: HRM-arrangements in four European countries

    NARCIS (Netherlands)

    Tros, F.

    2010-01-01

    National policies in the Netherlands, Denmark, Germany and Belgium show policy shifts towards active ageing and towards flexicurity to enhance flexibility and security in the labour market. The main question is about the practice and implementation of these macro policies on the workplace level.

  9. Russian natural gas exports-Will Russian gas price reforms improve the European security of supply?

    International Nuclear Information System (INIS)

    Sagen, Eirik Lund; Tsygankova, Marina

    2008-01-01

    In this paper we use both theoretical and numerical tools to study potential effects on Russian gas exports from different Russian domestic gas prices and production capacities in 2015. We also investigate whether a fully competitive European gas market may provide incentives for Gazprom, the dominant Russian gas company, to change its export behaviour. Our main findings suggest that both increased domestic gas prices and sufficient production capacities are vital to maintain Gazprom's market share in Europe over the next decade. In fact, Russia may struggle to carry out its current long-term export commitments if domestic prices are sufficiently low. At the same time, if Russian prices approach European net-back levels, Gazprom may reduce exports in favour of a relatively more profitable domestic market

  10. The Ukrainian Crisis and European Security: Implications for the United States and U.S. Army

    Science.gov (United States)

    2015-01-01

    14 Chris Giles and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Finan- cial Crisis,” Financial Times, October 8, 2014. 15 Ulrich...Jones, and Kathrin Hille, “Russian Air Incursions Rattle Baltic States,” Financial Times, September 25, 2014. 25 Andrew Higgins , “Tensions Surge in...Opening of the Munich Security Conference, January 31, 2014. Giles, Chris , and Stefan Wagstyl, “IMF Warns of Third Eurozone Recession Since Financial

  11. Harmonization of social security law of Serbia with the law of European Union

    Directory of Open Access Journals (Sweden)

    Golubović Velizar

    2011-01-01

    Full Text Available In this work, the author shortly exposes Communitarian social security law and remained tasks of the harmonization of Serbian legislation in this field. Recently some amendments of legislation were made in order to strengthen principles of gender equality and prevent discrimination, to regulate employment of persons with disability, as well as to install supervision in Institutions for occupational retirement. Regarding the compulsory social insurance in Serbia it may be concluded that there exists a high degree of compliance with the EU legislation, with an exception of privileged mode of entitlement for old age and disability pensions for women and partial disability caused by work injury where it is necessary to conclude agreements on social security with 10 EU states members. On the other side, occupational retirement provision is partially incompatible with Communitarian social security law, i.e. with Directive 2003/41/EC in the field of technical provision, as well as with Directive 113/2004/EU regarding the obligation of equation of the life expectancy for both sexes.

  12. The Threat from European Missile Defence System to Russian National Security

    Directory of Open Access Journals (Sweden)

    Alexey I. Podberezkin

    2014-01-01

    Full Text Available The article analyses the political and military aspects of progress in the dialogue between Russia and the U.S./NATO on cooperation in missile defense; investigates the past experiences and current state of cooperation between Russia and the Alliance on missile defense issues; examines the technical features of American missile defence systems today; finds a solution to question whether or not the European Missile Defence Program actually threatens Russia's nuclear deterrent and strategic stability in general; identifies both potential benefits and possible losses for Russia stemming from the development of cooperation with the United States and NATO in countering ballistic missile threats, or from refusal to have such cooperation. Evidently, the initiative of creation of a missile defense in Europe surely belongs to the USA. Washington has enormous technological, financial, economic, military and institutional capabilities in the field of a missile defense, exceeding by far other NATO member-states. In February 2010, the President of the United States B. Obama adopted a project "European Phased Adaptive Approach" (EPAA as an alternative to G. Bush's global strategic missile defense plan. The first two stages of the Phased Adaptive Approach are focused on creating a system capable of intercepting small, medium and intermediate-range ballistic missiles. The possibility of intercepting long-range missiles is postponed to the third (2018 and forth phases (2020. Moscow finds especially troublesome the third and the fourth phases of Washington's project of creating a European segment of the global antiballistic missile system, considering prospective capabilities of the U.S. interceptor missiles 61 and the envisioned areas of their deployment. The U.S. counter-evidence is that phase four interceptors do not exist yet. Russia insists on getting the political and legal guarantees from the U.S. and NATO that their missile defense systems will not slash

  13. European energy security: An analysis of future Russian natural gas production and exports

    Energy Technology Data Exchange (ETDEWEB)

    Soederbergh, Bengt, E-mail: bengt.soderbergh@fysast.uu.s [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden); Jakobsson, Kristofer; Aleklett, Kjell [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden)

    2010-12-15

    The widening gap between EU gas production and consumption may require an 87% increase of import volumes between 2006 and 2030, and there are great uncertainties regarding the amounts of gas that can be expected from new suppliers. The potential of increased production from Norway and Algeria is limited; hence, Russia is likely to play a crucial part of meeting the anticipated growing gas demand of the EU. A field-by-field study of 83 giant gas fields shows that the major producing Russian gas fields are in decline, and by 2013 much larger supplies from the Yamal Peninsula and the Shtokman field will be needed in order to avoid a decline in production. Gas from fields in Eastern Siberia and the Far East will mainly be directed to the Asian and Pacific Rim markets, thereby limiting its relevance to the European and CIS markets. As a result, the maximum export increase to the European and CIS markets amounts only to about 45% for the period 2015-2030. The discourse surrounding the EU's dependence on Russian gas should thus not only be concerned with geopolitics, but also with the issue of resource limitations. - Research highlights: {yields}Natural gas production in the Nadym Pur Taz region (Western Siberia) will start to decline within a few years. {yields}New production from the Yamal peninsula is critical to ensure gas exports to Europe. {yields}Additional production in East Siberia and the Far East will not be available for the European market. {yields}Rapid gas demand growth in China might also lead to competition for gas from Western Siberia.

  14. European energy security. An analysis of future Russian natural gas production and exports

    Energy Technology Data Exchange (ETDEWEB)

    Soederbergh, Bengt; Jakobsson, Kristofer; Aleklett, Kjell [Global Energy Systems, Department of Physics and Astronomy, Uppsala University, Laegerhyddsvaegen 1, Box 535, SE-751 21, Uppsala (Sweden)

    2010-12-15

    The widening gap between EU gas production and consumption may require an 87% increase of import volumes between 2006 and 2030, and there are great uncertainties regarding the amounts of gas that can be expected from new suppliers. The potential of increased production from Norway and Algeria is limited; hence, Russia is likely to play a crucial part of meeting the anticipated growing gas demand of the EU. A field-by-field study of 83 giant gas fields shows that the major producing Russian gas fields are in decline, and by 2013 much larger supplies from the Yamal Peninsula and the Shtokman field will be needed in order to avoid a decline in production. Gas from fields in Eastern Siberia and the Far East will mainly be directed to the Asian and Pacific Rim markets, thereby limiting its relevance to the European and CIS markets. As a result, the maximum export increase to the European and CIS markets amounts only to about 45% for the period 2015-2030. The discourse surrounding the EU's dependence on Russian gas should thus not only be concerned with geopolitics, but also with the issue of resource limitations. (author)

  15. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  16. Gazprom on the European Market: In Search of the Balance between the Principles of Competition and Energy Security

    Directory of Open Access Journals (Sweden)

    Valery I. Salygin

    2014-01-01

    Full Text Available The article analyses the position of Gazprom on the key export market - the market of the European Union. Situation on the EU gas market changed considerably because of an imbalance between supply and demand. Gazprom had to make price concessions for almost all of the main consumers of Russian gas in Europe, and also had to allow European consumers to break one of the key provisions of long-term contracts - "take or pay" clause. Besides disputes at the corporate level significant differences still remain about the well-known Third energy package, which effectively prohibits Gazprom to own and operate gas pipelines on the territory of the EU, as well as binding it to provide a third party access to gas pipelines. The implementation of Third package provisions on function unbundling by some EU Member States in the most rigid version may contradict bilateral international agreements of Russia with the EU Member States, primarily agreements on investment protection. Possible reasons underlying the investigation initiated by the European Commission against Gazprom in connection with a possible violation ofEU competition rules are examined. The paper investigates legal, political and economic aspects of contemporary regime of gas cooperation, particularly restriction of reexport, linkage between gas and oil prices, pricing based on long-term contracts and spot markets. The paper concludes that Russia and the EU need to elaborate a comprehensive document that would ensure the stability of the regulatory environment of energy cooperation and would reflect the balance of interests of producers and consumers. This document should equally ensure highly competitive environment and guarantees of security of supply in the short and long term.

  17. The Creation of an Energy Security Society as a Way to Decrease Securitization Levels between the European Union and Russia in Energy Trade

    Directory of Open Access Journals (Sweden)

    Olga Khrushcheva

    2011-05-01

    Full Text Available The energy trade between the European Union and Russia is securitized due to a combination of factors. First, there are securitizing agents within the European Union. Second, the domestic consolidation of the energy sector under governmental control, the Gazprom monopoly on transportation networks linking Central Asian gas with European markets and the state imposed-limits on foreign direct investment may also raise concerns in the European Union. Finally, Russia is also securitizing the energy sphere by claiming that the EU is trying to impose its values on Russia (for example through the Energy Charter Treaty, which contradicts Russian interests. This article combines securitization theory and the English School of thought and argues that the creation of an Energy Security Society could help de-securitize energy trade between the European Union and Russia.

  18. EUROPEAN POLICY REGARDING ENERGETIC SECURITY IN THE FIELD OF RENEWABLE ENERGY

    Directory of Open Access Journals (Sweden)

    Maria POPESCU,

    2015-12-01

    Full Text Available In recent years the European Union has been working continually to promote green energy. Renewable energy presents certain social, economic and environmental benefits, has a low environmental impact, therefore, can support economic growth on a sustainable basis. Theme analyzes progress in the EU, trends and long-term scenarios in renewable resources. Renewables have a high potential to stimulate EU industrial competitiveness. Developing new energy sources with low carbon is very important to avoid high costs of climate change and pollution conditions. Renewable energy can use all our energy requirements: electricity production, transport and domestic heating. Hydropower and wind are exclusively used for generating electricity, while biomass, geothermal and solar can be used to produce electricity and heat.

  19. Measuring the security of external energy supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Le Coq, Chloe [SITE, Stockholm School of Economics, P.O. Box 6501, Stockholm 11383 (Sweden); Paltseva, Elena [Department of Economics, Copenhagen University, Oester Farimagsgade 5, Building 26, 1353 Copenhagen (Denmark)

    2009-11-15

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  20. Green paper - towards a European strategy for the security of energy supply, technical document

    International Nuclear Information System (INIS)

    2005-01-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  1. Theorizing the European union as Union as an International Security Provider

    DEFF Research Database (Denmark)

    This final paper will summarise the theoretical strands of the discussion in the preceding papers and reflect on the suitability of the analytical framework in the introduction in light of the empirical analysis by other contributors to the special issue. It will sketch out the main tenets of a t...... of a theory of the EU as an international security provider and point to directions for further research in this area.......This final paper will summarise the theoretical strands of the discussion in the preceding papers and reflect on the suitability of the analytical framework in the introduction in light of the empirical analysis by other contributors to the special issue. It will sketch out the main tenets...

  2. Measuring the security of external energy supply in the European Union

    International Nuclear Information System (INIS)

    Le Coq, Chloe; Paltseva, Elena

    2009-01-01

    The security of energy supply is one of the main objectives of EU energy policy. In this paper, we introduce an index designed to evaluate the short-term risks associated with the external supply of energy to the EU Member States. It combines measures of energy import diversification, political risks of the supplying country, risk associated with energy transit, and the economic impact of a supply disruption. We construct separate indexes for three primary energy types, oil, gas and coal, and demonstrate that Member States' levels of supply risk exposure differ across energies. Most other studies of this kind provide aggregate indexes combining different types of energy. Our results suggest that an aggregate approach could be misleading, at least for discussions of the short-term response to risks. We discuss the implications of our findings for the common energy policy. (author)

  3. Second strategic energy report of the European Union - more security of supply with nuclear power

    International Nuclear Information System (INIS)

    Heller, W.

    2008-01-01

    On November 13, 2008, the EU Commission presented the Second Strategic Energy Report. The Report was supplemented by one proposed directive each on the security of gas supply and on oil stockpiling, by a multitude of measures to improve energy efficiency, and by 2 communications by the Commission on offshore wind energy and the nuclear program of the EU. The Commission attaches strategic importance in securing energy supply to the domestic energy resources, renewables, coal, and nuclear power. Moreover, the Commission assigns to the use of nuclear power an important role in the transition to an economy causing only a minimum of CO 2 emissions. The updated nuclear program contains these proposals: - The most up-to-date technology is to be employed in the construction of new reactors, and - the highest standards of nuclear safety are to be applied. - The diverse licensing conditions and procedures currently existing in the member states are to be harmonized. A few days earlier, the Nuclear Energy Agency (NEA) of OECD had presented the 2008 Nuclear Energy Outlook in which the points raised by the EU Commission are outlined in the same sense for the OECD member countries. Germany clearly continues to be in an isolated position worldwide in opting out of the use of nuclear power. This raises the question when and in what way political majorities may again be found which would prevent the enforcement of laws in the interest of phasing out nuclear power, and get rid of the irrational blockages in spent fuel and nuclear waste management. (orig.)

  4. Security of supply and retail competition in the European gas market

    Energy Technology Data Exchange (ETDEWEB)

    Abada, Ibrahim, E-mail: ibrahim.abada@polytechnique.edu [IFP Energies nouvelles, 1 et 4 avenue de Bois Preau, 92852 Rueil-Malmaison (France); EDF Research and Development, 1 avenue du General de Gaulle, 92140 Clamart (France); EconomiX-CNRS, University of Paris Ouest (France); Massol, Olivier, E-mail: olivier.massol@ifpen.fr [Center for Economics and Management, IFP School, 228-232 av. Napoleon Bonaparte, 92852 Rueil-Malmaison (France); Department of Economics, City University London, Northampton Square, London EC1V 0HB (United Kingdom)

    2011-07-15

    In this paper, we analyze the impact of uncertain disruptions in gas supply upon gas retailer contracting behavior and consequent price and welfare implications in a gas market characterized by long-term gas contracts using a static Cournot model. In order to most realistically describe the economical situation, our representation divides the market into two stages: the upstream market that links, by means of long-term contracts, producers in exporting countries (Russia, Algeria, etc.) to local retailers who bring gas to the consuming countries to satisfy local demands in the downstream market. Disruption costs are modeled using short-run demand functions. First we mathematically develop a general model and write the associated KKT conditions, then we propose some case studies, under iso-elasticity assumptions, for the long-short-run inverse-demand curves in order to predict qualitatively and quantitatively the impacts of supply disruptions on Western European gas trade. In the second part, we study in detail the German gas market of the 1980s to explain the supply choices of the German retailer, and we derive interesting conclusions and insights concerning the amounts and prices of natural gas brought to the market. The last part of the paper is dedicated to a study of the Bulgarian gas market, which is greatly dependent on the Russian gas supplies and hence very sensitive to interruption risks. Some interesting conclusions are derived concerning the necessity to economically regulate the market, by means of gas amounts control, if the disruption probability is high enough. - Highlights: > We model retail competition using a Nash-Cournot framework. > Risk-neutral retailers decide their import policy among a set of risky producers. > Case 1: the German gas trade of the 1980s to understand the gas sources' choices. > Case 2: the current Bulgarian gas trade to study the market properties. > Conclusions about the market regulation for welfare optimization reasons.

  5. Security of supply and retail competition in the European gas market. Some model-based insights

    International Nuclear Information System (INIS)

    Abada, Ibrahim; Massol, Olivier

    2011-04-01

    In this paper, we analyze the impact of uncertain disruptions in gas supply upon gas retailer contracting behavior and consequent price and welfare implications in a gas market characterized by long-term gas contracts using a static Cournot model. In order to most realistically describe the economical situation, our representation divides the market into two stages: the upstream market that links, by means of long-term contracts, producers in exporting countries (Russia, Algeria, etc.) to local retailers who bring gas to the consuming countries to satisfy local demands in the downstream market. Disruption costs are modeled using short-run demand functions. First we mathematically develop a general model and write the associated KKT conditions, then we propose some case studies, under iso-elasticity assumptions, for the long-short-run inverse-demand curves in order to predict qualitatively and quantitatively the impacts of supply disruptions on Western European gas trade. In the second part, we study in detail the German gas market of the 1980's to explain the supply choices of the German retailer, and we derive interesting conclusions and insights concerning the amounts and prices of natural gas brought to the market. The last part of the paper is dedicated to a study of the Bulgarian gas market, which is greatly dependent on the Russian gas supplies and hence very sensitive to interruption risks. Some interesting conclusions are derived concerning the necessity to economically regulate the market, by means of gas amounts control, if the disruption probability is high enough. (authors)

  6. Security of supply and retail competition in the European gas market

    International Nuclear Information System (INIS)

    Abada, Ibrahim; Massol, Olivier

    2011-01-01

    In this paper, we analyze the impact of uncertain disruptions in gas supply upon gas retailer contracting behavior and consequent price and welfare implications in a gas market characterized by long-term gas contracts using a static Cournot model. In order to most realistically describe the economical situation, our representation divides the market into two stages: the upstream market that links, by means of long-term contracts, producers in exporting countries (Russia, Algeria, etc.) to local retailers who bring gas to the consuming countries to satisfy local demands in the downstream market. Disruption costs are modeled using short-run demand functions. First we mathematically develop a general model and write the associated KKT conditions, then we propose some case studies, under iso-elasticity assumptions, for the long-short-run inverse-demand curves in order to predict qualitatively and quantitatively the impacts of supply disruptions on Western European gas trade. In the second part, we study in detail the German gas market of the 1980s to explain the supply choices of the German retailer, and we derive interesting conclusions and insights concerning the amounts and prices of natural gas brought to the market. The last part of the paper is dedicated to a study of the Bulgarian gas market, which is greatly dependent on the Russian gas supplies and hence very sensitive to interruption risks. Some interesting conclusions are derived concerning the necessity to economically regulate the market, by means of gas amounts control, if the disruption probability is high enough. - Highlights: → We model retail competition using a Nash-Cournot framework. → Risk-neutral retailers decide their import policy among a set of risky producers. → Case 1: the German gas trade of the 1980s to understand the gas sources' choices. → Case 2: the current Bulgarian gas trade to study the market properties. → Conclusions about the market regulation for welfare optimization

  7. Opportunities for an India-European Union Partnership on energy and climate security

    International Nuclear Information System (INIS)

    Barbier, C.; Mathur, R.

