14,315 research outputs found

    Laos legislative drafting programme

    Get PDF
    Draft documents, proposals, notes, and other various papers related to the Seidman's efforts to develop a legislative drafting programme in Lao People's Democratic Republic (PDR) between 1994 and 1997. This project was developed with support from the Lao National Program, UNDP and World Bank to help strengthen the country's legal framework

    Developments, Issues, and Initiatives in Retail Payments

    Get PDF
    Innovations in basic information technologies, in payment applications, and in the availability of global markets, as well as substantial changes in financial sector policy, have fundamentally changed how the retail payments system in Canada operates. Principally, the volume and types of electronic payments have grown, and there is increased participation by diverse groups of financial and non-financial institutions as providers of retail payment services. The resulting policy problem for payment systems is how best to benefit from efficiency gains while managing payment risks. O'Connor examines the effect of the technological and legislative changes and the initiatives developed by the public and private sectors in such areas as the market arrangements for services; customer risks and costs for settling large-value retail payments; the security of payment information and the efficiency with which it is transmitted; and the effects of differing regulatory regimes on competition among providers of retail payment services.

    Structuring cooperative nuclear risk reduction initiatives with China

    Get PDF
    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagements between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.Project on Advanced Systems and Concepts for Countering Weapons of Mass Destruction (PASCC)Grant Number N00244-14-I-003

    India as a global security actor

    Get PDF
    Thanks to sustained economic growth and key investments in military capabilities, India will face growing demands from within and the international community to seek and play a greater role in global security affairs. The values and interests likely to guide India’s future behavior will be a mixture of old and new, eastern and western. India’s international aspirations have an important pre-history, covered in this chapter’s first section where non-alignment, as idea and practice, is explored for its enduring significance. India’s relevance as a security actor is assessed in terms of its activities and capacity to influence developments within two security zones of major contemporary importance: Afghanistan and the Indian Ocean. Finally, a section on the constraints and challenges examines India’s ability to navigate a multi-polar world, the fallout and gains of nuclearization, the 2008 Indo-US nuclear deal, as well as ‘the weaknesses from within’ in terms of human security

    Negotiating the Australia–Japan Basic Treaty of Friendship and Cooperation : Reflections and Afterthoughts

    Get PDF
    This projects concern for diplomatic history is admirable, and my remarks will be directed towards encouraging the cause. Despite the best efforts of the Historical Documents Section of the Department of Foreign Affairs and Trade (DFAT), diplomatic history is languishing in Australian universities, as elsewhere, As evidence, I cite the under-whelming reception of Peter Edwards fine biography of Arthur Tange1 and academias muted notice of the 30th anniversary of the end of the Vietnam war and the 40th anniversary of Australias involvement, despite, I argue, their contemporary relevance.

    The Generals’ Scuttlebutt: Byzantine-Resilient Gossip Protocols

    Get PDF
    One of the most successful applications of peer-to-peer communication networks is in the context of blockchain protocols, which—in Satoshi Nakamoto\u27s own words—rely on the nature of information being easy to spread and hard to stifle. Significant efforts were invested in the last decade into analyzing the security of these protocols, and invariably the security arguments known for longest-chain Nakamoto-style consensus use an idealization of this tenet. Unfortunately, the real-world implementations of peer-to-peer gossip-style networks used by blockchain protocols rely on a number of ad-hoc attack mitigation strategies that leave a glaring gap between the idealized communication layer assumed in formal security arguments for blockchains and the real world, where a wide array of attacks have been showcased. In this work we bridge this gap by presenting a Byzantine-resilient network layer for blockchain protocols. For the first time we quantify the problem of network-layer attacks in the context of blockchain security models, and we develop a design that thwarts resource restricted adversaries. Importantly, we focus on the proof-of-stake setting due to its vulnerability to Denial-of-Service (DoS) attacks stemming from the well-known deficiency (compared to the proof-of-work setting) known as nothing at stake. We present a Byzantine-resilient gossip protocol, and we analyze it in the Universal Composition framework. In order to prove security, we show novel results on expander properties of random graphs. Importantly, our gossip protocol can be based on any given bilateral functionality that determines a desired interaction between two adjacent peers in the networking layer and demonstrates how it is possible to use application-layer information to make the networking-layer resilient to attacks. Despite the seeming circularity, we demonstrate how to prove the security of a Nakamoto-style longest-chain protocol given our gossip networking functionality, and hence, we demonstrate constructively how it is possible to obtain provable security across protocol layers, given only bare-bone point-to-point networking, majority of honest stake, and a verifiable random function

    November-December 2006

    Get PDF
    corecore