9,194 research outputs found

    Security Management System for 4G Heterogeneous Networks

    Get PDF
    There is constant demand for the development of mobile networks to meet the service requirements of users, and their development is a significant topic of research. The current fourth generation (4G) of mobile networks are expected to provide high speed connections anywhere at any time. Various existing 4G architectures such as LTE and WiMax support only wireless technologies, while an alternative architecture, Y-Comm, has been proposed to combine both existing wired and wireless networks. Y-Comm seeks to meet the main service requirements of 4G by converging the existing networks, so that the user can get better service anywhere and at any time. One of the major characteristics of Y-Comm is heterogeneity, which means that networks with different topologies work together to provide seamless communication to the end user. However, this heterogeneity leads to technical issues which may compromise quality of service, vertical handover and security. Due to the convergence characteristic of Y-Comm, security is considered more significant than in the existing LTE and WiMax networks. These security concerns have motivated this research study to propose a novel security management system. The research aims to meet the security requirements of 4G mobile networks, e.g. preventing end user devices from being used as attack tools. This requirement has not been met clearly in previous studies of Y-Comm, but this study proposes a security management system which does this. This research follows the ITU-T recommendation M.3400 dealing with security violations within Y-Comm networks. It proposes a policy-based security management system to deal with events that trigger actions in the system and uses Ponder2 to implement it. The proposed system, located in the top layer of the Y-Comm architecture, interacts with components of Y-Comm to enforce the appropriate policies. Its four main components are the Intelligent Agent, the Security Engine, the Security Policies Database and the Security Administrator. These are represented in this research as managed objects to meet design considerations such as extensibility and modifiability. This research demonstrates that the proposed system meets the security requirements of the Y-Comm environment. Its deployment is possible with managed objects built with Ponder2 for all of the components of Y-Comm, which means that the security management system is able to prevent end user devices from being used as attack tools. It can also achieve other security goals of Y-Comm networks

    Tracking Chart 2005 Nike, Sri Lanka 02027085D

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2005_Nike_TC_Sri_Lanka_02027085D.pdf: 7 downloads, before Oct. 1, 2020

    Expressive Policy Analysis with Enhanced System Dynamicity

    No full text
    Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take account of obligations and authorizations, (iii) include a dynamic system model, and (iv) give useful diagnostic information. We present a logic-based policy analysis framework which satisfies these requirements, showing how many significant policy-related properties can be analysed, and we give details of a prototype implementation. Copyright 2009 ACM

    Mutual obligation? Regulating by supervision and surveillance in Australian income support policy

    Get PDF
    Through an analysis of speeches by government ministers, documents and regulations, this article examines the Australian national government’s surveillance of unemployed people through what is known as Activity Testing, and more specifically as Mutual Obligation. It seeks to merge the social policy analysis of Mutual Obligation with a surveillance perspective in order to delve deeper into the underlying nature of the policy and its implications for people who are unemployed. It does this by 1. Outlining the neo-liberal political theory underlying these policies; 2. Illustrating the nature and extent of surveillance of people in receipt of income support, and 3. Employing Foucault’s concepts of the technologies of domination and the self to highlight the controlling and coercive aspects of Mutual Obligation in achieving certain of the Government’s political and policy objectives. In doing so, the analysis will make visible something of the power exerted over the disadvantaged while subject to such surveillance

    Tracking Chart 2005 47 Brand, Vietnam 36038480D

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2005_47_Brand_TC_Vietnam_36038480D.pdf: 21 downloads, before Oct. 1, 2020

    Preventing Reverse-Preemption of the United States\u27 Obligations Under the New York Convention

    Get PDF

    Relational Investing and Agency Theory

    Get PDF
    This Article analyzes how, and when, corporate governance could be improved by utilizing "relational investing." The term relational investing is just coming into vogue and there does not yet seem to be a consensus on what it means. Although the term has been trumpeted on the cover of Business Week, before the Conference on Relational Investing at Columbia University, relatively little legal writing had been published on the subject. For the purposes of this Article, we define relational investing to encompass commitments to buy and hold significant blocks of a corporation's stock. And it is particularly important that the relational investors commit not to tender their shares to hostile bidders. Using our definition, relational investing is used to foreclose or reduce hostile takeover threats, replacing this form of external discipline with enhanced internal discipline by the relational investors. The long-term investment induces the relational shareholders to invest more in acquiring information about the effectiveness of management. To be effective internal monitors, however, relational investors must be able to use this information to influence corporate policy. At a minimum, relational investors must be "provocable" -- they must be able to increase the likelihood that poor management or poor policies will be changed. Relational investors might accomplish these changes through either internal (informal negotiation or proxy contest) or external (tender offer) means.Relational Investing; Takeovers; Agency Costs; Moral Hazard
    • ā€¦
    corecore