    2008-01-01

    cooperation is crucial in order to achieve the UNFCCC target. The European Union and India have, for decades, been cooperating in various fields. A partnership on climate change issues, at both intergovernmental and civil society levels, would be an extremely positive step for both regions. This should not be limited to technology transfer from Europe to India, as is the case within the framework of the Clean Development Mechanism (CDM). Today, quite a few innovations in the environmental field are developed within the emerging countries themselves. This partnership should be primarily conceived as a reciprocal exchange of competencies and the co-development of new technologies. The climate emergency demands the construction of a new development model; this must be the focus of the EU-India partnership's contribution. (authors)

  8. Challenge for the national security of the Republic of Serbia in the concept of common European values

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2016-01-01

    Full Text Available Peaceful future based on common values, as a motive for the integration of the peoples of Europe, implies discontinuity with value-concepts that were the cause of conflicts. When the European Union and its member states ignore the promotion of the Ustasha's ideological concept which caused great evil to Serbia, as a neighboring country and a candidate for EU membership, the doubt arises whether the current value concept contains elements of challenge for the candidate's national security. In this article, we assume that the historical legacy of Nazism has influenced the shaping of European values. The analysis starts from the Nazi views embodied in the root of the interest for unity of Europe, and the factors of influence of the Nazi value order after World War II. The idea of unified Europe can be attributed to Nazis, who had territorial ambitions in terms of Europe as the living space of the Germanic race, under the dominance of Germany. During the war, there was a significant level of collaboration in European states, while Nazis basically aimed to annihilate Jews, Slavs and Gypsies. After the war, anti-Nazism was marginalized, due to the Cold War against communism and the Soviet Union. The identified trends are analyzed in the context of shaping the value system at the time of neo-liberalism and globalization. After the undermining of the international financial system in 1971, and the rise of neo-liberalism, globalization has generated a trend of centralization and financial domination. This is accompanied by neo-conservative doctrine and politics, which promote realism in international relations, and 'desovereignization' of nation states. The example of the coup d'état and civil conflict in Ukraine exposed tolerance for ultra-nationalistic and neo-Nazi ideas. We find that elitism and imperialism remain as value similarities between the Nazi and the current neo-liberal European value discourse, and that there is an essentially identical

  9. The security of energy supply. The European seminar. The green book of the Commission. The IEA judgment. The strategic oil stocks

    International Nuclear Information System (INIS)

    Rose, D.; Burucoa, X.

    2001-01-01

    This issue of Energies et Matieres Premieres journal comprises five articles about the security of energy supplies in Europe and France. The first article is the opening talk given by Christian Pierret at the European seminar on the security of energy supplies (Paris-Bercy, France, Nov. 24 2000). The article gives a broad presentation of the French energy policy in the worldwide economical, political and environmental context of energy. The second article is the concluding talk given by Jean-Michel Charpin at the seminar. The third article reports on some excerpts of the technical summary that was used to elaborate the green book of the European commission about the security of energy supplies. The fourth article is a summary written in collaboration with the IEA about the French policy of security of energy supplies. The last article gives a presentation of the role and management of strategic oil stocks (historical aspects, rules and legal aspects, management of crises, economical impact of the US destocking of September 2000, proposal of the European Commission's green book). (J.S.)

  10. The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-12-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  11. Increasing security of supply: The search for stable models of financing for new nuclear build in the European Union

    International Nuclear Information System (INIS)

    Heffron, Raphael James

    2009-01-01

    Full text: This research assesses models for financing of new nuclear build in European Union (EU) member states to find the most stable form. The countries examined in this study are France, the United Kingdom, Finland and Romania. The results attest that due to various historical, political, competition, and electricity market structural conditions Romania has emerged with the most secure and stable model for financing of new nuclear projects. This paper begins with an assessment of the effects on the nuclear sector from energy, environment and competition legislation in the EU. Then the political and economic climate of the afore mentioned EU member states is completed. Following this an overview of the market structure of the electricity sector in those respective countries is conducted. Then the key research on the models of financing of new nuclear build is explored, contrasted and analysed. The research concludes that there are four main models for financing new nuclear projects in Europe. Each model has transcended from different political and economic forces, and consequently each model has met with varied levels of success. Electricity market structures while operating to the same legal requirements, have been dissimilar in their evolution. The combination of the above factors has led to different models for financing new nuclear build. Upon further analysis it is concluded and demonstrated that the Romanian financing model is the most suitable and provides an example for any new nuclear build aspiring nations in the EU and beyond. (author)

  12. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information

  13. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  14. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  15. The joint European TEMPUS project 'Human Security (environment, quality of food, public health, and society) on territories contaminated by radioactive agents'

    International Nuclear Information System (INIS)

    Goncharova, N.; Butchenkow, I.; Maestri, E.

    2016-01-01

    Full text: The Joint European TEMPUS Project 'Human Security (environment, quality of food, public health, and society) on Territories Contaminated by Radioactive Agents', started in 2012. The EU project participants are the following: University of Cordoba (Spain) - Project Coordinator, University of Parma (Italy), University of Florence (Italy), Swedish University of Agricultural Sciences (Sweden) and Riga Technical University (Latvia). The project involves three partner countries - Belarus, Russia, Ukraine, represented by the following institutions: Belarusian State University, International Sakharov Environmental University, Grodno State Medical University, Grodno State Agrarian University, Voronezh State University, Tyumen State Medical Academy, Ural Federal University (Yekaterinburg), Chelyabinsk State University, Nuclear Cities Information-Education Centre, Vinnitsa National Medical University, Zhytomyr State Technological University, Kyiv International University, Sevastopol National University of Nuclear Energy and Industry, Polissya branch of G.M. Vysotsky Ukrainian Research Institute of Forestry and Forest Melioration. The main objectives of the project are: to develop interdisciplinary Master and Doctoral (PhD) programs in the field of Human Security of people living in areas affected by accidents at nuclear power plants / plant for processing nuclear fuel within the following specialties: Ecology and Environment Sciences - 'Human Security and Environment'; Food quality control - 'Human Security and Quality of Food'; Medicine - 'Human Security and Public Health'; Political and Social Sciences - 'Human Security and Society'. These programs will be implemented at 12 universities, 4 from each partner country. During the project implementation it is expected to achieve the following main results: modified interdisciplinary Master and Doctoral (PhD) programs taking into account the studied European experience and practice; joint system of upgrade of

  16. The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yuri

    2012-03-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that the EU launched the policy which later allowed to transfer part of its security concerns to third countries.

  17. Energy policy in the European Community: conflicts between the objectives of the unified single market, supply security and a clean environment

    International Nuclear Information System (INIS)

    Surrey, J.

    1992-01-01

    Policies for energy and the environment in Europe were previously the preserve of national governments, but the Commission of the European Community has gained a role in both policy areas in the past few years. This was due to the 1987 Single European Act which, in effect, extends the writ of competition law throughout the energy and other previously excluded sectors, expresses the desire to reduce acid rain and greenhouse gas emissions, and reaffirms Europe's renewed concern for long-term oil and gas supply security after the Gulf War and the disintegration of the USSR. The Commission's proposals for the unified internal energy market were driven by concern for competition and free market forces, and seemed to exclude any scope for long-term policy considerations. This paper argues that the implementation of those proposals will be uneven and protracted, and that the Commission's more recent proposals for reducing CO 2 emissions and the European Energy Charter appear to mark positive steps towards a long-term strategy for a clean environment, energy efficiency, and oil and gas supply security. 27 refs., 4 tabs

  18. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [fr

  19. Communication dated 18 December 2013 received from the Delegation of the European Union to the International Organisations in Vienna on the European Union's Support for the IAEA Activities in the Areas of Nuclear Security and Verification

    International Nuclear Information System (INIS)

    2014-01-01

    The Secretariat has received a note verbale dated 18 December 2013 from the Delegation of the European Union to the International Organisations in Vienna with Council Decision 2013/517/CFSP of 21 October 2013, in support of the IAEA activities in the areas of nuclear security and verification and in the framework of the implementation of the EU Strategy against Proliferation of Weapons of Mass Destruction. As requested in that communication, the note verbale and the enclosure are circulated herewith for information [es

  20. Restrictions on European Union Citizens’ Freedom of Movement and Residence in the Country on Grounds of Public Policy, Public Security and Public Health

    Directory of Open Access Journals (Sweden)

    Junevičius Algis

    2016-02-01

    Full Text Available The free movement of persons is one of the most successful European Union projects, serving as a majorly important factor promoting the European integration processes. The adoption of the Treaty on the European Union and the creation of EU citizenship implemented significant changes: the status of EU citizens and their right to move and reside freely within the territory of the Member States can no longer be interpreted in the way it was before the adoption of the Treaty on the European Union. There are no requirements for EU citizens within the Treaty to pursue professional or independent activities or to work under an employment contract in order to access provided rights. However, the right of free movement is not unlimited. The administrations of the Member State governments are authorized to impose restictions on the free movement of citizens. In the light of these facts, this article examines exceptions in the field of free movement of persons and indentifies concepts of public policy, public security and public health. Special attention is given to so-called rule limitation of restrictions and to the mechanism of protection against expulsion from the country. The article concludes by saying that the institutions of Member State governments have the right to evaluate threats within the territory of the country and to decide on the content of public security by themselves. However, their discretion can not be used as an instrument to treat the conduct of other Member State citizens in a worse way than that of their own local citizens.

  1. The European Arrest Warrant in the Italian legal system. Between mutual recognition and mutual fear within the European area of Freedom, Security and Justice

    Directory of Open Access Journals (Sweden)

    Franco Impalà

    2005-12-01

    Full Text Available Italy was the last Member State to transpose the Framework Decision on the European Arrest Warrant. The Italian law entered into full force on 14 May 2005, a full sixteen months later than the appointed date. Conversely, whilst the Framework Decision aimed to speed up extradition between Member States, the Italian implementation law seems to complicate things, providing for dozens of new legal obstacles to surrender. In fact, the execution of an EAW in Italy threatens to become something highly unpredictable. The responsibility for this outcome is shared by the national and the European legislator. Perhaps the latter underestimated the seriousness of the conflict between Third Pillar law and domestic constitutional systems which aim to protect their acquis in the field of fundamental rights. Considering that many Member States seem to be struggling with similar problems, the first part of this article is devoted to describing the current scenario and analysing possible solutions at the supranational level, such as the establishment of a coherent system regulating the allocation of penal competences among Member States. In the next part, the problem of the Framework Decision’s incompatibility with the Italian Constitution will be discussed, and in the final part the Italian implementation law is analysed in more detail.

  2. 17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

    CERN Multimedia

    Maximilien Brice

    2013-01-01

    17 October 2013 - C. Ashton High Representative of the European Union for Foreign Affairs and Security Policy, Vice-President of the European Commission visiting the ATLAS cavern with ATLAS Collaboration Spokesperson D. Charlton; visiting the LHC tunnel at Point 1 with Technology Department Head F. Bordry and signing the Guest book with CERN Director-General R. Heuer.

  3. Integrated energy and climate policy. Securing the supply of natural energy. An investigation of the German and European law; Integrierte Energie- und Klimapolitik. Die Sicherstellung der Erdgasversorgung. Eine Untersuchung deutschen und europaeischen Rechts

    Energy Technology Data Exchange (ETDEWEB)

    Nordmann, Henning

    2012-07-01

    Due to the extreme importance of natural gas as an energy source within an integrated energy policy and climate policy at national and European level, and due to the specific risks associated with the supply of natural gas, the contribution under consideration reports on the security of supply of natural gas. The following aspects are examined: To what extent are regulations on security of the natural gas supply provided in the German and European law. Which actors have the responsibility for the security of supply? What are the weaknesses in the legal arrangement of security of supply? The contribution also reports on the increasing importance of the EU as an actor of guarantee. The contribution of the EU to the security of supply in the supply of natural gas also is analysed.

  4. Protection of drinking water reservoirs in buried glacial valleys in the ice-marginal landscape for securing future demand in the European perspective (ENCORE-Project).

    Science.gov (United States)

    Smit, F. W. H.; Bregman, E. P. H.

    2012-04-01

    Quaternary glaciations have left a significant sedimentological fingerprint in the subsurface of north Europe, in the form of buried glacial valleys. These structures are important drinking water reservoirs for millions of people in the ice-marginal landscape, but are increasingly threatened by anthropogenic pollution (nitrate, sulphate and organic pollutants) and geogenic pollution (salinization). That is one of the conclusion of a recent overview study in the IML of northern Europe from the North Sea to the southern Baltic area. Adequate policy making is yet not possible for several reasons: - Large amounts of data are needed to get a good grip on the lateral continuity of the complex infill. - The BurVal Working Group (2006) has shown that a combination of high resolution seismic survey, together with transient electromagnetic (TEM) surveys can provide realistic data for 3D hydrogeological models. However, these data have not yet been retrieved on a European scale. - Available borehole data can only be used as control points in 3D hydrological models, since the infill of buried glacial valleys is often lateral too complex to make sound interpolations possible. Pollution in buried glacial valleys crosses national borders in northern Europe and therefore national geological surveys have to cooperate in a newly formed European project on protection of these structures. The ENCORE - project (Environmental Conference of the European Regions) has shown in the past that it can facilitate fruitful European cooperation, which is urgently needed due to the costs of gathering data and due to knowledge gaps between different countries. By working together in a European context, these problems can be reduced so that better policy making is possible in order to secure our future drinking water availability.

  5. Green paper: towards a European strategy for the security of energy supply; Livre Vert: vers une strategie europeenne de securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-04-01

    The Green Paper ''Towards a European strategy for the security of energy supply in Europe'', published in 2002, gives a clear priority to energy efficiency and renewable. Although it is not a legislative document, it is accepted by the main actors as a reference for all energy related actions. Energie-Cites welcomes the Green Paper. This document gives a clear review of the energy context in Europe and raises fundamental questions, in particular, the place given to energy demand management, presented as the priority policy to ensure security of supply and compliance with the European Union international commitments. However, they precise three important points. It is indispensable that potential energy savings be quantified so as to emphasize the importance of a resource that has always been underestimated. By the same token, the ''demand management'' option presented in the Green Paper would gain in credibility if several alternative scenarios were proposed, the impact and the conditions for the success of such a policy being then more clearly apparent. A policy with a stronger focus on demand management and renewable energy requires one to redirect attention towards a different set of players. (A.L.B.)

  6. Institutional change in European natural gas markets and implications for energy security: Lessons from the German case

    International Nuclear Information System (INIS)

    Westphal, Kirsten

    2014-01-01

    This article focuses on institutional change in the German gas market driven by EU internal market and climate policies. It argues that institutional change has functional externalities for energy security. The German gas market provides a useful case study, as Germany is the biggest continental gas market, a major hub and transport country which has largely privatised, unbundled and separated its natural gas undertakings. Transition is ongoing, tending towards an internal market. Inter/national natural gas economics is in flux. Institutional evolution has repercussions for corporate and market structures, the operating of the system and the realization of transactions. Changes in the institutional framework crucially affect energy security, which is often associated with institutional stability. On the basis of this case study, it is argued herein that the security of natural gas supplies should be reexamined in the context of the developments described above, since overall the institutional changes in natural gas security lag behind the EU’s internal natural gas market development. - Highlights: • EU natural gas market regulation primarily aims to establish competitive markets. • German/EU regulatory approach has externalities for supply security. • Institutional changes and breaks with path dependencies take place in Germany/the EU. • Institutional change results in increasing uncertainty and complexity. • Subsequent change in perceptions and expectations may destabilise trade relations

  7. The European supply security of petroleum and natural gas in the coming years. Economical and geopolitical risks

    International Nuclear Information System (INIS)

    Van der Linde, C.

    2001-01-01

    An overview is given of the geopolitical risks for oil and gas and (inter)national strategies to limit those risks. The risk assessment is motivated by the increasing dependency for European countries on imports of oil and gas from the Russian Federation, Caspian Sea region and the countries around the Persian Gulf in the next decades [nl

  8. Metrics, models and foresight for European sustainable food and nutrition security: the vision of the SUSFANS project

    NARCIS (Netherlands)

    Rutten, M.M.; Achterbosch, T.J.; Boer, de I.J.M.; Cuaresma, Jesus Crespo; Geleijnse, J.M.; Havlik, P.; Heckelei, T.; Ingram, John; Leip, Adrian; Marette, Stephan; Meijl, van J.C.M.; Soler, L.G.; Swinnen, J.; Veer, van 't P.; Vervoort, J.M.; Zimmermann, A.; Zimmermann, K.L.; Zurek, M.

    2018-01-01

    This paper defines the research agenda of the SUSFANS project, describes its history and its potential societal impacts. It contributes to balanced and encompassing views on how to strengthen food and nutrition security outcomes in the EU and how to improve the performance of the food system in the

  9. «GREEN» LOGISTICS AS A TOOL TO ENSURE ENVIRONMENTAL SECURITY AND INSTITUTIONAL INNOVATION SUBSOIL EUROPEAN ARCTIC

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2016-01-01

    Full Text Available This article is an overview of the major logistics and technology solutions to be implemented to streamline the subsoil use in the European Arctic. The theme of this work is very urgent, because Russia, despite the high resource base is underdeveloped institutional framework and resource extraction is characterized by the maximum level of loss of potential gross value of the hydrocarbon potential.The purpose of this article is to study Russian priorities at national and regional level, related to mining, through the use of «green» logistics as an instrument for environmental safety and institutional innovation subsoil of the European Arctic.Methodology. The methodological basis of this article are comparative, economic and statistical analysis methods.The results of this paper have become the solutions to problems, to achieve this goal, in particular: a substantiated conclusion that the Arctic is a world heritage and «climate laboratory» of the planet, so the development of the resource, industrial, transport and logistics potential of the region need to be based on «green» technologies; The article describes four environmentally-oriented direction (creating material and technical base, the formation of a safe icebreaker fleet, the development of new navigation and communication systems, power supply, which will enable to master the industrial, transport and logistics potential of the Arctic with minimal anthropogenic load.Conclusions. The following basic conclusions were as follows: first, subarctic and arctic areas are world heritage, so the development of deposits on them should be in the interest of the world community on a non-discriminatory  basis; secondly, hydrocarbon reserves, concentrated in the European Arctic, currently can not be extracted without environmental impacts, access to these resources is limited due to lack of development of the transport component, therefore, should be used aggressive techniques of extraction of

  10. German unity, conventional disarmament, confidence-building defense, and a new European order of peace and security

    International Nuclear Information System (INIS)

    Brauch, H.G.

