17,297 research outputs found

    A Normative Framework of Justice in Climate Change

    Get PDF
    The more the various dimensions of climate change are just, the more an international agreement is in principle attainable. That is the reason why justice plays a major role in favouring collective action against global warming. In this article I spell out the dominant notions of justice and the consequent criteria of equity for the main domains of global warming negotiations, in order to identify a normative ethical framework. As far as mitigation is concerned, for the definition of a just initial allocation of endowments the reference point should be a per capita distribution corrected by a factor which takes into account all undeserved inequalities, as suggested by Rawls’ theory of justice. With regard to the subsequent exchange of endowments, I consider the Pareto principle supplemented by the envy-freeness one as the most viable option. Turning to adaptation, my point is that the criterion of responsibility based on historical accountability is inevitable. The related underpinning of justice can be found in principle I of Rawls’ theory of justice. Finally, for the issues raised by the just allocation of compensations for climate related damages I consider Sen’s capability approach the soundest option.adaptation, climate change, equity, justice, international climate agreements, mitigation

    CamFlow: Managed Data-sharing for Cloud Services

    Full text link
    A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers, which share the operating system (OS) kernel. Increasingly it is the case that applications also require facilities to effect isolation and protection of data managed by those applications. They also require flexible data sharing with other applications, often across the traditional cloud-isolation boundaries; for example, when government provides many related services for its citizens on a common platform. Similar considerations apply to the end-users of applications. But in particular, the incorporation of cloud services within `Internet of Things' architectures is driving the requirements for both protection and cross-application data sharing. These concerns relate to the management of data. Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data has left its owner's control by cloud-hosted applications and within cloud-services. Information Flow Control (IFC), in addition, offers system-wide, end-to-end, flow control based on the properties of the data. We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software. In addition, the audit log associated with IFC provides transparency, giving configurable system-wide visibility over data flows. [...]Comment: 14 pages, 8 figure

    Cooperative game theory and its application to natural, environmental, and water resource issues : 2. application to natural and environmental resources

    Get PDF
    This paper provides a review of various applications of cooperative game theory (CGT) to issues of natural and environmental resources. With an increase in the level of competition over environmental and natural resources, the incidents of disputes have been at the center of allocation agreements. The paper reviews the cases of common pool resources such as fisheries and forests, and cases of environmental pollution such as acid rain, flow, and stock pollution. In addition to providing examples of cooperative solutions to allocation problems, the conclusion from this review suggests that cooperation over scarce environmental and natural resources is possible under a variety of physical conditions and institutional arrangements. CGT applications to international fishery disputes are especially useful in that they have been making headway in policy-related agreements among states and regions of the world. Forest applications are more local in nature, but of great relevance in solving disputes among communities and various levels of governments.Environmental Economics&Policies,Fisheries&Aquaculture,Common Property Resource Development,Economic Theory&Research,Ecosystems and Natural Habitats

    Traditional Knowledge and Biodiversity in South Africa : CSIR case

    Get PDF
    The focus of this paper is traditional knowledge (TK) and indigenous biological resources protection in South Africa, through the analysis of the existing policies and legislations, in order to provide a useful insight for a developed country such as Japan which has recently adopted the guidelines for the protection of TK and biological resources and promotion of access and benefit sharing (ABS). South Africa is the 3rd most diverse country in terms of natural resources, culture and traditions, languages and geology and its comprehensive legislative framework system shows the country\u27s seriousness to safeguard TK and conserve biological resources for future generations. The paper uses the South Africa\u27s government owned research and technology development institution, Council for Scientific and Industrial Research (CSIR), as an example to demonstrate the application of the TK protection and biodiversity conservation (including access and benefit sharing) laws, through case studies approach for lessons learned for other African countries, contemplating creation of their own TK protection and environmental conservation. Due to the repositioning of CSIR within the local and global research and develop, the organisation has adopted Industrialisation Strategy, and TK will play a significant role in technology development and new business models in rural agroprocessing and production to enhance inclusive development (through benefit sharing) and support economic growth. The paper concludes that TK and indigenous biological resources protection through the relevant government laws, as well as value addition to TK and biodiversity through research and development supported by government funding, is necessary for socioeconomic attainment, especially for local and indigenous communities and rural agroprocessing businesses as part of benefit sharing

    Obligations of trust for privacy and confidentiality in distributed transactions

    Get PDF
    Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions. The authors introduce the concept of the obligation of trust (OoT) protocol as a privacy assurance and authorization mechanism that is built upon the XACML standard. The OoT allows two communicating parties to dynamically exchange their privacy and authorization requirements and capabilities, which the authors term a notification of obligation (NoB), as well as their commitments to fulfilling each other's requirements, which the authors term signed acceptance of obligations (SAO). The authors seek to describe some applicability of these concepts and to show how they can be integrated into distributed authorization systems for stricter privacy and confidentiality control. Design/methodology/approach – Existing access control and privacy protection systems are typically unilateral and provider-centric, in that the enterprise service provider assigns the access rights, makes the access control decisions, and determines the privacy policy. There is no negotiation between the client and the service provider about which access control or privacy policy to use. The authors adopt a symmetric, more user-centric approach to privacy protection and authorization, which treats the client and service provider as peers, in which both can stipulate their requirements and capabilities, and hence negotiate terms which are equally acceptable to both parties. Findings – The authors demonstrate how the obligation of trust protocol can be used in a number of different scenarios to improve upon the mechanisms that are currently available today. Practical implications – This approach will serve to increase trust in distributed transactions since each communicating party receives a difficult to repudiate digitally signed acceptance of obligations, in a standard language (XACML), which can be automatically enforced by their respective computing machinery. Originality/value – The paper adds to current research in trust negotiation, privacy protection and authorization by combining all three together into one set of standardized protocols. Furthermore, by providing hard to repudiate signed acceptance of obligations messages, this strengthens the legal case of the injured party should a dispute arise

    A Game-Theoretic Approach for Runtime Capacity Allocation in MapReduce

    Get PDF
    Nowadays many companies have available large amounts of raw, unstructured data. Among Big Data enabling technologies, a central place is held by the MapReduce framework and, in particular, by its open source implementation, Apache Hadoop. For cost effectiveness considerations, a common approach entails sharing server clusters among multiple users. The underlying infrastructure should provide every user with a fair share of computational resources, ensuring that Service Level Agreements (SLAs) are met and avoiding wastes. In this paper we consider two mathematical programming problems that model the optimal allocation of computational resources in a Hadoop 2.x cluster with the aim to develop new capacity allocation techniques that guarantee better performance in shared data centers. Our goal is to get a substantial reduction of power consumption while respecting the deadlines stated in the SLAs and avoiding penalties associated with job rejections. The core of this approach is a distributed algorithm for runtime capacity allocation, based on Game Theory models and techniques, that mimics the MapReduce dynamics by means of interacting players, namely the central Resource Manager and Class Managers
    • 

    corecore