WorldWideScience

Sample records for regional security agreements

  1. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  2. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  3. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  4. African Regional Integration: Implications for Food Security

    NARCIS (Netherlands)

    Dijk, van M.

    2011-01-01

    This report looks at the African regional trade, regional integration agreements (RIAs) and the implications for food security. An overview is presented on the present state of African regional integration and the determinants of regional trade in agriculture and food commodities. In particular the

  5. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  6. Regional cooperative agreement for the Asia and Pacific region

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    Among the means available to the International Atomic Energy Agency to promote cooperative efforts in the nuclear field is the Regional Cooperative Agreement (RCA) for Research, Development, and Training related to Nuclear Science and Technology for the Asia and Pacific Region. Under the terms of this agreement, which came into force on June 12, 1972, participating countries aim to promote and coordinate research, development, and training projects in nuclear fields through collaborative efforts among relevant national institutions in the region. The Agency's role is to provide organizational, administrative, advisory, technical, and financial assistance when needed to secure successful execution of the projects undertaken within the framework of the RCA. Although this presentation deals primarily with the benefits of regional cooperation under the agreement, a review of the RCA would be somewhat imbalanced without a mention of its shortcomings. One of the principal impediments to more rapid progress, as is the case in many other areas, is financing. There is no stable source of funding outside the research contract program and, the likelihood of large-scale UNDP support notwithstanding, a greater willingness on the part of participating Member States to support the program along with the development of a greater sense of common purpose are called for. In this connection serious consideration is being given to the possibility of establishing an Asian Centre for Research and Training, an institute that would bring together scientists from the region to collaborate on problems common to the RCA countries. A study group has already been convened to investigate the feasibility of this proposal

  7. Maritime Security – The Need for a Global Agreement

    OpenAIRE

    Dinos Stasinopoulos

    2003-01-01

    This note reviews US maritime security measures, outlines work carried out by international organisations and then frames maritime security within the wider context of maritime trade. Finally, it suggests the development of a Global Agreement linking security and other maritime trade-related issues. The initiative for such an agreement should be undertaken by the EU only if current International Maritime Organisation (IMO) efforts fail to produce a maritime security framework with binding req...

  8. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  9. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  10. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  11. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  12. Why are Trade Agreements Regional?

    OpenAIRE

    Zissimos, Ben

    2007-01-01

    This paper shows how distance may be used to coordinate on a unique equilibrium in which trade agreements are regional. Trade agreement formation is modeled as coalition formation. In a standard trade model with no distance between countries, a familiar problem of coordination failure arises giving rise to multiple equilibria; any one of many possible trade agreements can form. With distance between countries, and through strategic interaction in tariff setting, regional trade agreements gene...

  13. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  14. Leveraging Trade Agreements to Meet U.S. Security Aims

    Science.gov (United States)

    2016-04-08

    President George H.W. Bush sought means to influence the policies of Latin American states more effectively. Mexico , particularly in the post-Cold War era...security goals. A review of the U.S. trade policy, and its nesting with the National Security Strategy, demonstrates how President Barack Obama’s... President Barack Obama’s strategic “pivot to Asia,” and the Trans-Pacific Partnership (TPP) trade agreement facilitate U.S. enduring national

  15. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  16. An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States

    Science.gov (United States)

    Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin

    2018-01-01

    Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.

  17. 48 CFR 53.303-DD-441 - Department of Defense DD Form 441, Security Agreement.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Department of Defense DD Form 441, Security Agreement. 53.303-DD-441 Section 53.303-DD-441 Federal Acquisition Regulations...-DD-441 Department of Defense DD Form 441, Security Agreement. EC01MY91.163 EC01MY91.164 ...

  18. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  19. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  20. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  1. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  2. AFRA. African Regional Co-operative Agreement

    International Nuclear Information System (INIS)

    1994-04-01

    This publication provides an outline of the African Regional Co-operation Agreement for research, development and training related to nuclear science and technology (AFRA). The agreement stems from an initiative of several African member states of the IAEA to get the agency to help establish an African regional arrangement which would be similar to arrangements which were already in place in the Asian and Latin American regions. Through this regional approach to development, AFRA seeks to accelerate moves toward self-sufficiency in scientific disciplines and appropriate technologies by coordinating intellectual and physical resources and disseminating innovative methods and practices in a cost-effective manner

  3. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  4. Approaches to regional security and arms control in North-East Asia: Tasks ahead

    International Nuclear Information System (INIS)

    Lee Seo-Hang

    1992-01-01

    In order to pave the way towards regional security and arms control in North-East Asia, one of the outstanding issues left over from the cold war, that is, the question of a divided Korea-must be solved first. In settling the Korean problem, the importance of the bilateral negotiation between the parties in direct conflict can never be overemphasized. Over the past few years, fortunately, there has been an accumulation of developments that would have a positive effect on the improvement of inter-Korean relations and peaceful unification of the peninsula. In this sense, the first challenge for the two Koreas is to fulfil the pledges that they committed in the agreements. Concluding agreements is only a first step. They must be implemented fully both in letter and in spirit. Only upon the sincere and complete translation of the agreements into action can the two Koreas establish a solid peace system and move towards unification. This fulfilment will eventually contribute to security and stability in North-East Asia. To emphasize the importance of bilateral negotiation between the two Koreas is not necessarily to exclude the role of external Powers. The four major Powers in North-East Asia-China, Japan, Russia and the United States - could support the South-North dialogue, help ease tensions, facilitate discussion of common security concerns and possibly guarantee the outcomes negotiated between the two Koreas. By fostering bilateral negotiation between the parties to the conflict, they could contribute to enhancing security, confidence and disarmament in the region. At this moment, the most urgent task in the Korean peninsula relates to the problem of Pyongyang's nuclear weapons programme. To solve the nuclear problem, a significant progress on mutual reciprocal inspections must be made immediately in accordance with the wordings of the Declaration. Mutual inspection will test whether Pyongyang intends to go towards nuclear weapons, or away from them and towards

  5. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  6. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  7. Hubs and spokes in Regional Trade Agreements

    NARCIS (Netherlands)

    Vaal, A. de

    2017-01-01

    In the plethora of Regional Trade Agreements (RTAs) some countries are involved in much more RTAs than others. Furthermore, some countries take in a position as a hub: they have trade agreements with many other countries, while their partner countries are much less involved in RTA relations. Even

  8. Minimum deterrence and regional security. Section 2. Other regions

    International Nuclear Information System (INIS)

    Azikiwe, A.E.

    1993-01-01

    Compared to European political and security circumstance, minimum deterrence is less an illusion in other regions where weapon free zones already exist. It will continue to be relevant to the security of other regions. Strategic arms limitation should be pursued vigorously in a constructive and pragmatic manner, bearing in mind the need to readjust to new global challenges. The Comprehensive Test Ban Treaty is the linchpin on which the Non-proliferation Treaty rests

  9. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  10. Modern Integration Processes in the Asia-Pacific Region: the Formation of Trans-Regional Mega-Agreements

    Directory of Open Access Journals (Sweden)

    Maliuta Iryna A.

    2017-12-01

    Full Text Available In the 21st century, especially in the last decade, new intercontinental integration projects appear on the global stage with a high potential for influencing the regional economic structure and at the same time bearing certain challenges for the international geo-economic and geo-political map of the world. Comprehensive new-generation inter-regional agreements are being formed, such as the TTP, the TTIP, the RCEP, the Comprehensive Economic and Trade Agreement between Canada and the EU (CETA, the Japan-EU Economic Partnership. The Asia-Pacific region has been an active participant in the creation and promotion of mega-regional trade agreements. Mega-regional trade agreements in the Asia-Pacific region, namely the TTP and the RCEP, are analyzed as mega-projects with an unprecedented scale of liberalization within the framework of the agreement that include provisions complementing the WTO framework or extending beyond it. There identified reasons for the emergence of mega-regional trade agreements and prospects for the implementation of these projects, as well as possible consequences for the international economic system. It is established that new trans-regional projects, providing certain advantages to the participating countries, simultaneously carry both opportunities and challenges for the world economy. The latter are associated with the threats of crowding the countries that do not take an active part in the integration processes out of the global chains of value creation as well as of the processes of international trade.

  11. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  12. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  13. Regional Security Partners: The Potential for Collective Security

    National Research Council Canada - National Science Library

    Tan, Jimmy

    1999-01-01

    ...." The threat of big power and regional conflicts has diminished. However, the security landscape is now characterized by political fragmentation, Third World chaos, failed states, and ethnic conflicts among others...

  14. Security Situation in China’s Neighboring Regions: New Changes

    Institute of Scientific and Technical Information of China (English)

    ZHU FENG

    2016-01-01

    Recent Development of Security Structure in East Asia Region:Alliance Politics Has Entered a New Strategic Active Stage Since the end of the Cold War in1991,the East Asia Region has witnessed quite a number of changes in security situation.However,there have been no decisive changes in regional security order,power distribution or the strategic choices of major states in the region.The Obama Adminis-

  15. Challenges to regional security and disarmament measures

    International Nuclear Information System (INIS)

    Clements, K.P.

    1993-01-01

    The new agenda for peace is providing an extremely useful road map for current international and regional discussions about new ways and means of securing and maintaining peace and security. It underlines the central role of the United nations Security Council in relation to international conflicts and the maintenance of the peace, but it underlines an increasingly important role of the regional organisations as well. In all, there is a recognition that the end of the cold war has generated possibilities for peace-building that have not existed before. To take advantage of these opportunities requires an enhancement of consultation and dialogue at national, regional and global levels so that all nations and all peoples feel and know that they have a stake in the new peace and security architecture that will govern international relations into the twenty first century

  16. EVALUATION OF ECONOMIC SECURITY NOVOSIBIRSK REGION (FOR EXAMPLE, A REGIONAL ENGINEERING

    Directory of Open Access Journals (Sweden)

    Lugacheva L. I.

    2014-12-01

    Full Text Available The article shows the importance of regional engineering for the Russian economy, it clarifies the factors of economic security of the Novosibirsk region (NSO. Analyzed the characteristics prevailing in the engineering industry, its competitive advantages. The research results of the export orientation of the regional engineering VAT: its direction and priorities; discusses the trends that influence the growth during the recovery has formed a new profile of its foreign economic relations. Threats identified in the development of engineering and to propose measures to overcome them to ensure the economic security of the region. The article deals with the problem-tional institutes provide for the sustainable development of regional engineering, discusses the possibility of using pub-lic-private partnerships. Sharing of risks and responsibilities between the subject of the Russian Federation, municipalities and entrepreneurs - one of the priorities in the creation of the necessary conditions for the economic security of the NSO.

  17. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  18. Indonesian Sea Power and Regional Maritime Security Challenges

    Directory of Open Access Journals (Sweden)

    Marsetio Marsetio

    2017-07-01

    Full Text Available The main objective of this paper is to examine the regional maritime security challenges facing Indonesia. As it is known that entering to the 21st century has come a new term in regional architecture in the Asia-Pacific region, namely the Indo-Pacific region. This region consists of the Indian Ocean and Pacific. Both of these areas became more interconnected than in the previous period. These two regions became a single, significant system in the global order. Key players in the Indo-Pacific region are China, India and the United States. Of course, their actions have created new challenges in maritime security. These challenges include maritime disputes, pirates, and maritime power competition. The dispute in the South China Sea has spawned a security problem in the Asia Pacific region that Indonesia must face in the future.

  19. Regional trade agreements & procurement rules : facilitators or hindrances?

    OpenAIRE

    ANDERSON, Robert D.; MÜLLER, Anna Caroline; PELLETIER, Philippe

    2015-01-01

    This Working Paper considers the significance of government procurement chapters in regional trade agreements (RTAs), both in their own right and vis-à-vis the WTO Agreement on Government Procurement (GPA). The paper finds, inter alia, that: (i) a strong complementarity exists between government procurement trade commitments and general goods and services trade commitments, making integration of procurement commitments in a more general system such as the WTO Agreements desirable; (ii) govern...

  20. The Current Status of the Economic Security of Poltava Region

    Directory of Open Access Journals (Sweden)

    Bondarevska Olha M.

    2017-12-01

    Full Text Available The status of economic security of Poltava region in 2012–2016 was analyzed, the analysis was conducted using the developed methodology for assessing economic security of region, which is based on the joint use of indicative and functional methods. In order to assess the status of economic security of region, a system of indicators, divided by economic security components, has been formed using functional approach. The information-analytical provision of assessment has been formed using statistical information on the socio-economic development of the region. The influence of factors of destabilizing and destimulative nature on the status of economic security of the region has been researched. It has been concluded that the economic security of Poltava region is unsatisfactory, despite the existence of some positive tendencies, which at present are not sustainable.

  1. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  2. REGIONAL TRADE AGREEMENTS AND COMPETITION POLICY. CASE STUDY: EU, ASEAN AND NAFTA

    Directory of Open Access Journals (Sweden)

    Fora Andreea-Florina

    2014-07-01

    Full Text Available The large number of regional trade agreements notified to the World Trade Organization (WTO significantly influenced the flow of world trade. By April 2014 there had been notified 583 regional trade agreements to the WTO, of which only 379 are in force. The objective of this paper is to highlight the importance of regional trade agreements in world trade, especially the importance of establishing a regional competition policy in these agreements. The research methodology used is the analysis of legislation governing preferential trade agreements at the level of WTO, the collection and interpretation of statistical data provided by the WTO Secretariat, the case study, namely the study of literature. The paper is structured in three parts. The first part of the paper examines the basic laws based on which regional trade agreements are notified to the WTO and the evolution of these agreements in the period 1958-2013. The second part of the paper is devoted to the analysis of competition policy in regional trade agreements. In this part of the paper, to highlight the patterns of competition policy adopted under these agreements was analyzed by three case studies of competition policy in the EU, ASEAN and NAFTA. The three case studies have revealed that the three preferential trade agreements present regional competition policies with varying degrees of integration. The most complex form of competition policy is found in the European Union, because we are talking about a centralized model of competition policy. ASEAN presents a partially decentralized model, while NAFTA scrolls with a decentralized model of competition policy. The last part of the paper presents the characteristics of the four models of competition policy identified in the preferential trade agreements in force. It should be emphasized that if the initial preferential trade agreements have not put a great emphasis on the rules of competition policy, practice has shown the importance

  3. India’s Participation In The Regional Trade Agreements

    Directory of Open Access Journals (Sweden)

    V. I. Baronov

    2017-01-01

    Full Text Available The main objective of the proposed study is to identify the specifics of India’s participation in the regional trade agreements (RTAs, a comparative analysis of the main provisions of the RTAs and the impact of membership in the integration agreements on the country’s foreign trade relations. In the world economic literature there is no unity of opinions on the economic effect of the participation of states in RTAs. The author’s thesis is that the final effect of membership in the RTAs depends on the amount of customs duties on the date of signing the agreement (the higher they are, the greater the effect of trade creation, and also on the place of the partner country in the trade of another participating state (the greater is mutual turnover, the greater effect of trade creation. Of course, other factors affect, such as geographical proximity, transportation and other transaction costs. India’s participation in the regional trade agreements (RTA was one of the tasks of implementing the policy “Look East”, which was approved in 1991. The countries of Southeast Asia have been identified as a regional priority, which was caused by the geo-strategic and economic reasons. Later, regional coverage has been extended to the countries of Northeast and South Asia because of increasing the role of China in the world economy and politics, which has become a strategic challenge and economic opportunities for the Indian economy. India is a participant of 13 RTAs, the majority of which are bilateral. In India’s integration practice, one of four types of RTAs is applied: (1 agreement on comprehensive economic partnership, which differ in the widest scope of mutual economic relations; (2 agreement on comprehensive economic cooperation; (3 free trade agreement; (4 preferential trade agreement. Most often, there is used classical integration model (of preferential or free trade area.Initially, the Indian policy of RTA dominated the political factor

  4. Exploring hubness in Regional Trade Agreements

    NARCIS (Netherlands)

    Vaal, A. de

    2016-01-01

    In the plethora of Regional Trade Agreements (RTAs) some countries take in a more central position than others in the sense that some countries are much more engaged with other countries through RTAs. Furthermore, the position of some countries is that of a hub: they have (many) trade

  5. Information security of power enterprises of North-Arctic region

    Science.gov (United States)

    Sushko, O. P.

    2018-05-01

    The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.

  6. Evaluating energy security in the Asia-Pacific region: A novel methodological approach

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2010-01-01

    This paper establishes an 'energy security assessment instrument' based on a new and expanded conceptualisation of energy security. The instrument is a systematic interrogative tool for evaluating energy security of individual states or regions. It consists of eleven broad energy security dimensions associated with the current global energy system. These energy security dimensions take into account numerous quantitative and qualitative attributes of each country's energy security and policy, and include both traditional energy security concerns and many new factors, such as environmental, socio-cultural and technological. Another dimension, largely absent from previous analyses, is the existence of, and the issues addressed in, energy security policy in each country. This instrument serves as an assessment system with which to evaluate energy security in the Asia-Pacific region. The existing studies on energy security in the Asia-Pacific region suffer from serious limitations. No study to date examines regional energy security policies by adopting a more comprehensive energy security definition as a starting point. Most studies also focus on a single country or issue. Even if they examine energy security in major regional economies, they lack critical comparative analysis. The instrument is valuable as it may be utilised to draw a comprehensive map of regional energy security situation, which can also include comparative analysis of energy security characteristics across the Asia-Pacific region. Ultimately, it may be utilised to set up a framework for improved regional energy cooperation with the aim of providing regional leaders with a blueprint for improving regional energy security and policy.

  7. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  8. THE ROLE OF REGIONAL TRADE AGREEMENTS IN THE GLOBAL ECONOMY

    Directory of Open Access Journals (Sweden)

    IRINA GABRIELA RADULESCU

    2010-12-01

    Full Text Available Regional and sub-regional groups having an integrative character appeared after the war and they aimed at harmonizing their economic policies, and, at the same time, they ensured, in accordance with the agreed degree of integration, free turnover of goods, products, services, capitals and labor force. By setting up these international economic organizations, the states of the world and especially developing countries wanted to improve their efforts for a sustained economic growth, to counteract the effects of the unequal external affairs and to eliminate underdevelopment. Some of the regional agreements that represent the new regionalism have been motivated politically and they were stimulated by the conviction that good agreements do not necessarily stand for good neighbors. Such agreements consolidate good diplomatic practices and their objective is to reduce the inevitable confrontation that may appear as a result of com

  9. Comprehensive Assessment of Industries Economic Security: Regional Aspect

    Directory of Open Access Journals (Sweden)

    Viktoriya Viktorovna Akberdina

    2017-12-01

    Full Text Available The article investigates the interaction of the forms of network integration and the development of complimentary production networks in terms of economic security. Currently, the most developed countries are occurring a transition from the industrial society to the information society. The industry 4.0 as the continuous communication at all levels and characterizes the production processes, in which technologies and devices interact automatically in the value-added chain. Under these new conditions, the former types of organizational structures of economic entities are not sufficiently effective. Therefore, there is a need to create new, modern types of organizational structures. One of these types is network structures. Currently, they are becoming characteristic features of the new economy. Regional economic security depends on internal and external threats, which lead to unstable situations. Regional crisis situations are influenced by both macroeconomic crisis processes and local features of economic and social development, as well as the resource potential, geographical location, national and other peculiarities. The article defines the specific characteristics of the regions of the Ural Federal District, as well as the current situation of the regional economy and threats to the region. The authors have evaluated the economic security of complimentary production networks at the regional level. This evaluation has revealed the interconnection between complimentary production networks and the construction industry in the national economy. We have defined the economic security of complimentary production networks and specified the concept of complimentary production networks. The research findings may be applied by organizations as a new perspective of industry using network forms related to economic security

  10. 12 CFR 725.20 - Repayment, security and credit reporting agreements; other terms and conditions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Repayment, security and credit reporting agreements; other terms and conditions. 725.20 Section 725.20 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION CENTRAL LIQUIDITY...

  11. The Text of the Agreement of 8 July Extending the Asian Regional Co-Operative Project on Food Irradiation. Extension Agreement

    International Nuclear Information System (INIS)

    1983-12-01

    The text of the Agreement to Extend the Agreement of 23 May 1980 Establishing the Asian Regional Co-operative Project on Food Irradiation within the framework of the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972, as extended in 1977 and in 1982, is reproduced herein for the information of all Members

  12. INTRODUCTION: DESERTIFICATION AND SECURITY - PERSPECTIVES FOR THE MEDITERRANEAN REGION

    Science.gov (United States)

    This book focuses on two basic concepts: security and desertification in the Mediterranean Region and their linkages. It emerged from a single meeting of the "Workshop on Desertification in the Mediterranean Region. A Security Issue" held in Valencia, Spain on 2-5 December 2003...

  13. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  14. Food and nutrition security in the Hindu Kush Himalayan region.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra

    2018-01-01

    The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  15. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  16. Regional Trade Agreement and Agricultural Trade in East African ...

    African Journals Online (AJOL)

    Intra-EAC trade is very low, that is, at 9 per cent of the total regional trade, but it is on upward trend. Agricultural trade accounts for over 40 per cent of the intra-EAC trade. This study investigated the effect of EAC regional trade agreement on the regions agricultural trade by analyzing the degree of trade creation and ...

  17. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  18. INTEGRATED ESTIMATION OF FOOD SECURITY IN THE REGION (BY THE EXAMPLE OF SAMARA REGION

    Directory of Open Access Journals (Sweden)

    Svetlana I. Nesterova

    2015-01-01

    Full Text Available The article presents a model of integrated assessment of food security in the region. A comprehensive analysis of food security in the Samara region in the dynamics is given, and its results are compared with the numbers of the Volga Federal District as a whole. Recommendations on further improvement of the agricultural sector are suggested.

  19. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  20. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  1. Substantiation the strategic priorities of innovation regional development security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2014-09-01

    Full Text Available In this article are discussed methodological challenges for strategic priorities ensure security innovation regional development. It is shown that in modern conditions innovative safety is an independent and very important area of security of the region. This innovative security should be understood as a qualitative characteristic that gives insight into the regional socio-economic systems requirements and challenges of the innovation economy, including their ability to recombination. It is considered the basic patterns and features of mutual influence and interaction of innovative and traditional socio-economic development of the territories. The necessity of the joint integrated treatment of innovation and socio-economic development in the management of innovative safety of the region is founded. It is given suggestions on fundamental approaches to the solution of the problem of selecting priority areas for strengthening the sources of innovation development successfully tailored to specific territories. The main positions are illustrated in the example the regions of the Ural Federal District.

  2. Regional collaboration among Urban Area Security Initiative regions: results of the Johns Hopkins urban area survey.

    Science.gov (United States)

    Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.

  3. Regional Collaboration Among Urban Area Security Initiative Regions: Results of the Johns Hopkins Urban Area Survey

    Science.gov (United States)

    Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073

  4. Evaluation the Role of Securities Market in Increasing the Regional Budget Revenues

    Directory of Open Access Journals (Sweden)

    Aleksandr Yemelyanovich Miller

    2015-09-01

    Full Text Available In the article, the relevant problem of increasing the regional budget revenues is investigated. The subject matter of the research is the securities market as a mechanism for the redistribution of financial resources. The purpose of the research is justification of the effective scheme feasible in the current environment of the interaction of the securities market and the regional budget. In the study of the above-mentioned subject, the hypothesis of a close relationship between state and non-state finance system was taken as a basis. The theoretical principle of the research supports the theory of the stock market; to achieve the purpose, the institutionally-functional approach to the study of state finances is applied. As the result of the research, possible common grounds of the securities market and the regional financial system are identified; the reserve of improving efficiency of the securities market in the Western Siberia regions are revealed; the model reflecting the dependence of tax revenues from the pace of regional economic development is constructed; promising areas for development of the securities market for the benefit of the regional economy and regional financial system are formulated; the possible effect from the development of regional securities market on regional budget revenues is estimated. The results mentioned above are recommended to be apllied when developing regional financial policies and programmes of region socio-economic development. A long-term stimulation of the growth in incomes of regional budgets is a very complex process, but with the proper elaboration of organizational issues, the implementation of the proposed scheme for interaction of the securities market and the regional financial system is capable to provide a steady increase in tax revenue in the short term and alleviate the problem of financing costs of the regional budget.

  5. Regional security in Southeast Asia and the South Pacific

    International Nuclear Information System (INIS)

    Pande, Amba

    2002-01-01

    Ever since the weapons of mass destruction have become an international currency of power, the efforts for their control and elimination have also developed simultaneously, as an important stream in international politics. Countries all over the globe have strived to evolve various devices to ensure security against these weapons at international, regional as well as national levels. One such regional effort for nuclear arms control is the creation of nuclear-free zone. The nuclear free zones present a potentially effective option to supplement the global nuclear disarmament regime. This is an endeavour towards crisis management, reducing the threat perception, common security and confidence building. In addition, they help in creating a regional security order by developing a code of conduct which binds external actors as well as the regional countries. They are meant to reduce if not eliminate the likelihood of a region getting involved into the war of mass destruction. It is in this context the cases of Southeast Asia and the South Pacific nuclear-free zones have been discussed in this book

  6. Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Sutrala, Anil Kumar; Das, Ashok Kumar; Odelu, Vanga; Wazid, Mohammad; Kumari, Saru

    2016-10-01

    Information and communication and technology (ICT) has changed the entire paradigm of society. ICT facilitates people to use medical services over the Internet, thereby reducing the travel cost, hospitalization cost and time to a greater extent. Recent advancements in Telecare Medicine Information System (TMIS) facilitate users/patients to access medical services over the Internet by gaining health monitoring facilities at home. Amin and Biswas recently proposed a RSA-based user authentication and session key agreement protocol usable for TMIS, which is an improvement over Giri et al.'s RSA-based user authentication scheme for TMIS. In this paper, we show that though Amin-Biswas's scheme considerably improves the security drawbacks of Giri et al.'s scheme, their scheme has security weaknesses as it suffers from attacks such as privileged insider attack, user impersonation attack, replay attack and also offline password guessing attack. A new RSA-based user authentication scheme for TMIS is proposed, which overcomes the security pitfalls of Amin-Biswas's scheme and also preserves user anonymity property. The careful formal security analysis using the two widely accepted Burrows-Abadi-Needham (BAN) logic and the random oracle models is done. Moreover, the informal security analysis of the scheme is also done. These security analyses show the robustness of our new scheme against the various known attacks as well as attacks found in Amin-Biswas's scheme. The simulation of the proposed scheme using the widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. We present a new user authentication and session key agreement scheme for TMIS, which fixes the mentioned security pitfalls found in Amin-Biswas's scheme, and we also show that the proposed scheme provides better security than other existing schemes through the rigorous security analysis and verification tool. Furthermore, we present the formal security

  7. The Korean Peninsula Energy Development Organization : implications for Northeast Asian regional security co-operation?

    International Nuclear Information System (INIS)

    Snyder, S.

    2000-01-01

    This paper identifies opportunities for co-operation on regional development and security in the North Pacific region. The Korean Peninsula Energy Development Organization (KEDO) was created in 1993 during bilateral negotiations between the United States and the Democratic People's Republic of Korea (US-DPRK) over North Korea's alleged nuclear weapons program. The negotiations resulted in an agreement to freeze North Korea's known nuclear weapons program in return for the construction of two proliferation-resistant 100 MWe light water reactors (LWR) in North Korea, and the provision of 500,000 tons of heavy fuel oil per year until the completion of the LWR construction as compensation for lost energy production capacity resulting from the shutting down of North Korea's nuclear reactors. The author described the activities of KEDO and examined its internal dynamics. The unique circumstances that produced the Agreed Framework and KEDO in response to a major international crisis of the nuclear program in the DPRK were also highlighted along with the US-DPRK bilateral agreement and the multilateral institution involving the United States, South Korea, Japan and the European Union. Financial support from Australia and Canada was discussed along with the mechanism for engaging North Korea in regularized interaction and technical cooperation. It was concluded that KEDO's record of successes and failures is mixed. The energy security issue has been identified as an area that could result in conflict among Northeast Asian countries which are increasingly dependent on oil supplies from the Middle East. In response, numerous multilateral financing mechanisms have been developed to promote joint business opportunities that exploit natural gas resources in the Russian Far East to address Japanese, Korean and Chinese energy needs. 35 refs

  8. Danish Interests in Regional Security Institutions in East Africa

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    For the past decade, peace and security in East Africa have gained increasing focus internationally. The region has experienced armed conflicts, civil wars, rebellion, drought and famine. Yet, at the same time, there is an emerging ambition among a number of African states to handle security issues...... on the continent independently. Such ambitions have fostered a variety of military capacity building programmes supported by external donors. The present report explores how up until now Denmark has sought to contribute to strengthening political and military security in East Africa. This has mainly been done...... through capacity building projects anchored in different regional security institutions. The report illuminates some of the risks that such capacity building projects might confront. Furthermore the report points out some of the challenges that exist in the cooperation between the Ministry of Foreign...