    1992-01-01

    This paper discusses a solar development initiative, or a demilitarized SDI, sponsored jointly by the CSCE countries as a conversion project which could contributed to conflict avoidance. If hydrogen can be obtained in solar energy plants in a cost-effective way, if desalination can be achieved on a massive scale, the social vision of a demilitarized SDI may be more realistic: to use solar energy for desalination of water and their transport to regions, e.g., in the Sahel where there is a shortage. The gas pipeline deal between the USSR and several West European countries could be a model for such a cooperative high technology conversion project that serves a basic human need; to supply water cheaply to permit farming and to offer survival for the people in the Sahel and in other parts of the world where there is a surplus of sun but a shortage of water. This vision will contribute to a dismantling of cold war institutions that impede the realization of a new European peace order

  11. The tension between cross-border cooperation in the European Area of Freedom, Security and Justice and the fundamental rights of mentally ill offenders in detention.

    Science.gov (United States)

    Meysman, Michaël

    2016-01-01

    In two recent judgements, the European Court of Human Rights (ECtHR) has given an alarming signal regarding the placement, care and treatment of mentally disordered offenders in Belgium. This article analyses these judgements and the Court's assessment that Belgium faces a structural problem regarding the detention of people with a mental illness in prison. By exploring other recent ECtHR decisions across the EU and combining this with an analysis of international norms and standards, it contends that there is something amiss regarding the post-trial approach towards mentally disordered offenders in an EU-wide context. The potential hazards of this situation, from both an individual and an EU perspective are then presented by analysing the EU Framework Decision on the transfer of prisoners (which aims to facilitate offender rehabilitation) and the EU Court of Justice's interpretation of the relationship between instruments like the Framework Decision that are based on mutual recognition and fundamental rights. Lastly, the EU's initiative for enhancing procedural rights in criminal proceedings through the Roadmap trajectory, and the subsequent Commission Recommendation of 27 November 2013, are scrutinized. Based on this research, the article pinpoints the flaws and vacuums that currently exist for mentally disordered offenders, and the negative outcome this may have on the legitimacy and effectiveness of the European Area of Freedom, Security and Justice. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security

    International Nuclear Information System (INIS)

    Benhassine, W.

    2009-04-01

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  13. Harmonization of domestic legislation in the field of civil law with the European Union law: Securing of claims by means of fiduciary agreements

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan

    2012-01-01

    Full Text Available This paper analyses fiduciary agreements, which, as a form of contract, that is the means of securing obligation and legal claims, are regulated by provisions of specific laws and codifications in some of the European Union countries. Even the Montenegrin legislator enacted a special law governing these legal matters, however in the Serbian law fiduciary agreements fall into the category of innominate contracts. Fiducia originates in the Roman Law and constitutes the first common form of the pledge law. The Latin term fiducia means 'trust', since these legal matters were, first of all, based on the trust between contractual parties. This paper addresses the institution of 'trust' as it is the Anglo-Saxon counterpart of the fiduciary agreement. Etymologically, 'trust' has the same meaning as the term fiducia - trust. Due to their advantages, fiduciary agreements are not even uncommon in the domestic legal practice, while there are certain, as we have already announced, theoretical, but also practical concerns arguing admissibility of this legal matter. These arguments mainly come down to the thesis (mentioned above that entering into the fiduciary agreement results in violation of the ban on performance of contract lex commissoria in the pledge law. Nevertheless, I provided explanation that differences between contracts of pledge and fiduciary agreements clearly point to the conclusion that fiduciary agreements may not be treated as a pledge, hence they are admissible, that is, they are concluded on the principle of contractual freedom as an imperative norm of the Law on Obligations. Fiduciary agreements (in relation to the realistic means of security offer to the creditor a higher level of security, reduce the period of payment of his claims, also providing practical benefits for the debtor himself. The paper presents the reasons supporting the view that it would be advantageous for the Serbian legislator, in the process of harmonization of the

  14. Russian gas price reform and the EU-Russia gas relationship: Incentives, consequences and European security of supply

    International Nuclear Information System (INIS)

    Spanjer, Aldo

    2007-01-01

    In order to provide a comprehensive picture on the relationship between Russia and the EU, the focus should be on both the external energy relationship as well as Russia's internal organization. This paper sets out to do this by combining both strands of research in order to arrive at recommendations for Europe on the way to adjust its energy policy towards Russia. The emphasis is on whether or not Russia should impose unified gas pricing. Main conclusions are that the perceived advantages of unified Russian gas pricing to Russia as well as Europe are in fact overstated and that EU security of supply might worsen under unified gas prices. Three policy recommendations are that EU policy should (1) more explicitly acknowledge the interdependence between Russia and Europe; (2) not push Russia towards unified gas pricing; and (3) not take for granted any increase in Russian exports flowing to Europe

  15. The European Union, the ESDP, and the question of Turkey /

    OpenAIRE

    Taylor, Alistair

    2005-01-01

    This paper analyses the potential contribution in terms of crude capabilities that Turkey could bring to the European Union’s ESDP security framework. The history of the European Union’s security aspirations and the security policy preferences of the major actors in European security will also be examined as a way of framing the question of Turkey's potential role within the emerging European security and defense framework. The second chapter will look at how European security has evolved fro...

  16. Comparison of External Exposure of Central and Eastern-European States as a Factor Threatening Financial Security of Their Economies

    Directory of Open Access Journals (Sweden)

    Magdalena Redo

    2018-06-01

    Full Text Available Central and Eastern-European countries are strongly linked to the international economic and financial systems, which results in their dependence on foreign capital and on the upturn in the global markets. This situation also makes them vulnerable to external shocks. Resilience of the economies of CEE countries was additionally diminished by their relatively quick and uncompromising opening up to the process of globalization and European integration. All the economies subject to scrutiny have quite a substantial external debt level (reaching 55–139% of GDP, their net international investment position is quite strongly in the negative (constituting 25–71% of GDP. They are also characterized by high level of foreign liabilities (85–350% of GDP, a significant degree of trade openness (export and import of goods and services amounting to 41–94% of GDP, considerable rate of foreign liquid portfolio investments (even as much as 32% of GDP. Another common feature is the strong financial support received from the EU budget, with CEE countries being its net beneficiaries (with the accumulated value of funds received from the EU budget in 2004–2015 at the level of 21–42% of GDP. It should be borne in mind that Lithuania, Latvia, Estonia, Slovenia and Slovakia are members of the Eurozone, i.e. operate an international currency, which improves their creditworthiness and augments the trust of the global markets. What seems not without significance for investors is the fact that the IMF classified these five CEE countries – as well as the Czech Republic – as advanced economies. In light of the above, it should be stated that the Polish economy is characterized by a relatively strong external exposure relative to the creditworthiness the country boasts. This exposure increases Poland’s vulnerability to shocks and makes it less immune thereto. These circumstances partially explain the higher estimation of the risk premium for investments in

  17. Hungary-Ukraine energy cooperation and its contribution to the security of supply in the European Union

    Energy Technology Data Exchange (ETDEWEB)

    Kiss, P.

    2007-07-01

    The European Union (EU) will be increasingly dependant upon non-EU primary energy resources as domestic resources are depleted. Ukraine can play a pivotal role in future supply to the EU through its neighbor Hungary. Ukraine is the largest country in the world by volume of gas transit. Through its pipeline, the transit gas deliveries amount annually to 140 billion m{sup 3}, including 120 billion m{sup 3} to countries of Central and Western Europe. The country also has an under-utilized 750 kV electricity transmission line that reaches into Hungary. These assets make Eastern Hungary a key location for a Combined Cycle Gas Turbine (CCGT). A plant of this type would be able to provide electricity generation for the Central Eastern Europe (CEE) region. The heat generated by the plant could also be used in local industrial and agricultural production, thereby providing an additional impetus for regional development initiatives. Hungary is open for foreign investment from the West, but also from investors in the Ukraine and Russia. The construction of the CCGT plant and the related regional development is a great opportunity to strengthen the cooperation of Ukraine, the EU and Hungary for the common benefit of the entire region. (auth)

  18. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  19. THE EUROPEAN UNION’S EXTERNAL AFFAIRS POLICY – THE HIGH REPRESENTATIVE OF THE UNION FOR FOREIGN AFFAIRS AND SECURITY POLICY – A FAVORABLE FRAMEWORK FOR CREATING A SINGLE VOICE FOR THE EUROPEAN DIPLOMATIC SYSTEM OR JUST A NEW BUREAUCRATIC STRUCTURE?

    Directory of Open Access Journals (Sweden)

    Alexandru Bogdan CALANCE

    2015-12-01

    Full Text Available Starting with the Lisbon Treaty, which establishes the new European diplomatic landscape structure, this paper analyses the difference between the objectives expressed in the treaties governing the European Union's foreign policy, and the diplomatic European and international reality. The main objective of this paper is to reveal the extent in which the European Union runs a coherent and unified foreign policy, especially highlighting the problems faced by these institutions in the current international environment, after five years since the creation of the High Representative of the Union for Foreign Affairs and Security Policy, as well as the European External Action Service The results of this paper show that, although from a legal standpoint it was attempted to clearly outline how the Union's external policies should work, on a practical level, this area still faces difficulties in performing at its full capacity.

  20. The role of electric grids in the European energy policy. Grids development is necessary to supply cleaner and securer electric power

    International Nuclear Information System (INIS)

    Merlin, A.

    2009-01-01

    The world is actually entering a new energy era where CO 2 emissions must be reduced. Consequently, the European Union policy includes three goals: a) to reduce greenhouse gas emissions and fossil energy consumption; b) to improve the security of energy supply; c) to improve interconnection between regions. In this context, electrical grids play a strategic role. While the overall energy consumption in Europe will decrease, the electricity demand will increase by more than 1% per year. A large part of this increase will be covered by renewable energy sources, especially wind energy. In 2020 the total wind power installed in Europe should be ∼1000 GW, leading to a mean power production of 200-250 GW. This makes necessary an adaptation of electrical grids in order to be able to integrate into the system large power sources of intermittent character, and also to improve the solidarity of the different countries. The interconnection of the grids must be improved in order to balance electricity supply and demand. For the transport of electricity over large distances, developments will take place in three different areas; a) high voltage alternative current for most of the grids; b) high voltage direct current where it is necessary to overpass obstacles (mountains, sounds); c) gaseous insulation technology for underground transport. Local (mostly low voltage) grids must also be adapted: so far, they only carry electricity in one direction, to the customers. With the distributed power production, electricity transport in the reverse direction must also be considered

  1. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  2. Jeksternalizacija migracionnogo kontrolja v Evropejskom sojuze: pervye shagi po formirovaniju vneshnepoliticheskogo izmerenija prostranstva svobody, bezopasnosti i pravosudija [The externalisation of migration control in the European Union: first steps towards the external dimension of the space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ryabov Yury

    2012-01-01

    Full Text Available The creation of an area of freedom, security and justice is one of the most rapidly developing aspects of European integration. It this paper, we take a look at the foreign policies involved in this process — aside from the internal development of the European Union, they concern a significant number of third countries, including Russia. In our view, the efforts to manage the flow of migrants and asylum seekers constitute a viable part of the external dimension within the AFSJ policies. Much of this article is based on the theoretical postulates introduced by the scholars of the Paris School, a school within the discipline of security studies that conceptualized the connection between migration, terrorism, asylum, crime and ethnic clashes, and its role as a major threat facing the European Union. Externalization of this complex threat (that is, externalization in relation to the European Union is thus seen as one of the key prerequisites to advancement of migration management activities beyond the EU (i. e. externalization of migration management. In this article, we analyze the role the EU plays at the international scene and categorize the actions it took to manage the influx of migrants and asylum seekers from the 1980s until the time when supranational administrative bodies were granted mandates in the spheres of Justice and Home Affairs (JHA of the EU Member States. We conclude that it was as early as the 1990-s that th

  3. Turkey and European Security Institutions

    Science.gov (United States)

    2009-03-01

    Korean War, when Turkey sent troops in support of the United Nations defense of South Korea. As a Muslim country, Turkey’s cooperation with the United...history of Turkish cinema : “Valley of the Wolves Iraq.” The United States military deemed the film and its viewers potentially dangerous enough that

  4. A Reflection on European Security

    Directory of Open Access Journals (Sweden)

    Cameron R. Hume

    1997-12-01

    Full Text Available En la conferencia final de las Jornadas, Cameron Hume examina el interés histórico de Estados Unidos en la seguridad europea y revisa algunas de las más importantes cualidades de la relación transatlántica, que encuentra sus orígenes en el Plan Marshall. La creación de la OTAN en 1949 proporcionó una institución que ayudaría a crear un medio para la expansión de las instituciones libres. Hoy en día, seis años después del fin de la Guerra Fría, la compleja agenda de seguridad del continente europeo implica nuevos retos tantopara Estados Unidos como para las instituciones europeas, como por ejemplo la ampliación de la OTAN. Hume señala que existen vínculos demográficos, políticos y económicos que impelen a Estados Unidos hacia Asia y América Central y del Sur, y provocan cambios en las percepciones estadounidenses sobre la seguridad europea. También subraya las dificultades inherentes a la aparición de un poder supranacional en la Unión Europea en temas de política exterior, que tendrá que decidir en asuntos como el uso de la fuerza parasalvaguardar la seguridad del continente. Dado que la imprevisibilidad es inevitable, Hume se muestra favorable a una aproximación colectiva a los futuros problemas de seguridad,fundada en el diálogo con Rusia y con países asiáticos y Mediterráneos, que enfatice la cooperación –no la competición– y no sea una simple toma de posturas. Esta aproximación debiera tener suficiente energía para aceptar cambios en ambos lados del Atlántico eidentificar objetivos a largo plazo.

  5. The European Union’s Policy Regarding Peace and Security in Sub-Saharan Africa Since the End of the Cold War: Concepts and Implementation

    Science.gov (United States)

    2007-06-01

    Policy: The Commission as Policy Entrepreneur in the CFSP,” European Foreign Affairs Review 8, no. 2 (2003): 221. 4 Stephan R. Hurt, “The European...Harvey, eds. Millennial Reflections on International Studies. Michigan: University of Michigan Press, 2002. Keohane, Robert, and Lisa L. Martin. “The... Entrepreneur in the CFSP.” European Foreign Affairs Review 8, no. 2 (2003): 221-237. ———.“Mehr als ein Papiertieger? Die Konfliktbearbeitungspolitik

  6. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ...), Assuming that national differences can be detected, the study proceeds in assessing whether there is an opportunity to reconcile them, or even to establish a European paradigm of strategic thinking...

  7. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report

    International Nuclear Information System (INIS)

    Tourneur, J.C.

    2009-01-01

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  8. Clausewitz and the Theory of Military Strategy in Europe - Reflections Upon a Paradigm of Military Strategy Within the European Common Security and Defense Policy (ESDP)

    National Research Council Canada - National Science Library

    Hartmann, Uwe

    2001-01-01

    ... as a core element of the Common Security and Defense Policy of the EU, Based on the interpretation of Clausewitz's theory of war and strategy in Britain, France, and Germany, main commonalities...

  9. 6. Analisis Implementasi Cyber Security Di Uni Eropa: Studi Kasus Carbon Credits Hacking Dalam European Union Emission Trading Scheme (EU ETS) Tahun 2010-2013

    OpenAIRE

    Aisya, Naila Sukma; Putranti, Ika Riswanti; Wahyudi, Fendy Eko

    2017-01-01

    Since the last two decades in the 20th century, the European Union (EU) has presented itself as a leader in climate change issues. The leadership manifested in the formation of the European Union Emission Trading Scheme (EU ETS) as an effort to fulfill the commitments of the Kyoto Protocol to reduce emissions in the region. But the existence of the EU ETS has been challenged by the emergence of carbon credits hacking case in some national registration systems in the EU ETS. This study discuss...

  10. European Sovereign Bond-Backed Securities – a Proposal to Mitigate Risks Arisen from the Lack of an Euro Area Common Fiscal Policy

    Directory of Open Access Journals (Sweden)

    Munteanu Bogdan

    2017-01-01

    Full Text Available “European Sovereign Bond-Backed Securities” explores the complexities of having a fiscal unionfor Euro Area. All measures taken for fiscal integration are elements that need cohesion in order tobreak the vicious circle of unsustainable public debt affecting the balance sheets of banks anddeepening the need for rescue, which signals a further deterioration in asset valuation and marketsshrinking, worsening further the economic conditions. The need for a synthetic bond obtained bysecuritization of Euro Area governments’ debts emerges as viable proposal to break this public debt– private debt circle. Furthermore, it explores the “impossible trinity” (Mundell-Flemming and thetranslation into the Euro Area. The conclusions point to the need for institutionalized and officialapproach of introducing such derivative products like European Sovereign Bond-Backed Securitiesin the quest for safe assets, aiming to break the circle of debt (effect by substituting the absence of acommon fiscal policy (cause.

  11. Energy 2020. A strategy for competitive, sustainable and secure energy. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions

    International Nuclear Information System (INIS)

    2010-01-01

    The Communication defines the energy priorities for the next ten years and sets the actions to be taken in order to tackle the challenges of saving energy, achieving a market with competitive prices and secure supplies, boosting technological leadership, and effectively negotiate with our international partners. On the basis of these priorities and the action presented, the Commission will come forward with concrete legislative initiatives and proposals within the next 18 months. This communication also sets the agenda for the discussion by Heads of States and Governments at the very first EU Summit on Energy on 4 February 2011.

  12. Secure Energy Supply 2009. Welcome address

    International Nuclear Information System (INIS)

    Slugen, V.

    2009-01-01

    In this invitation lecture professor Slugen (President of Slovak Nuclear Society and President of European Nuclear Society) invited the participants of the International Conference: Secure Energy Supply 2009.

  13. Performativity and the project: enacting urban transport security in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2015-01-01

    In April 2011, a large consortium of European rail and security suppliers, transport operators and research organisations launched the Secured Urban Transportation - European Demonstration (SECUR-ED) project with the objective of providing public transport operators with the means to enhance urban

  14. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  15. Speaker's presentations. Energy supply security

    International Nuclear Information System (INIS)

    Pierret, Ch.

