18,921 research outputs found
A New Distributed Chinese Wall Security Policy Model
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed system) and has been attempted in the past; however the proposed solutions cannot deal with the composite information flows problem (e.g., a malicious Trojan horses problem), caused by the writing access rule imposed to the subject on the objects. In this article, we propose a new CWSP model, based on the access query type of the subject to the objects using the concepts of the CWSP. We have two types of walls placement, the first type consists of walls that are built around the subject, and the second around the object. We cannot find inside each once wall two competing objects\u27 data. We showed that this mechanism is a good alternative to deal with some previous models\u27 limitations. The model is easy to implement in a distributed system (as Cloud-Computing). It is based on the technique of Object Oriented Programming (Can be used in Cloud computing Software as a service SaaS ) or by using the capabilities as an access control in real distributed system
Recommended from our members
Bitcoin: the wrong implementation of the right idea at the right time
This paper is a study into some of the regulatory implications of cryptocurrencies using the CAMPO research framework (Context, Actors, Methods, Methods, Practice, Outcomes). We explain in CAMPO format why virtual currencies are of interest, how self-regulation has failed, and what useful lessons can be learned. We are hopeful that the full paper will produce useful and semi-permanent findings into the usefulness of virtual currencies in general, block chains as a means of mining currency, and the profundity of current âmedia darlingâ currency Bitcoin as compared with the development of block chain generator Ethereum.
While virtual currencies can play a role in creating better trading conditions in virtual communities, despite the risks of non-sovereign issuance and therefore only regulation by code (Brown/Marsden 2013), the methodology used poses significant challenges to researching this âcommunityâ, if BitCoin can even be said to have created a single community, as opposed to enabling an alternate method of exchange for potentially all virtual community transactions. First, BitCoin users have transparency of ownership but anonymity in many transactions, necessary for libertarians or outright criminals in such illicit markets as #SilkRoad. Studying community dynamics is therefore made much more difficult than even such pseudonymous or avatar based communities as Habbo Hotel, World of Warcraft or SecondLife. The ethical implications of studying such communities raise similar problems as those of Tor, Anonymous, Lulzsec and other anonymous hacker communities. Second, the journalistic accounts of BitCoin markets are subject to sensationalism, hype and inaccuracy, even more so than in the earlier hype cycle for SecondLife, exacerbated by the first issue of anonymity. Third, the virtual currency area is subject to slowly emerging regulation by financial authorities and police forces, which appears to be driving much of the early adopter community âundergroundâ. Thus, the community in 2016 may not bear much resemblance to that in 2012. Fourth, there has been relatively little academic empirical study of the community, or indeed of virtual currencies in general, until relatively recently. Fifth, the dynamism of the virtual currency environment in the face of the deepening mistrust of the financial system after the 2008 crisis is such that any research conclusions must by their nature be provisional and transient.
All these challenges, particularly the final three, also raise the motivation for research â an alternative financial system which is separated from the real-world sovereign and which can use code regulation with limited enforcement from offline policing, both returns the study to the libertarian self-regulated environment of early 1990s MUDs, and offers a tantalising prospect of a tool to evade the perils of âprivate profit, socialized riskâ which existing large financial institutions created in the 2008-12 disaster. The need for further research into virtual currencies based on blockchain mining, and for their usage by virtual communities, is thus pressing and should motivate researchers to solve the many problems in methodology for exploring such an environment
What Would Zero Look Like? A Treaty for the Abolition of Nuclear Weapons
Nuclear disarmament-the comprehensive, universal, and permanent abolition of all nuclear weapons, pursuant to a verifiable, legally binding international agreement-has long been one of the most ambitious, controversial, and urgent items on the agenda for arms control. To date, however, most of the discussion of getting to zero has highlighted the political, military, technical and diplomatic dimensions of this complex problem, and there has been relatively little attention to the legal requirements for drafting such a novel treaty.
This Article fills that gap by offering two proposed agreements. The first, a non-legally-bindingfr amework accord, would be designedf or signature relatively soon (e.g., in 2015) to re-commit states to the goal of nuclear elimination and to energize their concerted individual and collective action on a set of prescribed steps in pursuit of it. The second, a legally-binding document, would be concluded at some point in the more distant future, when states had accomplished great reductions in their current nuclear arsenals and were ready, at last, to plunge forward to true abolition.
The Article describes the conditions necessary for the further articulation of these two novel agreements, and the text of each instrument carries numerous annotations that identify competing options, describe the negotiating range, and illuminate the drafter\u27s choices. The hope is that something novel can be gained-fresh insights can be suggested, and new questions can be raised (even if answering them remains elusive)-by advancing the dialogue about nuclear disarmament to the concrete stage of treaty drafting
The ISCIP Analyst, Volume XII, Issue 1
This repository item contains a single issue of The ISCIP Analyst, an analytical review journal published from 1996 to 2010 by the Boston University Institute for the Study of Conflict, Ideology, and Policy
Rule 10b-5 and the Corporationâs Affirmative Duty to Disclose
In order to make responsible investment decisions investors must be adequately informed. In this article Professor Bauman argues that the existing disclosure requirements of the federal securities laws do not meet the informational needs of investors because there is no affirmative duty to disclose all material information. In order to fill this substantial gap in the existing disclosure scheme, Professor Bauman argues that rule lob-5 should be read to require prompt disclosure of all material information subject only to limited exceptions and should be applicable even in the absence of trading or prior inaccurate disclosure
- âŠ