  9. The Text of the Fifth Agreement to Extend the 1987 Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2012-01-01

    The Text of the Fifth Agreement to Extend the 1987 Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status [es

  10. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  11. Disarmament and security issues in the Asia-Pacific region

    International Nuclear Information System (INIS)

    1992-01-01

    The main issues of the conference were focused on current political trends related to outstanding disputes between the state in Asia-Pacific region. Second cluster od issues which merits careful examination was concerned with the relevance of various arms control and disarmament measures. The tools of arms control and disarmament are proving to be more versatile, flexible instruments for security-building than was the case during the cold-war period. The third item of interest for many states in the Asia-Pacific region is the question of promoting new forums for regional dialogues on security matters

  12. Minimum deterrence and regional security. Section 1. Europe

    International Nuclear Information System (INIS)

    Gnesotto, N.

    1993-01-01

    The impact of regional security in Europe on the minimum nuclear deterrence is analyzed. There are four factors that enable definition of specific features of European security. Europe is the only theatre in which four of the five nuclear Powers coexist, where three states, Ukraine, Belarus and Kazakhstan, represent a new type of proliferation. It is therefore the strategic region with the heaviest concentration of nuclear weapons in the world. Finally it is a theatre in which regional wars are again a possibility. In other words, the end of cold war meant return of real wars in Europe on one hand, and on the other, a combination of absolutely massive and essential nuclear capability and over-increasing economic, political and diplomatic instability. In spite of these circumstances nuclear deterrence in Europe is inevitable and desirable

  13. The text of the third agreement to extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (RCA). Extension of agreement

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members. Pursuant to Article 1 of the Third Agreement to Extend the 1987 Regional Co-operative Agreement, the 1987 RCA shall continue in force for a further period of five years with effect from 12 June 2002, i.e., through 11 June 2007. As of 15 May 2002, notifications of acceptance had been received by the Director General from the Governments of Bangladesh, China, India, Indonesia, Republic of Korea, Malaysia, Pakistan, Sri Lanka and Viet Nam. The latest status list is attached

  14. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  15. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  16. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  17. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  18. Food security in the MENA region: the imperative rehabilitation of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    21 حزيران (يونيو) 2013 ... Food security in the MENA region: the imperative rehabilitation of agriculture ... Overcoming the food security challenge necessarily requires sustainably ... Local climate change data is securing food and livelihoods in southern Africa ... Copyright · Open access policy · Privacy policy · Research ethics ...

  19. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  20. Achieving water security through community-based agreements in rural Northwestern Costa Rica

    Science.gov (United States)

    Bautista Solís, P.; Bommel, P.; Campos, X.; Suarez, A.; Leclerc, G.

    2016-12-01

    Community-based drinking water organizations have the responsibility in supplying water for domestic use to 29% of the Costa Rican population. Nowadays, more than 1.500 of these organizations face important challenges for achieving this critical mission, such as fulfilling national drinking-water quality standards, and improving their organization and administration to secure water supply and distribution under climate change. We conducted action-research in two communities with similar geographical and demographic conditions: Cuajiniquil and Colas de Gallo located in the drought prone Guanacaste region in Costa Rica. Both communities are contrasted regarding to their assets and organization. We addressed the following research question: Can a participatory process help communities assess the situation of their aqueduct and its management, project themselves in the future, and build more resilient strategies to face domestic water restrictions? Through 16 participatory sessions, we adapted the Wat-a-Game (WAG) toolkit to the problem of domestic water provision in these communities, creating the WAG-Tico role-playing game. This was complemented by two other activities: visits by regional actors sharing their experience, and exchange visits between both communities for cross-learning about community-based water management. The process resulted in a locally-led collaboration between both communities and the emergence of community commitments for improving drought resilience. WAG-Tico sensibilized participants to appreciate the value of community organization and the impacts of climate change on water supply, and develop aqueduct management rules. Exchange visits and regional actors interventions promoted opportunities for accessing to external resources (i.e. social, human and financial). Colas de Gallo created its first water committee for building a community aqueduct and their first drilled well. Cuajiniquil has committed in protecting its water springs, organized

  1. Agreement Workflow Tool (AWT)

    Data.gov (United States)

    Social Security Administration — The Agreement Workflow Tool (AWT) is a role-based Intranet application used for processing SSA's Reimbursable Agreements according to SSA's standards. AWT provides...

  2. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  3. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1961-01-01

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency

  4. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency.

  5. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1961-01-01

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [es

  6. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  7. A Comparative Analysis of Trade Facilitation in Selected Regional and Bilateral Trade Agreement

    OpenAIRE

    Institute for International Trade

    2006-01-01

    This study compared the treatment of trade facilitation in four selected regional trade agreements, AFTA, APEC, SAFRA and PACER, and in one bilateral free trade agreement being the Australia-Singapore Free Trade Agreement (ASFTA), with a view to determining model trade facilitation principles and measures which may be instructive for developing country negotiations and policy makers.

  8. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  9. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  10. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  11. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  12. WTO’s information technology agreement (ITA and its expansion (ITA II: multilateralizing regionalism

    Directory of Open Access Journals (Sweden)

    Camilla Capucio

    2018-03-01

    Full Text Available Bearing in mind the complex context of the relationship between multilateralism and regionalism, the conclusion of plurilateral agreements within the WTO, open to participation of all interested members, offers a multilateral perspective of regionalism, in which the benefits of partial consensus are to be extended to the multilateral sphere. The ITA - Information Technology Agreement - is mentioned as an example of this possibility, and its recent expansion, through the negotiation of the ITA II, demonstrates the strengthening of this multilateralisation trend of regionalism, although with special features. Thus, this article is developed drawing the context and introduction of the theme of regionalism and multilateralism, and presents the theory of multilateralisation of regionalism and the ITA as one of those experiences, and its recent expansion as a resumption of the relevance of this theory. Considering the impasses for the conclusion of the Doha Round, the expansion of these partial consensus and the continuation of negotiations at the World Trade Organization by the conclusion of sectoral plurilateral agreements emerges as a possible way out, which demands a re-architecture of the interpretation of the role of the WTO in the global economic governance.

  13. Toward a Regional Security Architecture for the Horn of Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Moreover, conflict in one country tends to affect its neighbours, mainly through the flow of refugees and weapons. Building on work carried out during Phase I ... Extrants. Rapports. Towards Developing a Regional Security Architecture for the Horn of Africa: Developing Responses to Human (In) Security-Phase Two ...

  14. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  15. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http

  16. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    Science.gov (United States)

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  17. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2014-04-01

    Full Text Available User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks. In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  18. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Uren, R.T.

    1992-01-01

    The subject of regional security and arms control in the South-East Asia raises some new and difficult issues. No approach to ensuring regional security could be complete without military dimension including the following categories: regional arms control; global arms control measure; confidence building measures that are designed to enhance the transparency of defense policies; confidence building measures that encourage cooperation among the military forces in the region

  19. Security in the Asia-Pacific region. Report on working group 5

    International Nuclear Information System (INIS)

    1997-01-01

    Security in the Asia-Pacific region is highly dependent on nuclear weapons-proliferation which can be achieved in two steps: non-introduction of nuclear weapons by nuclear powers, and creation of nuclear-weapon-free zone. The causes and steps towards arms build-up in the region are discussed. On of the indispensable factors in improving the relations between the countries in the zone is creation of confidence building measures and a security forum

  20. Algorithm and Indicators of Evaluation of Agrarian Policy Efficiency in the Sphere of Food Security of the Region

    Directory of Open Access Journals (Sweden)

    Elena Nikolaevna Antamoshkina

    2015-12-01

    Full Text Available The article substantiates the author’s method of analysis of the regional food security and its approbation on the example of the Southern Federal District. The author’s goal was to develop a comprehensive universal method of analysis of the regional food security. To achieve this goal the following steps were required: to develop a system of indicators to measure food security at the regional level; to define criteria for assessing regional food security; to synthesize model analysis and evaluation of food security in the region. The paper presents an algorithm for the phased application of methodology for assessing regional food security. The recommended indicators and criteria for assessing regional food security are consistent with the parameters defined by the Doctrine of food security in Russia, and take into account the requirements of the WTO. The proposed method was tested on data from the largest regions of the Southern Federal District, which allowed a comparison of the level of food security in the regions of the spatial and temporal perspective. Comparison was made on the basis of an integrated assessment of the level of food security in the regions. The theoretical significance consists in the meaningful complement to research models and tools for analysis of food security at the regional level of the economy in terms of justification of indicators and criteria for assessing food security in the region in terms of Russia’s participation in the WTO. The practical significance is in developing and testing the proposed method based on an assessment of indicators of food security in SFD.

  1. Comparison of the Efficiency of Budget Financing and the Social Security of a Region

    Directory of Open Access Journals (Sweden)

    Aleksandr Anatolyevich Kuklin

    2016-09-01

    Full Text Available In the article, the theoretical and economic aspects of the category “security” are considered, the distinction between philosophical and socio-economic approaches to the understanding of social security is drawn. From the point of view of the system approach, the place of social security for national security protection is determined. The theoretical content of the category “social security” is shown; in the authors’ treatment, the specifying concepts such as “social risks”, “danger”, “threat” are given. For the purpose of risks identification (deviations and the revealing of the factors of inefficient financing, the methodological tools for the assessment of the social security of a region are proposed. These tools are based on the integrated assessment of the regional socio-economic indexes and the indexes assessing the budgetary financing of the territory. The methodical approach offered by the authors is based on the detection of dependencies between the social and financial security of a region. As estimates, the indicators reflecting the level of social security in the territory of residence are chosen: income, expenses of the consolidated budget of a region, growth rate of gross regional product, rate of natural population growth, level of unemployment, population share with the income below living level. This approach is approved on the example of Perm Krai and Sverdlovsk region; the regularities, the favourable and adverse periods for social security of the region are revealed. The received estimates are ranged depending on a temporary log of growth (fall, elasticity and sensitivity to the budget financing. The results of the assessment have shown that, from the point of view of social security protection, Perm Krai has entered a stage of deep recession, which started in 2012. Similar tendencies are observed in the Sverdlovsk region. Nevertheless, considering both a visible variety and the dominating influence of

  2. An empirical application of regional security complex theory on eastern partnership region

    Directory of Open Access Journals (Sweden)

    Ludmila STUPARU

    2015-12-01

    Full Text Available Eastern Partnership (EaP is a very dynamic region. If a year ago the EaP was seen as an authentic and vibrant „laboratory” of democracy building, overcoming the remains of the totalitarian state and putting the basis of a free and pluralist society, nowadays the Eastern Partnership is seen as an „out-dated” approach of the EU. However, Eastern Partnership is visible on European political arena and the big powers (USA, Russia and the EU pay attention more and more to the evolution of EaP countries. Moreover, it seems to be a confrontation between Russia and Western powers regarding the political and geopolitical orientation of EaP countries. Kremlin tries actively to stop the efforts of the EaP to close to the EU and on the other side, the EU as well as the USA encourage EaP countries to implement reforms in order to build their democracy. This paper aims to analyse the Eastern Partnership in terms of security complex, trying to argue that Eastern Partnership countries at this phase don’t form a Regional Security Complex and the EU and USA should rethink its approach towards this region.

  3. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrella, F.

    1993-01-01

    Paper deals with a new emerging international system of security with the emphasis on the regional contribution, especially position of Argentina, non-proliferation policy, comprehensive safeguards, safeguards agreements, technology developments and responsibilities and opportunities related to the disarmament issues

  4. The Text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members

  5. The Text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Extension of Agreement. Latest Status

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Fourth Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 'the 1987 RCA', is reproduced herein for the information of all Members [es

  6. The Text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology (RCA). Latest Status. Extension of Agreement

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Third Agreement to Extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, t he 1987 RCA , is reproduced herein for the information of all Members [es

  7. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  8. Eastern Canadian crude oil supply and its implications for regional energy security

    International Nuclear Information System (INIS)

    Hughes, Larry

    2010-01-01

    Canada has been blessed with immense energy resources; however, their distribution is not uniform. One such example is crude oil, which is found primarily in western Canada. Eastern Canada, consisting of the six eastern-most provinces (Newfoundland and Labrador, New Brunswick, Nova Scotia, Ontario, Prince Edward Island, and Quebec), produce limited quantities of crude oil, most of which is exported to the United States. Ideally, western Canadian crude oil would meet the demands of eastern Canada; however, the North American Free Trade Agreement (NAFTA) and the absence of oil pipelines means that eastern Canada increasingly relies on supplies of crude oil from a small number of oil exporting countries, many with declining production. This paper examines crude oil production, supply, and its refining in eastern Canada. It shows that crude production in the region has reached its peak and that increasing global competition for crude oil will affect energy security in eastern Canada, either through price increases or supply shortages, or both. (author)

  9. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  10. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  11. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    Full Text Available The article is aiming at the study of environmental hazards in Zhytomir region. Its main objective is to identify the set of adverse factors affecting the state of danger and compose a necessary starting material for the prediction of possible negative consequences, their nature and extent. The matter of special importance for the study of the phenomenon of security is the security classification. First of all, the forms (system of security in relation to the forces and processes of natural, social and technical character should be distinguished. They can be defined as systems of geo-bio-physical, social and technical security. The classification of security can be determined in many ways, for example, in relation to the object of security; in relation to the subject of security; according to the problem indication; according to the functional indication. Security is a distinctive characteristic and prerequisite of life, progressive development and viability of real-world objects. The methodology of its evaluation is based on the states of the essence of natural and anthropogenic environmental pollution, the standard requirements for the quality of environmental objects and standards of acceptable contamination. The assessment of ecological security of the environment is the quantitative measure of parameters of environmental pollution dangers, threats and risks of natural character as well as the state of anthropogenic security. This assessment is carried out according to the methods and ways to measure environmental parameters. For this purpose it is important to know the factors of danger and the system of indicators that characterizes all natural and environmental phenomena and processes of geo-ecological dangers, natural environmental conditions, ecological condition. The system of natural and industrial environmental indicators consists of the indicators which characterize all phenomena and processes of geo-ecological dangers of natural

  12. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  13. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2014-03-01

    Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.

  14. Harmonization of domestic legislation in the field of civil law with the European Union law: Securing of claims by means of fiduciary agreements

    Directory of Open Access Journals (Sweden)

    Pajtić Bojan

    2012-01-01

    Full Text Available This paper analyses fiduciary agreements, which, as a form of contract, that is the means of securing obligation and legal claims, are regulated by provisions of specific laws and codifications in some of the European Union countries. Even the Montenegrin legislator enacted a special law governing these legal matters, however in the Serbian law fiduciary agreements fall into the category of innominate contracts. Fiducia originates in the Roman Law and constitutes the first common form of the pledge law. The Latin term fiducia means 'trust', since these legal matters were, first of all, based on the trust between contractual parties. This paper addresses the institution of 'trust' as it is the Anglo-Saxon counterpart of the fiduciary agreement. Etymologically, 'trust' has the same meaning as the term fiducia - trust. Due to their advantages, fiduciary agreements are not even uncommon in the domestic legal practice, while there are certain, as we have already announced, theoretical, but also practical concerns arguing admissibility of this legal matter. These arguments mainly come down to the thesis (mentioned above that entering into the fiduciary agreement results in violation of the ban on performance of contract lex commissoria in the pledge law. Nevertheless, I provided explanation that differences between contracts of pledge and fiduciary agreements clearly point to the conclusion that fiduciary agreements may not be treated as a pledge, hence they are admissible, that is, they are concluded on the principle of contractual freedom as an imperative norm of the Law on Obligations. Fiduciary agreements (in relation to the realistic means of security offer to the creditor a higher level of security, reduce the period of payment of his claims, also providing practical benefits for the debtor himself. The paper presents the reasons supporting the view that it would be advantageous for the Serbian legislator, in the process of harmonization of the

  15. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  16. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  17. Control Mechanism and Security Region for Intentional Islanding Transition

    DEFF Research Database (Denmark)

    Chen, Yu; Xu, Zhao; Østergaard, Jacob

    2009-01-01

    in the grid. The concept of Islanding Security Region (ISR) has been proposed as an organic composition of the developed control mechanism. The purpose of this control mechanism is to maintain the frequency stability and eventually the security of power supply to the customers, by utilizing resources from...... generation and demand sides. The control mechanism can be extended to consider the distributed generations like wind power and other innovative technologies such as the Demand as Frequency controlled Reserve (DFR) technique in the future....

  18. How Do Professional Mutual Recognition Agreements Affect Higher Education? Examining Regional Policy in North America

    Science.gov (United States)

    Sa, Creso; Gaviria, Patricia

    2011-01-01

    Professional mutual recognition agreements (MRAs) are one of the policy instruments employed in global and regional trade agreements to facilitate the mobility of skilled labour. While such agreements have been noted in the literature examining cross-border academic mobility, little is known about how they impact higher education. This paper…

  19. Nuclear-weapon-free zones: Pursuing security, region by region. Conference of States Parties and Signatories of treaties that establish nuclear-weapon-free zones

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The development of nuclear-weapon-free zones, over the past four decades, is a testament to what nations can do, region by region, to achieve common security objectives. In fact, when considering the history of nuclear non-proliferation efforts, it might be said that here in Mexico City is w here it all began . The 1967 Treaty of Tlatelolco was the first multilateral treaty to establish a region free of nuclear weapons and a requirement for comprehensive IAEA safeguards for its parties - and clearly gave impetus to the conclusion of the Treaty on the Non-Proliferation of Nuclear Weapons. Nuclear-weapon-free zones provide tangible security benefits. They help to reassure the larger international community of the peaceful nuclear intentions of countries in these regions. They provide their members with security assurances against the use, or threat of use, of nuclear weapons by a nuclear-weapon State. They include control mechanisms for dealing with non-compliance in a regional setting. And in all cases, they prohibit the development, stationing or testing of nuclear weapons in their respective regions. An important benefit of these zones is that they open a forum for expanded regional dialogue on issues of security. Because the causes of insecurity vary from region to region, security solutions do not come in a 'one-size-fits-all' package. It is for this reason that regional dialogues, as we see in the nuclear-weapon-free zones, are so beneficial. It is clear that such treaties, and such security dialogues, would be invaluable in other areas of the world, such as the Middle East and the Korean Peninsula. Since the end of the Cold War, the international security landscape has undergone dramatic changes. For example, the rise in terrorism, the discovery of clandestine nuclear programmes, and the emergence of covert nuclear procurement networks have heightened our awareness of vulnerabilities in the nuclear non-proliferation regime. This statement focuses on two issues

  20. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...

  1. Law 18.871. It approve the Security Energetic agreement between the Republic of Uruguay and the Bolivarian Republic of Venezuela

    International Nuclear Information System (INIS)

    2012-01-01

    The proposal of this law is the agreement between Venezuela and Uruguay about the implementation of the energy security legislation . Both countries are committed to have a binational structure in this follows areas: oil, gas, refining, petrochemicals, transport, storage, electricity, alternative energy and marine transport

  2. Comparative analysis of military security policy of Norway and Denmark in the Arctic region

    Directory of Open Access Journals (Sweden)

    Igor S. Doroshenko

    2017-01-01

    Full Text Available The interest of Western countries in the Arctic region is growing with each new statement about the sharp climate change and the melting of the Arctic Ocean’s glaciers. In addition to the threats related to the environmental situation in the Arctic zone, the desire to participate in shelf research and development, the potential of using the sea routes of the region by both the Arctic and non-Arctic states creates threats to the security of the Nordic countries.The coastal states, which in case of the escalation of tensions will be in the midst of a regional conflict in the Arctic, are Norway and Denmark. Therefore, the analysis of a level of Norwegian and Danish military security against a backdrop of increasing confrontation between Russia and West and changing climate situation in the region is urgent ., Nevertheless, to ensure a necessary level of defence capability as well as security of borders and zones of exceptional economic interests in the conditions of low temperatures is not so easy. This article examines the Norwegian and Danish approaches to the new military security challenges in the Arctic region. The paper contains examination of the doctrinal basis of military security along with the main documents that form the security concepts of the two countries in the Arctic region, and the reports of the defense ministries and scientific institutions surveys of military activities in the Arctic.Three directions of coastal countries’ policy making in the issues of military security were chosen for comparison. Firstly, the relationships with the USA, the leader of the North Atlantic alliance, which allow us to determine the significance of Norway and Denmark in building NATO security in the north. Secondly, the relationships with the EU and separately with the Nordic countries are considered. This case shows the level of involvement of the European community in the issue of ensuring the Arctic security . Thirdly, the relationships with

  3. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    Science.gov (United States)

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  4. De Bilateral Security Agreement voor Afghanistan

    NARCIS (Netherlands)

    Voetelink, J.

    2013-01-01

    Wanneer de VS en de NAVO na 2014 de stationering van troepen in Afghanistan willen voortzetten, zullen zij hiervoor nieuwe internationale overeenkomsten moeten sluiten. De onderhandelingen tussen Afghanistan en de VS zijn het afgelopen jaar gestart en moeten leiden tot de Bilateral Security

  5. Canada and the North American Free Trade Agreement: Between globalization and regional integration

    Directory of Open Access Journals (Sweden)

    Caterina García Segura

    1995-07-01

    Full Text Available The aim of the present article is to analize, from Canada’s perspective, the choice regarding the model of state as well as of economic and commercial policy which the decision to participate in the North American Free Trade Agreement (NAFTA implies. The debatewhich NAFTA provoked in Canada expresses in concrete terms that debate which, in much larger terms, takes place at the international level regarding the multilateralization and/or the regionalization of commercial exchanges. It is a reflection of the tension between theintegrating forces (process of globalization and the fragmenting ones (processes of regionalization which characterize the dynamics of the contemporary international system. The hypothesis of this work is that in spite of being a commercial agreement, the Canadian government’s decision to participate in NAFTA was a decision of a political nature which was not determined exclusively by the reality of the existing commercial exchanges between Canada and Mexico or by the perspectives of improving them inthe short term. The immediate objective of Canada was to avoid that a possible bilateral agreement between its prinicipal economic member, the United States, and Mexico would empty out the contents of the existing Free Trade Agreement (FTA between Canada and the United States. In this sense, NAFTA was the possible remedy to an unwanted situation (the negotiation of a US-Mexico bilateral agreement. The objective in the medium and long term is use the platform of regional integration as a trampoline from where the Canadian economy can be reorientated and driven in order to attain international competitiveness. In this sense, Canada’s true option had already beenrealised with the FTA.

  6. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  7. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  8. The text of the agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology, 1987

    International Nuclear Information System (INIS)

    1992-09-01

    The document reproduces the text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987, for a further period of five years with effect from 12 June 1992. Australia, Bangladesh, the People's Republic of China, India, Indonesia, Japan, the Republic of Korea, Malaysia, Pakistan, the Philippines, Singapore, Sri Lanka, Thailand and Viet Nam are parties of this Agreement

  9. Trade Agreements PTI

    Data.gov (United States)

    Department of Homeland Security — The objective of the Trade Agreements PTI is to advance CBP’s mission by working with internal and external stakeholders to facilitate legitimate trade and address...

  10. The Text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1982-12-01

    The text of the Second Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, fist extended in 1977, for a further period of five years with effect from 12 June 1982, is reproduced herein for the information of all Members

  11. 7 CFR Guide 1 to Subpart G of... - Project Management Agreement Between the ____ Regional Commission and the Farmers Home...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 13 2010-01-01 2009-01-01 true Project Management Agreement Between the ____ Regional... Guide 1 to Subpart G of Part 1942—Project Management Agreement Between the ____ Regional Commission and... successor agency under Public Law 103-354, in concurring to this Project Management Agreement, hereby...

  12. Military-political Processes in the Caucasus Region and the Security of Russia

    Directory of Open Access Journals (Sweden)

    Anna V. Vilovatykh

    2015-01-01

    Full Text Available The unipolar world breaking and the tightening of geopolitical struggle led to destructive military-political processes in different regions of the world. In conditions of instability along the perimeter of Russia's borders the significance of the Caucasus region increases, especially in geo-strategic and geoeconomic perspectives. The efforts of world politics actors for the transformation of the region environment increase substantially. As a result the dynamics and the scope of the proceeding military-political processes in the Caucasus are complicated. The failures in the assessment and the prediction of the processes development influence on the safety of Russia. Wrong gradation of existing threats and challenges can lead to disastrous and irreversible consequences for state security. Designated circumstances caused the need for the expert survey on assessing the impact of the current military-political processes in the Caucasus region on the security of the Russian state and necessity for the concretization of military dangers and threats, due to political and military developments in the Caucasus. An expert survey was conducted in June 2014. During it authors interviewed 40 Russian and foreign experts representing Federal and regional authorities, academic community, research centers, analytical structures. Implementation of the survey allowed to identify the experts positions and the degree of their coherence on the military-political processes in the Caucasus region and their impact on the modern Russia security. As a result the degree of destructiveness of the regional military-political processes was fixed. We conclude that anti-Russian processes in the countries of the Caucasus continue to determine the overall geopolitical situation, including in the military-political sphere. The reason is mainly seen in interests clashing of Russia and countries of the "Atlantic world." Analysis of the military-political processes in the Caucasus

  13. A regional proposal for reinforcing nuclear and radiological security

    International Nuclear Information System (INIS)

    Puig, Diva

    2008-01-01

    This paper gives information about the phenomenon of globalization and the regional process of integration that have generated new and challenging characteristics in criminal actions, that has generated a trans national dimension. In this frame, the illicit trafficking of radioactive material is a matter of concern. After the terrorist attacks of September 11, 2001, it is a new reality that for certain terrorist groups, exposition to radiation ionizing with the purpose of committing a terrorist act is not more an obstacle. The use of a 'dirty bomb'. by terrorists is considered probable. The orphan sources represent a serious threat to security and must be: identified, located, recovered, and assured. Many radioactive materials with hundreds of applications in medicine, research and industry are lost or robbed. There are countries that have not a registry of such orphan sources. The IAEA Illicit Trafficking Data Base (ITDB) was established in 1993.There were 103 confirmed incidents of illicit trafficking and other unauthorized activities involving nuclear and radioactive materials in 2005. Nevertheless INTERPOL registers a much greater number of cases. The IAEA tries to increase the capacity of Member States to protect their facilities and nuclear fuels, storage and transport against acts of nuclear terrorism. In this paper I propose the creation of an Inter-American Committee Specialized in the Prevention and Control of the Illicit Trafficking of Radioactive and Nuclear Material at Pan-American level and within the framework of O.A.S., according to the Chart of the Organization of American States , and considering the respect to the sovereignty of the States and the principle of not intervention, with the purpose of developing the cooperation in order to prevent and to prevent and to control the illicit trafficking of radioactive and nuclear material. Its principal objective would be to develop a cooperation and a common approach of nuclear and radiological

  14. The influence of ecological and economic security on region's investment appeal

    OpenAIRE

    Aleksandr Kuklin; Irina Belik

    2009-01-01

    In the article authors reveal regional aspect of the problem of influence the ecological factor on investment appeal. This allows considering from the point of ecological and economic security. The choice of the type of investment policy in different scenarios of social-economic development of the region.

  15. Multilateral, regional and bilateral energy trade governance

    Energy Technology Data Exchange (ETDEWEB)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany (Queen Mary Univ. of London (United Kingdom))

    2014-12-01

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain the proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.

  16. The Text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The text of the Third Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology of 1972 the RCA Agreement, extended first in 1977 and then in 1982, for a further period of five years with effect from 12 June 1987, is reproduced herein for the information of all Members [fr

  17. The text of the second agreement to extend the 1987 Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology

    International Nuclear Information System (INIS)

    1998-03-01

    The document reproduces the text of the Second Agreement to Extend the 1987 Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology for a further period of five years with effect from 12 june 1997, i.e., through 11 June 2002

  18. Sustainability and Security: Timber Certification in Asia-Pacific Region

    Directory of Open Access Journals (Sweden)

    Antonina Ivanova

    2008-10-01

    Full Text Available The expansion of sustainable development initiatives since the 1990’s reflected an emphasis on integrated solutions to economic development, socio-political stability and environmental health in the global community. In the same context the traditional concept of security needed to be open in two directions. First, the notion of security should no longer be applied only to the military realm, but also to the economic, the societal, the environmental, and the political fields. Second, the referent object of the “security” should not be conceptualized solely in terms of the state, but should embrace the individual below the state, and the international system above it. The forests industry timber certification in Asia-Pacific region has been selected as a case study because it is an excellent example to illustrate the links between the sustainable development and the environmental security, including also certain elements of economic security. This article is presenting a critical overview of the forest industry and the status of timber certification globally, with an emphasis on Asia – Pacific countries applying the Systemic Thinking approach. In conclusion, an outlook is presented concerning the future of timber certification and possible impacts on security and sustainable development.