    2000-01-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  16. European Union and oil

    International Nuclear Information System (INIS)

    Paillard, Christophe Alexandre

    2004-01-01

    In a context of oil price increase, problems about a Russian oil company (Loukos), and uncertainties in the Middle-East, the possibility of a new oil shock is a threat for Europe, and raises the issue of a true European energy policy which would encompass, not only grid development, environmental issues or market regulation issues, but also strategic issues related to energy supply security. This article proposes an overview of the European policy: first steps for a future European energy and oil policy in the green paper of the European Commission published in November 2000, issues of pollution and safety for hydrocarbon maritime transport. The article then examines the possibility of a third oil shock due to a crisis in the Middle East, and discusses whether European must have strategic stocks to face an outage of oil supplies

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. Green paper - towards a European strategy for the security of energy supply, technical document; Livret vert sur la securite de l'approvisionnement en energie, document technique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  20. Gas markets and security of supply

    International Nuclear Information System (INIS)

    Gibot, G.

    1997-01-01

    In the natural gas business, some European states and companies seem to be concerned by security of supply. Security of supply for a governmental organisation is discussed, to share the author's conception and experience. The targets of a security of supply policy and the measures that can be set are described. The possible changes in implementing this policy are considered, according to recent developments in the field of gas security. The specificity of European gas markets justify the concern in security of supply, as concluded the Commission and the IEA. The integration of national gas markets in Europe will give new opportunities for managing this security of supply. (R.P.)

  1. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  2. Counterproliferation, Border Security and Counterterrorism Subject-Related Laws and Regulations, Including Export Control Regimes in South-Eastern European Countries

    International Nuclear Information System (INIS)

    Bokan, S.

    2007-01-01

    gaps exist, much less fill them. All this suggests that, to fulfil obligations under UNSC Resolutions 1540 and 1373, States must enact harmonized criminal prohibitions and authorization for law enforcement cooperation in order to establish a seamless web of security among all nations. Failure to do so implicitly poses a threat to international peace and security. One of the main issues which deserve to be further addressed and which prompts the continuation of the Southeast Europe Counterproliferation, Borger Security and Counterterrorism (CBSC) Working Group is to harmonize national laws and regulations that deal with deterring, detecting and interdicting WMD. Inventory of relevant CBSC subject-related laws of the Southeast Europe countries, including Export Control Laws was created and prepared for further consideration and harmonization by judiciary experts, with the aim to develop m odel laws . Let me very briefly present you the main features of the SEDM CBSC subject-related laws and regulations. This paper will present that inventory which includes the membership in the international Conventions, Treaties and Arrangements and also the membership in Multilateral Export Control Regimes of Southeast Europe countries. Also, it will be presented the membership in the international legal instruments that play an integral part in the global fight against terrorism. (author)

  3. Denmark and the European Union

    DEFF Research Database (Denmark)

    Manners, Ian

    2011-01-01

    Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan, K...... of this book, two of Kelstrup’s most important intellectual contributions come from his work on Denmark’s relations with the European Union, and his use of systems theory to understand the EU.......Over the past two decades Morten Kelstrup’s work has been at the centre of three important intellectual innovations in political science – the study of the EU as a regional political system; European security studies; and small states in European integration. Kelstrup’s best known books (Buzan...

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Evropejskaja ideja v Central'noj Evrope i Skandinavii kak chast' politiki bezopasnosti i mirnogo sosushhestvovanija v ramkah poslevoennogo planirovanija [The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-01-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  6. Twenty-First Century Europe: Emergence of Baltic States into European Alliances

    National Research Council Canada - National Science Library

    Brasier, Patricia

    2003-01-01

    ...), the European Union (EU) and the Organization for Security and Cooperation in Europe (OSCE), upon completing their membership obligations will enhance stability and security within the European continent. The U.S...

  7. Masters in Nuclear Security

    International Nuclear Information System (INIS)

    Rickwood, Peter

    2013-01-01

    Continuing global efforts to improve the security of nuclear and other radioactive material against the threat of malicious acts are being assisted by a new initiative, the development of a corps of professional experts to strengthen nuclear security. The IAEA, the European Commission, universities, research institutions and other bodies working in collaboration have established an International Nuclear Security Education Network (INSEN). In 2011, six European academic institutions, the Vienna University of Technology, the Brandenburg University of Applied Sciences, the Demokritos National Centre for Scientific Research in Greece, the Reactor Institute Delft of the Delft University of Technology in the Netherlands, the University of Oslo, and the University of Manchester Dalton Nuclear Institute, started developing a European Master of Science Programme in Nuclear Security Management. In March 2013, the masters project was inaugurated when ten students commenced studies at the Brandenburg University of Applied Sciences in Germany for two weeks. In April, they moved to the Delft University of Technology in the Netherlands for a further two weeks of studies. The pilot programme consists of six teaching sessions in different academic institutions. At the inauguration in Delft, IAEA Director General Yukiya Amano commended this effort to train a new generation of experts who can help to improve global nuclear security. ''It is clear that we will need a new generation of policy-makers and nuclear professionals - people like you - who will have a proper understanding of the importance of nuclear security,'' Mr. Amano told students and faculty members. ''The IAEA's goal is to support the development of such programmes on a global basis,'' said David Lambert, Senior Training Officer in the IAEA's Office of Nuclear Security. ''An existing postgraduate degree programme focused on nuclear security at Naif Arab University for Security Sciences (NAUSS) is currently supported by

  8. The European Crisis Management: An Organizational Narrative

    OpenAIRE

    Patrícia Kaplánová

    2016-01-01

    The debate of scholars in the field of international relations in last years has put the European Union’s role into the consideration. The European Foreign and Security Policy has positioned itself through its development to the constructive and normative line of research of world politics. With this respect, this article examines a character of crisis management of the European Common Foreign Policy based on the institutional development. Besides the European Union does not po...

  9. European Union

    International Nuclear Information System (INIS)

    Schaller, K.

    1995-01-01

    Different instruments used by European Commission of the European Union for financial support radioactive waste management activities in the Russian Federation are outlined. Three particular programmes in the area are described

  10. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  11. A decade of African Union and European Union trans-national ...

    African Journals Online (AJOL)

    The first decade of the new millennium saw the European Union deploy nine security missions to the African continent, quoting the European Security and. Defence Policy. Unlike the numerous United Nations security missions that. European states had previously contributed to, these were part of a grand strategy designed ...

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  14. Protection promotion and cooperation in the European semiconductor industry

    DEFF Research Database (Denmark)

    Martin, Stephen

    1996-01-01

    in the European market. Using strategies that involve world-wide cooperation, European firms are beginning to carve out secure places for themselves in what is now a world market. Joint ventures have been critical in bringing European firms up to world performance levels, but extra-European as well as intra...

  15. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  16. Eastern Dimension of the European Neighbourhood Policy: Europeanization Mutual Trap

    Directory of Open Access Journals (Sweden)

    V. A. Latkina

    2014-01-01

    Full Text Available The article analyses the Europeanization policy of the European Union towards the Eastern Partnership participant countries. Suffering from the lack of clear strategy and ultimate goal in the European Neighbourhood Policy the European Union enhances external democratization and its governance in post soviet states without immediate Union's membership perspective. Underestimation of common neighbourhood geopolitical duality in the context of growing rivalry between European (EU and Eurasian (Custom Union/Eurasian Economic Union integration gravitation centers presents the Eastern partners of the EU with a fierce dilemma of externally forced immediate geopolitical and civilizational choice while not all of them are well prepared to such a choice. The mutual Europeanization trap here to be studied both for the EU and its Eastern partners (involving Russia is a deficiency of regulating cooperation mechanism in the situation of European and Eurasian free trades zones overlapping. Vilnius Summit 2013 results test the "European aspirations" of the New Independent States and upset the ongoing process of the European Neighbourhood Policy in the context of growing economic interdependence in Wider Europe. Besides, the Ukrainian crisis escalation during 2014 as a new seat of tension provokes unbalance of the whole European security system and creates new dividing lines in Europe from Vancouver to Vladivostok.

  17. The common European flexicurity principles

    DEFF Research Database (Denmark)

    Mailand, Mikkel

    2010-01-01

    This article analyses the decision-making process underlying the adoption of common EU flexicurity principles. Supporters of the initiative succeeded in convincing the sceptics one by one; the change of government in France and the last-minute support of the European social partner organizations...... were instrumental in this regard. However, the critics succeeded in weakening the initially strong focus on the transition from job security to employment security and the divisions between insiders and outsiders in the labour market. In contrast to some decision-making on the European Employment...

  18. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. The Revitalisation of NATO and European Security

    Directory of Open Access Journals (Sweden)

    Nicholas Williams

    1997-12-01

    Full Text Available Los esfuerzos para construir una Identidad Europea de Seguridad y Defensa (IESDrecibieron un impulso importante tras la experiencia yugoslava, que revitalizó la OTAN y mostró a los países europeos sus limitaciones. Estas se evidenciaron especialmente tras la decisión, adoptada en 1996 en Berlín por los ministros de asuntos exteriores delos países de la Alianza, de construir la IESD dentro del marco OTAN. Williams revisa los futuros retos de la IESD a la luz de la ampliación de la OTAN, el fortalecimiento del Partenariado para la Paz y el Acta Fundacional firmada por Rusia. También repasa la iniciativa de diálogo entre la OTAN y algunos países del Mediterráneo, señalando al menos tres factores que pueden afectar su evolución: el propio mensaje de la OTAN, que indica a la vez la voluntad de cooperar con esos países y la amenaza que representala proliferación de armas de destrucción masiva en el Mediterráneo; la apariencia de que la OTAN está construyendo estructuras militares en su flanco sur; y la evidente triplicidad entre la UEO, la UE y la OTAN en el debate sobre acuerdos de seguridad en el Mediterráneo.

  20. European Security in an Evolving World

    Science.gov (United States)

    2011-06-18

    Years’ Crisis, 36.    2 Nobelprize.org website, “The Nobel Peace Price 1937: Robert Cecil,  Biography ,” http://nobelprize.org/nobel_prizes/peace/laureates...help their brethren expel the Turks from Jerusalem .”23                                                          20Steven Erlanger, "France

  1. Creating a European SCADA Security Testbed

    NARCIS (Netherlands)

    Christiansson, H.; Luiijf, H.A.M.

    2008-01-01

    Supervisory control and data acquisition (SCADA) systems are commonly used to monitor and control critical infrastructure assets. However, over the past two decades, they have evolved from closed, proprietary systems to open networks comprising commodity platforms running common operating systems

  2. European communion

    DEFF Research Database (Denmark)

    Manners, Ian James

    2013-01-01

    Political theory of European union, through an engagement between political concepts and theoretical understandings, provides a means of identifying the EU as a political object. It is argued that understanding the projects, processes and products of European union, based on ‘sharing’ or ‘communion......’, provides a better means of perceiving the EU as a political object rather than terms such as ‘integration’ or ‘co-operation’. The concept of ‘European communion’ is defined as the ‘subjective sharing of relationships’, understood as the extent to which individuals or groups believe themselves to be sharing...... relations (or not), and the consequences of these beliefs for European political projects, processes and products. By exploring European communion through an engagement with contemporary political theory, using very brief illustrations from the Treaty of Lisbon, the article also suggests that European...

  3. Capitalizing on emergence: The 'new' civil security market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential

  4. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  5. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  6. European Institutions?

    NARCIS (Netherlands)

    Meacham, Darian

    2016-01-01

    The aim of this article is to sketch a phenomenological theory of political institutions and to apply it to some objections and questions raised by Pierre Manent about the project of the European Union and more specifically the question of “European Construction”, i.e. what is the aim of the

  7. European Whiteness?

    DEFF Research Database (Denmark)

    Blaagaard, Bolette

    2008-01-01

    Born out of the United States’ (U.S.) history of slavery and segregation and intertwined with gender studies and feminism, the field of critical whiteness studies does not fit easily into a European setting and the particular historical context that entails. In order for a field of European...

  8. Mining in the European Arctic

    NARCIS (Netherlands)

    van Dam, Kim; Scheepstra, Annette; Gille, Johan; Stępień, Adam; Koivurova, Timo

    The European Arctic is currently experiencing an upsurge in mining activities, but future developments will be highly sensitive to mineral price fluctuations. The EU is a major consumer and importer of Arctic raw materials. As the EU is concerned about the security of supply, it encourages domestic

  9. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  10. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  11. Selective Europeanization

    DEFF Research Database (Denmark)

    Hoch Jovanovic, Tamara; Lynggaard, Kennet

    2014-01-01

    and rules. The article examines the reasons for both resistance and selectiveness to Europeanization of the Danish minority policy through a “path dependency” perspective accentuating decision makers’ reluctance to deviate from existing institutional commitments, even in subsequently significantly altered...... political contexts at the European level. We further show how the “translation” of international norms to a domestic context has worked to reinforce the original institutional setup, dating back to the mid-1950s. The translation of European-level minority policy developed in the 1990s and 2000s works most...

  12. Conceptualizing energy security

    International Nuclear Information System (INIS)

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  13. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  14. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  15. Secure multiparty computation goes live

    NARCIS (Netherlands)

    Bogetoft, P.; Christensen, D.L.; Damgard, Ivan; Geisler, M.; Jakobsen, T.; Kroigaard, M.; Nielsen, J.D.; Nielsen, J.B.; Nielsen, K.; Pagter, J.; Schwartzbach, M.; Toft, T.; Dingledine, R.; Golle, Ph.

    2009-01-01

    In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish Strategic Research Council and the European

  16. Secure multiparty computation goes live

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Christensen, Dan Lund; Damgård, Ivan Bjerre

    2009-01-01

    In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. This work was supported by the Danish Strategic Research Council and the European...

  17. European Community.

    Science.gov (United States)

    1987-05-01

    The European Community was established in 1951 to reconcile France and Germany after World War II and to make possible the eventual federation of Europe. By 1986, there were 12 member countries: France, Italy, Belgium, the Federal Republic of Germany, Luxembourg, the Netherlands, Denmark, Ireland, the United Kingdom, Greece, Spain, and Portugal. Principal areas of concern are internal and external trade, agriculture, monetary coordination, fisheries, common industrial and commercial policies, assistance, science and research, and common social and regional policies. The European Community has a budget of US$34.035 billion/year, funded by customs duties and 1.4% of each member's value-added tax. The treaties establishing the European Community call for members to form a common market, a common customs tariff, and common agricultural, transport, economic, and nuclear policies. Major European Community institutions include the Commission, Council of Ministers, European Parliament, Court of Justice, and Economic and Social Committee. The Community is the world's largest trading unit, accounting for 15% of world trade. The 2 main goals of the Community's industrial policy are to create an open internal market and to promote technological innovation in order to improve international competitiveness. The European Community aims to contribute to the economic and social development of Third World countries as well.

  18. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  19. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  20. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  1. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  2. European visit

    CERN Multimedia

    2006-01-01

    The European Commissioner for Science and Research, Janez Potočnik, (on the right) visited the CMS assembly hall accompanied by Jim Virdee, Deputy Spokesman of CMS (on the left), and Robert Aymar, Director-General of CERN. The European Commissioner for Science and Research, Janez Potočnik, visited CERN on Tuesday 31 January. He was welcomed by the Director-General, Robert Aymar, who described the missions and current activities of CERN to him, in particular the realisation of the LHC with its three components: accelerator, detectors, storage and processing of data. The European Commissioner then visited the CMS assembly hall, then the hall for testing the LHC magnets and the ATLAS cavern. During this first visit since his appointment at the end of 2004, Janez Potočnik appeared very interested by the operation of CERN, an example of successful scientific co-operation on a European scale. The many projects (30 on average) that CERN and the European Commission carry out jointly for the benefit of res...

  3. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  4. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  5. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  6. European hadrons

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    The European Hadron Facility (EHF) is a project for particle and nuclear physics in the 1990s which would consist of a fast cycling high intensity proton synchrotron of about 30 GeV primary energy and providing a varied spectrum of intense high quality secondary beams (polarized protons, pions, muons, kaons, antiprotons, neutrinos). The physics case of this project has been studied over the last two years by a European group of particle and nuclear physicists (EHF Study Group), whilst the conceptual design for the accelerator complex was worked out (and is still being worked on) by an international group of machine experts (EHF Design Study Group). Both aspects have been discussed in recent years in a series of working parties, topical seminars, and workshops held in Freiburg, Trieste, Heidelberg, Karlsruhe, Les Rasses and Villigen. This long series of meetings culminated in the International Conference on a European Hadron Facility held in Mainz from 10-14 March

  7. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  8. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  9. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  10. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  11. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  12. The European Crisis Management: An Organizational Narrative

    Directory of Open Access Journals (Sweden)

    Patrícia Kaplánová

    2016-12-01

    Full Text Available The debate of scholars in the field of international relations in last years has put the European Union’s role into the consideration. The European Foreign and Security Policy has positioned itself through its development to the constructive and normative line of research of world politics. With this respect, this article examines a character of crisis management of the European Common Foreign Policy based on the institutional development. Besides the European Union does not possess a unified foreign and security policy, regardless one army and single institutional mechanism, the recent crisis management actions have shaped the policies into a comprehensive nature. The paper overviews briefly the history of Common Foreign and Security Policy as well as Common Security and Defence Policy and focuses on crisis management of civilian and military missions. The author claims that the development has a significant impact on a character of crisis management analyzed from the institutional and financial capacities of the European Security and Defence Policy. Consequently, the character of crisis management performs complex mechanisms of responsive, political/administrative, legal, economic and human help to crisis-affected territories in the world. Respectfully, the character of crisis management has thus more pre-crisis nature of a resilience.

  13. European Cinema

    NARCIS (Netherlands)

    Elsaesser, Thomas

    2005-01-01

    In the face of renewed competition from Hollywood since the early 1980s and the challenges posed to Europe's national cinemas by the fall of the Wall in 1989, independent filmmaking in Europe has begun to re-invent itself. European Cinema: Face to Face with Hollywood re-assesses the different

  14. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  15. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  16. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  18. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  19. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  20. European energy supplies; some considerations

    International Nuclear Information System (INIS)

    Bahgat, G.

