23 research outputs found

    Legal Pluralism in Ethiopia: Actors, Challenges and Solutions

    Get PDF
    Being a home to more than 80 ethnic groups, Ethiopia has to balance normative diversity with efforts to implement state law across its territory. This volume explores the co-existence of state, customary, and religious legal forums from the perspective of legal practitioners and local justice seekers. It shows how the various stakeholders' use of negotiation, and their strategic application of law can lead to unwanted confusion, but also to sustainable conflict resolution, innovative new procedures and hybrid norms. The book thus generates important knowledge on the conditions necessary for stimulating a cooperative co-existence of different legal systems

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books

    Flexible Hardware-based Security-aware Mechanisms and Architectures

    Get PDF
    For decades, software security has been the primary focus in securing our computing platforms. Hardware was always assumed trusted, and inherently served as the foundation, and thus the root of trust, of our systems. This has been further leveraged in developing hardware-based dedicated security extensions and architectures to protect software from attacks exploiting software vulnerabilities such as memory corruption. However, the recent outbreak of microarchitectural attacks has shaken these long-established trust assumptions in hardware entirely, thereby threatening the security of all of our computing platforms and bringing hardware and microarchitectural security under scrutiny. These attacks have undeniably revealed the grave consequences of hardware/microarchitecture security flaws to the entire platform security, and how they can even subvert the security guarantees promised by dedicated security architectures. Furthermore, they shed light on the sophisticated challenges particular to hardware/microarchitectural security; it is more critical (and more challenging) to extensively analyze the hardware for security flaws prior to production, since hardware, unlike software, cannot be patched/updated once fabricated. Hardware cannot reliably serve as the root of trust anymore, unless we develop and adopt new design paradigms where security is proactively addressed and scrutinized across the full stack of our computing platforms, at all hardware design and implementation layers. Furthermore, novel flexible security-aware design mechanisms are required to be incorporated in processor microarchitecture and hardware-assisted security architectures, that can practically address the inherent conflict between performance and security by allowing that the trade-off is configured to adapt to the desired requirements. In this thesis, we investigate the prospects and implications at the intersection of hardware and security that emerge across the full stack of our computing platforms and System-on-Chips (SoCs). On one front, we investigate how we can leverage hardware and its advantages, in contrast to software, to build more efficient and effective security extensions that serve security architectures, e.g., by providing execution attestation and enforcement, to protect the software from attacks exploiting software vulnerabilities. We further propose that they are microarchitecturally configured at runtime to provide different types of security services, thus adapting flexibly to different deployment requirements. On another front, we investigate how we can protect these hardware-assisted security architectures and extensions themselves from microarchitectural and software attacks that exploit design flaws that originate in the hardware, e.g., insecure resource sharing in SoCs. More particularly, we focus in this thesis on cache-based side-channel attacks, where we propose sophisticated cache designs, that fundamentally mitigate these attacks, while still preserving performance by enabling that the performance security trade-off is configured by design. We also investigate how these can be incorporated into flexible and customizable security architectures, thus complementing them to further support a wide spectrum of emerging applications with different performance/security requirements. Lastly, we inspect our computing platforms further beneath the design layer, by scrutinizing how the actual implementation of these mechanisms is yet another potential attack surface. We explore how the security of hardware designs and implementations is currently analyzed prior to fabrication, while shedding light on how state-of-the-art hardware security analysis techniques are fundamentally limited, and the potential for improved and scalable approaches

    Mobile Ad-Hoc Networks

    Get PDF
    Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks

    Financial disclosure in developing countries with special reference to Bangladesh

    Get PDF

    The Legal Authority of Non-State Rules: Application in International Commercial Contracts

    Get PDF
    This thesis examines the legal authority of non-state rules in international commercial contracts and their application in state courts. Non-state rules can be divided in uncodified rules and codified rules. Uncodified non-state rules are general principles of law, practices, trade usages, and custom. They have a customary origin. Codified non-state rules are model laws, restatements of law, standard terms and conditions, and guidelines. They are created by international organisations and trade associations. Non-state rules have legal authority in the national and the international sphere. Their legal authority can be established by looking at different factors: promulgator, substance, support, and application. It is especially the last factor which plays a deciding role in measuring their legal authority. This thesis uses three main case studies: France, England, and the US to understand the legal authority of non-state rules. After having established what non-state rules are and how their legal authority can be measured this thesis concentrates on their application in courts. It asks three important questions: when can non-state rules be applied? When are they applied? And how are they applied? There are four scenarios in which non-state rules are applied in descending degrees of legal authority: first of all, they are applied as the applicable law to the contract, secondly they are applied as sources of domestic law, thirdly they are used to interpret the applicable law, and fourthly they are applied as contractual rules. Legislations have a preference for uncodified non-state rules such as trade usages and general principles. These are often sources of domestic law. To apply these uncodified non-state rules judiciary resorts to codified non-state rules to go from the general principle to the practical application. After studying the application of non-state rules in depth, this thesis concludes with a framework and classification that leads to understanding the legal authority of non-state rules

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books

    Internet and society in Latin America and the Caribbean

    Get PDF
    Published in Malaysia by SouthboundSpanish version available in IDRC Digital Library: Internet y sociedad en América Latina y el Carib
    corecore