  19. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  20. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  1. East Asia’s energy needs: The impact on security and guidelines for regional governance

    Directory of Open Access Journals (Sweden)

    Pablo Pareja Alcaraz

    2010-04-01

    Full Text Available The last three decades have witnessed a spectacular (and not easily sustainable increase in the global demand for energy. This trend has a particular significance in East Asia owing to its heavy industrialisation, which is promoting intense regional growth, on top of the already delicate balance of security in the region and the traditional refusal by the region’s states to delegate power and management to supranational bodies. The aim of this article is to analyse the impact of East Asia’s energy needs on security and on the instruments of order and governance that have been developed in the region up until the present time. Thus, the article is divided into two parts; the first analyses East Asia’s energy programme and its most significant features: 1 a high dependence on oil imports from other regions, especially the Middle East; 2 a persistence of high dependency on pollutant fossil fuels; and 3 a high degree of energy insecurity. Meanwhile, the second part assesses the impact of energy on regional relations in different areas of security and guidelines for regional government: 1 the securitisation of energy and of the environment; 2 the reactivation of certain maritime conflicts; 3 the transformation of certain threats, and conventional and non-conventional challenges to regional security; 4 the rise of non-state actors (mainly environmental businesses and NGOs in East Asia’s international relations; 5 the maintaining of bilateralism and the promotion of multilateral initiatives; and 6 the emergence of new extra-regional geopolitical links and balances.

  2. Regional Cooperation Agreement for Asia and the Pacific (RCA). A mechanism for nuclear technology transfer

    International Nuclear Information System (INIS)

    Bin Muslim, N.

    1993-01-01

    The paper presents the regional cooperation programs of the IAEA which have as purpose to promote the applications of peaceful uses of atomic energy and to transfer technology to the developing countries. The paper focusses on the (RCA) program for Asia and the Pacific, it is considered the most important mechanism for genuine technology transfer. The annex no 1 lists the full text of the Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (13 articles). The annex no.3 lists also the full text of the African Regional Cooperative Agreement for Research, Development and training Related to Nuclear Science and Technology (14 articles). 11 refs., 17 tabs

  3. Talking in Taejon : regional cooperative agreement project formulation meeting

    International Nuclear Information System (INIS)

    McEwan, A. C.

    1997-01-01

    The International Atomic Energy Agency as part of its Regional Cooperative Agreement (RCA) with countries in east Asia and the neighboring Pacific, has had a project on strengthening radiation protection infrastructures operating for some years. This project has arranged training courses, workshops and other activities on a range of topics related to establishing or improving radiation protection measures and safety of radiation sources in member states of the region. A second 5 year phase of planned activities is to be concluded during 1997, and the value of the project is such that member coutntries proposed its continuation for a further 5 year period commencing in 1998. For this purpose a Task Group took the lead in assembling and evaluating proposals for consideration and approval at a meeting of national coordinators for the project held in Taejon Korea, 24-28 February. The RCA project for Phase III will be titled Enhancement and Harmonisation of Radiation Protection. The meeting of national coordinators from the region represents a unique opportunity for information sharing and cooperation in radiation protection betweem countries. (author)

  4. The Migration Crisis from the East-Central European Perspective: Challenges for Regional Security

    Directory of Open Access Journals (Sweden)

    Renata Podgórzańska

    2017-12-01

    Full Text Available Nowadays, the common denominator of involvement of the EastCentral Europe in the international arena, and above all, the premise determining community of interest expressed in the European Union is the migration crisis. Despite the different circumstances of activity in the context of the migration crisis, states in the region express similar opinions on the consequences of immigration for security in the region. Above all, they emphasise the implications of immigration for the internal security of states. Given the complex nature of migration, this article focuses on the phenomenon of immigration in the EU, determining the causes of the escalation of the influx of immigrants and, above all, identifying the consequences for the security of states of East-Central Europe.

  5. Disentangling regional trade agreements, trade flows and tobacco affordability in sub-Saharan Africa.

    Science.gov (United States)

    Appau, Adriana; Drope, Jeffrey; Labonté, Ronald; Stoklosa, Michal; Lencucha, Raphael

    2017-11-14

    In principle, trade and investment agreements are meant to boost economic growth. However, the removal of trade barriers and the provision of investment incentives to attract foreign direct investments may facilitate increased trade in and/or more efficient production of commodities considered harmful to health such as tobacco. We analyze existing evidence on trade and investment liberalization and its relationship to tobacco trade in Sub-Saharan African countries. We compare tobacco trading patterns to foreign direct investments made by tobacco companies. We estimate and compare changes in the Konjunkturforschungsstelle (KOF) Economic Globalization measure, relative price measure and cigarette prices. Preferential regional trade agreements appear to have encouraged the consolidation of cigarette production, which has shaped trading patterns of tobacco leaf. Since 2002, British American Tobacco has invested in tobacco manufacturing facilities in Nigeria, Kenya and South Africa strategically located to serve different regions in Africa. Following this, British America Tobacco closed factories in Ghana, Rwanda, Uganda, Mauritius and Angola. At the same time, Malawi and Tanzania exported a large percentage of tobacco leaf to European countries. After 2010, there was an increase in tobacco exports from Malawi and Zambia to China, which may be a result of preferential trade agreements the EU and China have with these countries. Economic liberalization has been accompanied by greater cigarette affordability for the countries included in our analysis. However, only excise taxes and income have an effect on cigarette prices within the region. These results suggest that the changing economic structures of international trade and investment are likely heightening the efficiency and effectiveness of the tobacco industry. As tobacco control advocates consider supply-side tobacco control interventions, they must consider carefully the effects of these economic agreements and

  6. Guidelines and recommendations for regional approaches to disarmament within the context of global security

    International Nuclear Information System (INIS)

    Mason, P.

    1994-01-01

    Guidelines and recommendations for regional approaches to disarmament within the context of global security provide both a conceptual framework within which to pursue arms control in South Asia and a variety of concrete mechanisms or tools to carry out the task. However, they cannot operate independently of a broader process of political accommodation, which might be named as 'cooperative security building'. That process, however embryonic, is under way across Asia Pacific region

  7. Engineering security agreements against external insider threat

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Cleeff, A.; van Eck, Pascal; Wieringa, Roelf J.

    2013-01-01

    Companies are increasingly engaging in complex inter-organisational networks of business and trading part- ners, service and managed security providers to run their operations. Therefore, it is now common to outsource critical business processes and to completely move IT resources to the custody of

  8. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Acceptance of the Agreement by Bangladesh

    International Nuclear Information System (INIS)

    1974-01-01

    On 23 October 1974 the Government of Bangladesh notified the Agency of its acceptance of the Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States, in accordance with Section 9 thereof. Pursuant to Section 10, the Agreement consequently entered into force with respect to the Government of Bangladesh on that date

  9. The text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972

    International Nuclear Information System (INIS)

    1987-09-01

    The full text of the third agreement to extend the regional co-operative agreement for research, development and training related to nuclear science and technology of 1972 (INFCIRC/167) (extended first in 1977 and then in 1982) for a further period of five years with effect from 12 June 1987, is reproduced

  10. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  11. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations; Teksty Soglashenij o Sotrudnichestve Mezhdu Agentstvom i Regional 'Nymi Mezhpravitel' Stvennymi Organizacijami

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [Russian] Teksty soglashenii Agentstva o sotrudnichestve s perechislennymi nizhe regional'nymi mezhpravitel'stvennymi organizacijami vmeste s sootvetstvujushhimi protokolami, udostoverjajushhimi ih autentichnost'; soglashenija perechisleny v porjadke vstuplenija ih v silu.

  12. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  13. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  14. 76 FR 65365 - United States-OMAN Free Trade Agreement

    Science.gov (United States)

    2011-10-21

    ... Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... other customs-related provisions of the United States--Oman Free Trade Agreement entered into by the... the U.S.-Oman Free Trade Agreement (``OFTA'' or ``Agreement''). The provisions of the OFTA were...

  15. 78 FR 32356 - United States-Korea Free Trade Agreement

    Science.gov (United States)

    2013-05-30

    ...-Korea Free Trade Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... treatment and other customs-related provisions of the United States-Korea Free Trade Agreement entered into...-Korea Free Trade Agreement (hereinafter ``UKFTA'' or the ``Agreement''). On December 3, 2010, the United...

  16. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  17. 8 CFR 217.6 - Carrier agreements.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Carrier agreements. 217.6 Section 217.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS VISA WAIVER PROGRAM § 217... may notify a carrier of the existence of a basis for termination of a carrier agreement under this...

  18. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  19. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  20. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  1. A History of the International Agreement on Iran's Nuclear Program

    International Nuclear Information System (INIS)

    Fabius, Laurent

    2016-01-01

    In May 2012, in the aftermath of the French presidential election, Iranian nuclear program posed a major challenge concerning both regional security questions and global efforts to prevent nuclear proliferation. The situation was characterized by a diplomatic stalemate, sanctions and the concerning development of Iran's nuclear program. Many fear that Iran's current program development will warrant military intervention in an effort to prevent further success. France therefore decided to implement a policy of 'constructive firmness' in the hope of reaching a robust and verifiable agreement that shows real progress in the international effort to prevent Iran from acquiring nuclear weapons. The following text is an accurate account of the process leading up to this major agreement by one of its main actors

  2. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1962-10-18

    On 14 September 1962 the Board of Governors approved an Agreement for the establishment in Cairo of a Middle Eastern regional radioisotope centre for the Arab countries. The text of this Agreement is reproduced in this document for the information of all Members.

  3. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries

    International Nuclear Information System (INIS)

    1962-01-01

    On 14 September 1962 the Board of Governors approved an Agreement for the establishment in Cairo of a Middle Eastern regional radioisotope centre for the Arab countries. The text of this Agreement is reproduced in this document for the information of all Members

  4. Security and Prosperity: Reexamining the Connection Between Economic, Homeland and National Security

    Science.gov (United States)

    2015-09-01

    security enterprise NAFTA North American Free Trade Agreement NATO North Atlantic Treaty Organization NS national security NSS National Security...all hazards, outcome driven, national security) of the person being asked. Some advocate a more holistic description that encompasses law enforcement...department rather than maintaining the artificial separation. 3. Create a Department of Prosperity The Preamble to the Constitution defines our federal

  5. Impact of Inter‐Basin Water Transfer Projects on Regional Ecological Security from a Telecoupling Perspective

    Directory of Open Access Journals (Sweden)

    Yuan Quan

    2016-02-01

    Full Text Available Inter‐basin water transfer projects (IBWTPs offer one of the most important means to solve the mismatch between supply and demand of regional water resources. IBWTPs have impacts on the complex ecosystems of the areas from which water is diverted and to which water is received. These impacts increase damage or risk to regional ecological security and human wellbeing. However, current methods make it difficult to achieve comprehensive analysis of the impacts of whole ecosystems, because of the long distance between ecosystems and the inconsistency of impact events. In this study, a model was proposed for the analysis of the impacts of IBWTPs on regional ecological security. It is based on the telecoupling framework, and the Driver‐Pressure‐State‐ Impact‐Response (DPSIR model was used to improve the analysis procedure within the telecoupling framework. The Middle Line of the South‐to‐North Water Diversion Project was selected as a case study to illustrate the specific analysis procedure. We realized that information sharing is a key issue in the management of regional security, and that the ecological water requirement, in the form of a single index, could be used to quantitatively assess the impacts on ecological security from IBWTPs.

  6. 78 FR 60191 - United States-Colombia Trade Promotion Agreement

    Science.gov (United States)

    2013-10-01

    ... Trade Promotion Agreement AGENCY: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States- Colombia Trade Promotion... States-Colombia Trade Promotion Agreement (``CTPA'' or ``Agreement''), and on June 28, 2007, the Parties...

  7. 77 FR 64031 - United States-Peru Trade Promotion Agreement

    Science.gov (United States)

    2012-10-18

    ... Trade Promotion Agreement AGENCIES: U.S. Customs and Border Protection, Department of Homeland Security... tariff treatment and other customs-related provisions of the United States-Peru Trade Promotion Agreement... other customs-related provisions of the United States-Peru Trade Promotion Agreement (PTPA). Please...

  8. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  9. Table of written agreements on securing safety of nuclear power plants (Saga, Shimane, Fukushima, Ehime, Miyagi, Ibaraki, Fukui and Shizuoka prefectures)

    International Nuclear Information System (INIS)

    1981-01-01

    A table collecting the written agreements concluded between local city, town and village offices, prefectural governments and the local nuclear enterprises on securing nuclear power safety is given, which was prepared by the study committee on local development and finance problems in Japan Atomic Industrial Forum, Inc. The prefectures, with each of which the agreement was concluded are Saga, Shimane, Fukushima, Ehime, Miyagi, Ibaraki, Fukui and Shizuoka. The local nuclear enterprises are Kyushu, Chugoku, Tokyo, Shikoku, Tohoku, Chubu and Kansai Electric Power Companies, Japan Atomic Power Company, Japan Atomic Energy Research Institute, Power Reactor and Nuclear Fuel Development Corporation, etc. The contents of the agreements are as follows: radioactive waste and material control, understanding in advance of plans, environmental radioactivity measurement, presentation of measured results, hazard countermeasures, communication in normal plant operation and others, on the spot inspection, damage compensation, etc. (J.P.N.)

  10. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  11. Cooperation in the maintenance of peace and security, and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate an exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. This publication is based on material presented at the regional meeting on the Cooperation in the maintenance of peace and security, held at the United Nations Regional Centre for Peace and Disarmament in Asia and the Pacific, in Kathmandu, Nepal, from 31 January to 2 February 1994

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  13. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks.

    Science.gov (United States)

    Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming

    2015-11-30

    Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  14. Acordos bilaterais de comércio como estratégia de inserção regional e internacional do Chile Bilateral trade agreements as Chile's strategy for regional and international insertion

    Directory of Open Access Journals (Sweden)

    Renata Rossetto Lopes

    2010-12-01

    exhaustion of the unilateral tariff reduction, today in 6% for the majority of products, in trade creation. Nevertheless, the implementation of a large and diversified net of bilateral trade agreements also have political, strategic and security interests regarding the neighbors and near countries. This strategy also gives Chile the choice of not taking part in regional blocks to guarantee its interests, which increases its ability to deal with different and important partners in the international level.

  15. Chaotic map based key agreement with/out clock synchronization

    International Nuclear Information System (INIS)

    Han, S.; Chang, E.

    2009-01-01

    In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.

  16. MULTILATERAL ENVIRONMENTAL AGREEMENTS AND THE TRADE MEASURES CONTAINED IN THESE AGREEMENTS

    Directory of Open Access Journals (Sweden)

    Margareta Timbur

    2012-06-01

    Full Text Available The environmental problems which the society is facing, ozone depletion, biodiversity loss, the spread of persistent organic pollutants, are a result of human activity with a worldwide impact, requiring immediate resolution. In this context, negotiation, signing and implementation of several multilateral environmental agreements (MEAs are one of the best solutions, affordable and reliable. The aim of this study is to analyze the commercial measures, which to some extent, ensure stability, security, and expansion of MEAs. The paper discusses, also, the efficiency, necessity and the influences of trade measures in MEAs and the WTO role in signing these agreements.

  17. Investigating the Influence of Regional Stress on Fault and Fracture Permeability at Pahute Mesa, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Donald M. [Desert Research Inst. (DRI), Reno, NV (United States); Smith, Kenneth D. [Univ. of Nevada, Reno, NV (United States); Parashar, Rishi [Desert Research Inst. (DRI), Reno, NV (United States); Collins, Cheryl [Desert Research Inst. (DRI), Las Vegas, NV (United States); Heintz, Kevin M. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-05-24

    Regional stress may exert considerable control on the permeability and hydraulic function (i.e., barrier to and/or conduit for fluid flow) of faults and fractures at Pahute Mesa, Nevada National Security Site (NNSS). In-situ measurements of the stress field are sparse in this area, and short period earthquake focal mechanisms are used to delineate principal horizontal stress orientations. Stress field inversion solutions to earthquake focal mechanisms indicate that Pahute Mesa is located within a transtensional faulting regime, represented by oblique slip on steeply dipping normal fault structures, with maximum horizontal stress ranging from N29°E to N63°E and average of N42°E. Average horizontal stress directions are in general agreement with large diameter borehole breakouts from Pahute Mesa analyzed in this study and with stress measurements from other locations on the NNSS.

  18. 7 CFR 766.201 - Shared Appreciation Agreement.

    Science.gov (United States)

    2010-01-01

    ... requires a borrower to enter into a SAA with the Agency covering all real estate security when the borrower: (1) Owns any real estate that serves or will serve as loan security; and (2) Accepts a writedown in... AGRICULTURE SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Servicing Shared Appreciation Agreements and Net...

  19. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  20. SECTOR-SPECIFIC STRUCTURE OF THE REGIONAL ECONOMY AS A FACTOR OF ELEVATION OF RISKS TO ITS ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Rostislav BILYK

    2016-07-01

    Full Text Available The article analyzes a sector-specific specialization of the regional economy in Ukraine. It also reveals possibility and conditions of transformation of a sector-specific specialization of the region and risks to its economic security. The article suggests an assessment of influence of a sector-specific specialization on occurrence of threats to the economic security of the region.

  1. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  2. Regional Radiological Security Partnership in Southeast Asia - Increasing the Sustainability of Security Systems at the Site-Level by Using a Model Facility Approach

    International Nuclear Information System (INIS)

    Chamberlain, Travis L.; Dickerson, Sarah; Ravenhill, Scott D.; Murray, Allan; Morris, Frederic A.; Herdes, Gregory A.

    2009-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO), created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's Global Threat Reduction Initiative (GTRI) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP is to cooperate with countries in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports objectives to improve the security of high risk radioactive sources by raising awareness of the need and developing national programs to protect and control such materials, improve the security of such materials, and recover and condition the materials no longer in use. The RRSP has utilized many tools to meet those objectives including: provision of physical protection upgrades, awareness training, physical protection training, regulatory development, locating and recovering orphan sources, and most recently - development of model security procedures at a model facility. This paper discusses the benefits of establishing a model facility, the methods employed by the RRSP, and three of the expected outcomes of the Model Facility approach. The first expected outcome is to increase compliance with source security guidance materials and national regulations by adding context to those materials, and illustrating their impact on a facility. Second, the effectiveness of each of the tools above is increased by making them part of an integrated system. Third, the methods used to develop the model procedures establishes a sustainable process that can ultimately be transferred to all facilities beyond the model. Overall, the RRSP has utilized the Model Facility approach as an important tool to increase the security of radioactive sources, and to position facilities and countries for the long term secure management of those sources.

  3. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  4. 20 CFR 416.2171 - Duration of agreement.

    Science.gov (United States)

    2010-04-01

    ... selected by whoever wants to end the agreement; or (c)(1) The State fails to pay our costs as agreed; (2....2171 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... and again at the end of each 1-year renewal term, unless— (a) The State and we agree in writing to end...

  5. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    Science.gov (United States)

    2007-12-14

    by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and

  6. Non-conventional provisions in regional trade agreements : do they enhance international trade?

    OpenAIRE

    Hayakawa, Kazunobu; Kimura, Fukunari; Nabeshima, Kaoru

    2011-01-01

    The scope of recent regional trade agreements (RTAs) is becoming much wider in terms of including several provisions such as competition policy or intellectual property. This paper empirically examines how far advanced, non-conventional provisions in RTAs increase trade values among RTA member countries, by estimating the gravity equation with more disaggregated indicators for RTAs. As a result, we find that the provision on competition policy has the largest impacts on trade values, followin...

  7. On Issue of Algorithm Forming for Assessing Investment Attractiveness of Region Through Its Technospheric Security

    Science.gov (United States)

    Filimonova, L. A.; Skvortsova, N. K.

    2017-11-01

    The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.

  8. The text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987. Status of acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    The document gives the status of acceptances as of 28 February 1993 of the agreement to extend regional co-operative agreement for research, development and training related to nuclear science and technology from 1987

  9. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    1993-01-01

    In the face of improved international relations, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being actively encouraged by the international community. Towards this end, the United Nations Office for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground and delineating areas of possible future negotiation and agreement. Within this framework, a Conference on the theme 'Disarmament and national security in an interdependent world' was held in Kyoto, Japan, from 13 to 16 April 1993. The Conference, the third one in a series held in Kyoto on disarmament issues, was organized by the Office for Disarmament Affairs through the Regional Centre for Peace and Disarmament in Asia and the Pacific and in collaboration with the Government of Japan and the Prefecture and City of Kyoto. This publication is based on material presented at that Conference

  10. 19 CFR 114.2 - Customs Conventions and Agreements.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Customs Conventions and Agreements. 114.2 Section 114.2 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARNETS General Provisions § 114.2 Customs Conventions and Agreements. The...

  11. The management of the state reserving system in the aspect of the regional economic security supporting

    Directory of Open Access Journals (Sweden)

    Aleksandr Yefimovich Zemskov

    2011-06-01

    Full Text Available This paper reviews the role of the state material reserve system to ensure economic security of the region. A classification of reserves ensuring economic security of the region was elaborated. A scheme of systematic and structural representation of the state material reserve in order to improve the economic security of the region was suggested. Optimization of operational control of the territorial offices, factories, and settlements of custody within the framework of the state material reserve is one of the most effective instruments to enhance the functioning of the whole system. To solve the problem of technological processes optimization of products acquisition and storage in manufacturings, plants and points of consignment storage of the state material reserve, a static economic-mathematical model was developed. The results can be used to develop appropriate computer systems for support of effective management decisions in the system of state of material reserve.

  12. Regional energy resource development and energy security under CO2 emission constraint in the greater Mekong sub-region countries (GMS)

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO 2 emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO 2 emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO 2 emission reduction strategy would be less costly than that under the individual emission targets set for each country.

  13. Security of water, energy, and food nexus in the Asia-Pacific region

    Science.gov (United States)

    Taniguchi, M.; Endo, A.; Fujii, M.; Shoji, J.; Baba, K.; Gurdak, J. J.; Allen, D. M.; Siringan, F. P.; Delinom, R.

    2014-12-01

    Water, energy, and food are the most important and fundamental resources for human beings and society. Demands for these resources are escalating rapidly because of increases in populations and changes in lifestyles. Therefore intensive demand for those resources makes conflicts between resources. Securities of water, energy, and food are treated separately, however they should be considered as one integrated matter, because water-energy-food are connected and it makes nexus and tradeoff. Security in terms of self-production, diversity of alternatives, and variability are evaluated for water, energy and food for thirty two countries in the Asia-Pacific region. The water and energy nexus includes water consumption for the cooling of power plant systems, water use for hydro power generation, and energy consumption for water allocation and pumping. The water and food nexus consists of water consumption for agriculture and aquaculture. The energy and food nexus includes energy consumption for food production and biomass for energy. Analyses of 11 countries within the Asia- Pacific region show that energy consumption for fish is the largest among foods in Japan, Philippines, and Peru, while energy consumption for cereals is the largest among foods in Canada, US, Indonesia, and others. Water consumption for different types of food and energy are also analyzed, including nexus ratio to total water consumption. The water-energy-food nexus at a local level in the Asia Pacific region are examined by the Research Institute for Humanity and Nature project "Human environmental security in Asia Pacific Ring of Fire". Themes including geothermal power plants for energy development and hot springs as water, shale gas for energy development and water consumption/contamination, aquaculture for food and water contamination are used to evaluate the water-energy-food nexus in the Asia-Pacific region.

  14. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  15. A juridical review of partnership agreements that have the elements of work agreements in Indonesia

    Science.gov (United States)

    Nugroho, A.; Sulistyowati, E.; Hikmah, N.

    2018-01-01

    The Partnership Agreements place the parties in an equal position each party has something as the bargaining power. In some cases, employers prefer to use Partnership Agreements to some individuals to complete the work in their company than Work agreements. Practicality and the absence of obligations to fulfil workers’ rights such as the right to join a Union and to get social security are some of the reasons why employers use the Partnership Agreements. Sometimes Partnership Agreement contains jobs, wages and orders which is the characteristic of work agreement. Based on the fact above, the legal issues arise whether the Partnership Agreement can be considered as the Work Agreement or not and which court is authorized to hear in the event of a dispute. To analyze the above legal issues, this research uses normative legal research type with the statute approach. The technique of legal material analysis uses prescriptive techniques to assess the issue and make recommendations. Based on the analysis, it can be concluded that the Partnership Agreement, of which the elements are: wages and orders can be categorized as Work Agreement and therefore in the event of a dispute, the authorized court is Industrial Relations Court.

  16. Central Asia as a Regional Security Complex from the Perspectives of Realism, Liberalism and Constructivism

    Directory of Open Access Journals (Sweden)

    Caroline Putri Pratama

    2013-05-01

    Full Text Available Tulisan ini bertujuan menganalisis kawasan Asia Tengah, dilihat dari perspektif Realisme, Liberalisme dan Konstruktivisme, melalui teori Regional Security Complex oleh Barry Buzan dan Ole Waever. Teori ini hendak menunjukkan keamanan regional berdasarkan interdependensi antar unit dalam kawasan dilihat dari struktur power dan proses sekuritisasi di dalamnya, demikian pola hubungan keamanan dalam kawasan Asia Tengah berusaha dijelaskan dengan elemen-elemen dari ketiga paradigma yang terdapat dalam teori tersebut. Hasil analisis tulisan ini menunjukkan bahwa Asia Tengah dipandang sebagai bentuk insecurity interdependence by external forces dari perspektif Realis, security interdependence by interest dari perspektif Liberalis dan securitization interdependence by understanding of threat/security dari perspektif Konstruktivis. Kompleks keamanan Asia Tengah termasuk dalam tipe kompleks keamanan Great Power, terlihat dari peran besar kekuatan-kekuatan eksternal terutama Rusia dan Cina dalam kawasan tersebut; baik dalam pembentukan pola pertemanan dengan kerjasama, pola permusuhan dengan persaingan dan ketakutan, juga proses sekuritisasi isu separatisme, ekstremisme dan terorisme sebagai ancaman terhadap keamanan regional.Tulisan ini diambil dari tugas karya akhir penulis yang diajukan untuk medapatkan gelar Sarjana Sosial dari Departemen Ilmu Hubungan Internasional, Universitas Indonesia.

  17. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  18. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  19. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  20. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    Science.gov (United States)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy

  1. Climate-derived tensions in Arctic security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  2. Model, Characterization, and Analysis of Steady-State Security Region in AC/DC Power System with a Large Amount of Renewable Energy

    Directory of Open Access Journals (Sweden)

    Zhong Chen

    2017-08-01

    Full Text Available A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current and the fluctuation of renewable energy have significantly affected the operation and control of a conventional AC system, the definition of the steady-state security region of the AC/DC power system is proposed in this paper based on the AC/DC power flow calculation model including LCC/VSC (Line Commutated Converter/Voltage Sourced Converter-HVDC transmission and various AC/DC constraints, and hence the application of the security region is extended. In order to ensure that the proposed security region can accurately provide global security information of the power system under the fluctuations of renewable energy, this paper presents four methods (i.e., a screening method of effective boundary surfaces, a fitting method of boundary surfaces, a safety judging method, and a calculation method of distances and corrected distance between the steady-state operating point and the effective boundary surfaces based on the relation analysis between the steady-state security region geometry and constraints. Also, the physical meaning and probability analysis of the corrected distance are presented. Finally, a case study is demonstrated to test the feasibility of the proposed methods.

  3. 48 CFR 225.870-8 - Industrial security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...

  4. The text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques

    International Nuclear Information System (INIS)

    1987-04-01

    The full text of the Agreement establishing the Asian Regional Co-operative Project on Medical and Biological Applications of Nuclear Techniques between the Agency and Member States is reproduced. The Agreement entered into force on 20 May 1986 after the Governments of Japan, Bangladesh and the Philippines had notified the Agency of their acceptance of the Agreement

  5. 75 FR 27432 - Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA

    Science.gov (United States)

    2010-05-17

    ... can better evaluate its effects on them and participate in the rulemaking process. Small businesses... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0221] RIN 1625-AA87 Security Zone; Golden Guardian 2010 Regional Exercise; San Francisco Bay, San Francisco, CA AGENCY...

  6. 48 CFR 52.204-2 - Security Requirements.

    Science.gov (United States)

    2010-10-01

    ... Agreement (DD Form 441), including the National Industrial Security Program Operating Manual (DOD 5220.22-M... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Security Requirements. 52....204-2 Security Requirements. As prescribed in 4.404(a), insert the following clauses: Security...