    2009-01-01

    European leaders are increasing conscious of their heavy dependence on energy supplies from Russia. In an attempt to articulate a strategy to improve energy security and Solidarity Action Plan in november 2008. This essay examines the E U-Russia energy partnership and argues that despite a number of supply-interruptions, of threats of interruptions, the interdependence between Brussels and Moscow is likely to endure, at least the foreseeable future. [it

  1. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  2. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  3. Elements of ESA's policy on space and security

    Science.gov (United States)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  4. Energy transition and security: which voluntary codes? Energy efficiency: IEA, IEC and ISO dialogue. The European Commission's safety, solidarity and efficiency measures. Securing natural gas supplies and favoring cogeneration. Less energy consuming buildings: rework of the energy efficiency directive. Energy efficiency inside buildings: GDF Suez report; Transition et securite energetiques: quels codes volontaires? Efficacite energetique: dialogue AIE, CEI et ISO. Les mesures de securite, solidarite et efficacite de la commission europeenne. Securiser l'approvisionnement en gaz naturel et favoriser la cogeneration. Des batiments moins gourmands en energie: refonte de la directive sur la performance energetique. Efficacite energetique dans les batiments: GDF Suez au rapport (volontaire)

    Energy Technology Data Exchange (ETDEWEB)

    Tourneur, J.C

    2009-10-15

    This dossier gathers a series of short articles about energy security and efficiency in a context of policy transition. The first paper deals with the use of international standards to promote energy efficiency thanks to efficient public policies and private sector actions. This was the main topic of the mixed workshop organized by the International electrotechnics Commission (IEC) in spring 2009. The second paper presents the new strategic analysis of the European commission in the domain of energy which stresses on the '20-20-20' climate change proposals approved in December 2008. A new European action plan for energy security and solidarity defines 5 domains requiring an extra action to warrant a sustainable energy supply. The commission is also examining the challenges that Europe will have to face between 2020 and 2050. The third article treats of the security of natural gas supplies which represents a quarter of the European Union (EU) energy mix. The supply crises susceptible to occur may have serious economic and social consequences. Therefore, the EU must be prepared to warrant its security of supplies. Cogeneration allows the EU to stay close to its energy goals. Buildings play a key role in the realisation of the EU's energy saving objectives and fight against climate change. The new directive on buildings energy efficiency (2002/91/CE) will allow to exploit this potential of saving and to stimulate sustainable investment and employment as well. Finally, the publication of the second WBCSD (World business council for sustainable development) international report on buildings energy efficiency has led GDF Suez utility to reaffirm its commitment in favour of energy saving and efficiency. (J.S.)

  5. Strategy 2020 and the European Social Policy

    Directory of Open Access Journals (Sweden)

    Radu Razvan Popescu

    2013-08-01

    Full Text Available Flexicurity is an integrated concept, resulted from the combination of two fundamental elements flexibility and security. The strategy was recognized as one of the key objectives for European Labour markets in the context of the European Employment Strategy and Lisbon Strategy. The implementation of flexicurity can only be specific, taking account of national and regional characteristics in spite of the fact that all labour markets in Europe are faced with similar challenges.

  6. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  7. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  8. European Utility Requirements: European nuclear energy

    International Nuclear Information System (INIS)

    Komsi, M.; Patrakka, E.

    1997-01-01

    The work procedure and the content of the European Utility Requirements (EUR) concerning the future LWRs is described in the article. European Utility Requirements, produced by utilities in a number of European countries, is a document specifying the details relating to engineered safety, operating performance, reliability and economics of the reactors to be built by manufacturers for the European market

  9. Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe

    NARCIS (Netherlands)

    Hoijtink, M.

    2014-01-01

    In recent years, the European Union has supported the development of a new civil security market, capable of providing security technology for new and global security challenges. This article analyses the emerging growth market for civil security in relation to contemporary notions of potential

  10. Security and citizenship in the global south

    DEFF Research Database (Denmark)

    Bilgin, Pinar; Ince, Basak

    2015-01-01

    secured internationally as citizens of newly independent ‘nation-states’ who were protected against interventions and/or ‘indirect rule’ by the (European) International Society, whose practices were often justified on grounds of the former’s ‘failings’ in meeting the so-called ‘standards of civilization......The relationship between security and citizenship is more complex than media portrayals based on binary oppositions seem to suggest (included/excluded, security/insecurity), or mainstream approaches to International Relations (IR) and security seem to acknowledge. This is particularly the case...... in the post-imperial and/or postcolonial contexts of global South where the transition of people from subjecthood to citizenship is better understood as a process of in/securing. For, people were secured domestically as they became citizens with access to a regime of rights and duties. People were also...

  11. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  12. European nuclear education initiatives

    International Nuclear Information System (INIS)

    Glatz, Jean-Paul

    2011-01-01

    international and bilateral information exchange on operating experience. Within the European Safeguards Research and Development Association (ESARDA), academically recognised nuclear safeguards and non-proliferation courses are organised by the JRC. Those should in the future be part of a newly created European Nuclear Safety and Security School with the goal to make JRC's nuclear research facilities better accessible for graduate and post-graduate training and education programmes in Europe. Furthermore the JRC is running the Actinide User Laboratory (ACTUSLAB), offering researchers the possibility to use its unique facilities and associated expertise on basic research related to the actinides elements of both fundamental and applied interest. Similarly the JRC is pooling its facilities to the partners in the ACTINET network, to facilitate the efficient use of major nuclear research facilities by the scientific community. E and T is a key element in order to reach students and young scientists in the EU by organising summer schools and supporting students to attend international conferences, workshops, seminars or to participate in traineeships. (author)

  13. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  14. Is there a European way of war?

    DEFF Research Database (Denmark)

    Vennesson, P.; Breuer, F.; de Franco, Chiara

    2009-01-01

    Europe is the region of the world where the network of security institutions is the densest. Yet, these institutions did not erase differences about conceptions of force employment among European countries and between European countries and the United States. Why have concepts of military power...... and force employment remained distinct and varied in Europe, and yet, what facilitates their convergence at the European Union level into the ambiguous notion of crisis management? We argue that an important answer to these questions is endogenous to the military: both role conceptions and organizational...

  15. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  18. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  20. The liberalization of the European electric and gas industries through the firms' M and A and investment strategies: propositions for a better energy security; Le processus de liberalisation des industries electriques et gazieres europeennes a travers les strategies de fusion - acquisition et d'investissement des firmes - propositions pour une securite energetique renforcee

    Energy Technology Data Exchange (ETDEWEB)

    Benhassine, W.

    2009-04-15

    The electric and gas industries have been traditionally managed by public monopolies. The post World War II context was supportive to such an industrial organization. In fact, Europe was getting engaged in a long period of economic growth and was benefiting a favorable energetic context. At the end of the 90's, Europe decides to liberalize the national energy industries in order to create a unique European energy market. This liberalization has occurred in a context that as dramatically changed from the economic and energetic perspective. Indeed, the globalization phenomenon has strengthened the competitiveness of the emerging economies. The strong growth of the energy demand and the stagnation of the supply on the offer side have created tensions which have been increasingly frequent and important on the energy markets. Besides, facing greater budget restrictions and financial difficulties, the states have wished to get financially disengaged from these industries. Many factors show that the economic and energetic context will not get better in the next decades. Hence, in this new context, the liberalization of the energy industries should respond to two major stakes for the energy security of the European countries: the sustainability of the investments and the control of the energy demand. After having studied the merger and investment strategies of the energy firms, operating within a freshly liberalized sector, we make some propositions to draw up a new industrial organization which would allow a more efficient response to these two stakes. (author)

  1. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  2. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  3. Integration of EGA secure data access into Galaxy

    NARCIS (Netherlands)

    Spalding, D. (Dylan); Y. Hoogstrate (Youri); Zhang, C. (Chao); Senf, A. (Alexander); Bijlard, J. (Jochem); S. Hiltemann (Saskia); D. van Enckevort (David); Repo, S. (Susanna); Heringa, J. (Jaap); G.W. Jenster (Guido); R.J.A. Fijneman (Remond J. A.); Boiten, J.-W. (Jan-Willem); G.A. Meijer; A. Stubbs (Andrew); Rambla, J. (Jordi); Abeln, S. (Sanne)

    2016-01-01

    textabstractHigh-throughput molecular profiling techniques are routinely generating vast amounts of data for translational medicine studies. Secure access controlled systems are needed to manage, store, transfer and distribute these data due to its personally identifiable nature. The European

  4. Polish Defense Policy in the Context of National Security Strategy

    National Research Council Canada - National Science Library

    Bieniek, Piotr S

    2006-01-01

    ... goals to eliminate current threats and risks such as terrorism. As far as Poland is concerned, its priority is to be an active leader in improving common security policy within the boundaries of the European Union (EU...

  5. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  6. The European Nuclear Energy Tribunal

    International Nuclear Information System (INIS)

    Marchetti, D.

    1977-01-01

    The European Nuclear Energy Tribunal was set up within the Organisation for European Economic Co-operation (now the Organisation for Economic Co-operation and Development) on 20th December 1957 under the Convention on Security Control. Seven independent judges are appointed for five years by decision of the Council of the Organisation; if the Tribunal includes no judge of the nationality of a party in a dispute submitted to it, the Government concerned may select an additional judge in that case. The Tribunal is competent in matters of security control, third party liability and activities of one of the Organisation's joint undertakings. At the request of any Government party to the Security Control Convention, to the Eurochemic Convention or to the Paris Convention and Brussels Supplementary Convention it may be convened to resolve any dispute concerning the interpretation or application thereof. While the Tribunal has not yet been called upon to exercise its judgment it is nonetheless an important and necessary instrument for Member States engaged in nuclear activities at international level. (NEA) [fr

  7. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  8. The European Union and Military Conflict Management

    DEFF Research Database (Denmark)

    Rodt, Annemarie Peen

    This book provides the first comprehensive review of the European Union’s role in military conflict management beyond its borders and makes an important contribution to debates on the EU’s role in global security governance. The EU has launched five military operations within the framework of its...

  9. Measurement with Persons: A European Network

    NARCIS (Netherlands)

    Pendrill, L.R.; Emardson, R.; Berglund, B.; Gröning, M.; Höglund, A.; Cancedda, A.; Quinti, G.; Crenna, F.; Rossi, G.B.; Drnovek, J.; Gersak, G.; Goodman, T.; Harris, S.; Heijden, van der G.W.A.M.; Kallinen, K.; Ravaja, N.

    2010-01-01

    The European ‘Measuring the Impossible’ Network MINET promotes new research activities in measurement dependent on human perception and/or interpretation. This includes the perceived attributes of products and services, such as quality or desirability, and societal parameters such as security and

  10. Liberalising the European natural gas market

    International Nuclear Information System (INIS)

    Mulder, M.

    2002-01-01

    Europe's natural gas market is changing radically. The several national markets dominated by monopolistic suppliers are integrating into one European market in which production and trade are subject to competition, while transport through the networks will be unbundled and placed under regulatory influence. What will be the consequences of these changes on natural gas prices, supply security and the environment?

  11. European approaches to changing patterns of energy consumption and supply

    Energy Technology Data Exchange (ETDEWEB)

    Lepetit, P. [Centre Francais sur les Etats-Unis, 75 - Paris (France)

    2001-07-01

    In the case of the broad debate on the security of energy supply, launched by the european commission on november 2000, this document presents the historical european facts and figures, stress the dramatic changes since 1990 and discussed the policy opinions (nuclear energy, tax policy, further progress in opening market and promoting international trade and investment). (A.L.B.)

  12. European approaches to changing patterns of energy consumption and supply

    International Nuclear Information System (INIS)

    Lepetit, P.

    2001-01-01

    In the case of the broad debate on the security of energy supply, launched by the european commission on november 2000, this document presents the historical european facts and figures, stress the dramatic changes since 1990 and discussed the policy opinions (nuclear energy, tax policy, further progress in opening market and promoting international trade and investment). (A.L.B.)

  13. ECLIPSE, an Emerging Standardized Modular, Secure and Affordable Software Toolset in Support of Product Assurance, Quality Assurance and Project Management for the Entire European Space Industry (from Innovative SMEs to Primes and Institutions)

    Science.gov (United States)

    Bennetti, Andrea; Ansari, Salim; Dewhirst, Tori; Catanese, Giuseppe

    2010-08-01

    The development of satellites and ground systems (and the technologies that support them) is complex and demands a great deal of rigor in the management of both the information it relies upon and the information it generates via the performance of well established processes. To this extent for the past fifteen years Sapienza Consulting has been supporting the European Space Agency (ESA) in the management of this information and provided ESA with ECSS (European Cooperation for Space Standardization) Standards based Project Management (PM), Product Assurance (PA) and Quality Assurance (QA) software applications. In 2009 Sapienza recognised the need to modernize, standardizing and integrate its core ECSS-based software tools into a single yet modularised suite of applications named ECLIPSE aimed at: • Fulfilling a wider range of historical and emerging requirements, • Providing a better experience for users, • Increasing the value of the information it collects and manages • Lowering the cost of ownership and operation • Increasing collaboration within and between space sector organizations • Aiding in the performance of several PM, PA, QA, and configuration management tasks in adherence to ECSS standards. In this paper, Sapienza will first present the toolset, and a rationale for its development, describing and justifying its architecture, and basic modules composition. Having defined the toolset architecture, this paper will address the current status of the individual applications. A compliance assessment will be presented for each module in the toolset with respect to the ECSS standard it addresses. Lastly experience from early industry and Institutional users will be presented.

  14. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  15. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  16. The European Union and sub-Saharan Africa

    DEFF Research Database (Denmark)

    Kluth, Michael Friederich

    2013-01-01

    This article argues that aspirations of maintaining a dominant influence over sub-Saharan security issues has spurred the French and British leadership of European Union (EU) foreign and security policy integration, just as it has informed military capability expansions by the armed forces...

  17. European bond markets: do illiquidity and concentration aggravate price shocks?

    NARCIS (Netherlands)

    Boermans, M.A.; Frost, Jon; Steins Bisschop, Sophie

    2016-01-01

    We study the effects of market liquidity and ownership concentration of European bonds on price volatility during periods of market stress. Specifically, using security-by-security data from euro area investors we examine if market illiquidity and concentrated holdings explain the large price shocks

  18. European approaches to changing patterns of energy consumption and supply

    International Nuclear Information System (INIS)

    Lepetit, P.

    2001-10-01

    On November 2000 the European Commission launched a broad debate on the security of energy supply in the European Union. Fortunately these debates are occurring simultaneously in Europe and in the US, thus providing an opportunity for a transatlantic debate and further cooperation. The author come back to european facts and figures, then to stress the dramatic changes in the context since 1990 and finally to discuss the policy options. (A.L.B.)

  19. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  20. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  1. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  2. European energy policy: the green book

    International Nuclear Information System (INIS)

    Anon.

    2006-01-01

    Energy dependence, insecurity of supplies, rise of demand and prices, global warming: these are the characteristics of the energy situation of the 21. century. The new green book of the European Commission about 'a European strategy for a safe, competitive and durable energy' starts from this alarming status and proposes some suggestions for the building up of a new global European energy policy: realization of the European domestic energy markets (a European energy network, a priority interconnection plan for gas networks, a separation of transport and distribution activities for equitable rules, a reinforcement of the competitiveness of the European industry), a joint security of supplies between member states (redefining the EU position about strategic oil and gas reserves), a sustainable, efficient and diversified energy offer, an integrated approach to fight against global warming (improving energy efficiency, development of renewable energy sources, carbon sequestration), encouraging innovation, developing a consistent foreign policy of energy (a clear policy for the security and diversification of energy supplies, energy partnerships between producers, transit countries and other international actors). (J.S.)

  3. Protecting animals and enabling research in the European Union

    DEFF Research Database (Denmark)

    Olsson, I. Anna S.; Pinto da Silva, Sandra; Townend, David

    2016-01-01

    In 1986, European Directive 86/609/EEC, regulating the use of animals in research, was one of the first examples of common legislation to set standards for animal protection across the Member States of the former European Economic Community, now the European Union, with the aim of securing a level...... objectives of the directive, particularly with a focus on securing the same high standards of animal protection across member countries. The analysis focuses on three separate issues: (1) minimum standards for laboratory animal housing and care, (2) restrictions on the use of certain animal species, and (3...

  4. DEBT SECURITIES, SECURITIES IN THE NEW CODE OF CIVIL LAW – THE NEED OF JUDICIAL DISAMBIGUATION

    Directory of Open Access Journals (Sweden)

    Eugenia Florescu

    2012-11-01

    Full Text Available A large part of the wealth is invested in securities, which circulate through documents or specific scriptural records that are located in the memory of the computer. These magnetic or paper-made „supports”, received different names, in law and in doctrine: debt securities, securities, negotiable instruments or commercial securities, equity securities, bearer bonds, financial instruments, transferable securities, stocks, bonds, bill, promissory note, check, et al. These expressions used by the New Code of Civil Law were assumed tale quale from the specialized language of commercial law, without any concern for explaining the foundation and judicial meaning of these legal institutions, and eliminate the ambiguity in this matter. Under such conditions, the analysis is to identify the criteria under which the judicial genre will separate from the judicial species in relation to the law and jurisprudence of the European Union and/or to the regulations specially adopted at national level, over time.

  5. Automated Security Testing of Web Widget Interactions

    NARCIS (Netherlands)

    Bezemer, C.P.; Mesbah, A.; Van Deursen, A.

    2009-01-01

    This paper is a pre-print of: Cor-Paul Bezemer, Ali Mesbah, and Arie van Deursen. Automated Security Testing of Web Widget Interactions. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering

  6. The security of energy supplies in Europe

    International Nuclear Information System (INIS)

    Vuillemin, Francois

    2002-01-01

    As an attempt occurred against a French oil tanker in the Persian Gulf (in 2002), and showed that security of oil supplies is not only related to oil shock or to political environment such as the Cold War, this article discusses issues of security for European energy supplies. It first addresses the situation and the evolution of energy needs and resources in the World and in Europe: predictions of evolution of consumption and production, major role of fossil fuels in the European consumption. It discusses the outage risks: the supply security can be analysed with respect to consumption per sector, per usage or per energy product, and Europe must face three major risks (no more hydrocarbon resources at a reasonable cost, economic risk due to market volatility, geopolitical risk). The next part discusses the perspective of a European strategy. It identifies several elements of choice for Europe in terms of energy demand management, of opening up to competition of electricity and gas markets. It discusses European ambitions in terms of supply security: need of a community framework, actual propositions of a directive for oil and gas

  7. Third Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    On June 4th, 2009, the third Dutch Process Control Security Event took place in Amsterdam. The event, organised by the Dutch National Infrastructure against Cybercrime (NICC), attracted both Dutch process control experts and members of the European SCADA and Control Systems Information Exchange

  8. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  9. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  10. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  11. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  12. Security dimension of the Canada-EU relationship

    Directory of Open Access Journals (Sweden)

    O. M. Antokhiv­Skolozdra

    2014-05-01

    In particular, it defines that the Canadian Government accepted the fact of strengthening the security part of the European Union activity in a reserved manner, as it could cause decrease in influence of this North American State in Euro­Atlantic area. It outlines the main directions of cooperation, scrutinizes institutional mechanisms of interaction and emphasizes the key challenges of security dimension of bilateral relations.  It deals with the peculiarities of Canada’s participation in military and civil actions under the auspices of the European Union and stresses that the limited military potential of Ottawa makes its effective participation in bilateral cooperation with the European partners less possible. It stresses the adherence of priority in relations between Canada and the United States in security sphere and underlines the significant role of the North Atlantic Treaty Organization in its interaction on the security and defense issues between Canada and the European Union. It emphasizes that the official Ottawa insists on NATO playing the leading role in providing security in Euro­Atlantic area. It illustrates, however, that due to a number of reasons, in particular, lack of initiative in advancing European security and defense policy, the Canadian Government on current stage don’t present particular interest in activating interaction with their European partners in this sphere. It depicts also that Canada and the European Union have started developing cooperation outside ESDP on domestic security, in particular, on struggle against organized crime and other challenges of current society, which has encouraged institutionalization in relationship of the European Union and the Europol.

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. The European Union Training Mission in Mali: A case study

    Directory of Open Access Journals (Sweden)

    Dicke Rachel

    2014-10-01

    Full Text Available For several years, the European Union (EU has been increasing its international presence and moving into the role of a global security actor. To support the goal of greater crisis management capabilities, European security integration (ESI has been deepening. This article therefore examines an Ell operation - the European Union Training Mission in Mali (EUTM Mali - with the aim of gauging the success of the EU's efforts at ESI. To determine the success of EUTM Mali and thus of ESI, three propositions are examined: if EUTM Mali is a security operation showing successful security integration, there will be evidence of (i broad participation, (ii financial burden-sharing and (iii the successful incorporation of troops and equipment. The first and third propositions are supported whereas the second does not receive as much support. Overall, EUTM Mali shows considerable success and bodes well for further ESI.

  15. Opting Out of the European Union

    DEFF Research Database (Denmark)

    Adler-Nissen, Rebecca

    controversial cases of differentiated integration: the British and Danish opt-outs from Economic and Monetary Union and European policies on borders, asylum, migration, internal security and justice. Drawing on over one hundred interviews with national representatives and EU officials, the author demonstrates......European integration continues to deepen despite major crises and attempts to take back sovereignty. A growing number of member states are reacting to a more constraining EU by negotiating opt-outs. This book provides the first in-depth account of how opt-outs work in practice. It examines the most...... how representatives manage the stigma of opting out, allowing them to influence even politically sensitive areas covered by their opt-outs. Developing a practice approach to European integration, the book shows how everyday negotiations transform national interests into European ideals. It is usually...

  16. Nuclear power and European Union enlargement challenge

    International Nuclear Information System (INIS)

    Chirica, Teodor; Bilegan, Constantin

    2001-01-01

    From 1991 through 1996 the European Union signed the Association Agreements with ten East European countries (EE10), namely: Czech Republic, Estonia, Hungary, Poland, Slovenia, Latvia, Lithuania, Slovakia, Bulgaria and Romania. In the period 1994-1996 European Union received membership applications from all ten countries. The paper analyzes the approach of complying the requirements and regulations for European Union accession in the field of the Romanian nuclear power based on the CANDU technology. In this process, the real challenge is represented by the preparation and implementation of new regulations aiming to improve the general business environment by introducing International Accounting Standards simplification of bankruptcy laws, reform of taxation procedures and secureness of financial instruments. A new stand-by agreement with the International Monetary Fund and World Bank was set out in late April 1999 for an one-year loan of 475 million dollars. (authors)

  17. Energy perspectives of the France by 2020-2050. European orientations

    International Nuclear Information System (INIS)

    2007-09-01

    The authors recall the absence in 2007 of a real european energy policy and present the new energy Plan of the european commission, fight against the climatic change, reinforce the security of the energy supply, maintain the competitiveness of the european economy. This plan is then discussed. (A.L.B.)

  18. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  19. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  20. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  1. SECURITY SYSTEMS FOR MARITIME HARBOUR

    Directory of Open Access Journals (Sweden)

    Georgică SLĂMNOIU

    2010-11-01

    Full Text Available Infrastructure protection objectives are at the top of the agenda of those responsible in the European Union. Currently Romania is one of the countries on its eastern border of the Union and this has special implications in terms of security measures that are required to be implemented. Ships and harbours are important current conflict stage. An integrated system of protection of harbours must be prepared in advance in order to continuously provide information that will increase the overall performance of the intervention forces.

  2. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  3. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  4. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  5. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  6. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  7. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  8. The new architecture of the European Union

    Directory of Open Access Journals (Sweden)

    Radivojević Zoran

    2011-01-01

    Full Text Available The Lisbon Treaty has brought significant changes into the architecture of the European Union. The most important novelty, however, is the establishment of a full unity of the Union structure achieved by creating new and strengthening the existing elements. The new elements of this unity are the disappearance of the European Community, the 'independence' of the European Atomic Energy Community, constituting the European Union as a single entity and the introduction of EU values. At the same time, the Lisbon Treaty has strengthened the existing elements of the common institutional mechanisms, rules on amending the founding treaties and EU membership. However, constituting the Union as a single entity which has replaced and succeeded the European Communities has not abolished the EU elements of diversity. In the areas that differed, even before the adoption of the Lisbon Treaty, from the community pillar, there remain significant differences in the nature and the scope of competences of the Union institutions. This mainly regards the common foreign and security policy, which now includes the defense policy, where the existing model of inter-state cooperation has been only slightly interfered with. In contrast, in the field of police and judicial cooperation in criminal matters, which has become part of a larger Area of Freedom, Security and Justice, the inter-state model of cooperation has been abandoned in some of its most important elements. However, the implementation of some of the important elements of the supranational model has been postponed.

  9. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  10. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  11. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  12. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  13. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  14. A look at the European domestic and foreign energy policy

    International Nuclear Information System (INIS)

    Lesourne, J.

    2008-01-01

    After having defined the main characteristics of energy considered as a good (a private good, a product of first necessity, a redistributed product, a strategic good), the author presents the actors of the European energy policy: European authorities, member state governments, firms (operators and big consumers), and households. He presents the European domestic energy policy which comprises three main themes: the creation of a domestic market, the taking of government commitments for 2020 into account, and the emission trading scheme. He identifies and comments the three main objectives of the European foreign energy policy: supply security, struggle against climate change, and support to the less developed countries

  15. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  16. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  17. European Competition Law in the electricity sector

    International Nuclear Information System (INIS)

    Hiller, P.

    2001-09-01

    The first part gives an overview on the implementation of the Electricity Directive 96/92 in the member states of the European Union and on the still missing preconditions for a single market in the electricity sector. The second part deals with the main elements of the European merger control (market definition, market domination), the decisions in the electricity sector and analyses the impact of the Electricity Directive 96/92 EG on future merger decisions in this sector. The third part examines the role of the articles 81 and 82 EGV to secure competition in the electricity market. (author)

  18. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  19. Computer Security: Geneva, Suisse Romande and beyond

    CERN Multimedia

    Computer Security Team

    2014-01-01

    To ensure good computer security, it is essential for us to keep in close contact and collaboration with a multitude of official and unofficial, national and international bodies, agencies, associations and organisations in order to discuss best practices, to learn about the most recent (and, at times, still unpublished) vulnerabilities, and to handle jointly any security incident. A network of peers - in particular a network of trusted peers - can provide important intelligence about new vulnerabilities or ongoing attacks much earlier than information published in the media. In this article, we would like to introduce a few of the official peers we usually deal with.*   Directly relevant for CERN are SWITCH, our partner for networking in Switzerland, and our contacts within the WLCG, i.e. the European Grid Infrastructure (EGI), and the U.S. Open Science Grid (OSG). All three are essential partners when discussing security implementations and resolving security incidents. SWITCH, in...

  20. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Comparative Discourse Analysis of the Security-Privacy Dilemma: Salience of Security Issues in Printed Media

    Czech Academy of Sciences Publication Activity Database

    Guasti, Petra; Mansfeldová, Zdenka

    2015-01-01

    Roč. 30, č. 10 (2015), s. 127-156 ISSN 0254-0223 EU Projects: European Commission(XE) 285223 - SECONOMICS Institutional support: RVO:68378025 Keywords : security * media * stuxnet Subject RIV: AO - Sociology, Demography Impact factor: 0.444, year: 2015

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  5. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  6. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  7. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  8. The European Union Response to Regional Conflicts

    Science.gov (United States)

    2013-03-01

    into force of the Lisbon Treaty. (Cuadernos de Estrategia , 145-B. Spanish Institute for Strategic Studies, 2010), 18. 4 Felix Arteaga, The European...Security and Defense Policy after the entry into force of the Lisbon Treaty. (Cuadernos de Estrategia , 145-B. Spanish Institute for Strategic...Lisbon Treaty. (Cuadernos de Estrategia , 145-B. Spanish Institute for Strategic Studies. 2010), 37. 15 ENP regulates the EU’s relations with countries

  9. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  10. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  11. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  12. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  13. European Vegetation Archive (EVA)

    NARCIS (Netherlands)

    Chytrý, Milan; Hennekens, S.M.; Jiménez-Alfaro, Borja; Schaminée, J.H.J.; Haveman, Rense; Janssen, J.A.M.

    2016-01-01

    The European Vegetation Archive (EVA) is a centralized database of European vegetation plots developed by the IAVS Working Group European Vegetation Survey. It has been in development since 2012 and first made available for use in research projects in 2014. It stores copies of national and

  14. Data security breaches and privacy in Europe

    CERN Document Server

    Wong, Rebecca

    2013-01-01

    Data Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems a

  15. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  16. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  17. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  18. Problems And Prospects Of The European Regional Order

    Directory of Open Access Journals (Sweden)

    L. A. Dymova

    2017-01-01

    Full Text Available For the last few decades, the system of international relations continues to change. One of the key components of the emerging international order is the European regional order, which currently goes through deep transformations associated with changes of the international system and structural reconstruction of the European communities. The formation of the European regional system is a complex international political process, which is based on various political, social, economic, cultural, historical and other factors. Since the end of the World war II the European Union constitutes a political and institutional basis of relations both between member states and with the rest of the world. However, today the European Union runs through a systemic crisis embodied by ongoing economic and financial downturn as well as a crisis of socio-political structures and models of governance that now threaten the existence of the Union itself. Institutional problems are aggravated against the background of crises in highly sensitive areas such as economy and security, as well as uncertainties in the external international environment. All these factors undermine the ability of the EU to play a decisive role in building a European regional order. The emphasis is shifting towards particular countries, with the greater potential in shaping the international agenda and giving an effective response to modern challenges and threats. Building a stable architecture of the European security system is one of the essential conditions of the European regional order, however contradicting approaches of the parties acknowledge that political and ideological barriers between the East and the West continue to exist. In the context of increasing security threats transatlantic partnership does not lose the relevance though the tough course of the US and its desire to reinforce its leadership in Europe often meets the extreme disapproval on the part of the Europeans. Russian

  19. European Energy Law. Report VII

    Energy Technology Data Exchange (ETDEWEB)

    Hammer, U.; Roggenkamp, M.M. (eds.)

    2010-04-15

    The European Energy Law Report VII presents in four parts an overview of the most important legal developments in the field of EU and national energy and climate change law as discussed at the 2009 European Energy Law Seminar. The first part examines recent developments in EU climate change regulation. It includes an overview of the revision of the EU Directive governing CO2 emissions trading and a more detailed analysis of the new allocation regime, including the auctioning of emission rights. This is followed by an analysis of the competitiveness of the new EU emissions trading Directive and recent developments in the US regarding emissions trading. The second part focuses on the energy liberalisation process and the Third Energy Package. Following an overview of recent developments in EU competition law and the impact of the Sector Inquiry on the energy sector, this part concentrates particularly on the new Internal Energy Market Directives and most particularly on the legality of the unbundling provisions. Subsequently, the focus is on the role of the TSOs. After an analysis of the need for an increased cooperation of the German TSOs, another chapter discusses the need for more consolidation in the European gas transmission market and the role of regulation therein. Is there a new role for nuclear energy? In order to secure long term energy supply, the focus turns again to nuclear energy. The third part of this report discusses two elements of nuclear liability. First, it analyses the issue of the possible privatisation of the nuclear sector and its impact on long term liability. Although the focus is on the UK nuclear sector, a comparison is made with some other regulatory regimes. Next, the role of nuclear energy is discussed as an instrument to reduce CO2 emissions and, more particularly as a means to reach the 20-20-20 targets. The question is raised whether the international rules on civil liability provide sufficient protection to victims of nuclear

  20. A European Research Area

    International Nuclear Information System (INIS)

    Caro, R.

    2001-01-01

    This article is a summary of the presentation of the European Commissioner, Philippe Busquen, to the European Parliament (beginning of year 2000) with the proposal and method for a revival of the Research and Development in this wider sense in the European Union. The starting point of his thesis is that Europe performs less, and more disorderly, activities in this field that her main competitors. USA and Japan. His basic proposal is a larger coordination among the european research projects, with a previous phase of informatics intoxicator among the european research centres and the cross-linked participation, real of virtual in the experiments and projects. (Author)

  1. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  2. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  3. The Russian-European Union Competition in Ukraine

    Science.gov (United States)

    2015-06-01

    of Germany’s brief triumph during the Great War. The 1918 treaty of Brest -Litovsk created for the first time an independent Ukraine, designed to be a...6North Atlantic Treaty Organization, “Founding Act on Mutual Relations, Cooperation and Security between NATO and the Russian Federation signed in Paris ...institution now known as the European Union originated as the European Coal and Steel Community in 1951. Interest in expanding economic cooperation

  4. European biofuel policies in retrospect

    International Nuclear Information System (INIS)

    Van Thuijl, E.; Deurwaarder, E.P.

    2006-05-01

    Despite the benefits of the production and use of biofuels in the fields of agriculture, security of energy supply and the environment, in India and surrounding countries, the barriers to the use of biofuels are still substantial. The project ProBios (Promotion of Biofuels for Sustainable Development in South and South East Asia) aims at promoting biofuels in the view of sustainable development in the Southern and South eastern Asian countries. The first stage of this project concerns a study, which will provide a thorough review of the complicated and sector-overarching issue of biofuels in India and surrounding countries. This report describes past experiences with the policy context for a selection of EU countries, with the purpose of identifying conclusions from the European experience that may be valuable for Indian and South East Asian policy makers and other biofuels stakeholders

  5. European Union energy policy integration: A case of European Commission policy entrepreneurship and increasing supranationalism

    International Nuclear Information System (INIS)

    Maltby, Tomas

    2013-01-01

    Focusing on gas, this article explores the role of the European Commission in the process of European Union energy security policy development, and the extent to which the policy area is becoming increasingly supranational. Situating the article within the literature on agenda-setting and framing, it is argued that a policy window was opened as a result of: enlargement to include more energy import dependent states, a trend of increasing energy imports and prices, and gas supply disruptions. From the mid-2000s, the Commission contributed to a shift in political norms, successfully framing import dependency as a problem requiring an EU-level solution, based on the institution’s pre-existing preferences for a diversified energy supply and internal energy market. Whilst Member States retain significant sovereignty, the Commission has achieved since 2006 creeping competencies in the internal, and to a lesser extent external, dimensions of EU energy policy. - Highlights: ► We examine the development of EU energy security policy, focusing on gas. ► We examine changes in European Commission competence in energy policy. ► The European Commission has gained increased competence in the internal market. ► In the external dimension of EU energy policy Member States retain competence. ► The European Commission has had qualified success as a policy entrepreneur

  6. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  7. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  9. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  10. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  11. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  12. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  13. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  14. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  15. Bezopasnost v portahh Jevropõ = Security in European ports

    Index Scriptorium Estoniae

    2004-01-01

    Ülevaade 18-20. veebruarini 2004 Tallinnas toimunud Rahvusvahelise Sadamate Assotsiatsiooni (International Association of Ports and Harbours) nõupidamisest "Europe - Africa", millel käsitleti Euroopa sadamate julgeoleku küsimusi

  16. Global Climate and the Security of the European Union

    Science.gov (United States)

    2012-03-15

    social institutions),  climate-induced migration conflicts (internal in host nations due to resources scarcity, ethnic and religious differences... Romania , Slovakia, Slovenia and the Northern part of France,  Mediterranean Countries (MCEU) – Cyprus, Greece, Italy, Malta, Portugal, Spain, and the...M(+) M(-) H(-) Energy for heating and cooling M(+) L(+) M(-) Hydropower and cooling for thermal plants M(+) M(-) H(-) Tourism and recreation M

  17. Common Foreign and Security Policy of the European Union

    Directory of Open Access Journals (Sweden)

    Haydar Efe

    2008-06-01

    Full Text Available CFSP has been one of the most difficult areas in the cooperation cooperate in EU’s integration process. Because member states which have different national interests, historical traditions and different political relations with other parts of the world, have seen it as a sign of their sovereignty. But, in spite of many controversies, the demands for a CFSP are widely shared in the EU. The main argument of this study is to emphasize the fact that in the realization of the aims of EU for being effective in the solutions of international problems and for being the main actor on the global policy the only way is to form effective and coherent DDGP

  18. A new paradigm for the European energy policy?

    International Nuclear Information System (INIS)

    Veyrenc, Thomas

    2010-01-01

    As the European Union adopted in 2009 an organisational framework for the energy sector (the third energy package), the author analyses and discusses the progressive evolutions of the European energy policy during the last decades. He first addresses the process of liberalization of electricity and natural gas markets (or network industries) which has been launched by the European Commission from the middle of the 1990's and has been almost achieved. He comments the break created by the emergence of the climate challenge during the 2000's which had an impact on the objectives of the European energy policy, on the environmental policy and on competitiveness. The author then addresses the emergence of concerns related to the security of energy supplies (a coherence challenge for the European policy): definition of the concept of supply security, dilemma of security of supply, discussion of the content of the Lisbon Treaty as a remedy to coherence challenge). The author then discusses these evolutions in terms of new content and continuity, questions the emergence of a European federalism and the lack of great projects

  19. Europe, arms control and American security

    International Nuclear Information System (INIS)

    Burns, W.F.