  7. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  8. Regional energy resource development and energy security under CO{sub 2} emission constraint in the greater Mekong sub-region countries (GMS)

    Energy Technology Data Exchange (ETDEWEB)

    Watcharejyothin, Mayurachat; Shrestha, Ram M. [School of Environment, Resources and Development, Asian Institute of Technology (Thailand)

    2009-11-15

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO{sub 2} emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO{sub 2} emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO{sub 2} emission reduction strategy would be less costly than that under the individual emission targets set for each country. (author)

  9. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  10. Experience with WASP and MAED among IAEA Member States participating in the Regional Co-operative Agreement (RCA) in Asia and the Pacific Region

    International Nuclear Information System (INIS)

    1989-10-01

    The report includes the proceedings and papers presented during the workshop on the experience with WASP/MAED computer programs among IAEA Member States participating in the regional co-operative agreement (RCA) in Asia and the Pacific Region, organized by the IAEA and held in Kuala Lumpur (Malaysia) between 5-9 December 1988. A separate abstract was prepared for each of the 14 papers presented. Refs, figs and tabs

  11. Accounting and Control in Ensuring Economic Security of the Organizations of Perm Region

    Directory of Open Access Journals (Sweden)

    Vyacheslav Valetyevich Epishin

    2016-09-01

    Full Text Available The article deals with the urgent problem concerning the regional development as well as the specific organization, or to the development of an integrated system of economic security of the organization. The article discusses the importance of such an element of economic security (including the financial security as the accounting and control as well as their possible violations. The authors substantiate their position on the relationship of the violations of accounting and control and also the internal theft, other economic crimes and their negative consequences. The analysis of the existing national and foreign sources related to the subject of the study is carried out. The conclusion is made about the lack of modern research devoted to the study of the protective properties of accounting, control and their violations, which condition economic crimes. The methodological tools of the research include dialectic method, systemic analysis, complex sociological methods: the analysis of the legal sources, of statistical information and judicial practice. On the basis of the analysis of criminal cases, financial statements, publications media, the authors made the conclusion about the conditionality of the theft in the organizations as there are the violations of accounting and control, low efficiency of control and auditing, of preventive measures for neutralization of the violations of accounting and control from the services of economic security, accounting offices, auditing and law enforcement services. The recommendations for the optimization of this work are introduced. They can be used by accounting departments, auditing bodies, fiscal authorities at the municipal and regional level and by law enforcement officials. The economic security is necessary for any organizations regardless of their forms of ownership, ranging from government organizations to small kiosks. The difference will only consist in the means and methods.

  12. Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Agreement among the Portuguese Republic, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Portugal on 27 June 2006 and the United States on 13 December 2006, and by the Director General of the IAEA on 14 December 2006. Pursuant to the Article XII.1 of the Agreement, the Agreement entered into force on 19 April 2007, the date on which the Agency received written notification from Portugal that its internal requirements for entry into force had been met

  13. Improving Regional Security in Central America: Military Engagement Options for Nicaragua

    Science.gov (United States)

    2002-12-01

    of Disasters) Guatemala, Guatemala. Secretaria de Integracion Economica Centroamericana. 68 Smith, Peter H. 2000. Talons of the Eagle: Dynamics of...for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection...an essential role in the stability and security of the Central American sub region. The de -stabilizing influence of Sandinista policies in the 1980s

  14. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  15. Challenges to the South Caucasus regional security aftermath of Russian–Georgian conflict: Hegemonic stability or new partnership?

    Directory of Open Access Journals (Sweden)

    Kornely K. Kakachia

    2011-01-01

    And the question is now how to handle this delicate situation in a strategically and geopolitically important region. So by controlling Georgia (in case Russia reaches abovementioned aims, Russia actually will be able to cut off Central Asia and Caspian resources. It means Russia would be able to isolate and cut off Azerbaijan and Central Asian countries and it will significantly strengthen its energy monopoly over Europe with all results coming out from that fact. So it’s about major shift in the energy policy and major shift in geopolitics based on this energy policy and Russian energy monopoly. The August war in Georgia demonstrated some risks associated with the functioning of the transit energy corridor in the southern Caucasus. It also demonstrated the need for broader security guarantees for a region that is vital to European and global energy security. Paper deals with economic damage inflicted by the Russo-Georgian war in South Caucasus and its implications for regional security.

  16. Globalisation, States, and Regionalisation: Analysing post-Cold War Security in the Mediterranean Region

    NARCIS (Netherlands)

    Amineh, M.P.; Grin, J.; Brauch, H.G.; Liotta, P.H.; Marquina, A.; Rogers, P.; Selim, M.E.-S.

    2003-01-01

    Is it possible to promote security in the Mediterranean through a process of increasing regional cooperation that builds upon the commonality in problems and opportunities more than on the mutual divides? In a comprehensive and enlightening analysis, Brauch (2001) has argued that this option is

  17. The Text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology, 1987. Status of Acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    As of 28 February 1993, notifications of acceptance of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (See INFCIRC/ 167/Add.15), in accordance with Article 2 thereof, had been received by the Director General from the Governments [ru

  18. The Text of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology, 1987. Status of Acceptances as of 28 February 1993

    International Nuclear Information System (INIS)

    1993-04-01

    As of 28 February 1993, notifications of acceptance of the Agreement to Extend the Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology, 1987 (See INFCIRC/ 167/Add.15), in accordance with Article 2 thereof, had been received by the Director General from the Governments [es

  19. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  20. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  1. Asia-Pacific Regional Economic Integration: Coopetition vs. Conflict

    Directory of Open Access Journals (Sweden)

    YuJane Chen

    2016-04-01

    Full Text Available In the era of economic globalization, promoting regional trade agreements or regional cooperation has become a plausible strategy to attract foreign direct investment and to promote national competitiveness at a global level. Nonetheless, facing the differential national economic interests and the needs of protection of domestic industries, as well as the diverse levels of economic liberalization domestically, the involvement of FTA negotiation in every country is universally in the situation of struggling between securing economic sovereignty and national economic development. Countries in the Asia-Pacific region are in the same situation. This article analyzes how countries balance between securing economic sovereignty and promoting national economic development when they are involved in TPP and RCEP negotiations. By confirming the appropriate linkage between each participating countries’ decision for balancing between domestic economic sovereignty and further integrating into regional economic cooperation institutions the validity of the proposition for this research project can be verified.

  2. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  3. The Need for a Regional Security System Multinational Coast Guard Unit in the Eastern Caribbean

    Science.gov (United States)

    2012-06-08

    the teaching staff of Staff Group 11 A (Mr Matt Bonnott, Dr Thomas Huber, LTC Andrew McIntyre) and Mr William Knight for officiating, my oral...assist me on this journey. Finally, to my wife Vonette, son Isaiah , daughter Makayla, my mother Muriel (this one is for you), and my friends (too...for the implementation of a new security risk management mechanism to enhance the security of the RSS sub-region. According to Thomas Norman in the

  4. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  5. The role of trade agreements in regional and subregional integration in the caribbean

    OpenAIRE

    Serrano Caballero, Enriqueta

    2016-01-01

    Esta comunicación tiene como objetivo analizar el papel de los acuerdos comerciales que han firmado la Comunidad del Caribe (en adelante CARICOM) y la Organización de Estados del Caribe Oriental (en adelante OECO), y ver si han influido en el fortalecimiento y en la reconfiguración de los procesos de integración regional y subregional en el Caribe. This communication aims to analyze the role that trade agreements it has signed the Caribbean Community (CARICOM) and the Organisation of Easte...

  6. Security challenges to Central European bordering territories: view from the Transcarpatian region of Ukraine

    Directory of Open Access Journals (Sweden)

    Myroslava Lendel

    2015-12-01

    Full Text Available The factor of integral Central European space determines the formation of common challenges to the region's security. One part of them is not visualized or not perceived in the capital cities. These threats may be most vividly traced in the Transcarpathian region of Ukraine, taking into consideration the fact that it borders with the abovementioned countries. These are ethnopolitical threats, caused by the multiethnic population of the region, energy dependence, threats of social economic peripherization of Central European bordering territories, informational influence on the population, different attitudes to Ukraine-Russia conflict.

  7. Nuclear power in Northern Russia: A case study on future energy security in the Murmansk region

    International Nuclear Information System (INIS)

    Kinnunen, Miia; Korppoo, Anna

    2007-01-01

    The economy of the Murmansk region in Russia is based on energy intensive industry, mainly metallurgies, and consequently, the region is highly dependant on the ageing Kola nuclear power plant. This interdependence together with other weaknesses in the regional energy system creates threats to the energy supply security of the region. This paper analyses the internal and external threats influencing the region and presents potential solutions. Scenarios further illustrate possible future paths these potential solutions could deliver by the year 2025

  8. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [fr

  9. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States

  10. Agreement Between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Agreement between the International Atomic Energy Agency, the Government of Jamaica and the Government of the United States of America for Assistance in Securing Low Enriched Uranium for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the text of the Agreement on 6 March 2013. The Agreement was signed by the authorized representatives of Jamaica on 25 November 2013, the United States on 2 May 2013 and the Director General of the IAEA on 16 December 2013. Pursuant to the Article XI of the Agreement, the Agreement entered into force on 16 December 2013, upon signature by the Director General of the IAEA and by the authorized representatives of Jamaica and the United States [es

  11. Implications of the New Regional Trade Agreements for the World Trading System

    Directory of Open Access Journals (Sweden)

    Agnes Ghibuțiu

    2017-04-01

    Full Text Available The year 2013 witnessed an outstanding rise in the pace and scale of negotiations on regional trade agreements (RTAs. While RTAs are not a new phenomenon, current negotiations involve multiple parties and/or major trading countries that have a significant combined economic weight, i.e. mega-RTAs. This paper looks at the recent surge in trade regionalism and addresses some of the key issues related to the potential impact of mega-RTAs upon the world trading system and global trade patterns. It examines the peculiarities of the new mega-RTAs and the factors underlying their proliferation, and discusses the main concerns raised by their foreseeable impact on excluded countries and the wider trading system. The paper finds that, if successfully concluded, mega-RTAs are likely to have far-reaching implications for the world trading regime, affecting its transparency and coherence. Nevertheless, the adverse effects could be cushioned through a revival of trading nations’ interest in the multilateral Doha Round talks.

  12. INDIA’S GROWING INFLUENCE IN STABILIZING REGIONAL SECURITY IN SOUTHEAST ASIA

    Science.gov (United States)

    2016-02-16

    East Policy’ focusing on engagement with Southeast Asia .2 Following the reforms, Indian economy grew rapidly with an...civilizational neighbors in Southeast Asia and East Asia .”19 Thus, LEP and recognition of India’s economic, political, security and cultural potential by ASEAN...point. 21 During the 10th East Asia Summit, Prime Minister Modi emphasized the importance of South East Asian region and informed that his

  13. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  14. Multi-membership and the effectiveness of regional trade agreements in Western and Southern Africa : A comparative study of ECOWAS and SADC

    NARCIS (Netherlands)

    S.K. Afesorgbor (Sylvanus Kwaku); P.A.G. van Bergeijk (Peter)

    2011-01-01

    textabstractUsing a gravity model for 35 countries and the years 1995-2006 we estimate the impact of regional trade agreements in Africa (in particular ECOWAS and SADC) and compare this to the a benchmark of North South trade integration (Europe’s preferential trade agreement). We find that •

  15. Political and security issues in the Asia-Pacific region: Assessment of trends

    International Nuclear Information System (INIS)

    Lehmann, R.F. II

    1992-01-01

    It should be emphasized that the fundamental shift has taken place in international relations, away from a world dominated by the bipolar super-Power confrontation. There is a today to be more concerned about regional instabilities, which are made more threatening by the potential proliferation of weapons of mass destruction. Just as every nation was affected by the cold war, regional instabilities and proliferation concern each member of the world community. In the Asia-Pacific region, the goal is clear: safer, more stable military postures; transparency and confidence-building; and stronger non-proliferation norms. In working together towards that goal, there is a need to foster greater security through bilateral and multilateral dialogue. In that way, one could promote the change within and among societies; that is the best hope for defusing regional tensions, preventing the spread of weapons of mass destruction, and building a lasting peace

  16. The Asia-Pacific Region on the Paris Agreement against Climate Change: Geopolitics and Cooperation

    Directory of Open Access Journals (Sweden)

    Ana Bertha Cuevas Tello

    2017-11-01

    Full Text Available Given the complexity surrounding climate change, it is argued that the willingness to cooperate on the part of the States is based on one of the faces that, for the climate field, can offer geopolitics: strengths or weaknesses (understood as vulnerability of geographical conditions, location and territory. That is, the physical, geographic, economic and demographic factors of each State influence the decision making of the foreign climate policy, which induces them to cooperate or the abstention of it. This paper will address, broadly speaking, the participation of the main economies of the Asia-Pacific region in the institutionalization of climate change in the International Agenda; the importance of the economies of the Asia-Pacific region with regard to the Paris Agreement; and the geopolitical strengths and weaknesses that explain the cooperative or non-cooperative behavior of the region in the fight against climate change.

  17. Prospects and challenges for new security arrangements in the Asia-Pacific region

    International Nuclear Information System (INIS)

    Hong, Mark

    1992-01-01

    The topics covered in this presentation are as follows: prospects and challenges for arms limitations; cooperation for new regional security arrangements; role of the United nations in conflict prevention, peace-keeping and disarmament. Developments in former Soviet Union which create concern are: the possible dispersion of Russian nuclear expertise and personnel to would be nuclear powers; the continuing friction between Russia and Ukraine over disposal of ex-Soviet ICBMs and tactical nuclear weapons, and the transfer to Russia of 3000 nuclear warheads in Ukraine; the Black Sea fleet, and the Crimea question. These dramatic events have global as well as regional impact as Russia is an Asia-Pacific Country

  18. The United States Department of Homeland Security Concept of Regionalization - Will It Survive the Test

    Science.gov (United States)

    2006-09-01

    used to explain in general an individual state’s focus including restrictions on the application of regionalization and the impact of home rule...terrorist attack. Didn’t New York City Mayor Michael Bloomberg exhibit big city egoism over a reduction in homeland security funding? Some...been missed in the turmoil at DHS. Several states have eased legislative restrictions that interfere with regionalization. Indiana for example, has an

  19. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    Science.gov (United States)

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  20. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  1. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  2. A Catalyst for Change: Drought and Food Security in the Near East Region (Invited)

    Science.gov (United States)

    Knutson, C. L.

    2010-12-01

    In the Near East, drought at the turn of the 21st century was reported to be the worst in 50 years, affecting millions of people across the region. The drought caused a wide range of effects, including widespread crop failures and livestock losses, increased drinking water shortages and disease stress, additional debt, and forced mass migrations to urban areas and other countries, all of which affected food security. As devastating as the drought was for people and the environment, the event created a “policy window” - a time during which the public’s and policy makers’ attention was directed toward a particular issue, creating an advantageous political environment for addressing the problem. In this case, the drought revealed the need for enhanced mitigation and drought relief coordination. It has served as the impetus for several countries and international organizations to work together to foster new policies and training activities to reduce drought risk and enhance food security in the region.

  3. Competitiveness and food security at the regional level

    Directory of Open Access Journals (Sweden)

    Mikhail Vasil'evich Fyodorov

    2012-06-01

    Full Text Available This paper deals with food safety as one of the areas of food security and food sovereignty. A review of concepts, models, acts on the power of international and national levels is made. The authors formulate a conclusion about the need for a measure of «food quality» with the release of the functional components of fitness (the ability to perform specified functions with the purpose and safety (restrictions on the content of harmful substances in the products. The analysis of the competitiveness of local products is made on the quality characteristics based on the proportion of output indicator of inadequate quality or dangerous to health in the total volume of products placed on the market. The paper identifies key areas of federal and regional levels to comply with the quality of food.

  4. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  5. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  6. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  7. African Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology. Third extension of agreement

    International Nuclear Information System (INIS)

    2005-01-01

    Pursuant to Article XIV.2, the Agreement 'shall continue in force for a period of five years from the date of its entry into force and may be extended for further periods of five years if the Government Parties so agree'. The third extension of the Agreement entered into force on 4 April 2005, upon expiration of the second extension of the Agreement and will remain in force for an additional period of five years, i.e. through 3 April 2010. As of 10 May 2005, 20 States have notified the Agency of their acceptance of the extension of the Agreement. The status list of the Agreement is reproduced in this document for the information of all Members. Members will be notified of further acceptances of the extension of the Agreement by addenda to this information circular

  8. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    Science.gov (United States)

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  9. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  10. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  11. The Bali Agreement: Implications for Development and the WTO

    Directory of Open Access Journals (Sweden)

    Christophe Bellmann

    2014-05-01

    Full Text Available At the most recent World Trade Organisation (WTO ministerial conference, in December 2013, in Bali, Indonesia, ministers from 160 countries concluded the first multilateral agreement ever negotiated under the auspices of the WTO. After five years of impasse in the moribund Doha Round of trade negotiations, the so-called “Bali package” was enthusiastically welcomed by the world’s governments and international press alike as a critical step towards restoring the credibility of the WTO as a negotiating forum. The centrepiece of the package is without doubt a new agreement on trade facilitation aimed at reducing red tape, and facilitating customs procedures in an effort to cut down the cost of doing business. Other — less far reaching — aspects of the deal focused on food security and a set of issues of particular interest to least developed countries including trade preferences or cotton subsidies. As the dust from the heated Bali negotiations settles, the main challenge for the WTO will now consist in building on this success to re-energise multilateral negotiations and ultimately close the Doha Round. In a world increasingly dominated by regional and bilateral free-trade agreements, members will have to confront the core issues that have divided them for nearly 15 years and find creative solutions to rehabilitate the WTO’s centrality in global trade governance.

  12. The Paris Agreement on Climate Change: Agriculture and Food Security

    NARCIS (Netherlands)

    Verschuuren, Jonathan

    Climate change has a profound impact on agriculture and on food security. At the same time agriculture contributes to climate change to a considerable extent. Fortunately there is also much to gain since the agricultural sector holds significant climate change mitigation potential through reductions

  13. African Regional Cooperative Agreement for Research, Development and Training Related to Nuclear Science and Technology. Fourth Extension of Agreement

    International Nuclear Information System (INIS)

    2010-01-01

    Pursuant to Article XIV.2, the Agreement 'shall continue in force for a period of five years from the date of its entry into force and may be extended for further periods of five years if the Government Parties so agree'. The fourth extension of the Agreement entered into force on 4 April 2010, upon expiration of the third extension of the Agreement and will remain in force for an additional period of five years, i.e. through 3 April 2015. As of 30 April 2010, 8 States have notified the Agency of their acceptance of the extension of the Agreement. The status list of the Agreement is reproduced in this document for the information of all Members [es

  14. The 21st Century Challenges and the Food-Energy-Water-Security (FEWS) Nexus in the Middle East Region

    Science.gov (United States)

    Moradkhani, H.; Hameed, M.

    2017-12-01

    Developing countries have experienced crucial conditions in meeting the needs for food, energy, and water security. This paper presents a country-level quantitative assessment of the current issues associated with the Food-Energy-Water-Security (FEWS) Nexus in the Middle East region. In this study, sixteen countries in the Middle East region are chosen, namely, Arabian Peninsula, Iran, Syria, Lebanon, Israel, Palestine, Egypt, and Turkey. The most recent datasets are used to study and analyze the factors that have emerged the demand to understand and manage the linkage of FEW systems in the region. Water scarcity, extreme events, population growth, urbanization, economic growth, poverty, and political stability are found to be the key drivers of the current challenges in the Middle East region. Additionally, the results suggest that these factors have created a subsequent stress on FEW resources specifically on water sector in the region. Therefore, more attention is required to sustain the FEW resources and cope with the socio-economic development.

  15. The text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1993-02-01

    The document informs that as of 31 January 1993, the following states sent to the Director General notifications of acceptance of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology: Tunisia, Egypt, Algeria, Nigeria, Madagascar, Libyan Arab Jamahiriya, Morocco, Kenya, Sudan, Ghana, Tanzania, Mauritius, Cameroon, South Africa and Zaire. The Agreement entered into force on 4 April 1990

  16. 40 CFR 35.3010 - Delegation agreement.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Delegation agreement. 35.3010 Section... STATE AND LOCAL ASSISTANCE Construction Grants Program Delegation to States § 35.3010 Delegation agreement. (a) Before execution of the delegation agreement, the Regional Administrator must determine that...

  17. The IAEA regional cooperative agreement programme (RCA) on enhancement and harmonization of radiation protection in the Asia-Pacific Region (1998-2002)

    International Nuclear Information System (INIS)

    Cameron, R.F.; Oresegun, M.O.

    2000-01-01

    The IAEA Regional Cooperative Agreement (RCA) was initiated in 1972, and currently consists of 17 Member States from East Asia and Oceania. These countries are Australia, Bangladesh, China, India, Indonesia, Japan, Korea, Malaysia, Myanmar, Mongolia, New Zealand, Pakistan, Philippines, Singapore, Sri Lanka, Thailand and Vietnam. The RCA is one of three cooperative agreements under the aegis of the IAEA, the other two being for Africa (AFRA) and Latin America (ARCAL). The RCA agreement has been extended five times, as it meets particular needs of the participating countries. The region covered by the RCA comprises nearly half of the world's population and is undergoing a rapid expansion in nuclear power development and in the uses of radiation sources (radioactive materials and irradiating equipment). A number of activities in a wide range of areas of Agency interest are carried out under RCA. The Project to Strengthen Radiation Protection Infrastructures was initiated in 1988, as a five year programme, to offer a regional response to some of the radiation protection issues that were raised following the Chernobyl accident. It was extended into Phase 2 from 1993 to 1998 and has now reached a new phase. The IAEA has a dual role to establish standards in radiation protection and safety and to provide for their application. Since the status of the implementation of radiation safety laws and regulations is variable within the RCA countries, the primary focus has been on providing assistance to member states in the drafting of laws and regulations to ensure that sources are authorized and are properly controlled. A number of accidents worldwide have resulted from inappropriate or a complete lack of regulations on the control of sources. However as countries develop, their needs change and it is important that the RCA project in radiation protection changes with them. Hence the new Phase 3 programme in radiation protection has a mixture of events to strengthen radiation

  18. Impacts of Climate Change on Colombia’s National and Regional Security

    Science.gov (United States)

    2009-10-01

    Peru, and Chile have relatively diverse, industrialized economies and greater domestic resources and state capaci- ties for adaptation. Bolivia...Change on Colombia’s National and Regional Security References 1 Colombia, Sistema de Informacion sobre el Uso del Agua en la Agricultura y el Medio...Jul 2009. "El cambio climatico en Colombia." Unpublished report shared with authors. IDEAM. 26 "El agua para 40 millones de personas esta en riesgo

  19. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  20. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  1. Import dependence of industrial enterprises in the region as an economic security hazard

    Directory of Open Access Journals (Sweden)

    A. N. Makarov

    2010-12-01

    Full Text Available Import is traditionally considered as a source for saturation of a home market with scarce commodities or goods non-manufactured in an importing country. However, the larger is the share of import in the total volume of deliveries, the greater is the hazard for economic security of the region and for the state upon the whole. The analysis has revealed the fact that in the regional industry there is a real situation of absolute import dependence. It means that enterprises have been functioning only based on import deliveries to manufacture some single components for products of production-technical purposes.

  2. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    Directory of Open Access Journals (Sweden)

    Tsung-Hung Lin

    2017-12-01

    Full Text Available The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA. PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  3. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    Science.gov (United States)

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

  4. SCPR: Secure Crowdsourcing-Based Parking Reservation System

    Directory of Open Access Journals (Sweden)

    Changsheng Wan

    2017-01-01

    Full Text Available The crowdsourcing-based parking reservation system is a new computing paradigm, where private owners can rent their parking spots out. Security is the main concern for parking reservation systems. However, current schemes cannot provide user privacy protection for drivers and have no key agreement functions, resulting in a lot of security problems. Moreover, current schemes are typically based on the time-consuming bilinear pairing and not suitable for real-time applications. To solve these security and efficiency problems, we present a novel security protocol with user privacy called SCPR. Similar to protocols of this field, SCPR can authenticate drivers involved in the parking reservation system. However, different from other well-known approaches, SCPR uses pseudonyms instead of real identities for providing user privacy protection for drivers and designs a novel pseudonym-based key agreement protocol. Finally, to reduce the time cost, SCPR designs several novel cryptographic algorithms based on the algebraic signature technique. By doing so, SCPR can satisfy a number of security requirements and enjoy high efficiency. Experimental results show SCPR is feasible for real world applications.

  5. THE CHINA’S ENERGY SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY

    Directory of Open Access Journals (Sweden)

    Evgeniy Sergeevich Krasantsov

    2013-10-01

    Full Text Available The main objective of this article was to determine the level of the Chinese energy security that was built up for last several decades. In order to reach the set aim the author figured the current condition of the energy sector within the leading states of the Asia-Pacific Region and compared it with a similar condition ofChina. The condition’s characteristics included the following: Chinese energy balance, oil production, import and consumption, energy efficiency, CO2 emissions, electricity amount produced by using the renewable energy sources (hydropower, wind energy, sun energy and nuclear energy. In addition the authorities’ plans for the expansion of the mentioned renewable and nuclear energy production were as well discovered. The probable threats of the energy security and possible obstacles for the extensive means of sustaining the country’s energy security were also brought up.Statistical, comparative and analytical methods were applied in the process of the current research. As a result the PRC was found to be at a threshold to energetic crisis. In order to avoid the scenario two innovative methods were proposed as the means of avoiding the possible future crisis and sustaining energy security.The research results can be applied in determining the domestic and foreign policy of China as well as the foreign policies of the PRC’s energetic partners both within the Asia-Pacific Region and beyond its borders. DOI: http://dx.doi.org/10.12731/2218-7405-2013-7-39

  6. Evidence-Based Model of Integration of Regions for Ensuring Economic Security and Sustainable Development of the Russian Federation

    Directory of Open Access Journals (Sweden)

    Olga O. Smirnova

    2017-01-01

    Full Text Available Purpose: the main objective of preparation of article consists in formation of conceptual reasons for the new approach to administrative-territorial division of the Russian Federation corresponding to the relevant calls facing the country in the modern economic conditions. For achievement of this purpose in article the following research tasks are delivered and successfully solved: 1 to create new approach to administrative-territorial division of the Russian Federation on the basis of stability of her subjects; 2 to develop conceptual model of acceptance of the administrative decision on enlargement of regions by use of the modern methods of the quantitative and qualitative analysis of nature of regional development and a status of an economic security of the territory; 3 to define composition and structure of regional clusters, to give their characteristic in specific parametric space; 4 to develop recommendations about formation of administrative decisions on enlargement of regions taking into account specifics of development of the territories in a section of each cluster. Methods: by preparation of article general scientific methods of researches, such as systematization, generalization, cause-effect analysis and also receptions of the quantitative are used (hierarchical and iterative methods, statistic analysis and qualitative (methods of the spatial analysis, theory of image identification analysis. The new conceptual model based on synthesis of qualitative and quantitative methods of assessment of effectiveness of association of territories is developed for achievement of the goal of a research. According to the offered model making decision on association of the region is carried out in four steps. At the first stage justification of expediency of integration of territories is carried out and the general concept of association of regions is formed; at the second stage – holding a procedure of the cluster analysis and registration of

  7. African Regional Co-operative Agreement for research, development and training related to nuclear science and technology. Extension of agreement

    International Nuclear Information System (INIS)

    1995-01-01

    Pursuant to Article XIV.2, the Agreement ''shall continue in force for a period of five years from the data of its entry into force and may be extended for further periods of five years if the Government Parties so agree''. The extension of the Agreement entered into force on 4 April 1995, upon expiration of the original Agreement

  8. African Regional Co-operative Agreement for research, development and training related to nuclear science and technology. Extension of agreement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-05-10

    Pursuant to Article XIV.2, the Agreement ``shall continue in force for a period of five years from the data of its entry into force and may be extended for further periods of five years if the Government Parties so agree``. The extension of the Agreement entered into force on 4 April 1995, upon expiration of the original Agreement.

  9. Challenges of transfrontier conservation areas: Natural resources nationalism, security and regionalism in the southern African development community region

    Directory of Open Access Journals (Sweden)

    Oswell Rusinga

    2012-12-01

    Full Text Available Transfrontier Conservation Areas (TFCAs initiatives in the Southern African Development Community (SADC region offer hope for providing a mechanism for resolving political tensions and conflicts which are not only related to environmental issues but to security concerns as well. The geopolitical implications of TFCAs in the SADC region cannot be overemphasised with regard to international relations and regional integration. The SADS region is characterised by histories of contested military balance of power and geopolitical rivalries which have a potential to degenerate into military confrontation. Although there is a strong belief in multilateral co-operation among SADC member countries, most of them often engage the international community at the bilateral level. Moreover, there is disharmony in constitutional applications of the rule of law, respect of human rights and good governance. However, TFCAs initiatives in Southern Africa have been seen as offering an opportunity to heal the wounds of pre- and post-independence wars of destabilisation through the encouragement of inter-state collaboration and co-operation by giving governments an opportunity for mutual action on issues of common interest.