    1992-01-01

    What has come to be called the Revolution of 1989 has swept away longstanding political and economic arrangements in Eastern Europe. Perhaps more important, it has also called into question the fundamental underpinnings of European security created during the nonpeace that followed World War II. In June 1990, the Warsaw Treaty Organization abandoned the notion that NATO was the ideological enemy. At the same time, NATO ministers agreed at Tunberry, Scotland, to consider defining the Atlantic Alliance as more of a partner of the Soviet Union than as an enemy. The Washington summit of May 1990 between president Mikhail Gorbachev and president George Bush further highlighted the recent changes in the Soviet Union and its former satellites. Issues going to the heart of the viability of the Soviet Union and the communist system of political and economic organization competed with German reunification as central themes. Arms control issues, particularly as they pertain in European military stability, became contingent and dependent on the development of a broader political and economic framework for a new Europe. Whether this framework is viable remains an open question as Gorbachev's role is challenged more and more within the Soviet Union. This paper deals with European arms control issues from the point of view of the United States and its own security interests. The United States involved its security inextricably with that of Western Europe as a conscious decision in the turmoil following World War II

  20. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  1. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  2. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  3. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  4. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  5. European internal electricity market. What next?

    International Nuclear Information System (INIS)

    Petrov, K.; Hewicker, C.; Boisseleau, F.; Nabuurs, P.

    2007-01-01

    2006 has been a very active year in the development of electricity markets worldwide. In Europe the liberalisation process was moving forward driven by the European Directives implemented in the EU states. Together with security of supply and environmental protection, implementation of competitive energy markets has also been one of the main objectives of EU energy policy. A competitive internal market for electricity has been progressively implemented across the European Union since 1999-2000. This process aims at increasing competition in electricity generation and supply leading to enhanced efficiency, which is closely associated with lower production costs and ultimately lower electricity prices. The sector inquiry and the country reviews conducted by the European Commission (EC) during 2006 showed that progress has been achieved. However, there are still a number of issues that need to be resolved in order to achieve an adequately operating internal electricity market. The EC energy package from 10th January 2007 is a set of concrete proposals for action in the energy field and arises in reaction to the Green Paper published on 8th March 2006. The Green Paper 'A European Strategy for Sustainable, Competitive and Secure Energy', on the one hand, identified the main problems that the European energy sector faces and, on the other hand, suggested possible actions to meet key objectives, including security of supply, environmental sustainability and competitiveness towards a unified European Energy Policy. The motivation of the EC package is the need to identify new measures or a strengthening of existing measures to reach the targets and their underlying objectives. The EC package deals with the main issues on energy policy (renewable electricity, internal electricity and gas market, sector competition, sustainable power generation from fossil fuels, nuclear energy, gas and electricity infrastructures and energy technology) and an action plan for energy

  6. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  7. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  8. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  9. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  10. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  11. The United States, NATO and the European Union: A New Trans-Atlantic Relationship?

    National Research Council Canada - National Science Library

    Barry, Charles

    1994-01-01

    .... The United States wants the concept of a "European Security and Defense Identity" (ESDI) implemented in such a way that it neither duplicates NATO nor threatens to dismantle or replace the alliance. U.S...

  12. Ballistic Missile Defense in the European Theater: Political, Military and Technical Considerations

    National Research Council Canada - National Science Library

    Terstegge, Stephen D

    2007-01-01

    ... that threatens the homeland of the United States. Therefore, the United States faces the complex security challenge of emplacing ballistic missile defense assets on European soil in the very near-term to mitigate this threat...

  13. Speaker's presentations. Energy supply security; Recueil des interventions. Securite d'approvisionnement energetique

    Energy Technology Data Exchange (ETDEWEB)

    Pierret, Ch

    2000-07-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  14. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  15. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  16. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  17. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  18. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  19. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  20. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  1. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  2. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  3. THE COMPETITION POLICY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Dumitriţa Florea (Ionescu

    2012-09-01

    Full Text Available The idea of European unity dates back to antiquity, the time when the Roman Empire alsopursued such a goal. Attempts to unify European countries have appeared constantly in history, but theirsuccessful culmination crystallized only after the Second World War.Basically, the two wars have led to the downfall of Europe and the loss of its centenary political andmilitary position. The experience of these wars has led the states to initiate a defense mechanism of peace,security and international cooperation - resulted in creating an organization of universal jurisdiction -TheLeague of Nations. However, the successor of this organization, The United Nations - was one thatmanaged thorough its collective security system represented by the Security Council, to ensure andmaintain universal / global peace until now (Stelian Scăunaş, 2005.The creation of the European Union is based on four founding treaties: The Treaty establishingThe European Coal and Steel Community (ECSC - adopted in Paris on April 18, 1951, entered into forcein 1952 - treaty concluded for a period of 50 years and that has terminated in 2002, The Treatyestablishing the European Economic Community (EEC, The Treaty establishing the European AtomicEnergy Community (EAEC or EURATOM, both signed in Rome on March 25, 1947 and entered into forcein 1958 as the Treaties of Rome, and The Treaty on the European Union, which was adopted at Maastrichton 7th of February 1992 and entered into force in 1993. To these institution treaties we can add themodifying treaties of the founding treaties, including: The Merger Treaty - adopted in Brussels on 8 April1965, entered into force in 1967; The Single European Act - signed in Luxembourg and Hague in 1986,entered into force in 1987; The Amsterdam Treaty - signed on October 2, 1997, entered into force in 1999,The Treaty of Nice - signed on February 26, 2001, entered into force in 2003, The Lisbon Treaty signed in2007 and entered into force on December 1st

  4. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  5. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  6. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  7. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  8. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  9. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  10. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  11. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  12. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  13. European nuclear education network

    International Nuclear Information System (INIS)

    Blomgren, J.; Moons, F.; Safieh, J.

    2005-01-01

    In most countries within the European Union that rely to a significant extent on nuclear power, neither undergraduate nor PhD education is producing a sufficient number of engineers and doctors to fill the needs of the industry. As a result of an EU-supported project, a new education organisation, European Nuclear Education Network (ENEN), has recently been established, with the aim to establish a European master's degree of nuclear engineering. Recently, a new EU project, Nuclear European Platform of Training and University Organisations (NEPTUNO), has been launched, aiming at the practical implementation of ENEN and harmonisation of training activities. (author)

  14. European mobility cultures

    DEFF Research Database (Denmark)

    Haustein, Sonja; Nielsen, Thomas A. Sick

    2016-01-01

    More targeted European policies promoting green travel patterns require better knowledge on differing mobility cultures across European regions. As a basis for this, we clustered the EU population into eight mobility styles based on Eurobarometer data. The mobility styles - including, for example...... positions on the path towards sustainable mobility and therefore different requirements towards European platforms and support measures, e.g. for 'Sustainable Urban Mobility Plans'. The country clusters can provide a starting point for future communication and targeting of European efforts in sustainable...

  15. Minimum deterrence and regional security. Section 2. Other regions

    International Nuclear Information System (INIS)

    Azikiwe, A.E.

    1993-01-01

    Compared to European political and security circumstance, minimum deterrence is less an illusion in other regions where weapon free zones already exist. It will continue to be relevant to the security of other regions. Strategic arms limitation should be pursued vigorously in a constructive and pragmatic manner, bearing in mind the need to readjust to new global challenges. The Comprehensive Test Ban Treaty is the linchpin on which the Non-proliferation Treaty rests

  16. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  18. A European Res publica

    Directory of Open Access Journals (Sweden)

    Ola Zetterquist

    2011-05-01

    Full Text Available The article analyses the fundamental constitutional enigma of the European Union (EU, namely whether the EU can be considered as a (from its Member States separate and independent constitutional legal order. The EU is often referred to as a legal order sui generis, i.e. of a unique character that defies traditional definitions. More specifically, the notion of an independent and separate EU is at odds with the idea of the sovereign state. The notion of the EU as a legal order sui generis is too much influenced by the models of the sovereign state and sovereignty (in the vein of Thomas Hobbes. The key component in the Hobbesian idea of sovereignty is freedom as non-interference. A sovereign state is consequently a state that is free from, i.e. not interfered with by, external actors like, for example, the EU. Put differently, either the EU is sovereign or the Member States are sovereign. By shifting the perspective to a neo-Roman republican understanding of freedom as non-domination the constitutional picture of the EU will become more nuanced. Res publica is best understood as what citizens hold in common and above their narrow self-interest. According to a republican notion of the constitution the purpose of the law is to eliminate the possibility of arbitrary domination. For that reason, not all interference is to be considered as a restriction of freedom but only those restrictions that cannot be justified according to the res publica. Viewed through the republican prism it can be argued that the EU represents an important advancement in securing freedom as non-domination without implying that the EU must become a state. The fundamental enigma can thus be rephrased as a clash between two diverging concepts of freedom. Whereas the EU will always be at odds with the idea of sovereignty (however framed it will be much easier to reconcile with the republican ideal. DOWNLOAD THIS PAPER FROM SSRN: http://ssrn.com/abstract=1837332

  19. The Harmonization of Public Sector Accounting in European Union

    DEFF Research Database (Denmark)

    Pontoppidan, Caroline Aggestam; Alijarde, Isabel Brusca; Chow, Danny

    accounting standards in Member States. The suitability of IPSAS for the Member States” (European Commission, 2013b). This report takes into account the Public Consultation on the suitability of the IPSAS for EU Member States. The European Commission (2013b, p. 8) considers that IPSASs cannot easily......The European Commission is working on several fronts to achieve the implementation of uniform and comparable accruals-based accounting practices for the European Union Member States and for all the sectors of General Government, that is, Central Government, State Government, Local Government...... and Social Security, considering that at the same time it can help ensure high quality statistics (European Commission, 2013a). In 2012 Eurostat issued a Public Consultation on the suitability of the IPSAS for EU Member States, later publishing the report “Towards implementing harmonised public sector...

  20. The European energy community, it is for now

    International Nuclear Information System (INIS)

    Andoura, S.; Buzek, J.; Delors, J.; Vitorino, A.

    2013-01-01

    Given that the European Council (on 22. May) mentioned the stakes involved for a common European energy policy, and that France's president has juts made another call to set up a European energy community, it is time to properly identify the main challenges that have to be met for such a project. The energy transition, that requires a deep change in our ways of producing, transporting and using energy, could be the basis of this new common policy. This new policy may follow 3 axis: first achieving the integration of a common energy market that will simulate the competitiveness of the European energy operators, secondly the security of supply implies a diversification of energy sources that could be reached through a stronger European solidarity, and thirdly a better cooperation between states for coordinating the construction of new infrastructures

  1. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. Pro Spring security

    CERN Document Server

    Scarioni, Carlo

    2013-01-01

    Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications. Pro Spring Security will be a reference and advanced tutorial that will do the following: Guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground-up. Demonstrates the different authentication and authorization methods to secure enterprise-level applications

  3. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  4. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  5. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  6. Securing collaborative environments

    Energy Technology Data Exchange (ETDEWEB)

    Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thompson, Mary [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  7. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  8. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  9. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  10. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  11. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  12. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  13. ATLAS OF EUROPEAN VALUES

    NARCIS (Netherlands)

    M Ed Uwe Krause

    2008-01-01

    Uwe Krause: Atlas of Eurpean Values De Atlas of European Values is een samenwerkingsproject met bijbehorende website van de Universiteit van Tilburg en Fontys Lerarenopleiding in Tilburg, waarbij de wetenschappelijke data van de European Values Study (EVS) voor het onderwijs toegankelijk worden

  14. European media law

    NARCIS (Netherlands)

    Castendyk, O.; Dommering, E.; Scheuer, A.

    2008-01-01

    European Union legislation concerning electronic communications media is firmly established as an essential part of the law in the field in Europe. From relevant provisions of the European Convention of Human Rights and the EC Treaty to numerous directives, the most recent being the Audiovisual

  15. European Industry, 1700 - 1870

    NARCIS (Netherlands)

    Broadberry, Stephen; Fremdling, Rainer; Solar, Peter M.

    2008-01-01

    This paper offers an overview of the development of European industry between 1700 and 1870, drawing in particular on the recent literature that has emerged following the formation of the European Historical Economics Society in 1991. The approach thus makes use of economic analysis and quantitative

  16. European Stars and Stripes

    National Research Council Canada - National Science Library

    Hendricks, Nancy

    1994-01-01

    The European Stars and Stripes (ES&S) organization publishes a daily newspaper, The Stars and Stripes, for DoD personnel stationed in Germany, Italy, the United Kingdom, and other DoD activities in the U.S. European Command...

  17. Introduction: European climate leadership

    NARCIS (Netherlands)

    Wurzel, R.K.W.; Liefferink, J.D.; Connelly, J.; Wurzel, R.K.W.; Connelly, J.; Liefferink, D.

    2017-01-01

    There is no shortage of would-be leaders in EU climate change politics. The EU institutions (e.g. European Council, Council of the EU, Commission and the European Parliament (EP)), member states and societal actors have all, though to varying degrees and at different time periods, tried to offer

  18. European works councils

    DEFF Research Database (Denmark)

    Knudsen, Herman Lyhne

    2004-01-01

    The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies.......The theme addressed by this artcle is the opportunities for European Works Councils of gaining influence on corporate decisions in multinational companies....

  19. European Home Energy

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.

    2009-01-01

    An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes......An important aim of the european energy performance of buildings directive is to improve the overall energy efficiency of new homes...

  20. The European Programme Manager

    DEFF Research Database (Denmark)

    Larson, Anne; Bergman, E.; Ehlers, S.

    The publication is a result of a cooperation between organisations in six European countries with the aim to develop a common European education for programme managers. It contains of a description of the different elements of the education together with a number of case-studies from the counties...

  1. European Analytical Column

    DEFF Research Database (Denmark)

    Karlberg, B.; Grasserbauer, M.; Andersen, Jens Enevold Thaulov

    2009-01-01

    for European analytical chemistry. During the period 2002–07, Professor Grasserbauer was Director of the Institute for Environment and Sustainability, Joint Research Centre of the European Commission (EC), Ispra, Italy. There is no doubt that many challenges exist at the present time for all of us representing...

  2. Energy policy of the EU and the role of Turkey in Energy Supply Security

    Directory of Open Access Journals (Sweden)

    MEHTER AYKIN Sibel

    2018-01-01

    Full Text Available All the nations define strategies and develop policies on national and international levels to eliminate risks against energy security. The aim of this paper is to define the energy policy of the European Union and identify the potential of Turkey in securing energy supply to the European Union. To achieve this end, after explaining the policy frame of the European Union and that of Turkey in energy related matters, the existing and planned energy routes expanding from the Russian Federation, Caspian Sea and the Middle East to the European Continent are mapped, and the role assigned to Turkey as an energy hub is exemplified with reference to its accession process. It is concluded that Turkey’s membership is to enrich the European Union and contribute to its energy supply security.

  3. Seven proposals for an efficient and dynamic European electricity system

    International Nuclear Information System (INIS)

    Keppler, J.H.; Geoffon, P.; Finon, D.

    2013-01-01

    While liberalisation of the electricity generation sector is inevitably a long term process, given the complexity of the industry, European consumers expect to reap identifiable benefits in terms of price, innovation in associated services, environmental performance and security of supply. Yet rather than evidence of progress, complexity - indeed confusion - effectively characterises Europe's electricity structure at present. It's time to react. (authors)

  4. European Human Resources Observatory for the Nuclear Energy Sector

    International Nuclear Information System (INIS)

    Flore, Massimo

    2014-01-01

    Institute for Energy and Transport provides support to European Union policies and technology innovation to ensure sustainable, safe, secure and efficient energy production, distribution and use and to foster sustainable and efficient transport in Europe. Briefly outlined are the organization, bottom-up approach and top-down approach

  5. A review of the European offshore wind innovation system

    NARCIS (Netherlands)

    Wieczorek, A.J.; Negro, S.O.; Harmsen, R.; Heimeriks, G.J.; Luo, L.; Hekkert, M.P.

    2013-01-01

    Offshore wind has the potential of becoming an important pillar of the future European energy system. It can contribute to policy objectives on climate change, energy security, green growth and social progress. However, the large potential of offshore wind does not automatically lead to a large

  6. Seven proposals for an efficient and dynamic European electricity system

    International Nuclear Information System (INIS)

    Keppler, Jan Horst; Geoffron, Patrice; Finon, Dominique

    2013-01-01

    While liberalisation of the electricity generation sector is inevitably a long term process, given the complexity of the industry, European consumers expect to reap identifiable benefits in terms of price, innovation in associated services, environmental performance and security of supply. Yet rather than evidence of progress, complexity - indeed confusion - effectively characterises Europe's electricity structure at present. It is time to react

  7. Report of the European Energy Law seminar 2011

    International Nuclear Information System (INIS)

    Holwerda, J.M.; Mueller, H.K.; Mutsaers, A.

    2011-01-01

    The 24th European Energy Law Seminar was held in Noordwijk aan Zee, Netherlands, 11-12 April 2011. The first day attention was paid to the liberalization of the energy markets, the climate and energy. The second day was dedicated to energy security, the upstream sector and development of energy infrastructure. [nl

  8. Report of the European Energy Law Seminar 2002

    International Nuclear Information System (INIS)

    Brinkman, I.

    2002-01-01

    An overview is given of the most important lectures that were held at the title symposium in Noordwijk, Netherlands, 23-24 September 2002. 18 presentations were attended by circa 120 participants from European countries. The subjects were public services, emission trade and green certificates. security of supply, interconnectors, and restructuring of natural gas markets in Europe [nl

  9. Legal constraints on genetic data processing in European grids

    NARCIS (Netherlands)

    Mouw, Evert; van't Noordende, Guido; van Kampen, Antoine H. C.; Louter, Baas; Santcroos, Mark; Olabarriaga, Silvia D.

    2012-01-01

    European laws on privacy and data security are not explicit about the storage and processing of genetic data. Especially whole-genome data is identifying and contains a lot of personal information. Is processing of such data allowed in computing grids? To find out, we looked at legal precedents in

  10. ENEN - European nuclear engineering network

    International Nuclear Information System (INIS)

    Comsa, Olivia; Paraschiva, M.V.; Banutoiu, Maria

    2002-01-01

    declining number of courses associated with it, and the declining interest among students, is arrested. Even in countries not now developing additional nuclear power, qualified people are still needed to operate the existing plants and fuel-cycle facilities (many of which will operate for decades), manage radioactive waste, and prepare for future decommissioning of existing plants. Now and for the generations to come, these activities will require expertise in nuclear engineering and science if safety and security are to be maintained and the environment protected.' Clear conclusions are drawn regarding main achievements and future European actions in the field of nuclear education concerning reactor design, construction and maintenance, as well as, waste management and radiation protection. (authors)

  11. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  12. The Post-9/11 European Union Counterterrorism Response: Legal-Institutional Framework

    Science.gov (United States)

    2012-12-01

    library/ biblio /publications/2011/fin_report/fin_report_11_en.pdf. 427 Heading 3a: Freedom, security and justice did not exist in the Financial Framework...European Union, 2012. Accessed November 8,2012. http://ec.europa.eu/budget/library/ biblio /publications/2011/fin_report/fin_report_1 1_en.pdf. European

  13. Contesting Risk and Responsibility: European Debates on Food and Agricultural Governance of Avian Influenza

    NARCIS (Netherlands)

    Krom, de M.P.M.M.; Oosterveer, P.J.M.