  10. A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP

    OpenAIRE

    Zhang, Liping; Tang, Shanyu; Zhu, Shaohui

    2016-01-01

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP. Several attempts have been made to address the tradeoff problem between security and efficiency, but designing a successful authenticated key agreement protocol for SIP is still a challenging task from t...

  11. Regional cooperation planning. Project planning for JAEA/SNL regional cooperation on remote monitoring

    International Nuclear Information System (INIS)

    Olsen, John

    2006-01-01

    Developing cooperation between the JAEA's NPSTC and the NNCA may take advantage of bilateral activities between those parties and SNL. The merger of JNC and JAERI has affected the schedule for JAEA/SNL cooperation. Also, the evolution of the NNCA as an independent agency has slowed the projected schedule for cooperation between the JAEA and the NNCA. A potential schedule for establishment of a quadrilateral remote monitoring system may include interim activities, securing an agreement of some type, and actual establishment of VPN links. A parallel schedule might exist for informing other regional parties and gaining their interest. (author)

  12. An Approach to Building Capacity for Nuclear Security and Safeguards in Thailand and the Southeast Asian Region

    International Nuclear Information System (INIS)

    Pengvanich, P.; Chanyotha, S.; Nilsuwankosit, S.

    2016-01-01

    Full text: A master’s degree programme in nuclear security and safeguards has been developed and offered at Chulalongkorn University for the first time in 2013 in order to develop necessary human resources in the fields of nuclear security and safeguards who can continue to work, conduct research, or serve as educators in these fields in Thailand and the Southeast Asian region. The first group of 20 students joined the programme in 2013 and recently graduated. The programme was one-of-its-kind, as there have not been many similar specialized programmes in nuclear security and safeguards in the past. In this paper, challenges and lessons learned throughout the programme are reported. Experience from the pilot programme will be used to improve the next round of the programme which is expected to start in 2017. With this program, more nuclear knowledge can be shared and maintained among the Association of South East Asian Nations (ASEAN) countries to ensure the peaceful utilization of nuclear technology in the region. (author

  13. Text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1994-01-01

    As of 1 September 1994, notifications of acceptance of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), in accordance with Article XIII thereof, had been received by the Director General from the Governments of: Tunisia, Egypt, Algeria, Nigeria, Madagascar, Libya, Morocco, Kenya, Sudan, Ghana, Tanzania, Mauritius, Cameroon, South Africa, Zaire, Ethiopia, Zambia, Niger. The Agreement entered into force on 4 April 1990, the date of receipt of the third notification of acceptance

  14. Energy security and pattern of regional conflicts in Eurasia: From a constructive framework of analysis

    Directory of Open Access Journals (Sweden)

    Nalin Mohapatra

    2018-02-01

    Full Text Available The term energy security is undergoing a sea change from a state-centric economic conception to a sociological one. The definitional aspect is undergoing a transformation because of the changing pattern of relations between “energy producing and consuming states” along with “transit states”. Eurasia is one such region where the broader definition of energy security can be applicable. The existence of historically rooted social conflicts like Chechnya, South Ossetia, Crimea, “simmering discontent” in Siberia and Far East, and primordial apprehensions between ethnic groups (Armenian and Azeri in Nagorno Karabakh are providing a structural basis for the accentuation of regional conflicts. Most of these conflicts are taking place in Eurasia due to existence of natural resources like energy. Often competition over controlling transportation corridor is also generating societal tension. Some of these trajectories are putting this geopolitical space into a “cauldron.” Against this backdrop, Constructivism is emerging as a major theoretical approach to study the securitization processes in Eurasia.

  15. The procedure of dispute settlement in the atomic energy cooperation agreement

    International Nuclear Information System (INIS)

    Hyung, Sang Cheol

    2010-01-01

    'UN Charter' Article 33 writes; the parties to any dispute, the continuance of which is likely to endanger the maintenance of international peace and security, shall, first of all, seek a solution by negotiation, enquiry, mediation, conciliation, arbitration, judicial settlement, resort to regional agencies or arrangements, or other peaceful means of their own choice. And 'THE AGREEMENT OF 31 OCTOBER 1975 BETWEEN THE REPUBLIC OF KOREA AND THE AGENCY FOR THE APPLICATION OF SAFEGUARDS IN CONNECTION WITH THE TREATY ON THE NON-PROLIFERATION OF NUCLEAR WEAPONS' (INFCIRC/236) writes ; Any dispute arising out of the interpretation or application of this Agreement, except a dispute with regard to a finding by the Board under Article 19 or an action taken by the Board pursuant to such a finding, which is not settled by negotiation or another procedure agreed to by the Government of the Republic of Korea and the Agency shall, at the request of either, be submitted to an arbitral tribunal as above mentioned, the disagreeing parties prefer alternative dispute resolution, abbreviated ADR, to litigation. So we need to study the ADR

  16. The new strategic balance and cooperative security

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    The new strategic balance and cooperative security in the world now is discussed including the following issues: strategic balances and the features of the old strategic environment; the main characteristics of the new political and security environment; the future role of nuclear weapons; the role of arms limitation agreements

  17. Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for assistance in securing nuclear fuel for a research reactor

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Project and Supply Agreement among the Government of the Republic of Poland, the Government of the United States of America and the International Atomic Energy Agency for Assistance in Securing Nuclear Fuel for a Research Reactor is reproduced in this document for the information of all Members of the Agency. The Agency's Board of Governors approved the above mentioned Project and Supply Agreement on 14 June 2006. The Agreement was signed by the authorized representatives of Poland on 8 January 2007, the United States on 12 January 2007 and by the Director General of the IAEA on 16 January 2007. Pursuant to the Article XII of the Agreement, the Agreement entered into force on 16 January 2007, upon signature by the representatives of Poland, the United States and the Director General of the IAEA

  18. Neoindustrialization as a factor in improving economic security of old-industrial regions

    Directory of Open Access Journals (Sweden)

    Ol’ga Aleksandrovna Romanova

    2012-06-01

    Full Text Available This paper proves that the paradigm of the world of the XXIcentury is neoindustrialization on the basis of alternativestrategic goals of the global economy associated with the formation of post-industrial society and financialization neoindustrialization. A systematic proposal for the driving forces and mechanisms for its implementation is suggested. It is shown that target-oriented approach can be successfully used at the regional level as a mechanism for economic neoindustrialization of an old-industrial region. Conceptual approach to developing comprehensive program of industrial development in the industrial region that implements the ideas of neoindustrialization in relation to industry of Sverdlovsk region is presented. It was found that the regional technology platform can be an effective tool for combining the interests of territorial and sectoral development. It is proved that the idea of neoindustrialization can be realized only as a result of wise industrial policy and road map formation for the movement to an entirely new high-tech based industrial development. In the process of forming, the problem of neoindustrialization of a «pure» market as a factor in increasing the economic security is actualized.

  19. A multihop key agreement scheme for wireless ad hoc networks based on channel characteristics.

    Science.gov (United States)

    Hao, Zhuo; Zhong, Sheng; Yu, Nenghai

    2013-01-01

    A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we first propose a basic multihop key agreement scheme for wireless ad hoc networks. The proposed basic scheme is resistant to external eavesdroppers. Nevertheless, this basic scheme is not secure when there exist internal eavesdroppers or Man-in-the-Middle (MITM) adversaries. In order to cope with these adversaries, we propose an improved multihop key agreement scheme. We show that the improved scheme is secure against internal eavesdroppers and MITM adversaries in a single path. Both performance analysis and simulation results demonstrate that the improved scheme is efficient. Consequently, the improved key agreement scheme is suitable for multihop wireless ad hoc networks.

  20. Iran's Relations to the East: Nonproliferation and Regional Security in a Changing Southwest Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tehsin, Muhammad [Quaid-I-Azam Univ., Islamabad (Pakistan)

    2014-11-01

    This study attempts to answer the following questions: would a successful JPOA result in nuclear nonproliferation and regional security in Southwest Asia; and could the Middle East and South Asia work together to contain the threat of Salafi jihadism?

  1. The system of innovative development of the agroindustrial complex in order to ensure the economic security of the region

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2017-01-01

    Full Text Available The basis for innovative development of the agroindustrial complex is the goals, principles and methods that determine the economic security of the region. The category of “economic security”is often identified with the sustainability, competitiveness and risk-free economy of agricultural and processing enterprises. Ensuring the economically safe functioning of all industries and spheres of regional agribusiness is impossible without interconnection with science and education. The most important principles necessary for the formation in the regional and national agribusinesses of a developed economically secure market of scientific, technical and innovative products for agroindustrial purposes are the following: providing the scientific and research sphere of the agro-industrial complex with highly qualified personnel; ensuring real freedom and independence in the activities of research institutions; the formation of a common interdependent economic space and interest; organization of specialized market structures in the field of research and innovation development; development and application within the regional agro-industrial complex of a scientifically grounded economic mechanism for regulating the functioning and stimulating the development of the market for scientific and technical innovation products. Purposeful development of the civilized market of scientific, technical and innovative products of agro-industrial design with its corresponding structures and organizational-economic mechanism is an objective necessity of functioning of economic security of the national economy. The interests of the economic and food security of the region and the state as a whole need to increase the financing of the agricultural sector and the processing industry to a level that will overcome the investment and innovation crisis caused by sanctions. To this end, we believe it is necessary to finance the innovative investment agrarian fund at the

  2. The problem of Indonesia’s leadership in ASEAN political and security cooperation

    Directory of Open Access Journals (Sweden)

    A. G. Smorzhevska

    2017-07-01

    Full Text Available The study is dedicated to modern approaches and policy of the Republic of Indonesia toward the process of regional integration in Southeast Asia. Key aspects and instruments of Indonesia’s increasing contribution in strengthening of the political and security cooperation between members of ASEAN have been explained by the researcher. The aim of the article is to identify the role of Indonesia in conduction of multilateral diplomacy within the framework of ASEAN political and security sphere, forms of its implementation as well as the specifics of limiting factors for such leadership. It has been argued by the author that Indonesia’s commitments to ASEAN and its desire to promote or inhibit the process of regional integration vary depending on policy areas and level of compliance to its national interests. Consequently, Indonesia’s main interests and priorities concerning the ASEAN integration process lie in security and defense sphere. Indonesia’s key role in building of the ASEAN Political and Security Community is to provide ideas and political concepts as well as to shape the regional agenda. Therefore, the country implements the relevant agreements and puts forward a number of regional initiatives in foreign policy and defense. Moreover, assuming the fact that direct regional mechanisms of conflict resolution has not been fully implemented yet, Jakarta works on its development, acting as a mediator and a reliable regional partner. In addition, it is worth to underline that Jakarta makes substantial contribution to regional efforts in counterterrorism. The benefit of this study is that it takes into consideration the specifics of the factors that reveal the limitations for leadership in the security sphere. The core principles of ASEAN functioning determine the degree and nature of Member States’ leadership in the region. The material power resources and implementation on power through coercion gave way to soft instruments of

  3. IAEA-EU Joint Action Partnership in Improving Nuclear Security

    International Nuclear Information System (INIS)

    2011-12-01

    infrastructure related to nuclear and other radioactive material to enable the country to fulfil its national and international obligations; (ii) Nuclear security measures for nuclear and other radioactive material in use, storage and transport and their related facilities; (iii) State's capabilities for dealing with nuclear and radioactive material out of control of national regulatory control. The programme - with a combined budget for the first four EU Joint Actions of about Euro 22 million (implementation period January 2005-December 2011) - covers 88 potential beneficiary States and includes both Member States and non-Member States of the IAEA. These funds have been appropriated in response to a growing need for tighter control of nuclear and radioactive material and a better understanding of how to implement policies and procedures to ensure that effective nuclear security measures are in place. An additional region was added to each Action, with Central Asia, South-eastern Europe, Africa, the Middle East and South-East Asia being covered by EU Joint Action IV in 2008. A Contribution Agreement for EU Council Decision V was signed in November 2010 under which the European Commission contributed nearly Euro 10 million to the Nuclear Security Fund (NSF). EU Council Division V expands the reach of the programme to States in the Gulf, South America, the Caribbean and Middle America region, with 126 States eligible for support worldwide.

  4. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq

    NARCIS (Netherlands)

    Shukor, Ali R.; Klazinga, Niek S.; Kringos, Dionne S.

    2017-01-01

    Background: This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and

  5. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  6. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  7. 47 CFR 73.1650 - International agreements.

    Science.gov (United States)

    2010-10-01

    ... Agreements for the Broadcasting Service in Region 2: (i) MF Broadcasting 535-1605 kHz, Rio de Janeiro, 1981. (ii) MF Broadcasting 1605-1705 kHz, Rio de Janeiro, 1988. (3) Bi-lateral Agreements between the United...

  8. NEW APPROACHES TO ENERGY SECURITY IN THE BALTIC SEA REGION: RUSSIAN VIEWPOINT

    OpenAIRE

    Irina Zeleneva

    2013-01-01

    NEW APPROACHES TO ENERGY SECURITY IN THE BALTIC SEA REGION: RUSSIAN VIEWPOINT By 2050, we can expect dramatic changes in the global energy balance. At the beginning of 21st century, the configuration of the global energy market has begun to change due to a wide variety of both political and economic reasons. The formation of a European common gas market in the world of fierce competition among world exporters for short-term and long-term contracts, the growth of energy consumption in China, J...

  9. 78 FR 42532 - Cooperative Research and Development Agreement (CRADA) Opportunity With the Department of...

    Science.gov (United States)

    2013-07-16

    ... DEPARTMENT OF HOMELAND SECURITY Cooperative Research and Development Agreement (CRADA) Opportunity With the Department of Homeland Security for the Development of a Foot-and-Mouth Disease 3ABC ELISA Diagnostic Kit; Correction AGENCY: Science and Technology Directorate, Plum Island Animal Disease Center...

  10. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  11. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  12. Security and Political Stability in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  13. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1998-01-01

    As of 31 January 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology(INFCIRC/377), has been received by the Director General of the IAEA from the Governments of 21 African States. Uganda is added at the at the list of 20 African States reported in the previous addition to the document (INFCIRC/377/Add.8). Pursuant to Article XIV.2 of the original Agreement the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  14. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    International Nuclear Information System (INIS)

    1997-01-01

    As of 31 December 1996, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (see INFCIRC/377), had been received by the Director General from the Governments of 20 African countries. Niger, Libya and Mali are added at the list of 17 countries reported in the previous addition of the document (INFCIRC/377/Add.7). Pursuant to Article XIV.2 of the original Agreement, the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  15. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-02-24

    As of 31 January 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology(INFCIRC/377), has been received by the Director General of the IAEA from the Governments of 21 African States. Uganda is added at the at the list of 20 African States reported in the previous addition to the document (INFCIRC/377/Add.8). Pursuant to Article XIV.2 of the original Agreement the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  16. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-28

    As of 31 December 1996, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA) (see INFCIRC/377), had been received by the Director General from the Governments of 20 African countries. Niger, Libya and Mali are added at the list of 17 countries reported in the previous addition of the document (INFCIRC/377/Add.7). Pursuant to Article XIV.2 of the original Agreement, the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  17. Understanding the security situation in Colombia

    Energy Technology Data Exchange (ETDEWEB)

    Escobar, C.O. [Colombia Central Bank (Colombia)

    1997-11-01

    The following aspects influencing Colombia are considered: the causes of security problems, including social, political and criminal violence; the political and economic crises produced by financing of the presidential campaign; coal`s social, economic and cultural environment in Guajira and Cesar; a description of the security situation in the carboniferous region focusing on guerrilla, crime and paramilitary threats; and three possible scenarios in the region`s security future. The government`s strategy of assuring restricted security to carboniferous and petroleum plants has proven expensive for the state and country. A competitive regional economy would bring social and economic benefits in the medium and long terms. 1 tab.

  18. SECURITY RISKS, MYTHS IN A TRANSITIONING SUB-NATIONAL REGIONAL ECONOMY (CROSS RIVER STATE AND IMAGINATIVE GEOGRAPHIES OF NIGERIA

    Directory of Open Access Journals (Sweden)

    J. K. UKWAYI

    2015-03-01

    Full Text Available The emergence of an “international community” through accumulation of perceived risks that contrasts with those risks (of considerably lower levels of seriousness compared to those perceived constitutes one of the interesting (or intriguing subjects of risks and disaster studies surrounding the 9/11 era. The constructions of “imaginative geographies”, have frequently been biased in the practices that underlie the mapping of the foreign places tend to put-down the affected regions in their “paintings” for the global community. The latter are subsequently “demonized” in their ratings of competence for participating in world trade, tourism, travel, among other social/cultural, and economic and political activities. The objective of this article is to highlight how the exaggeration of risks (contrasted to actually existing/lived risks, practices that are frequently associated with such adverse “imaginative geographies” poses sub-national regional development dilemma in Nigeria’s Niger Delta. We trace the roots of adverse “imaginative geographies” of Nigeria to the Abacha dictatorship (1993-1997. Then we highlight the mixed characteristics of the Niger Delta conditions during the “return of positive image recapture” by Nigeria’s federal government (re-democratisation of the Fourth Republic, 1999-present, re-branding campaigns; as well as adverse conditions present. Most significantly, we show that despite these adversities, a combination of favorable geographical size, differentiation, sub-national regional security programme formulation and management taking aims at diversification have created “large oases” of peace and security in Cross River State, a part of the Niger Delta that has been completely unscathed by insurgencies of the nearby sub-national region and further away national origin. Apart from identifying sub-national regions qualifying for delisting from “adverse imaginative geographies” due to

  19. 7 CFR 762.147 - Servicing shared appreciation agreements.

    Science.gov (United States)

    2010-01-01

    ... percent of any positive appreciation in the market value of the property securing the loan or line of... 7 Agriculture 7 2010-01-01 2010-01-01 false Servicing shared appreciation agreements. 762.147..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS GUARANTEED FARM LOANS § 762.147 Servicing shared appreciation...

  20. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  1. ANALYSIS OF FOOD SECURITY STATUS OF FARMING HOUSEHOLDS IN THE FOREST BELT OF THE CENTRAL REGION OF GHANA

    Directory of Open Access Journals (Sweden)

    John K.M. Kuwornu

    2013-01-01

    Full Text Available The study seeks to examine the Food Security Status of Farming Households in the Forest Belt of the Central Region of Ghana. A multistage sampling technique was used to select the respondents that were interviewed. In all 134 farming households were interviewed but 120 were selected for analysis after removing the questionnaires which were not properly administered. The households were selected from eight communities in two districts. Food consumption data of 851 individuals in 120 households were used for the analysis. The study reveals that the majority of the farming households (60% were found to be food insecure. Further, the Binary Logit Model results reveal that an increase in household's income, having access to credit as well as increase in the quantity of own farm production improve the food security status of farming households in the Forest Belt of the Central Region of Ghana. However, holding all other factors constant, increases in non-working member of households worsens the food security status of farming households. Most of the food insecurity coping strategies adopted by household's are not severe and can only be used to avert the impact of food insecurity on a temporal basis. These results have policy implications for Food Security Status of Farming Households in developing countries.

  2. 48 CFR 225.872-7 - Industrial security for qualifying countries.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security for... Agreements and Coordination 225.872-7 Industrial security for qualifying countries. The required procedures... qualifying country sources are in the DoD Industrial Security Regulation DoD 5220.22-R (implemented for the...

  3. 75 FR 14159 - Notice of Agreements Filed

    Science.gov (United States)

    2010-03-24

    ... parties to exchange slots in the trade between U.S. East Coast ports and ports in Turkey. Agreement No.: 201048-005. Title: Lease and Operating Agreement between Philadelphia Regional Port Authority and... FEDERAL MARITIME COMMISSION Notice of Agreements Filed The Commission hereby gives notice of the...

  4. Freshwater Ecosystem Service Flow Model To Evaluate Regional Water Security: A Case Study In Beijing-Tianjin-Hebei Region, China

    Science.gov (United States)

    Li, D.; Li, S.

    2016-12-01

    Freshwater service, as the most important support ecosystem service, is essential to human survival and development. Many studies have evidenced the spatial differences in the supply and demand of ecosystem services and raised the concept of ecosystem service flow. However, rather few studies quantitatively characterize the freshwater service flow. This paper aims to quantify the effect of freshwater ecosystem service flow on downstream areas in Beijing-Tianjin-Hebei (BTH) region, China over 2000, 2005 and 2010. We computed the freshwater ecosystem service provision with InVEST model. We calculated freshwater ecosystem service consumption with water quota method. We simulated the freshwater ecosystem service flow using our simplified flow model and assessed the regional water security with the improved freshwater security index. The freshwater provision service mainly depends on climatic factors that cannot be influenced by management, while the freshwater consumption service is constrained by human activities. Furthermore, the decrease of water quota for agricultural, domestic and industrial water counteracts the impact of increasing freshwater demand. The analysis of freshwater ecosystem service flow reveals that the majority area of the BTH (69.2%) is affected by upstream freshwater. If freshwater ecosystem service flow is considered, the water safety areas of the whole BTH account for 66.9%, 66.1%, 71.3%, which increase 6.4%, 6.8% and 5.7% in 2000, 2005 and 2010, respectively. These results highlight the need to understand the teleconnections between distant freshwater ecosystem service provision and local freshwater ecosystem service use. This approach therefore helps managers choose specific management and investment strategies for critical upstream freshwater provisions across different regions.

  5. 20 CFR 405.715 - Agreement in expedited appeals process.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Agreement in expedited appeals process. 405.715 Section 405.715 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Expedited Appeals Process for Constitutional Issues § 405...

  6. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  7. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  8. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  9. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  10. Nuclear arbitration: Interpreting non-proliferation agreements

    International Nuclear Information System (INIS)

    Tzeng, Peter

    2015-01-01

    At the core of the nuclear non-proliferation regime lie international agreements. These agreements include, inter alia, the Nuclear Non-proliferation Treaty, nuclear co-operation agreements and nuclear export control agreements.1 States, however, do not always comply with their obligations under these agreements. In response, commentators have proposed various enforcement mechanisms to promote compliance. The inconvenient truth, however, is that states are generally unwilling to consent to enforcement mechanisms concerning issues as critical to national security as nuclear non-proliferation.3 This article suggests an alternative solution to the non-compliance problem: interpretation mechanisms. Although an interpretation mechanism does not have the teeth of an enforcement mechanism, it can induce compliance by providing an authoritative interpretation of a legal obligation. Interpretation mechanisms would help solve the non-compliance problem because, as this article shows, in many cases of alleged non-compliance with a non-proliferation agreement, the fundamental problem has been the lack of an authoritative interpretation of the agreement, not the lack of an enforcement mechanism. Specifically, this article proposes arbitration as the proper interpretation mechanism for non-proliferation agreements. It advocates the establishment of a 'Nuclear Arbitration Centre' as an independent branch of the International Atomic Energy Agency (IAEA), and recommends the gradual introduction of arbitration clauses into the texts of non-proliferation agreements. Section I begins with a discussion of international agreements in general and the importance of interpretation and enforcement mechanisms. Section II then discusses nuclear non-proliferation agreements and their lack of interpretation and enforcement mechanisms. Section III examines seven case studies of alleged non-compliance with non-proliferation agreements in order to show that the main problem in many cases

  11. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  12. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  13. The IPA and the American Psychoanalytic Association: a perspective on the regional association agreement.

    Science.gov (United States)

    Wallerstein, R S

    1998-06-01

    Ever since 1938 the American Psychoanalytic Association has had a special autonomous relationship within the IPA accorded to no other component organisation. This Regional Association status has had two main features: (1) total internal control over training standards and membership criteria, with no accountability to the IPA; and (2) an 'exclusive franchise', so that the IPA was barred from recognising any other component within the United States. This unique Regional Association status reflected the resolution at the time (1938) of the long-standing controversy between the IPA and the American over the issue of 'lay analysis', and remained unaltered for half a century until, with the resolution of the 3 1/2-year long law-suit against the American (and secondarily against the IPA) in 1988, the Regional Association agreement was modified (but not totally abrogated) by the American's giving up the 'exclusive franchise' aspect (thus permitting IPA recognition of psychoanalytic groups in the US organised outside the American), but still retaining its internal full control over training and membership. The meanings and consequences for psychoanalysis of this special status of the American are explored.

  14. Venezuela and Energy Security of Latin America

    Directory of Open Access Journals (Sweden)

    Elena Igorevna Vesnovskaya

    2015-12-01

    Full Text Available The article is devoted to the specificity of Venezuela's energy policy and the features of the evolution of its approaches to solving problems of energy security. Special attention is paid to the projects of Caracas in the energy sector which are aimed at the creating of common energy zone in Latin America. The author has revealed the interaction of internal political processes in Venezuela as the country's leader in the region, with its integration policy, and also identified trends in the further development of energy policy and strategy of Latin American countries. The research of energy resources of Latin America determined that the main factor that works in favor of convergence states within the South American "geopolitical ring" is to ensure energy security. Venezuela is among the richest resources of Latin America. In the research it was determined that Petrosur, Petrocaribe and Petroandina provide the basis for a range of bilateral agreements to promote cooperation, creation ventures based on the state oil companies of these states.

  15. Pastoralists at War: Violence and Security in the Kenya-Sudan-Uganda Border Region

    Directory of Open Access Journals (Sweden)

    Jonah Leff

    2009-12-01

    Full Text Available The majority of those living in the border region of Kenya, Sudan, and Uganda are pastoralists, whose livelihoods are dictated by the upkeep and size of their herds. Harsh environmental conditions force pastoralists to migrate in search of water and pasturelands during the dry season. With limited access to water and competing rights to land, intertribal conflict arises when pastoralists from one tribe enter the territory of another. The increased availability of small arms in the region from past wars increasingly makes ordinary clashes fatal. Governments in the region have responded with heavy-handed coercive disarmament operations. These have led to distrust and subsequent violent clashes between communities and security providers. This report reviews the scale, consequences of, and responses to the many pastoral conflicts, utilizing methodological tools such as key informant interviews, retrospective analysis, and a thorough review of available literature.

  16. Household Perceptions about the Impacts of Climate Change on Food Security in the Mountainous Region of Nepal

    Directory of Open Access Journals (Sweden)

    Shobha Poudel

    2017-04-01

    Full Text Available This study tried to understand the mountainous households’ perception of climate change and its impacts on food security in the Lamjung district of Nepal. The study attempted to find out changes in households food security and daily activities in the face of climate change for the last twenty years. The study started with the 150 household surveys along with participatory rural appraisal to understand the climate change perception of local people and its impact on dimensions of food security. Households expressed different levels of perception in terms of climate change on food security. The result shows that most of the mountainous households experienced increased temperature, less rainfall in winter, an increasing number of natural disasters and the emergence of insects for the last twenty years. They perceived the role of climate change in decreased crop production, decreased dairy products and increased household work. The situation of food security is likely to be more vulnerable to climate change in the future. It was also observed that households have been using different autonomous adaptation measures, such as high yielding crop varieties, enhanced irrigation systems and fertilizers, to cope with the changing climate. Finally, the study recommended policy instruments to enhance food security in the mountainous region amidst changing climate.

  17. The text of an African regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    1990-04-01

    The document reproduces the text of an African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology among African Member States that was endorsed by the Board of Governors on 21 February 1990

  18. FOOD INDUSTRY DEVELOPMENT IN THE CONTEXT OF THE FOOD SECURITY OF REGIONS OF UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Mykolaichuk

    2017-12-01

    Full Text Available The purpose of the study is to substantiate the food security needs in the regions of Ukraine, as well as the definition of tasks in filling the market with own production products. The obtained results will determine the directions of structural changes in agricultural complexes of the regions and the necessary measures by the public regulatory bodies. Methodology. The research is based on a comparison of results of normative and search forecasts. In developing normative forecasts, the projected population and needs in different types of products according to the norms of rational consumption are taken into account. Search forecasts provide for the definition of a future state of satisfaction with the preservation of existing development trends. The gap between the necessary and projected results determines the task of accelerating growth. In terms of national security, food production should be provided with its own raw material base. Therefore, an analysis of the conditions for the development of livestock and crop production is necessary, which enables to substantiate the directions of systemic changes in agricultural complexes of the regions. In order to ensure positive changes in the structure of agricultural production, strengthening the effectiveness of public regulation on the basis of financial and economic leverage is needed. Results. Regions of Ukraine by territory and population exceed certain countries of the European Union. Significant differences in socio-economic conditions of the regions contribute to the growth of tension in society and migration. The events of recent years indicate the possibility of external interference in the functioning of the regions of Ukraine and the danger of the collapse of cooperative ties. Therefore, it is important to ensure the satisfaction of the immediate needs of the population of each region at the expense of its own production. Among the necessities, food occupies a special place. Complete

  19. Asymmetric Power Balance and Its Implications for Regionalism in South Asia

    Science.gov (United States)

    2015-03-01

    constitutes an ideal grouping for economic integration.16 The political dimensions are mainly overshadowed with security concerns among member states...United States’ to the North American Free Trade Agreement ( NAFTA ).39 The region’s geo-politics strongly suggest that India is the best candidate for...dynamics in South Asia. Many scholars have put forth their view on what constitutes regional cooperation and integration. E.B. Haas defines the

  20. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  1. The bilateral trade agreements and export performance of South Asian nations with special reference to India Sri Lanka Free Trade Agreement

    Directory of Open Access Journals (Sweden)

    Suhail P

    2011-12-01

    Full Text Available The regional trade agreements (RTA have been one of the important developments in the world trading system in 1990s. There are number of studies on the effects trade agreements in different contexts. This study is an attempt to analyse the effects of bilateral trade agreements in the intraregional trade in the SAARC region with special reference to the Free Trade Agreements (FTA between India Sri Lanka. The study uses a panel regression analysis by using balance panel data. The study concludes that the FTA between India and Sri Lanka has brought positive results in the trade between these two nations by improving the bilateral trade in goods. The results of the study are important in the context of looking for the prospects of a free trade area in the region by member nations.

  2. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems.

    Science.gov (United States)

    Li, Xuelei; Wen, Qiaoyan; Li, Wenmin; Zhang, Hua; Jin, Zhengping

    2014-11-01

    Healthcare delivery services via telecare medicine information systems (TMIS) can help patients to obtain their desired telemedicine services conveniently. However, information security and privacy protection are important issues and crucial challenges in healthcare information systems, where only authorized patients and doctors can employ telecare medicine facilities and access electronic medical records. Therefore, a secure authentication scheme is urgently required to achieve the goals of entity authentication, data confidentiality and privacy protection. This paper investigates a new biometric authentication with key agreement scheme, which focuses on patient privacy and medical data confidentiality in TMIS. The new scheme employs hash function, fuzzy extractor, nonce and authenticated Diffie-Hellman key agreement as primitives. It provides patient privacy protection, e.g., hiding identity from being theft and tracked by unauthorized participant, and preserving password and biometric template from being compromised by trustless servers. Moreover, key agreement supports secure transmission by symmetric encryption to protect patient's medical data from being leaked. Finally, the analysis shows that our proposal provides more security and privacy protection for TMIS.

  3. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  4. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  5. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  6. 12 CFR 221.113 - Loan which is secured indirectly by stock.

    Science.gov (United States)

    2010-01-01

    ... of the securities which comprise the portfolio of Fund X. The agreement includes the following terms... in the ordinary sense, since the portfolio of Fund X is not pledged to secure the credit from Bank Y... analysis of the technical circumstances under which a loan is made * * * . Where security is involved...

  7. Voluntary agreements in environmental policy

    International Nuclear Information System (INIS)

    Torvanger, Asbjoern

    2001-01-01

    A typically voluntary agreement is signed between the authorities and an industrial sector in order to reduce the emission of environmentally harmful substances. There are many different types of agreements. Voluntary agreements are not strictly voluntary, since in the background there is often some kind of ''threat'' about taxation or fees if the industry is unwilling to cooperate. This type of agreements has become popular in many OECD countries during the last decades. In Norway there are only a few agreements of this type. Experience with the use of voluntary agreements as well as research show that they are less cost-effective than market-based instruments such as taxes and quota systems. If there are great restrictions on the use of taxes and quota systems because of information- or measurement problems, or because these instruments are not politically acceptable, then voluntary agreements may be an interesting alternative. Thus, voluntary agreements are best used as a supplement to other instruments in some niche areas of the environmental policy. In some cases, voluntary agreements may be used between two countries or at a regional level, for example within the EU

  8. 20 CFR 405.720 - Notice of agreement to expedite appeal.

    Science.gov (United States)

    2010-04-01

    ....720 Section 405.720 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Expedited Appeals Process for Constitutional Issues § 405.720 Notice of agreement to expedite appeal. If we agree that you can use the expedited appeals process...

  9. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2014-12-01

    Full Text Available The digitization of patient health information (PHI for wireless health monitoring systems (WHMSs has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient’s PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient’s privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks.

  10. Freshness-Preserving Non-Interactive Hierarchical Key Agreement Protocol over WHMS

    Science.gov (United States)

    Kim, Hyunsung

    2014-01-01

    The digitization of patient health information (PHI) for wireless health monitoring systems (WHMSs) has brought many benefits and challenges for both patients and physicians. However, security, privacy and robustness have remained important challenges for WHMSs. Since the patient's PHI is sensitive and the communication channel, i.e., the Internet, is insecure, it is important to protect them against unauthorized entities, i.e., attackers. Otherwise, failure to do so will not only lead to the compromise of a patient's privacy, but will also put his/her life at risk. This paper proposes a freshness-preserving non-interactive hierarchical key agreement protocol (FNKAP) for WHMSs. The FNKAP is based on the concept of the non-interactive identity-based key agreement for communication efficiency. It achieves patient anonymity between a patient and physician, session key secrecy and resistance against various security attacks, especially including replay attacks. PMID:25513824

  11. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations. The Agreement with the League of Arab States

    International Nuclear Information System (INIS)

    1972-01-01

    The text of the Agency's agreement for co-operation with the League of Arab States is reproduced in this document for the information of all Members. The agreement entered into force on 15 December 1971 pursuant to Article IX

  12. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA)

    International Nuclear Information System (INIS)

    1998-01-01

    As of 4 May 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 22 African States. Zimbabwe is added to the list of 21 States reported in the previous edition (add. 9) to this document. Extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  13. Extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (AFRA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-15

    As of 4 May 1998, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, development and Training Related to Nuclear Science and Technology (INFCIRC/377), had been received by the Director General of the IAEA from the Governments of 22 African States. Zimbabwe is added to the list of 21 States reported in the previous edition (add. 9) to this document. Extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  14. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  15. Household food security and adequacy of child diet in the food insecure region north in Ghana.

    Directory of Open Access Journals (Sweden)

    Pascal Agbadi

    Full Text Available Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity. In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators.Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871, descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project.Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards.Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results

  16. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  17. 17 CFR 240.15a-1 - Securities activities of OTC derivatives dealers.

    Science.gov (United States)

    2010-04-01

    ... options, forwards, futures, swap agreements, or collars involving currencies, interest or other rates... derivatives dealers. 240.15a-1 Section 240.15a-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... Under the Securities Exchange Act of 1934 Exemption of Certain Otc Derivatives Dealers § 240.15a-1...

  18. The Text of the Agreement for conducting under the Auspices of the Agency. A Regional Joint Training and Research Programme using a Neutron Crystal Spectrometer

    International Nuclear Information System (INIS)

    1964-01-01

    On 11 June 1964 the Board of Governors approved an Agreement for conducting, under the auspices of the Agency, a regional joint training and research programme using a neutron crystal spectrometer. The text of that Agreement is reproduced in this document for the information of all Members. The entry into force of the Agreement in accordance with Section 17 thereof, as well as later acceptances by additional Governments, will be notified to Members in addenda to this document

  19. The Text of the Agreement for conducting under the Auspices of the Agency. A Regional Joint Training and Research Programme using a Neutron Crystal Spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1964-07-22

    On 11 June 1964 the Board of Governors approved an Agreement for conducting, under the auspices of the Agency, a regional joint training and research programme using a neutron crystal spectrometer. The text of that Agreement is reproduced in this document for the information of all Members. The entry into force of the Agreement in accordance with Section 17 thereof, as well as later acceptances by additional Governments, will be notified to Members in addenda to this document.

  20. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations

    International Nuclear Information System (INIS)

    1969-01-01

    The text of the Agency's agreement for co-operation with the Organization of African Unity (OAU) is reproduced in this document for the information of all Members. The agreement entered into force on 26 March 1969

  1. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    Institute of Scientific and Technical Information of China (English)

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  2. Regional cooperation based on multilateral international agreements in nuclear field

    International Nuclear Information System (INIS)

    Valcic, I.

    1996-01-01

    Multilateral international agreements have defined the framework of behavior and cooperation in various fields and aspects of peaceful use of nuclear energy. Thus, obligations have been defined in the following areas: nonproliferation of nuclear weapons, physical protection of nuclear material, liability for nuclear damage, nuclear safety, early notification about a nuclear accident and assistance in case of nuclear accident. Obligations regarding radioactive waste management should be defined soon. This paper gives a review of obligations from particular agreements with a special emphasis on those which are being realized through mutual cooperation of concerned countries and are important for safe use of nuclear energy. (author)

  3. International Environmental Agreements: Emissions Trade, Safety Valves and Escape Clauses

    International Nuclear Information System (INIS)

    Karp, Larry; Zhao, Jinhua

    2010-01-01

    We explain how the structure of multi-national or multi-regional environmental agreements affect their chance of success. Trade in emissions permits has ambiguous and in some cases surprising effects on both the equilibrium level of abatement, and on the ability to persuade nations or regions to participate in environmental agreements. An escape clause policy and a safety valve policy have essentially the same properties when membership in environmental agreement is pre-determined, but they create markedly different effects on the incentives to join such an agreement. The two policies lead to a qualitative difference in the leverage that a potential member of the agreement exercises on other members

  4. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  5. Regional Integrated Tenets to Reinforce the Safety and Security of Radioactive Sources (ClearZone)

    International Nuclear Information System (INIS)

    Salzer, P.

    2003-01-01

    The EURATOM Research and Training Programme on Nuclear Energy includes 2 main fields - fusion energy research and management of radioactive waste, radiation protection and other activities of nuclear technology and safety.Seven instruments (mechanisms) for projects management are used - 'Network of Excellence' (NOE); 'Integrated Project' (IP); 'Specific Targeted Research Project' or 'Specific Targeted Training Project' (STREP); 'Co-ordination Action' (CA); Actions to Promote and Develop Human Resources and Mobility Specific Support Actions; Integrated Infrastructure Initiatives. Two consecutive sub-projects are proposed: 'small' - countries of the Visegrad four + Austrian participant -within the 6th FP 'Specific Supported Actions' and 'large' - participation of more countries in the region - more oriented to practical implementation of the 'small' project findings - intention to use the 6th Framework Programme resources to co-financing the implementation activities. The main objectives are: to create effective lines of defense (prevention -detection - categorization - transport - storage) against malicious use of radioactive sources; to achieve and maintain a high level of safety and security of radioactive sources; to arise the radioactive sources management safety and security culture at the Central European region. Consortium of 11 organisations from Czech Republic, Slovak Republic, Austria, Hungary and Poland is established for the Project implementation. The Project task are grouped in the following areas: legislation, infrastructure, practices; metallurgical industry, cross border control; instrumentation and metrology; information system

  6. Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN)

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Prasad, Neeli R.

    2007-01-01

    Abstract — Personal Networks (PNs) have been focused on in order to support the user’s business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature...... of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device...... combinations based on user’s location and device’s capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV)....

  7. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  8. IAEA and International Science and Technology Center sign cooperative agreement

    International Nuclear Information System (INIS)

    2008-01-01

    Full text: The IAEA and the International Science and Technology Center (ISTC) today signed an agreement that calls for an increase in cooperation between the two organizations. The memorandum of understanding seeks to amplify their collaboration in the research and development of applications and technology that could contribute to the IAEA's activities in the fields of verification and nuclear security, including training and capacity building. IAEA Safeguards Director of Technical Support Nikolay Khlebnikov and ISTC Executive Director Adriaan van der Meer signed the Agreement at IAEA headquarters in Vienna on 22 October 2008. (IAEA)

  9. Federal Facility Agreement progress report

    Energy Technology Data Exchange (ETDEWEB)

    1993-10-01

    The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas.

  10. Federal Facility Agreement progress report

    International Nuclear Information System (INIS)

    1993-10-01

    The (SRS) Federal Facility Agreement (FFA) was made effective by the US. Environmental Protection Agency Region IV (EPA) on August 16, 1993. To meet the reporting requirements in Section XXV of the Agreement, the FFA Progress Report was developed. The FFA Progress Report is the first of a series of quarterly progress reports to be prepared by the SRS. As such this report describes the information and action taken to September 30, 1993 on the SRS units identified for investigation and remediation in the Agreement. This includes; rubble pits, runoff basins, retention basin, seepage basin, burning pits, H-Area Tank 16, and spill areas

  11. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  12. Improved chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  13. A Comparative Study on Safeguards Implementation under Bilateral Nuclear Cooperation Agreements and the IAEA Comprehensive Safeguards Agreement

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, Jihye; Kim, Ki-Hyun; Lee, Young Wook [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2016-10-15

    A Nuclear Cooperation Agreement (NCA) requires several conditions, so-called obligations, on the items under the agreement such as: 1) peaceful use, 2) retransfer consent, 3) consent prior to reprocessing or enrichment and 4) safeguards and security. These obligations of the NCAs are imposed by the supplier country. The Comprehensive Safeguards Agreement (CSA) between the International Atomic Energy Agency (IAEA) and its member states require similar activities. However, there is a significant gap in nuclear material accountancy between safeguards implementation under the NCA and CSA. The difference of those two frameworks is compared herein, focusing on the unique features of the NCA safeguards and its implications are presented. In this study, the NCAs between the ROK and Canada, Australia and US were analyzed since each of them is one of the ROK’s major nuclear trading partners. The safeguards implementation under the NCA is usually specified in an Administrative Arrangement (AA) under the Agreement. The ROK has two AAs in force with Canada and Australia among 29 countries with NCA. Recently, the AA with Canada was revised in December 2015, with those concepts mentioned above. The AA with the US is currently under discussion. Cooperation in nuclear energy between two countries could be further enhanced through reliable implementation of the NCA undertakings. Taking into account the unique features of the NCA, we need to establish effective strategy for fulfilling the obligation under the Agreement.

  14. PLACING INDIA IN THE EMERGING REGIONAL DYNAMICS OF CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Meena Singh Roy

    2017-10-01

    Full Text Available The present article tries to examine India’s initiatives in the region in the context of the emerging regional geo-strategic landscape. With an aim to enhance political, economic and strategic ties, India’s policy towards the region has moved from ‘Look North’ to ‘Connect North’. Notably, the full membership of SCO offers India greater synergies to play a more active role in the region. India is, thus, all set to build more meaningful partnerships with the region in the context of new geo-political changes shaping Central Asia. More importantly, the region is seeking India to play a more active role. It is argued that the beginning of a new era of cooperation initiated by PM Modi can only be sustained if New Delhi continues to implement its various agreements and commitments. While building stronger bilateral ties with the region is important, working closely in the regional groupings will also help address regional economic and security challenges

  15. Regional Labour Court Baden-Wuerttemberg (Mannheim), decision of November 24, 1986 (co-determination in matters of security control)

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    In its decision of November 24, 1986, the Regional Court of Baden-Wuerttemberg deals with the direction of security controls in nuclear research plants. The co-determination of the works council in this field is excluded, if the operator is directed by the licensing authority to carry out these controls pursuant to an obligation of the operating licence according to sec. 7 and sec. 17 of the Atomic Energy Act. With regard to the security purpose in sec. 1 no. 2 Atomic Energy Act only the operator is competent to make decisions in these cases. (WG) [de

  16. Ownership Networks Effects on Secured Borrowing

    NARCIS (Netherlands)

    Martinez, Constanza; Cizek, Pavel; Leon Rincon, Carlos

    2018-01-01

    The secured borrowing based on sell/buy-backs agreements is studied, specifically considering both: quantity and price. The empirical evidence presented in this paper suggests that, after controlling for specific individual characteristics, group-specific effects (defined by belonging or not to a

  17. Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

    Directory of Open Access Journals (Sweden)

    Hung-Yu Chien

    2015-01-01

    Full Text Available Authenticated Diffie-Hellman key agreement (D-H key is the de facto building block for establishing secure session keys in many security systems. Regarding the computations of authenticated D-H key agreement, the operation of modular exponentiation is the most expensive computation, which incurs a heavy loading on those clients where either their computational capacities or their batteries are limited and precious. As client’s privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client’s identity privacy. This paper proposes a new problem: the modified elliptic curves computational Diffie-Hellman problem (MECDHP and proves that the MECDHP is as hard as the conventional elliptic curves computational Diffie-Hellman problem (ECDHP. Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client’s anonymity from outsiders. This new scheme is attractive to those applications where the clients need identity protection and lightweight computation.

  18. Northern Security and Global Politics

    DEFF Research Database (Denmark)

    This book takes a comprehensive approach to security in the Nordic-Baltic region, studying how this region is affected by developments in the international system. The advent of the new millennium coincided with the return of the High North to the world stage. A number of factors have contributed......-unipolar", indicating a period of flux and of declining US unipolar hegemony. Drawing together contributions from key thinkers in the field, Northern Security and Global Politics explores how this situation has affected the Nordic-Baltic area by addressing two broad sets of questions. First, it examines what impact...... declining unipolarity - with a geopolitical shift to Asia, a reduced role for Europe in United States policy, and a more assertive Russia - will have on regional Nordic-Baltic security. Second, it takes a closer look at how the regional actors respond to these changes in their strategic environment...

  19. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  20. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  1. Amazon rainforest modulation of water security in the Pantanal wetland.

    Science.gov (United States)

    Bergier, Ivan; Assine, Mario L; McGlue, Michael M; Alho, Cleber J R; Silva, Aguinaldo; Guerreiro, Renato L; Carvalho, João C

    2018-04-01

    The Pantanal is a large wetland mainly located in Brazil, whose natural resources are important for local, regional and global economies. Many human activities in the region rely on Pantanal's ecosystem services including cattle breeding for beef production, professional and touristic fishing, and contemplative tourism. The conservation of natural resources and ecosystems services provided by the Pantanal wetland must consider strategies for water security. We explored precipitation data from 1926 to 2016 provided by a regional network of rain gauge stations managed by the Brazilian Government. A timeseries obtained by dividing the monthly accumulated-rainfall by the number of rainy days indicated a positive trend of the mean rate of rainy days (mm/day) for the studied period in all seasons. We assessed the linkage of Pantanal's rainfall patterns with large-scale climate data in South America provided by NOAA/ESRL from 1949 to 2016. Analysis of spatiotemporal correlation maps indicated that, in agreement with previous studies, the Amazon biome plays a significant role in controlling summer rainfall in the Pantanal. Based on these spatiotemporal maps, a multi-linear regression model was built to predict the mean rate of summer rainy days in Pantanal by 2100, relative to the 1961-1990 mean reference. We found that the deforestation of the Amazon rainforest has profound implications for water security and the conservation of Pantanal's ecosystem services. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. The Development Standard Agreement Influences on National and International Business Practices

    Directory of Open Access Journals (Sweden)

    Cindawati Cindawati

    2016-12-01

    Full Text Available The rapidly growing business traffic either nationally or internationally forces the business practices to establish a standard agreement to secure the products and to protect the buyer from any risks. The standard agreement successfully meets the demand of international trade which urgently need the high speed and the accuracy. The objective of this research is to find out how does the development of agreement affect to the commerce practices and what are the requirements of standard agreement in accordance with the right and obligation. A qualitative method is applied in searching data of business practices. This study uses a normative research which guides the rule of law or determines some business standards and norms. The finding of this study show that the development of agreement strongly affects to the commerce practices, and standar agreement is urgently needed by business practices as a guideline to perform business traffic as smooth as buyer and seller expect, then both seller and buyer should know the three alternative way used as the procedures of standard agreement, namely; contract signing, notification document agreement, and notification by bulletin board. At last, a standard agreement could be accepted as legal agreement corresponding to willingness and trustworthy.

  3. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  4. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  5. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  6. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  7. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  8. Air pollution reduction and control in south asia need for a regional agreement

    International Nuclear Information System (INIS)

    Khwaja, M.A.; Shaheen, N.; Sherazi, A.; Shaheen, F.H.

    2012-01-01

    With increasing urbanization and economic growth, air pollution is becoming an urgent concern in South Asia. The objective of this study is to look into and discuss the socioeconomic situation of South Asia, the existing situation of air pollution in the countries of the region, resulting health impacts of air pollution on the population and the responses, if any, of national governments to combat this problem. With the increase in industrial activity and exponential growth in number of vehicles and population, the contribution of each South Asian country to the regional air pollution will increase over time. As evident from the review of the available country data, sulfur dioxides, nitrogen oxides and particulate matter (PM) emissions have been rising steadily over past few decades. The air pollutants can be transported across state and national boundaries, therefore, pollutants produced by one country can, as well, have adverse impacts on the environment and public health of neighboring countries. It has been reported by the country national health authorities that air pollution has pushed respiratory diseases up in the ranks as the leading cause of hospitalization. To minimize the socio-economic and health impacts, resulting from air pollution, South Asian states have developed environmental legal and regulatory frameworks in their respective countries. However, the implementation of country national environmental action plan has been limited due to lack of financial resources and technical know-how. Recommendations have been made for policy actions, including a legally binding agreement for South Asia (LBA-SA), for strengthening the framework for air pollution reduction at regional and national levels in South Asia. (author)

  9. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  10. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Directory of Open Access Journals (Sweden)

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  11. Introduction To U.S. Free Trade Agreements

    Directory of Open Access Journals (Sweden)

    Gantz David A.

    2016-12-01

    Full Text Available This introduction explores the historical changes in the trade policies of the United States (U.S., namely, the shift from the support of multilateral rules to the embracement of regional trade agreements and provides an overview of the political and economic considerations behind the conclusion of the major U.S. free trade agreements.

  12. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  13. What are the determinants of food security among regional and remote Western Australian children?

    Science.gov (United States)

    Godrich, Stephanie L; Davies, Christina R; Darby, Jill; Devine, Amanda

    2017-01-22

    To explore how determinants of food security affect children in regional and remote Western Australia (WA), across food availability, access and utilisation dimensions. The Determinants of Food Security framework guided the thematic analysis (using NVivo 10) of semi-structured interviews with 20 key informants. Food availability factors included availability, price, promotion, quality, location of outlets and variety. Food access factors included social support, financial resources, transport to food outlets, distance to food outlets and mobility. Food utilisation factors included nutrition knowledge and skills, children's food preferences, storage facilities, preparation and cooking facilities and time to purchase food. Key food availability recommendations include increasing local food supply options. Food access recommendations include ensuring equitable formal social support and empowering informal support options. Food utilisation recommendations include prioritising food literacy programs focusing on quick, healthy food preparation and budgeting skills. Implications for public health: Policymakers should invest in local food supply options, equitable social support services and experiential food literacy programs. Practitioners should focus child/parent programs on improving attitude, knowledge and skills. © 2017 Public Health Association of Australia.

  14. Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

    Directory of Open Access Journals (Sweden)

    Juan Qu

    2014-01-01

    Full Text Available A password authentication scheme using smart card is called two-factor authentication scheme. Two-factor authentication scheme is the most accepted and commonly used mechanism that provides the authorized users a secure and efficient method for accessing resources over insecure communication channel. Up to now, various two-factor user authentication schemes have been proposed. However, most of them are vulnerable to smart card loss attack, offline password guessing attack, impersonation attack, and so on. In this paper, we design a password remote user authentication with key agreement scheme using elliptic curve cryptosystem. Security analysis shows that the proposed scheme has high level of security. Moreover, the proposed scheme is more practical and secure in contrast to some related schemes.

  15. Technical cooperation for the pacific uses of nuclear technology in Latin America and Caribbean: the experience of regional agreement ARCAL

    International Nuclear Information System (INIS)

    Rondinelli Junior, Francisco

    2017-01-01

    This thesis studies the international technical cooperation in the field of peaceful applications of the nuclear technology, focusing on the experience of Latin American countries, where the Cooperation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean, also known as ARCAL, is in force. The study adopts as theoretical approach the concept of state capacities, particularly with regard to the institutional capacities applicable to the ARCAL Agreement. Within this approach, three dimensions of analysis are adopted: the institutional dimension, the governance dimension and the focus on outcomes. The evaluation of the ARCAL Agreement is carried out in order to confirm if the intended role to promote regional technical cooperation in the nuclear sector is being implemented. The methodological approach adopted the case study model. It starts with the analysis of the institutional evolution of the Agreement, and identifies variables articulating with the three dimensions above mentioned. The empirical data were collected in two stages. In the first stage it were performed 29 interviews carried out by the author with the technical and staff members of the Department of Technical Cooperation of IAEA, in Vienna, Austria, headquarter of IAEA. The other stage involved an electronic questionnaire submitted to the national coordinator of ARCAL in 14 countries, in a universe of 21 member states. The conclusion of the research points to the fact that the ARCAL Agreement has incorporated, throughout its trajectory, elements of the institutional capacities which are still in the process of development. They give to the Agreement the potential to induce the development of the state capacities of the respective countries in the field of peaceful applications of nuclear technology. (author)

  16. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  17. The Role of Vietnam in The ASEAN Regional Security Cooperation: From Mechanism Construction to Dispute Settlement

    Directory of Open Access Journals (Sweden)

    Li Chunxia

    2016-12-01

    Full Text Available In the context of the integration of ASEAN, Vietnam recognized that the strategic role of ASEAN is in its diplomacy. At the same time, to further improve the status in the region and in the international community, Vietnam has actively been participating in ASEAN affairs. Vietnam not only promoted the integration process of ASEAN, but also promoted the political security cooperation of ASEAN, in which Vietnam has advantages and wants to play a leading role. On the one hand, Vietnam promotes the construction of political security cooperation mechanisms, such as ARF, ADMM+, and so on; on the other hand, Vietnam took the South China Sea as a common concern, actively appeals for a common ASEAN position, to maximize its own benefit. Vietnam will further enhance and consolidate its status and role in ASEAN in the future.

  18. Agreement for the Establishment in Cairo of a Middle Eastern Regional Radioisotope Centre for the Arab Countries. Acceptances of the Agreement and Pledges of Additional Contributions to the Centre. Information Received up to 31 December 1963

    International Nuclear Information System (INIS)

    1964-01-01

    The Government of the United Arab Republic, the Host State of the Middle Eastern Regional Radioisotope Centre for the Arab Countries, has notified the Agency that on the dates shown the following Arab States deposited with the Government instruments of acceptance of the Agreement establishing the Centre

  19. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  20. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  1. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    National Research Council Canada - National Science Library

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  2. Globalisation, Geopolitics and Energy Security in Central Eurasia and the Caspian Region

    International Nuclear Information System (INIS)

    Amineh, Parvizi Mehdi

    2003-01-01

    The demise of the Soviet Union and its subsequent break-up into 15 independent states gave rise to totally new political and strategic circumstances, which also extended into Central Eurasia and the Caspian Region. The eight newly independent states of this region have become one of the most important geopolitical areas in the post-Cold War era, due to a combination of its geographical position and significant oil and gas reserves. The region's resources are vital for advanced industrialised countries and figure prominently in Western geostrategic and economic interests in the twenty-first century. Intense competition, as well as co-operation, among various state and non-state actors for the control of these resources is emerging, also known as the New Great Game. The main actors involved in Central Eurasia and the Caspian region are identified as follows: inner circle actors (Russia, Iran, and Turkey), outer circle actors (China, India, Pakistan, and Afghanistan), external actors (the United States, the European Union and its particular member states), and non-state actors (ethno-religious groups, Transnational Corporations, crime groups, etc.). The author analyses the New Great Game by using a neo-geopolitical perspective. An important element towards control of the region's energy resources is the construction of transport routes. The question of where to construct pipelines engenders considerable conflicts between the interested players that could create obstacles to building the most economically viable and secure pipelines. Transportation of energy resources to the global market is also subject to conflicts between different forces within the Central Eurasian region, including ethno-religious conflicts. Problems such as lack of infrastructure and technology, and finding a solution for the Caspian legal regime dispute could pose further obstacles to prospective pipeline construction. The book analyses these and other important local and geopolitical aspects to

  3. Globalisation, Geopolitics and Energy Security in Central Eurasia and the Caspian Region

    Energy Technology Data Exchange (ETDEWEB)

    Amineh, Parvizi Mehdi

    2003-07-01

    The demise of the Soviet Union and its subsequent break-up into 15 independent states gave rise to totally new political and strategic circumstances, which also extended into Central Eurasia and the Caspian Region. The eight newly independent states of this region have become one of the most important geopolitical areas in the post-Cold War era, due to a combination of its geographical position and significant oil and gas reserves. The region's resources are vital for advanced industrialised countries and figure prominently in Western geostrategic and economic interests in the twenty-first century. Intense competition, as well as co-operation, among various state and non-state actors for the control of these resources is emerging, also known as the New Great Game. The main actors involved in Central Eurasia and the Caspian region are identified as follows: inner circle actors (Russia, Iran, and Turkey), outer circle actors (China, India, Pakistan, and Afghanistan), external actors (the United States, the European Union and its particular member states), and non-state actors (ethno-religious groups, Transnational Corporations, crime groups, etc.). The author analyses the New Great Game by using a neo-geopolitical perspective. An important element towards control of the region's energy resources is the construction of transport routes. The question of where to construct pipelines engenders considerable conflicts between the interested players that could create obstacles to building the most economically viable and secure pipelines. Transportation of energy resources to the global market is also subject to conflicts between different forces within the Central Eurasian region, including ethno-religious conflicts. Problems such as lack of infrastructure and technology, and finding a solution for the Caspian legal regime dispute could pose further obstacles to prospective pipeline construction. The book analyses these and other important local and geopolitical

  4. 7 CFR 1980.333 - Promissory notes and security instruments.