    2010-01-01

    In August 2005, avian influenza entered European public arenas as the next food and agricultural risk. As the virus was detected close to Europe, questions arose whether measures were required to protect human health and secure European food supply. This article analyzes the public debates on the

  14. SOCIAL SECURITY OF TURKISH ATHLETES

    Directory of Open Access Journals (Sweden)

    Barış ÖZTUNA

    2015-07-01

    Full Text Available Law No. 5510 realized within the social security reform aims providing a structure which presents equal scope and quality of social security service other all citizens. According to Labor Law No 4857, unionization of sportsmen in Turkish legal environment is possible, sport clubs and sportsmen are continuing to live without so many rights and obligations but they didn’t. Aim of this study; to prove sportsmen of location of the labour law and to mark off. The purpose of the study is explained according to Law No. 4857 and Law No. 5510 Turkish athletes. Profesional athletes deemed to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. But amateur athletes don't seem to be insurance holders for the purposes of implementing short and long term insurance branches of No 5510 Law. According to the law 5774 regarding to be called as an g overnment athlete, within the adults category of the sports that are accepted as olympic, paralympic and deaflympic; pension is paid to the amateur athletes who became first, second or third at Olymic games, World or European Champions as an individual or team sports and to the national team coaches and assistant coaches of the athletes’ who became Olympic or World Champion as a team.

  15. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  17. Innovation in Justice and Security by Treaty of Lisbon

    Directory of Open Access Journals (Sweden)

    Myzafer ELEZI

    2013-11-01

    Full Text Available The Lisbon Treaty is a legal package which includes previous treaties, starting from the year 1957, following the Treaty of Rome and the Treaty of Nice in 2001, summarized in a single text that introduces a number of changes of the way how the European Union works, in order to make it more efficient for its citizens. This Treaty converts the European Union for the first time in a single entity, unifying pillars of its activities which are as follows: the European Communities, Common Foreign and Security Policy, and Judicial Cooperation in Criminal Matters, which so far only the European Communities had the status of judicial person. It modifies the Treaty of European Union, created by the European Union and the Treaty created by the European Community, which is in power, but do not replace them. The new Treaty gives the EU the legal framework, and necessary tools to face the future challenges and to respond to its citizen’s perspectives. The Conference will introduce all the innovations that the Treaty of Lisbon brings not only in the field of security and foreign policy of the EU, but also in those related to police and judicial cooperation regarding criminal matters.

  18. THE ROLE OF THE EUROPEAN EXTERNAL ACTION SERVICE IN THE EU’S INSTITUTIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    DAN VATAMAN

    2012-05-01

    Full Text Available European External Action Service (EEAS is a new institution of the European Union, whose foundation was laid by the Treaty of Lisbon with the role to support the High Representative of the Union for Foreign Affairs and Security Policy in fulfilling his mandate and, also to assist the President of the European Council, European Commission, President and other Commissioners to exercise their powers in international relations. Since the establishment of the European External Action Service (EEAS is relatively recent, this article tries to highlight the crucial role of the European External Action Service (EEAS in the European Union's institutional system and its contribution to strengthening the coherence and increasing impact and visibility of European Union action at international level and thus the one of the Member States.

  19. The Role of Europe in Peacekeeping and International Security

    Directory of Open Access Journals (Sweden)

    Pablo Antonio Fernández Sánchez

    1998-09-01

    Full Text Available All of the States in Europe belong to the United Nations and two of them enjoy status as Permanent Members of the Security Council, which is the primordial organism for dealing with peacekeeping and international security. Besides this, one or two European States have almost always been chosen to form part of the Security Council as rotating, non-permanent members, with voting priviliges and the capacity to design policies for peacekeeping and international security. Such State participation in the Security Council is not carried out collectively, but rather individually, which explains, in part, Europe’s political “dwarfism” in regards these two matters. Another aspect to consider is this: The 15 Member States of the European Union pay, on time, 35.41% of the United Nation’s budget, whereas the one State that pays the most, 25%, the United States of America, is a nation in persistent arrears, if not an endemic debtor. Before this, though, national egoisms ask each European country to impart its own foreign policy, a fact observed when each deals with security and peace matters. This individualistic isolationism is prejudicial to the many European interests, which are seen as fragmented if not in confrontation. The problematic above is seen to be growing in complexity for lack of a common defense structure that allows for pre-existent structures and logistics to facilitate the work of the United Nations in matters of peacekeeping and international security. To an analysis of these issues are these pages dedicated.

  20. Sustainable development and energy in the european union

    International Nuclear Information System (INIS)

    Roth, A.

    2013-01-01

    Sustainable development represents a core objective of the European Union, being embodied through out its major polices. In the field of energy, the EU objectives, commonly known as ä20-20-20ö initiative, aim at ensuring a competitive, secure and sustainable energy for European households and industries by reducing the emissions of green house gases, an efficient use on energy and increasing the use of renewable energy. The present paper draws a review on the most important aspects of EU energy policy, its measures, results and costs from the perspective of security of supply, competitiveness of price and green house gases emissions. The aim is to highlight the trade offs which are involved in the orientation towards a sustainable path of the energetic sector of the European Union. (authors)

  1. The European Nuclear Safety Training and Tutoring Institute

    International Nuclear Information System (INIS)

    2012-01-01

    The European Nuclear Safety Training and Tutoring Institute, ENSTTI, is an initiative of European Technical Safety Organizations (TSO) in order to provide vocational training and tutoring in the methods and practices required to perform assessment in nuclear safety, nuclear security and radiation protection. ENSTTI calls on TSOs' expertise to maximize the transmission of safety and security knowledge, practical experience and culture. Training, tutoring and courses for specialists are achieved through practical lectures, working group and technical visits and lead to a certificate after knowledge testing. ENSTTI contributes to the harmonization of nuclear safety and security practices and to the networking of today and future nuclear safety experts in Europe and beyond. (A.C.)

  2. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  3. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  4. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  5. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  6. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  7. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  8. While working around security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne; Petersen, Marianne Graves

    This paper describes our work at two levels. First of all the paper discusses how users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the kind of understanding of IT security that comes out of careful analyses of use confronts the ways in which usable...... IT security is established in the literature. Recent literature has called for better conceptual models as a starting point for improving IT security. In contrast to such models we propose to dress up designers by helping them better understand the work that goes into everyday security. The result...... is a methodological toolbox that helps address and design for usable and useful IT security. We deploy examples of analyses and design, carried out by ourselves and by others to fine-tune our design perspective; in particular we use examples from three current research projects....

  9. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  10. Information security of remote-reading energy meters

    International Nuclear Information System (INIS)

    Jacobson, J.

    1994-01-01

    This report presents basic concepts within the field of IT security. The ITSEC security and the ITSEM methods given by the European Community are used as a base. The EC INFOSEC research programme has included the project 'PER DOMUM' which focuses on remote reading of energy meters. The project is a co-operation between TACS (U.K.), GPP (Germany), CESI (Italy) and ENEL (Italy). SP has during the spring and summer of 1994 participated in the concluding of the project. Threats, security functions and security mechanisms are given for remote reading of energy meters. All of the listed functions and mechanisms do not origin from the 'PER DOMUM' project, but are the experiences of SP. The security evaluation is explained in two ways. One description of the required by ITSEM is given. Another description is given of which deliverables are required to perform the evaluation

  11. Update of European bioethics

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2015-01-01

    This paper presents an update of the research on European bioethics undertaken by the author together with Professor Peter Kemp since the 1990s, on Basic ethical principles in European bioethics and biolaw. In this European approach to basic ethical principles in bioethics and biolaw......, the principles of autonomy, dignity, integrity and vulnerability are proposed as the most important ethical principles for respect for the human person in biomedical and biotechnological development. This approach to bioethics and biolaw is presented here in a short updated version that integrates the earlier...... research in a presentation of the present understanding of the basic ethical principles in bioethics and biolaw....

  12. Transnational European Television Drama

    DEFF Research Database (Denmark)

    Bondebjerg, Ib; Redvall, Eva Novrup; Helles, Rasmus

    This book deals with the role of television drama in Europe as enabler of transnational, cultural encounters for audiences and the creative community. It demonstrates that the diversity of national cultures is a challenge for European TV drama but also a potential richness and source of creative...... variation. Based on data on the production, distribution and reception of recent TV drama from several European countries, the book presents a new picture of the transnational European television culture. The authors analyse main tendencies in television policy and challenges for national broadcasters...

  13. Democratic Citizenship: European referents

    Directory of Open Access Journals (Sweden)

    María PUIG GUTIÉRREZ

    2011-09-01

    Full Text Available Let’s sense beforehand in this article a tour concerning the educational European policies that favors the development of a democratic citizenship. The aim that we chase is to understand the way in which nowadays it is being interpreted and stimulated the Citizenship education from European Union. for it we offer a conceptual delimiting of «Citizenship education» and later, we show an analysis of the principal documents and materials elaborated principally by the Council of Europe that mark the way followed by European Union as for education for Democratic Citizenship (EDC.

  14. Symbolism in European Integration

    DEFF Research Database (Denmark)

    Manners, Ian

    2011-01-01

    Ernst Haas observed over fifty years ago that ‘United Europe' is a resilient, adaptable, unifying, and yet unspecified symbol'. It is precisely this adaptability and ambiguity that has ensures the continuing importance of European studies as a means of understanding ‘the remarkable social...... of social transformation involved' (Calhoun 2003: 18). This article will consider the role of symbolism in European integration as part of answering Craig Calhoun's call for a means of transcending specific regimes of analysis in order to advance European studies....

  15. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  16. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  17. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  18. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  19. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  20. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  1. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  2. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  3. Political and Military Challenges of the Republic of Moldova in the Context of Security in the Black Sea Basin

    Science.gov (United States)

    2014-12-01

    ONSORING /MONIT ORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING NIA AGENCY REPORT NUMBER 11. SUPPLEMENTARY NOTES TI1e views expressed...Priorities and Actions, European Commission - SPEECH/14/ 505 - 25/06/2014, College of Europe and European Commission: First Joint High-Level Roundtable...Security Strategy: Key Priorities and Actions. European Commission - SPEECH/14/ 505 - 25/06/2014. College of Europe and European Commission: First Joint

  4. National choices in a European perspective. Proceedings of the European Forum 2003

    International Nuclear Information System (INIS)

    Sido, Bruno; Lamoureux, Francois; ); Herzog, Philippe; ); Barre, Bertrand; Bataille, Christian; Colombani, Pascal; Gonzalez Gomez, Jose Luis; Lescoeur, DBruno; Perez, Serge; Weh, Rudolf; Westerlind, Magnus; Houssin, Didier; Nagashima, Hideo; Pavlopoulos, Panagiotis; Linkohr, Rolf; ); Allemeersch, Antoine; Beveridge, George; Bonnemains, Jacky; Fritschi, Markus; Piguet, Jack-Pierre; Rigny, Paul; Streydio, Jean-Marie; Tallec, Michele; Vasa, Ivo; Pancher, Bertrand

    2003-01-01

    In 2003, the 'Entretiens europeens' engaged a dialogue between stakeholders of various socio-professional backgrounds from several countries and with the European Commission, in order to compare the selected options of management of radioactive waste and materials and to emphasize the best experiments, which could inspire an innovating European policy in the world. This document is the proceedings of this first European Forum on this topic. Content: 1 - Introduction by Bruno Sido, senator and chairman of the County Council of Haute-Marne; 2 - talk by Francois Lamoureux, General Director of DG TREN, European Commission. 3 - Debate with the audience. 4 - First round table chaired by Philippe Herzog, Member of the European Parliament and President of Confrontations Europe: Is a European directive feasible? Within what time frame? What flexibility is required? What democratic process is needed? With the contributions from: Bertrand Barre, Manager in charge of Scientific Communications (AREVA), Christian Bataille, Member of the French Parliament, author of the 'Bataille Law', Pascal Colombani, Administrator, British Energy (nuclear power producer in UK), Jose Luis Gonzalez Gomez, ENRESA (Spain), Bruno Lescoeur, Director of the Energy sector, EDF, Serge Perez, Trade Unionist, Member of the National Bureau, FNME CGT (France), Rudolf Weh, Head of Department Spent Fuel and Waste Management Services/Interim Storage, GNS Gesellschaft fuer Nuklear-Service mbH (Germany), Magnus Westerlind, Manager Nuclear Security, SKI (Sweden). 5 - Hearing Didier Houssin, Director, Raw Materials and Hydrocarbons, DGEMP. 6 - Interventions of Hideo Nagashima, Executive Director, NUMO (Japan) and of Panagiotis Pavlopoulos, Research Director CERN, Geneva. 7 - Second round table chaired by Rolf Linkohr, Member of the European Parliament and chairman of European Energy Foundation: 'The scientific and social importance of the various options for the management of nuclear waste' With the contributions

  5. EUROPEAN UNION POLICIES FOR CLIMATE CHANGE MITIGATION

    Directory of Open Access Journals (Sweden)

    Paul Canter

    2017-07-01

    Full Text Available Climate change is one of the most important challenges that humanity faces in the 21st century, and for the European Union, combating this phenomenon represents an important element, which is reflected both in the actions carried out in recent years, domestically and internationally, as well as in the EU policy on climate change. Within the EU, regulations were adopted, that demonstrate the importance that the Union confers to the limitation of this phenomenon, stressing at the same time the need for an integrated policy framework to ensure the security for potential investors and a coordinated approach between Member States. This paper will present recent developments for the most important policies to combat and mitigate climate change in the European Union, starting with "20-20-20" objectives, which are to be met through the package "Energy-Climate Change", continuing with 2030 and 2050 timeframes, and finally presenting the main lines of action to combat climate change.

  6. Policy-making in the European Union

    CERN Document Server

    Pollack, Mark A; Young, Alasadair R

    2015-01-01

    Constantly evolving, and with far-reaching implications, European Union policy-making is of central importance to the politics of the European Union. From defining the processes, institutions and modes through which policy-making operates, the text moves on to situate individual policies within these modes, detail their content, and analyse how they are implemented, navigating policy in all its complexities. The first part of the text examines processes, institutions, and the theoretical and analytical underpinnings of policy-making, while the second part considers a wide range of policy areas, from economics to the environment, and security to the single market. Throughout the text, theoretical approaches sit side by side with the reality of key events in the EU, including enlargement, the ratification of the Lisbon Treaty, and the financial crisis and resulting euro area crisis, exploring what determines how policies are made and implemented. In the final part, the editors consider trends in EU policy-makin...

  7. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  8. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  9. VoIP Security

    OpenAIRE

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  10. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  11. Beginning ASPNET Security

    CERN Document Server

    Dorrans, Barry

    2010-01-01

    Beginning ASP.NET 3.5 Security is geared for novice to intermediate ASP.NET programmers who wish to protect and defend their web sites against attack and exploitation. Beginning with a discussion of why we need security and the things that may occur when it is ignored and an overview of how ASP.NET works, readers are taken through the common steps in developing a web site, the security problems each area exposes and how these can be exploited. Visual Studio Security MVP Barry Dorrans teaches readers how they can defend their applications using the standard .NET framework, industry patterns and

  12. Governing for Enterprise Security

    National Research Council Canada - National Science Library

    Allen, Julia

    2005-01-01

    ... business. If an organization's management -- including boards of directors, senior executives, and all managers -- does not establish and reinforce the business need for effective enterprise security...

  13. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  14. National Security Whistleblowers

    National Research Council Canada - National Science Library

    Fisher, Louis

    2005-01-01

    .... Domestic and national security information is provided through agency reports and direct communications from department heads, but lawmakers also receive information directly from employees within the agencies...

  15. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  16. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2003-01-01

    Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a c

  17. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  18. Lecture 1: General Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    The CERN Computer Security Team is mandated to coordinate all aspects of CERN’s computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN’s operational needs. This presentation will cover a series of security incidents which happened at CERN over the last five years, and discuss the lessons-learned in order to avoid similar things from happening again (there is enough blunder out there so there is need to make the same mistake twice). In the second part, I will outline how computer security --- prevention, protection, detection and response --- is generated at CERN, what the main objectives of the CERN computer security team are, and which policies, procedures and tools have been put in place. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadr...

  19. Working towards a European Geological Data Infrastructure

    Science.gov (United States)

    van der Krogt, Rob; Hughes, Richard; Pedersen, Mikael; Serrano, Jean-Jacques; Lee, Kathryn A.; Tulstrup, Jørgen; Robida, François

    2013-04-01

    The increasing importance of geological information for policy, regulation and business needs at European and international level has been recognized by the European Parliament and the European Commission, who have called for the development of a common European geological knowledge base. The societal relevance of geoscience data/information is clear from many current issues such as shale gas exploration (including environmental impacts), the availability of critical mineral resources in a global economy, management and security with regard to geohazards (seismic, droughts, floods, ground stability), quality of (ground-)water and soil and societal responses to the impacts of climate change. The EGDI-Scope project responds to this, aiming to prepare an implementation plan for a pan-European Geological Data Infrastructure (EGDI), under the umbrella of the FP7 e- Infrastructures program. It is envisaged that the EGDI will build on geological datasets and models currently held by the European Geological Surveys at national and regional levels, and will also provide a platform for datasets generated by the large number of relevant past, ongoing and future European projects which have geological components. With European policy makers and decision makers from (international) industry as the main target groups (followed by research communities and the general public) stakeholder involvement is imperative to the successful realization and continuity of the EGDI. With these ambitions in mind, the presentation will focus on the following issues, also based on the first results and experiences of the EGDI-Scope project that started mid-2012: • The organization of stakeholder input and commitment connected to relevant 'use cases' within different thematic domains; a number of stakeholder representatives is currently involved, but the project is open to more extensive participation; • A large number of European projects relevant for data delivery to EGDI has been reviewed

  20. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with