    Science.gov (United States)

    2010-01-01

    ... promissory notes, real estate mortgages, including deeds of trust and similar instruments, and security... Interest Assistance Agreement, assure that the closing agent properly records a junior mortgage or deed of...

  5. Black Sea Energy Security - Present and Future

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available We chose this theme to highlight the need for continuous and sustained human society to secure energy resources needed to survive, needs reflected in an increasingly in recent years in the strategies adopted at both states, as at the level of international organizations. Achieving security and stability in the wider Black Sea area has been among the priorities of each country's interests in this region. In this context, state and non-state actors were being called to come up with new solutions to achieve those interests. Certainly not in all cases the negotiations were completed or not yet found a generally accepted formula for others to apply, but most of them show off their values. The main environmental threats to security environment in the Black Sea region are represented by ethnic conflicts and territorial secessionism. A significant contribution to the security environment of the Black Sea region has the phenomenon of globalization, which in this region is manifested by a steady increase in traffic and volume of shipping passage of communication, which largely affects the security in the region. Globalization and the need for energy resources in the Black Sea was an important area not only as energy transport route, but as a potential supplier of material energy (oil and natural gas. Black Sea Basin can be stabilized and secured only by the will and input from all States and interested international organizations in pragmatic and effective institutional frameworks, meant to promote and protect the common interests of countries decided to participate in actions aimed at ensuring a stable environment security.

  6. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  7. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  8. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  9. Health care agreements as a tool for coordinating health and social services

    DEFF Research Database (Denmark)

    Rudkjøbing, Andreas; Strandberg-Larsen, Martin; Vrangbaek, Karsten

    2014-01-01

    of general practitioners (n = 700/853). RESULTS: The health care agreements were considered more useful for coordinating care than the previous health plans. The power relationship between the regional and municipal authorities in drawing up the agreements was described as more equal. Familiarity......INTRODUCTION: In 2007, a substantial reform changed the administrative boundaries of the Danish health care system and introduced health care agreements to be signed between municipal and regional authorities. To assess the health care agreements as a tool for coordinating health and social...... with the agreements among general practitioners was higher, as was the perceived influence of the health care agreements on their work. DISCUSSION: Health care agreements with specific content and with regular follow-up and systematic mechanisms for organising feedback between collaborative partners exemplify...

  10. Secure Degrees of Freedom Regions of Multiple Access and Interference Channels: The Polytope Structure

    OpenAIRE

    Xie, Jianwei; Ulukus, Sennur

    2014-01-01

    The sum secure degrees of freedom (s.d.o.f.) of two fundamental multi-user network structures, the K-user Gaussian multiple access (MAC) wiretap channel and the K-user interference channel (IC) with secrecy constraints, have been determined recently as K(K-1)/(K(K-1)+1) [1,2] and K(K-1)/(2K-1) [3,4], respectively. In this paper, we determine the entire s.d.o.f. regions of these two channel models. The converse for the MAC follows from a middle step in the converse of [1,2]. The converse for t...

  11. Emerging Regional Energy Security Issues China

    Science.gov (United States)

    2009-09-29

    moving toward European standards and taxation of least efficient vehicles www.csis.org | 7 China’s Energy Strategy - Clean Power Generation...Project Type of Contract Signature Date Estimated Value Contractor(s) Remarks Malaysian Amona (Main Contractor), Chinese COSL and CNOOC The first...infrastructure. List of Upstream Agreements Between Iran and China in Recent Years ** The original buyback contract w as signed betw een Malaysian Amona and

  12. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  13. Harmonization between a Framework of Multilateral Approaches to Nuclear Fuel Cycle Facilities and Bilateral Nuclear Cooperation Agreements

    Directory of Open Access Journals (Sweden)

    Makiko Tazaki

    2013-09-01

    Full Text Available One of primary challenges for ensuring effective and efficient functions of the multilateral nuclear approaches (MNA to nuclear fuel cycle facilities is harmonization between a MNA framework and existing nuclear cooperation agreements (NCA. A method to achieve such harmonization is to construct a MNA framework with robust non-proliferation characteristics, in order to obtain supplier states’, especially the US’s prior consents for non-supplier states’ certain activities including spent fuel reprocessing, plutonium storages and retransfers of plutonium originated in NCAs. Such robust characteristics can be accomplished by MNA member states’ compliances with International Atomic Energy Agency (IAEA Safeguards, regional safeguards agreements, international conventions, guidelines and recommendations on nuclear non-proliferation, nuclear security, safety, and export control. Those provisions are to be incorporated into an MNA founding agreement, as requirements to be MNA members in relation to NCAs. Furthermore, if an MNA facility is, (1 owned and operated jointly by all MNA member states, (2 able to conclude bilateral NCAs with non-MNA/supplier states as a single legal entity representing its all member states like an international organization, and (3 able to obtain necessary prior consents, stable, smooth, and timely supplies of nuclear fuel and services can be assured among MNA member states. In this paper, the authors will set out a general MNA framework and then apply it to a specific example of Europe Atomic Energy Community (EURATOM and then consider its applicability to the Asian region, where an establishment of an MNA framework is expected to be explored.

  14. Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hui He

    2016-01-01

    Full Text Available Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks. The trend of unknown network security events can be predicted through multitask learning of the occurrence and transmission characteristics of known network security events. Second, in case of lacking regional data, the quantitative trend of unknown regional network security events can be calculated. This study introduces a sensor network security event forecast method named Prediction Network Security Incomplete Unmarked Data (PNSIUD method to forecast missing attack data in the target region according to the known partial data in similar regions. Experimental results indicate that for an unknown security event forecast the forecast accuracy and effects of the similarity forecast algorithm are better than those of single-task learning method. At the same time, the forecast accuracy of the PNSIUD method is better than that of the traditional support vector machine method.

  15. Monitoring the implementation of the State-Regional Council agreement 03/02/2005 as to the management of acute stroke events: a comparison of the Italian regional legislations.

    Science.gov (United States)

    Guidetti, Donata; Spallazzi, Marco; Rota, Eugenia; Morelli, Nicola; Immovilli, Paolo; Toni, Danilo; Baldereschi, Marzia; Di Carlo, Antonio; Polizzi, Bianca M; Ferro, Salvatore; Inzitari, Domenico

    2013-09-01

    Access to effective acute stroke services is a crucial factor to reduce stroke-related death and disability, but is limited in different parts of Italy. Our study addresses this inequality across the Italian regions by examining the regional legislations issued to adopt and implement the State-Regional Council agreement 03/02/2005 as to the acute stroke management. All decrees and resolutions as to acute stroke were collected from each region and examined by the means of a check list including quantitative and qualitative characteristics, selected in accordance with the recommendations from the State-Regional Council document. Each completed check list was then sent to each regional reference person, who filled in the section on the implementation of the indications and compliance, with the collaboration of stroke specialists if necessary. The study was carried out from November 2009 to September 2010. The documents and information were collected from 19 regions. Our survey revealed disparities both in terms of number of decrees and resolutions and of topics covered by the regional legislations about stroke care. Most legislations lacked practical and economical details. This feedback from national and regional stroke regulations revealed a need of more concrete indications. Involvement of various stakeholders (legislators, consumers, providers) might possibly ensure that policies are actually adopted, implemented and maintained. Although considerable challenges are present to the development of standard and optimal stroke care more widely across Italian regions, the potential gains from such developments are substantial.

  16. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  17. The role of unattended ground sensors (UGS) in regional confidence building and arms control

    Energy Technology Data Exchange (ETDEWEB)

    Vannoni, M.; Duggan, R.

    1997-03-01

    Although the Cold War has ended, the world has not become more peaceful. Without the stability provided by an international system dominated by two super-powers, local conflicts are more likely to escalate. Agreements to counter destabilizing pressures in regional conflicts can benefit from the use of cooperative monitoring. Cooperative monitoring is the collecting, analyzing, and sharing of information among parties to an agreement. Ground sensor technologies can contribute to the collection of relevant information. If implemented with consideration for local conditions, cooperative monitoring can build confidence, strengthen existing agreements, and set the stage for continued progress. This presentation describes two examples: the Israeli-Egyptian Sinai agreements of the 1970s and a conceptual example for the contemporary Korean Peninsula. The Sinai was a precedent for the successful use of UGS within the context of cooperative monitoring. The Korean Peninsula is the world`s largest military confrontation. Future confidence building measures that address the security needs of both countries could decrease the danger of conflict and help create an environment for a peace agreement.

  18. Form Characteristics of Regional Security Organizations - The Missing Link in the Explanation of the Democratic Peace

    OpenAIRE

    Dembinski, Matthias; Freistein, Katja; Weiffen, Brigitte

    2006-01-01

    This paper contributes both to the debate on the effects of regional security organizations and to the debate on democratic peace. It argues that even if international organizations as such may not be able to influence the conflict behavior of their member states, the subgroup of interdemocratic institutions is well suited to do so. The form of interdemocratic institutions differs in two significant respects from the form of traditional institutions: they are more densely connected via transn...

  19. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  20. Security in the Americas: Neither Evolution Nor Devolution-Impasse

    National Research Council Canada - National Science Library

    Manwaring, Max

    2004-01-01

    Contemporary security and stability are fragile in the Western Hemisphere. As a corollary, an insecure and unstable hemisphere threatens regional national security and sovereignty, regional economic and socio-political development, U.S...

  1. The International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    2011-01-01

    The term 'nuclear security' is generally accepted to mean 'the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material, other radioactive substances or their associated facilities.' While the ultimate responsibility for nuclear security within a State rests entirely with that State, the need for regional and international cooperation has become increasingly evident with the growing recognition that the ability to prevent, detect and respond to the threats to nuclear security within one State is affected by the adequacy and effectiveness of nuclear security measures taken by other States, particularly when nuclear material is transported across national frontiers. Since the early 1970s, the IAEA has been called upon to play an ever increasing role in assisting States, upon request, to strengthen their national legal infrastructures and physical protection systems, as well as to facilitate regional and international efforts to enhance nuclear security, including measures to protect against nuclear terrorism. This publication brings together the legally binding primary international instruments and the internationally accepted non-binding instruments that constitute the international legal framework for nuclear security. It does not discuss the safety and safeguards related instruments, which also form a part of the broader legal framework for nuclear security. By setting out the legislative bases for the mandate of the IAEA in the area of nuclear security, it is hoped that this publication will increase awareness of the IAEA's role in facilitating national, regional and international efforts to enhance nuclear security , including measures to protect against nuclear terrorism. It is also intended to serve as a guide in carrying out the IAEA's nuclear security mandate and functions assigned to it under these instruments, including in the elaboration of nuclear security

  2. 34 CFR 668.150 - Agreement between the Secretary and a test publisher.

    Science.gov (United States)

    2010-07-01

    ... ability and facilities to keep its test secure against disclosure or release; (3) Decertify a test... test, provide the test administrator with software that will: (i) Immediately generate a score report... 34 Education 3 2010-07-01 2010-07-01 false Agreement between the Secretary and a test publisher...

  3. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  4. An improved authenticated key agreement protocol for telecare medicine information system.

    Science.gov (United States)

    Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin

    2016-01-01

    In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.

  5. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  6. Information security knowledge sharing in organizations : Investigating the effect of behavioral information security governance and national culture

    OpenAIRE

    Rocha Flores, Waldo; Antonsen, Egil; Ekstedt, Mathias

    2014-01-01

    This paper presents an empirical investigation on what behavioral information security governance factors drives the establishment of information security knowledge sharing in organizations. Data was collected from organizations located in different geographic regions of the world, and the amount of data collected from two countries – namely, USA and Sweden – allowed us to investigate if the effect of behavioral information security governance factors on the establishment of security knowledg...

  7. Impact of climate change on food security in southwest coastal region of bangladesh

    International Nuclear Information System (INIS)

    Islam, S.; Rahman, A.

    2014-01-01

    This paper examines the impact of climate change on food security of the population residing in the coastal area of Bangladesh. Based on multistage random sampling technique, a survey was conducted to collect socioeconomic and food datasets of the people affected by extreme climate events in the country. The study found that climate change caused food insecurity in the region; it led to greater dependence on pond and rain water for cooking food and water intake. Catastrophe due to extreme weather events adversely affected the livelihoods and level of income. The severe cyclonic storms, Sidr (November 2007) and Alia (May 2009) severely affected the vulnerable people of this region, especially the extremely poor. The study came out with several coping strategies to address adverse effects of climate change, including rehabilitation with income and employment generating activities and development training; alternative livelihood adaptation practices; access to subsidized inputs and credits; introduction of crop calendar; conservation of arable and fellow land; and innovation of saline-tolerant, heat-resistant, moderate water consuming and short-rotation crops for the coastal people. (author)

  8. New government to make social security cutbacks

    NARCIS (Netherlands)

    Grünell, M.

    2003-01-01

    In May 2003, a new coalition government of the Christian Democrats and two liberal parties, VVD and D66, took office in the Netherlands. The parties' coalition agreement provides for major cutbacks in public spending, largely targeted on social security expenditure. The trade unions are fiercely

  9. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  10. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  11. Transparency in armaments, regional dialogue and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. Within this framework, a Conference on the theme 'Transparency in armaments, regional dialogue and disarmament' was held in Hiroshima, Japan. The Conference, the second one held in Hiroshima on disarmament issues, was organized by the Centre for Disarmament Affairs through the Regional Centre for Peace and Disarmament in Asia and the Pacific and in collaboration with the Government of Japan and the Prefecture and City of Hiroshima. This publication is based on material presented at that Conference

  12. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it

  13. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [es

  14. The Text of a Regional Co-operative Agreement for Research, Development and Training related to Nuclear Science and Technology. Latest Status. Declarations/Reservations

    International Nuclear Information System (INIS)

    1972-01-01

    The text of a Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology between the Agency and Member States is reproduced herein for the information of all Members. Section 9 thereof specifies the Members that may become party to it [fr

  15. EU Failing FAO Challenge to Improve Global Food Security.

    Science.gov (United States)

    Smyth, Stuart J; Phillips, Peter W B; Kerr, William A

    2016-07-01

    The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. 20 CFR 408.1210 - What are the essential elements of an administration agreement?

    Science.gov (United States)

    2010-04-01

    ... administration agreement? 408.1210 Section 408.1210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1210... provide that recognition payments can only be made to individuals who are receiving SVB payments. (b...

  17. Left fronto-temporal dynamics during agreement processing: evidence for feature-specific computations.

    Science.gov (United States)

    Molinaro, Nicola; Barber, Horacio A; Pérez, Alejandro; Parkkonen, Lauri; Carreiras, Manuel

    2013-09-01

    Grammatical agreement is a widespread language phenomenon that indicates formal syntactic relations between words; however, it also conveys basic lexical (e.g. grammatical gender) or semantic (e.g. numerosity) information about a discourse referent. In this study, we focus on the reading of Spanish noun phrases, violating either number or gender determiner-noun agreement compared to grammatical controls. Magnetoencephalographic activity time-locked to the onset of the noun in both types of violation revealed a left-lateralized brain network involving anterior temporal regions (~220 ms) and, later in time, ventro-lateral prefrontal regions (>300 ms). These activations coexist with dependency-specific effects: in an initial step (~170 ms), occipito-temporal regions are employed for fine-grained analysis of the number marking (in Spanish, presence or absence of the suffix '-s'), while anterior temporal regions show increased activation for gender mismatches compared to grammatical controls. The semantic relevance of number agreement dependencies was mainly reflected by left superior temporal increased activity around 340 ms. These findings offer a detailed perspective on the multi-level analyses involved in the initial computation of agreement dependencies, and theoretically support a derivational approach to agreement computation. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. 20 CFR 416.2130 - Effect of the agreement and responsibilities of States.

    Science.gov (United States)

    2010-04-01

    ... for SSI benefits; (4) Setting up or running a State's system for requiring a person to pay part of the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Effect of the agreement and responsibilities of States. 416.2130 Section 416.2130 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL...

  19. Nonproliferation issues. Hearings before the Subcommittee on Arms Control, International Organizations and Security Agreements of the Committee on Foreign Relations, United States Senate, Ninety-Fourth Congress, First and Second Sessions

    International Nuclear Information System (INIS)

    Anon.

    1976-01-01

    Twelve days of hearings were held over an 18-month period to discuss issues relating to the Nonproliferation Treaty and its effectiveness. Nuclear weapons are no longer confined to those nations with economic and technical capability, a fact which jeopardizes the security of all nations. Critics of the treaty felt that it was more the result of maneuvering than negotiation. The committee examined issues raised by the Vladivostok Accords, which limits the nuclear arms race, promotes detente, and allows progress in arms control. Witnesses responded to criticism that the Accords (1) did not limit a qualitative arms race, (2) allowed both sides to modernize all 2,400 permitted delivery vehicles, (3) did not equalize throw weight, and (4) allow extensive new deployment of MIRV's, especially in the Soviet Union. Witnesses representing government, universities, industry, and foreign countries considered the range of weapons, safeguards and control agreements, estimates of war damage, and the Treaty's intended benefits of security assurance and information exchange

  20. World market or regional integration and food security in West Africa

    NARCIS (Netherlands)

    L.J. de Haan (Leo); A. Klaasse Bos (Andries); C. Lutz (Clemens)

    1994-01-01

    textabstractThe problem of food security in West Africa was put on the international agenda in 1974 at the international food conference in Rome following the Great Sahelian Drought of 1968-1973. In those years preoccupation with food security was limited mainly to the Sahel countries and

  1. Initiatives for regional dialogue consideration of regional disarmament guidelines

    International Nuclear Information System (INIS)

    Marschik, R.

    1994-01-01

    The General Assembly of the United Nations adopted guidelines and recommendations for regional approaches to disarmament within the context of global security. The guidelines contain 52 principles on: relationship between regional disarmament, arm limitation and global security; general guidelines and recommendations for regional disarmament efforts; possible ways and means to assist and implement these efforts; possible role of the United Nations in aiding these efforts. Experiences gained in Europe and Near East are analysed in the framework of the situation in Northeast, South and Southeast Asia

  2. Tri-party agreement databases, access mechanism and procedures. Revision 2

    International Nuclear Information System (INIS)

    Brulotte, P.J.

    1996-01-01

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc

  3. Getting to yes negotiating an agreement without giving in

    CERN Document Server

    Fisher, Roger; Patton, Bruce

    2012-01-01

    The worlds bestselling guide to negotiation Getting to Yes has been in print for over thirty years and in that time has helped millions of people secure winwin agreements both at work and in their private lives Including principles such as Dont bargain over positions Separate the people from the problem and Insist on objective criteria Getting to Yes simplifies the whole negotation process offering a highly effective framework that will ensure success

  4. Agreements

    International Nuclear Information System (INIS)

    2001-01-01

    These columns summarize the different bilateral and multilateral agreements concluded recently between the different OECD countries and concerning the nuclear energy domain: Argentina - Australia: Agreement concerning Co-operation in the Peaceful Uses of Nuclear Energy (2001). Argentina - Brazil: Joint Declaration regarding the Creation of the Argentinean-Brazilian Agency for Nuclear Energy Applications (2001). Australia - Czech Republic / Australia - Hungary: Agreements on Co-operation in Peaceful Uses of Nuclear Energy and the Transfer of Nuclear Material (2001). Australia - Indonesia: Arrangement Concerning Co-operation on Nuclear Safeguards and Related Matters (2001). Austria - Switzerland: Agreement on the Early Exchange of Information in the Field of Nuclear Safety and Radiation. Brazil - United States: Extension of the Agreement concerning Research and Development in Nuclear Material Control, Accountancy, Verification, Physical Protection, and Advanced Containment and Surveillance Technologies for International Safeguards Applications (2001). Czech Republic - Republic of Korea: Agreement for Co-operation in the Peaceful Uses of Nuclear Energy (2001). European Union- Russian Federation: Agreements on Nuclear Safety and Controlled Nuclear Fusion (2001). France - United States: Agreement for Co-operation in Advanced Nuclear Reactor Science and Technology (2001). Japan - United Kingdom: Co-operation Agreement on Advanced Nuclear Fuel Cycle, Fast Breeder Reactor and Other Related Technologies (2001). Republic OF Korea - United States: Annex IV Joint Project on Cintichem Technology (2000). Morocco - United States: Protocol amending the Co-operation Agreement on the Peaceful Uses of Nuclear Energy (2001). Multilateral Agreements: Agreement for Information Exchange on Radiological Surveillance in Northern Europe (2001). Status of Conventions in the Field of Nuclear Energy. (author)

  5. Triple Helix Model as an Efficient Mechanism of Food Security Provision in Regional Economic Entities and the Economic System as a Whole

    Directory of Open Access Journals (Sweden)

    Mihail N. Dudin

    2014-08-01

    Full Text Available The leading countries of the world consider food security the important condition of internal political and social-economic stability of the state and its external independence. The topic of the article is crucial due to the fact that the problem of food security is rather complicated and multilevel and should be considered at different interrelated hierarchical levels. In this context the efficient model of food security is the result of the permanent dialogue between the representatives of the state government, business entities, social organizations and scientific institutions. The article justifies the fact that the model of innovation development, known as ‘the triple helix model’ should be applied at the modern stage of economic development as an efficient tool for the food security provision, which can be implemented in the activity of regional economic entities and the whole economic system of the Russian Federation.

  6. Land Ecological Security Evaluation of Guangzhou, China

    Directory of Open Access Journals (Sweden)

    Linyu Xu

    2014-10-01

    Full Text Available As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES, has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES level decreased from 0.2 (marginal security to −0.18 (marginal insecurity as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.

  7. Land ecological security evaluation of Guangzhou, China.

    Science.gov (United States)

    Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun

    2014-10-15

    As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.

  8. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  9. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  10. Inter-relations between regional and global approaches to nuclear non-proliferation

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    It is now becoming evident that the end of the East-West conflict has had a significant effect upon both global and regional security structures. From a situation where regional arrangements were, in the main, determined and driven by pressures arising from the bipolar division which permeated all aspects of the global political system, they increasingly have an independent existence. This has enabled such arrangements to be tailored to local circumstances in a manner which is not possible with global agreements. In particular, it has become apparent that enhanced constraints on peaceful nuclear activities and much more intrusive inspection and monitoring procedures, can more easily be negotiated on a regional basis than a global one. It also appears that nuclear weapon states are prepared to make unconditional commitments about nuclear weapon use on a regional basis, whereas they may not be prepared to do so on a global one. In short, regional approaches enable fine-tuning of the international non-proliferation regime to occur, and for measures to be taken on a regional level that would be politically unacceptable on the global level, due to their discriminatory nature. In the years ahead additional Nuclear-Weapon-Free Zone (NWFZ) agreements may be negotiated, covering more of the land area of the globe. In parallel, regional nuclear cooperation and safeguarding agreements might also be expected to develop along the lines of EURATOM and ABACC. This in turn may move the states which remain outside of the NPT to a similar position to Argentina and Brazil at the moment: to an acceptance that whatever their opposition in principle to the NPT and the system of supplier export guidelines, the commitments they have already accepted on a regional level are more intrusive and constraining than those they would incur if they were to have acceded to the Treaty. In these circumstances, accession to the NPT becomes a distinct possibility, and thus the regional approach to non

  11. Effect of Policy Interventions on Food Security in Tigray, Northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Anne van der Veen

    2011-03-01

    Full Text Available Following the design of a conservation-based agricultural development strategy and food security strategy, the Tigray government has implemented different pro-poor development programs over the past years to address the problems of food security. This study attempts to investigate the effectiveness of government policy interventions at different scales addressed to improve food security. Food security both at the regional and district level was investigated by deriving food balance sheets for the period 2000-2008. An empirical analysis based on a logit model was also employed to analyze household level food security status. The results of the logit model reveal that government policy interventions such as water harvesting schemes, employment generation schemes, and promotion of technology adoption significantly contribute to a higher likelihood of household food security status. The findings of the food balance sheet also indicate that the region has made some impressive development gains in improving regional food self-sufficiency, indicating the importance of government interventions in improving food security both at the household and regional level.

  12. 78 FR 9406 - Southwest Louisiana Area Maritime Security Regional Sub-Committee; Vacancies

    Science.gov (United States)

    2013-02-08

    ..., review, update, and exercising of the Area Maritime Security (AMS) Plan for their area of responsibility... port stakeholders having a special competence in maritime security; and port stakeholders affected by...

  13. ExxonMobil and QGPC sign EGU agreement

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    ExxonMobil Middle East Gas Marketing Ltd., an Exxon Mobil Corporation subsidiary, and Qatar General Petroleum Corporation (QGPC) announced on May 2 that they have signed a Development and Production Sharing Agreement (DPSA) for the Enhancement Gas Utilization (EGU) project. Under the EGU project, additional North Field gas will be developed for pipeline sales to domestic projects and regional gas exports. The signing ceremony was attended by HE Abdulla Bin Hamad Al Attiyah, Minister of Energy, Industry, Electricity and Water and Chairman of QGPC, Mr Lucio A. Noto, Vice Chairman, Exxon Mobil Corporation, and Mr Harry J. Longwell, Senior Vice President, Exxon Mobil Corporation. The signing of the agreement follows the signing of the Heads of Agreement (HOA) for the project i December 1998. The EGU project will produce gas from the North Field with nominal capacity of 1.75 billion cubic feet per day (1.75 BCFPD) of gas sales to supply domestic demand and export to regional markets. The project will also produce condensate, butane and propane for export, as well as ethane for feedstock to future petrochemical ventures. (author)

  14. Korea’s Trade Strategies for Mega Free Trade Agreements in Regional and Global Economic Integration

    Directory of Open Access Journals (Sweden)

    Sang-Chul Park

    2016-12-01

    Full Text Available Korea has developed rapidly since the 1960s. It is one of the four Asian tiger economies and a good model for developing countries. Korea shows the world how a developing country can develop its economy rapidly and become industrialized. Its development strategy has mainly been an export-oriented trade policy. As a result, its trade volume grew from $1 billion in 1966 to $1 trillion in 2011, which is a 1,000-fold increase within five decades. Since 2011, Korea has become one of seven countries with a trade volume over $1 trillion. However, the Korean economy has experienced turbulence as well as positive growth. It underwent severe economic crises such as the Asian financial crisis in 1997 and the global financial crisis in 2008. Its economy has been extremely vulnerable to the external economic environment, although it has improved and strengthened, particularly since the global financial crisis. During those two crises, the government carried out an appropriate trade policy with a strategic approach to upgrade its industrial structure and competitiveness in global markets. This article comprehensively discusses Korean trade policy and strategy over the last five decades, and how its national economy has developed rapidly. It also explores how the government sets its strategic targets in Asia and the Asia Pacific region. It considers two mega free trade agreements (FTAs — the Regional Comprehensive Economic Partnership and the Trans-Pacific Partnership — as new opportunities for further development. Therefore, it is wise to analyze these regional mega FTAs in order to maximize the national interest.

  15. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  16. Development of Innovative Component for the Region’s Economic Security

    Directory of Open Access Journals (Sweden)

    Irina Markovna Golova

    2017-12-01

    Full Text Available This article studies the development of innovative component for the region’s economic security. The hypothesis of the study is that in the context of globalization and development of network society, innovation is becoming one of the key elements ensuring the economic security of a region. We considered the relationship between the concepts of sustainable development and economic security. The authors show that currently, the economic security of the country directly depends on its place within the innovation chain. We substantiate that Russian Federation and its regions need to shift to the innovation development based on strengthening its own sources for long-term growth. The paper considers the basic theoretical and methodological problems in the formation of innovation component of the Russian regions’ economic security. We reveal the major essence and elements of the innovative component of the sustainable economic development of the region. The authors show that the formation of the innovative component of the region’s economic security demands the correlation of the strategy of regional innovation development and the production and technological type of territory. Additionally, this strategy should correlate with the desirable ways of production type transformation in the future, considering the trends of the world economy. We have highlighted the production and technological types of Russian regions as well as identified the features of relevant regional components for the innovation system of the Russian Federation to ensure sustainable development. The study defines the priority directions and goals for the development of economic security innovative component in the Russian regions. The authors’ calculations allowed to select a group of territorial subjects of the Russian Federation, which appear to be the most promising for the development of innovative activities for the elaboration of export-oriented high-tech industries

  17. Enabling food security by verifying agricultural carbon

    DEFF Research Database (Denmark)

    Kahiluoto, H; Smith, P; Moran, D

    2014-01-01

    Rewarding smallholders for sequestering carbon in agricultural land can improve food security while mitigating climate change. Verification of carbon offsets in food-insecure regions is possible and achievable through rigorously controlled monitoring......Rewarding smallholders for sequestering carbon in agricultural land can improve food security while mitigating climate change. Verification of carbon offsets in food-insecure regions is possible and achievable through rigorously controlled monitoring...

  18. Free Trade Regional Agreements and Human Rights: the case of TPP and its impact in Chile

    Directory of Open Access Journals (Sweden)

    Juan Carlos Lara

    2016-08-01

    Full Text Available The negotiation and signature of free trade agreements has been a policy implemented by governments of many countries with economies open to international trade. Chile has been part of that trend, with a recent example in the signature of the Trans-Pacific Partnership Agreement. However, the content of such agreements is not exclusively related to conditions of trade between countries. In fact, this kind of agreement include progressively normative content of local nature, which are discussed and negotiated under much different conditions that local law or agreements signed in international forums. This implies consequences not only in the content of fundamental rights affected by the rules set in the agreements, but also in the shape that such rights are recognised and configured by democratic States.

  19. 15 CFR 2008.18 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Information Security Oversight Committee. 2008.18 Section 2008.18 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF...

  20. Perspectives of Security Ensuring within the Framework of Barcelona Process

    Directory of Open Access Journals (Sweden)

    T N Kirabaev

    2009-06-01

    Full Text Available Barcelona process was aimed to become an important mechanism in the realization of ideas of peace, stability and security ensuring in the Mediterranean Sea region. Cooperation in the sphere of security ensuring means openness of the regional states, social and economic reforms, human rights protection. The article deals with the problem of security ensuring by nonmilitary means.

  1. Report on Symposium on Pacific Energy Cooperation 2001. Energy Security in Asian Region; Taiheiyo energy kyoryoku kaigi 2001 hokokusho. Asia chiiki no energy anzen hosho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-02-20

    The Symposium on Pacific Energy Cooperation (SPEC), which started in 1986 to discuss energy problems and international cooperation on energy in the Pacific region, met for 2001 in Tokyo on February 20 and 21, 2001, to discuss Energy Security in Asian Region. The conference comprised two keynote addresses, four sessions, and a panel discussion. Twenty-four countries and an international organization were represented by a total of 785 participants who actively exchanged views and opinions. With Director Tsutomu Toichi, The Institute of Energy Economics, Japan, acting as chairman, two keynote addresses were delivered. Minister of Oil Bijan Namdar Zanganeh of Iran reported on The Role of I. R. Iran in Meeting the Growing Oil and Gas Demand in the Asia-Pacific Region and Potential Cooperation with the Region's Consumers. Managing Director Phil Watts of the Royal Dutch/Shell Group reported on Security in Trust - Meeting Asian Energy Needs in the 21st Century. (NEDO)

  2. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  3. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Directory of Open Access Journals (Sweden)

    Chengqi Wang

    Full Text Available With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  4. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  5. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  6. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  7. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  8. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    Science.gov (United States)

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  9. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  10. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  11. Hydroelectric developments in Nunavik : update on impact benefit agreements

    Energy Technology Data Exchange (ETDEWEB)

    Aatami, P. [Makivik Corp., Makivik, NF (Canada)

    2004-07-01

    The Partnership Agreement on Economic and Community Development in Nunavik is intended to accelerate development of natural resources in Nunavik and promote autonomy of the Inuit regional organizations. This can be accomplished through hydroelectric projects, mining, sport hunting, outfitting and tourism. In recent years, activities in these domains have raised fundamental questions pertaining to the advantages and disadvantages of resource development. The role that the Impact Benefit Agreement has on business opportunities has been examined more closely. The results of the Impact Benefit Agreement and its implication for the Cree Nation and hydro development in untapped regions of northern Quebec were described along with the role of the parties in financing future projects. An overview of the costs, benefits and considerations for hydro opportunities in northern Quebec was presented with reference to the electricity grid and the incentives for large investment. 1 fig.

  12. Convenio "Andres Bello:" Informe Final [de la] Segunda Reunion de Ministros de Educacion de la Region Andina ("Andres Bello" Agreement: Final Report of the Second Meeting of the Andean Region Ministers of Education).

    Science.gov (United States)

    Ministros de Educacion de la Region Andina, Lima (Peru).

    This final report of the second meeting of the Andean Region Ministers of Education subscribing to the Andres Bello Agreement on education and culture contains a resume of the individual sessions and the proposals approved during that meeting. The proposals cover various educational problems and issues and begin with the Declaration of Lima which…

  13. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    Science.gov (United States)

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  14. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  15. Mobility Partnerships and Security Subcomplexes in the Mediterranean

    DEFF Research Database (Denmark)

    Seeberg, Peter

    2017-01-01

    issues, the article analyses the MPs by looking at the strategic significance of migration in the context of EU’s foreign and security policy cooperation with the five Arab Mediterranean states. The MPs are seen as an important element in the EU’s overall migration strategy, but have been met......The present article discusses the negotiating and implementing of Mobility Partnership (MP) agreements between the European Union (EU) and Egypt, Jordan, Lebanon, Morocco, and Tunisia. Taking its starting point in the conceptual notions of subregional security complexes and non-traditional security...... with reluctance by the Arab partner states. The article concludes that so far only to a limited degree have the MPs developed into well-functioning tools for managing the migration policies of the EU and its partners states, and that they seem mainly to play a role as instruments for the EU’s foreign and security...

  16. Sovereignty, Robustness, and Short-Term Energy Security Levels. The Catalonia Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Rosas-Casals, Martí, E-mail: rosas@mmt.upc.edu [Sustainability Measurement and Modelling Lab, Universitat Politècnica de Catalunya – Barcelona Tech, Barcelona (Spain); Marzo, Mariano [Geomodels Institute, Department of Stratigraphy, Paleontology and Marine Geosciences, University of Barcelona, Barcelona (Spain); Salas-Prat, Pep [Sustainability Measurement and Modelling Lab, Universitat Politècnica de Catalunya – Barcelona Tech, Barcelona (Spain); SmartGrid.cat, Barcelona (Spain)

    2014-05-12

    Energy-related impacts and conflicts have been used to account for the emergence, maintenance, and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a) construction of organic articulations of people with nature and technology and (b) generation of growing levels of social, economic, and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature) but also in its technological and energy acceptations. In this paper, we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions, which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterizes energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  17. Sovereignty, Robustness, and Short-Term Energy Security Levels. The Catalonia Case Study

    International Nuclear Information System (INIS)

    Rosas-Casals, Martí; Marzo, Mariano; Salas-Prat, Pep

    2014-01-01

    Energy-related impacts and conflicts have been used to account for the emergence, maintenance, and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a) construction of organic articulations of people with nature and technology and (b) generation of growing levels of social, economic, and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature) but also in its technological and energy acceptations. In this paper, we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions, which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterizes energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  18. Sovereignty, robustness and short-term energy security levels. The Catalonia case study

    Directory of Open Access Journals (Sweden)

    Marti eRosas-Casals

    2014-05-01

    Full Text Available Energy related impacts and conflicts have been used to account for the emergence, maintenance and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a construction of organic articulations of people with nature and technology and (b generation of growing levels of social, economic and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature but also in its technological and energy acceptations. In this paper we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterize energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  19. The Non-Proliferation Treaty increases security

    International Nuclear Information System (INIS)

    Kahiluoto, K.

    1995-01-01

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.)

  20. Revisiting the soft security debate: From European progress to ...

    African Journals Online (AJOL)

    Given the extended scope of security sectors falling within the ambit of soft security regional co-operation is indispensable – a phenomenon most visible in European security architecture and that of Northern Europe in particular. Not only European decision-makers, however, pursue the soft security option. As Africa entered ...

  1. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    Science.gov (United States)

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  2. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  3. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  4. Multilateralising TRIPs-Plus Agreements : is the US strategy a failure?

    OpenAIRE

    Morin, Jean-Frédéric

    2009-01-01

    This article examines the current wave of US bilateral agreements with respect to their strategic and political value at the plurilateral level. The US government has explicitly recognized its objective of leveraging bilateral agreements in order to influence regional and multilateral negotiations. Although it may be too early to assess the full effectiveness of this US strategy, the article argues that there are clear signs that the exploitation of bilateral agreements will not independently...

  5. An arms race is coming to the Asia-Pacific region

    International Nuclear Information System (INIS)

    Shu Yuan Hsieh

    1997-01-01

    After nearly half a century of the Cold War, the USA and Russia have finally come to carrying out their arms control agreements, drastically cutting their nuclear and conventional weapons as well as military personnel. One would imagine that the world would gradually cease to manufacture and sell weapons. The reality has seen quite the opposite. The Asia-Pacific region needs to establish urgently a forum for dialogue in security and cooperation negotiations in order to resolve peacefully outstanding territorial and political disputes. Certain arms control measures should be initiated by the Asia-Pacific nations, otherwise they will face the 21st century with the prospect of many military confrontations

  6. The Texts of the Agency's Co-operation Agreements with Regional Intergovernmental Organizations; Texto de los Acuerdos de Colaboracion del Organismo con las Organizaciones Intergubernamentales Regionales

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1961-02-07

    The texts of the Agency's agreements for co-operation with the regional inter-governmental organizations listed below, together with the respective protocols authenticating them, are reproduced in this document in the order in which the agreements entered into force, for the information of all Members of the Agency [Spanish] Para conocimiento de todos los Estados Miembros del Organismo, en este documento se transcriben en el orden en que entraron en vigor, los acuerdos de colaboracion que el Organismo ha concertado con las organizaciones intergubernamentales regionales que a continuacion se enumeran, junto con los respectivos protocolos de autenticacion.

  7. IAEA Director General reacts to U.S.- India cooperation agreement

    International Nuclear Information System (INIS)

    2005-01-01

    Full text: IAEA Director General, Mohamed ElBaradei has welcomed the US-India agreement to embark on full civil nuclear energy cooperation and to work to enhance nuclear non-proliferation and security. 'Out of the box thinking and active participation by all members of the international community are important if we are to advance nuclear arms control, non-proliferation, safety and security, and tackle new threats such as illicit trafficking in sensitive nuclear technology and the risks of nuclear terrorism,' Dr. ElBaradei said. Dr. ElBaradei has also been urging all countries using nuclear energy to apply the highest safety standards possible. 'Making advanced civil nuclear technology available to all countries will contribute to the enhancement of nuclear safety and security,' he said. Dr. ElBaradei said that India's intention to identify and place all its civilian nuclear facilities under IAEA safeguards and sign and adhere to an Additional Protocol with respect to civilian nuclear facilities is a welcome development. I have always advocated concrete and practical steps towards the universal application of IAEA safeguards,' Dr. ElBaradei said. (IAEA)

  8. Energy supply security and geopolitics: A European perspective

    International Nuclear Information System (INIS)

    Correlje, Aad; Linde, Coby van der

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets. Regions and Empires involves a world broken up in rival political and economic blocks, competing for resources and markets via political, economic and military power. It is shown that these storylines have a significant impact on the development of the energy market, on the way in which energy supply may be secured and on the effect and applicability of the several types of instruments available. The current EU is geared towards enlargement and a deepening of economic integration, based on the tenets of the post-1945 multilateral world system. The present world tends towards Regions and Empires and suggests that the EU may have to reorient its energy security policy. Energy policy must become an integral part of EU external trade and foreign relations and security policy. The EU should develop its own strategy, actively investing in dialogues with producer countries in the Persian Gulf and Africa and with Russia. Sustainable prosperity and governance in these regions will support EU energy security

  9. R2P in the UN Security Council: Darfur, Libya and beyond

    OpenAIRE

    Gifkins, J

    2016-01-01

    It has been argued that consensus on the responsibility to protect (R2P) was lost in the UN Security Council as a result of the NATO-led intervention in Libya in 2011. This argument assumes that there was more agreement on R2P before the Libyan intervention than there was afterwards. Yet a close examination of the Security Council’s use of language on R2P shows the opposite: R2P was highly contentious within the Security Council prior to the Libyan intervention, and less so afterwards. Not on...

  10. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA). Status of acceptances as of 30 September 1995

    International Nuclear Information System (INIS)

    1995-10-01

    As of 30 September 1995, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), has been received by the Director General from the Governments of: Tunisia, Egypt, Madagascar, South Africa, Ethiopia, Algeria, Mauritius, Sudan, Tanzania, Cameroon, Kenya, Zaire, Morocco, Sierra Leone, Namibia, Nigeria, Ghana. Pursuant to Article XIV.2, (of the original Agreement) the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000

  11. Extension of the African regional co-operative agreement for research, development and training related to nuclear science and technology (AFRA). Status of acceptances as of 30 September 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-10-01

    As of 30 September 1995, notifications of acceptance of the extension of the African Regional Co-operative Agreement for Research, Development and Training Related to Nuclear Science and Technology (see INFCIRC/377), has been received by the Director General from the Governments of: Tunisia, Egypt, Madagascar, South Africa, Ethiopia, Algeria, Mauritius, Sudan, Tanzania, Cameroon, Kenya, Zaire, Morocco, Sierra Leone, Namibia, Nigeria, Ghana. Pursuant to Article XIV.2, (of the original Agreement) the extension entered into force on 4 April 1995, upon expiration of the original Agreement, and will remain in force for an additional period of 5 years, i.e. through 3 April 2000.

  12. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  13. Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs

    Directory of Open Access Journals (Sweden)

    Shengke Zeng

    2018-01-01

    Full Text Available VANETs need secure communication. Authentication in VANETs resists the attack on the receipt of false information. Authenticated group key agreement (GKA is used to establish a confidential and authenticated communication channel for the multiple vehicles. However, authentication incurs privacy leakage, that is, by using digital signature. Therefore, the deniability is deserved for GKA (which is termed as DGKA due to the privacy protection. In the DGKA protocol, each participant interacts with intended partners to establish a common group session key. After this agreement session, each participant can not only be regarded as the intended sender but also deny that it has ever participated in this session. Therefore, under this established key, vehicles send confidential messages with authentication property and the deniability protects the vehicles privacy. We present a novel transformation from an unauthenticated group key agreement to a deniable (authenticated group key agreement without increasing communication round. Our full deniability is achieved even in the concurrent setting which suits the Internet environment. In addition, we design an authenticated and privacy-preserving communication protocol for VANETs by using the proposed deniable group key agreement.

  14. Commercial agreements and documentation relevant for project financing renewable energy schemes

    International Nuclear Information System (INIS)

    1997-01-01

    Renewable energy projects covered by the NFFO Orders are distinguished by the fact that the key contract in any project is in effect a standard form contract in the form of the Power Purchase Agreement with the Non-Fossil Purchasing Agency Limited (''NFPA''). However our research has indicated that general contract standardization is unlikely to be practicable in the short term, although it is thought that the production of a range of specimen documents in the context of this study with input from various representative industry associations could lead to a more consistent approach to the negotiation and structuring of projects and facilitate the presentation of projects at the funding stage. We have produced a suite of documents which are specimens of the sorts of agreements that lenders are likely to find acceptable. The range of documents which we have produced covers the principal contractual arrangements for a typical renewable energy project (including full text or abridged agreements), for a land lease and for agreements for design and build, operation and maintenance, waste supply, wind lease, landfill gas, and forestry residue supply. We have produced an insurance scope of cover and financing documentation including a due diligence check list, term sheet, and a facility agreement with related security documentation. (author)

  15. Sponsoring Asia-Pacific Security: PACOM’s Role in Reconciling Bilateral and Multilateral Security Structures

    Science.gov (United States)

    2016-05-13

    regional security order according to realist or liberal-institutionalist international relations theory.3 Realists emphasize the deep-seated...other states has motivated party officials to pursue multilateralism to impress international society with the country’s peaceful rise. 10 The...simultaneous pursuit ofbilateralism and multilateralism within Asia "amounts to outsourcing of great power management ofregional security order in two

  16. Compliance with HIPAA security standards in U.S. Hospitals.

    Science.gov (United States)

    Davis, Diane; Having, Karen

    2006-01-01

    With the widespread use of computer networks, the amount of information stored electronically has grown exponentially, resulting in increased concern for privacy and security of information. The healthcare industry has been put to the test with the federally mandated Health Insurance Portability and Accountability Act (HIPAA) of 1996. To assess the compliance status of HIPAA security standards, a random sample of 1,000 U.S. hospitals was surveyed in January 2004, yielding a return rate of 29 percent. One year later, a follow-up survey was sent to all previous respondents, with 50 percent replying. HIPAA officers'perceptions of security compliance in 2004 and 2005 are compared in this article. The security standards achieving the highest level of compliance in both 2004 and 2005 were obtaining required business associate agreements and physical safeguards to limit access to electronic information systems. Respondents indicated least compliance both years in performing periodic evaluation of security practices governed by the Security Rule. Roadblocks, threats, problems and solutions regarding HIPAA compliance are discussed. This information may be applied to current and future strategies toward maintaining security of information systems throughout the healthcare industry.

  17. End-user challenges to security digitalisation and integration: a retail perspective

    OpenAIRE

    Lahtinen, Markus

    2008-01-01

    With the assumed digitalisation happening on the end-user side, progressive systems integrators stress the importance of changing the business concept from being installers to being service and solution providers. However, less is known about the details of this process on the end-user side. Based on an online survey of loss prevention managers it can be stated that security digitalisation and further business integration of security is a top agreement among the respondents. Integ...

  18. U.S. Security-Related Agreements in Force Since 1955: Introducing a New Database

    Science.gov (United States)

    2014-01-01

    necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax -deductible charitable contribution at www.rand.org/giving... inherited by a now independent colonial state. We also include an 4 The process becomes somewhat more...Madagascar 2 Malawi 3 Malaysia 8 Maldives 3 52 Partner Number of Agreements Mali 7 Malta 4 Marshall Islands 4 Mauritania 3 Mauritius 3 Mexico

  19. Agreement on technology? Exploring the political feasibility of technology-oriented agreements and their compatibility with cap-and-trade approaches to address climate change

    International Nuclear Information System (INIS)

    De Coninck, H.C.; Bakker, S.; Van der Zwaan, B.; Junginger, M.; Kuik, O.; Massey, E.

    2007-11-01

    Climate change has been on the international policy agenda since the UNFCCC was agreed in 1992. The Kyoto Protocol was the UNFCCC's answer to the call for measures and has been effective in establishing an international carbon market and reducing emissions in some countries and regions. A follow-up of the Kyoto Protocol is currently under discussion. In theory, the economically most efficient form of a global agreement is a global cap-and-trade agreement. It remains highly uncertain whether an effective global climate regime fully founded on another cap-and-trade type of agreement is politically feasible. In addition, it has been suggested that a new agreement would have to be more effective in promoting technology development and diffusion. This report explores the compatibility of a cap-and trade regime with a different form of international agreements to address climate change: technology-oriented agreements (TOAs)

  20. Good practices in provision of nuclear safeguards and security training courses at the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security

    Directory of Open Access Journals (Sweden)

    Kobayashi Naoki

    2017-01-01

    Full Text Available More than five years have passed since the Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN was established under the Japan Atomic Energy Agency (JAEA in December 2010 and started its activities, in response to the commitment of Japan at the Nuclear Security Summit in Washington D.C.. The ISCN has been vigorously involved in capacity building assistance on nuclear nonproliferation (safeguards and nuclear security, mainly in the Asian region. It has provided 105 training courses to 2901 participants in total as of August 2016. The ISCN plays a major role in strengthening nuclear nonproliferation and nuclear security in the region, and this can be considered one of the great results of the Nuclear Security Summit process. The ISCN has cooperated with the US Department of Energy/National Nuclear Security Administration (DOE/NNSA and Sandia National Laboratories (SNL to establish a base of instructors, particularly for the Center's flagship two-week courses, the Regional Training Course on Physical Protection of Nuclear Material and Facilities (RTC on PP and the Regional Training Course on State Systems of Accounting for and Control of Nuclear Material (RTC on SSAC. Furthermore, the ISCN has provided training courses for experts in Japan, making the best use of the Center's knowledge and experience of organizing international courses. The ISCN has also started joint synchronized training with the Joint Research Centre of the European Commission (EC JRC on nuclear safeguards. This paper describes the good practices at the ISCN through its five years of activities, focusing on its progress in nuclear safeguards and nuclear security training.

  1. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  2. Remote monitoring, data sharing, and information security

    International Nuclear Information System (INIS)

    Parise, D.; Dalton, C.; Regula, J.

    2009-01-01

    Full-text: Remote Monitoring (RM) is being used with increased frequency by the IAEA for safeguards in many parts of the world. This is especially true in Japan where there are also agreements for data sharing. The automated nature of RM lends itself to assist in modernizing old cumbersome data sharing techniques. For example, electronic declarations can be received, parsed and checked; then data for that time period and facility can be automatically released. This could save considerable time and effort now spent processing paper declarations and hand copying data. But care must be taken to ensure the parsing, transfers, and connections for these systems are secure. Advanced authentication and encryption techniques are still vital in this process. This paper will describe how to improve security with vulnerability assessments, the use of certificates, avoiding compromising dial-up connections and other methods. A detailed network layout will be presented that will resemble a future RM collaboration with the IAEA and the Japanese. From this network design, key strategic security points will be identified and suggestions will be made to help secure them. (author)

  3. DETERMINANTS OF HOUSEHOLD FOOD SECURITY: A COMPARATIVE ANALYSIS OF EASTERN AND WESTERN INDONESIA

    Directory of Open Access Journals (Sweden)

    Puspi Eko Wiranthi

    2014-04-01

    Full Text Available Indonesian Food Security Council in 2009 issued a Food Security and Vulnerability Atlas (FSVA which stated that there were 100 districts in Indonesia which were most vulnerable to food insecurity and 79% of which were located in eastern region. By using Susenas regular data in 2008, this study aimed to analyze determinants of household food security in eastern compared to western region. The ordered logistic regression model was employed to investigate the determinants of household food security. The result showed that most of households in Indonesia were vulnerable to food insecurity (41.76%. The percentage in eastern region (48.56% was higher than that in western region (41.76%. Increase in expenditure equivalent, age and education level of household head, female household head, small household size, household head’s occupation in non-agriculture and urban household would increase the probability of a household to become food secure in both regions. The difference was in the factor of access to electricity in eastern and access to safe drinking water and loan in western region. Policies which aim to increase education, credit access, and intensive family planning have big roles in improving household food security.

  4. Adaptive and Reactive Security for Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Stankovic, John A

    2007-01-01

    .... WSNs are also susceptible to malicious, non-random security attacks. For example, a wireless sensor network deployed in remote regions to detect and classify targets could be rendered inoperative by various security attacks...

  5. Mali and Nigeria Should be Established as Key Regional Partners of the United States to Further Mutual Interests for Ensuring Long-Term Security and Stability in the Sahel Region

    Science.gov (United States)

    2016-06-10

    natural resources and markets through the IMF and World Bank’s Structural Adjustment Programs ( SAPs ) during the 1980s. As a result, the security...development- indicators&Type=TABLE&preview=on#. On the macroeconomics spectrum, an economic dependency, poor human resources , and lack of... resources became involved in the region but now find it necessary to protect their interests and homelands from a variety of hybrid threats

  6. Regional disaster risk management strategies for food security: Probing Southern African Development Community channels for influencing national policy

    Directory of Open Access Journals (Sweden)

    Happy M. Tirivangasi

    2018-05-01

    Full Text Available Natural disasters and food insecurity are directly interconnected. Climate change related hazards such as floods, hurricanes, tsunamis, droughts and other risks can weaken food security and severely impact agricultural activities. Consequently, this has an impact on market access, trade, food supply, reduced income, increased food prices, decreased farm income and employment. Natural disasters create poverty, which in turn increases the prevalence of food insecurity and malnutrition. It is clear that disasters put food security at risk. The poorest people in the community are affected by food insecurity and disasters; hence, there is a need to be prepared as well as be in a position to manage disasters. Without serious efforts to address them, the risks of disasters will become an increasingly serious obstacle to sustainable development and the achievement of sustainable development goals, particularly goal number 2 ‘end hunger, achieve food security and improved nutrition and promote sustainable agriculture’. In recent years, countries in southern Africa have experienced an increase in the frequency, magnitude and impact of climate change–related hazards such as droughts, veld fire, depleting water resources and flood events. This research aims to reveal Southern African Development Community disaster risk management strategies for food security to see how they an influence and shape policy at the national level in southern Africa. Sustainable Livelihood approach was adopted as the main theoretical framework for the study. The qualitative Analysis is based largely on data from databases such as national reports, regional reports and empirical findings on the disaster management–sustainable development nexus.

  7. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  8. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  9. The regional co-operative agreement for research, development and training related to nuclear science and technology

    International Nuclear Information System (INIS)

    Fowler, E.

    1978-01-01

    The history of the Agreement, known as the RCA, is given and the operation of the Agreement, its achievements and current projects are described. The Agreement entered into force in 1972 for a period of five years and has been extended for an additional five years. Any IAEA Member State in the area of South Asia, South East Asia, the Pacific and the Far East may become a party to the Agreement. The purpose of the Agreement is to promote and co-ordinate research, development and training projects in nuclear science and technology through co-operation between the appropriate national institutions and with the assistance of the IAEA. The current RCA co-operative projects cover a broad spectrum of technologies and interests, among which are: food and agriculture, medicine, environmental research, industrial applications, training, research reactor use including radioisotope production, and physical research such as nuclear data programs

  10. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  11. Protecting livelihoods, boosting food security in Kenya | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-05-21

    May 21, 2015 ... Protecting livelihoods, boosting food security in Kenya ... America, and the Caribbean with funds from the Government of Canada's fast-start financing. ... Water management and food security in vulnerable regions of China.

  12. Regional Education Partners

    Science.gov (United States)

    & Development (LDRD) National Security Education Center (NSEC) Office of Science Programs Richard P Databases National Security Education Center (NSEC) Center for Nonlinear Studies Engineering Institute Scholarships STEM Education Programs Teachers (K-12) Students (K-12) Higher Education Regional Education

  13. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  14. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  15. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  16. A quarter of a century of function assignment agreements with the autonomous communities. The

    International Nuclear Information System (INIS)

    Montero Sanchez, M. A.; Rodriguez Marti, M.; Urbano Pollato, I.; Zamora Martin, F.

    2010-01-01

    The CSN has the power to commission certain radioactive facility surveillance and inspection functions to the autonomous communities through an agreement between the Council and the regional government in question. The first of these agreements was signed in 1985 with the Regional Government of Catalonia, and during the 25 years that have passed since then similar agreements have been signed with eight other communities: Asturias, the Balearic Islands, the Canary Islands, Galicia, Murcia, Navarra, the Basque Country and the Community of Valencia. (Author)

  17. Implementation of nuclear reduction agreements

    International Nuclear Information System (INIS)

    Scheinman, L.

    1994-01-01

    The collapse of the Soviet Union not only created a new political environment conductive to arms control and disarmament. It also raised unique and unprecedent non-proliferation problems which bear on the implementation of Start I and even on the Non-proliferation treaty insofar as a failure to rein in Ukraine would create a case of instant proliferation and raise questions about whether somehow Russia as a successor of the Soviet Union failed to meet its Non-proliferation Treaty obligation not to 'assist' any other state in acquiring nuclear weapons. The significance of implementing the agreements concerned with non-proliferation, production of highly enriched uranium outside IAEA safeguards, transparency relevance to the international arena, particularly to nuclear issues are discussed as crucial to progress towards a more stable and secure world order. The importance of the Non-proliferation Treaty extension Conference is underlined

  18. Information Security Management - Part Of The Integrated Management System

    Science.gov (United States)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  19. The Rise of the Spirit of National Interest and the Existence of World Trade Organization Agreement: A Case Study of Indonesia

    Directory of Open Access Journals (Sweden)

    I Gusti Ngurah Parikesit

    2017-10-01

    Full Text Available There has been an anxiety over the rise of the spirit of national interest on the existence of World Trade Organization. This spirit that has been reflected from domestic trade policy, to some extent, has undermined trade negotiation process under the WTO as shown by the failure of the Doha Round to conclude significant trade deals. Countries also started concluding bilateral and regional trade agreements instead of the WTO. This article aimed to analyze whether the rise of the spirit of national interest has threaten the existence of the WTO agreements, putting Indonesia as a case study. This article is a normative research, analyzing the dynamics development of the national interest under the WTO, especially Indonesia, and how the judicial body has responded the rise of this spirit in its decisions. This article argues that the spirit of national interest will not threaten the existence of WTO as this spirit has been exist from the early establishment of the General Agreement on Tariffs and Trade in 1947 to the latest WTO negotiation. Moreover, the existence of the WTO judicial body will secure the existence of the WTO, especially because it has successfully controlled the overwhelming spirit of national interest of its members through its decisions.

  20. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.