3,693 research outputs found

    Optimizing the computation of overriding

    Full text link
    We introduce optimization techniques for reasoning in DLN---a recently introduced family of nonmonotonic description logics whose characterizing features appear well-suited to model the applicative examples naturally arising in biomedical domains and semantic web access control policies. Such optimizations are validated experimentally on large KBs with more than 30K axioms. Speedups exceed 1 order of magnitude. For the first time, response times compatible with real-time reasoning are obtained with nonmonotonic KBs of this size

    ILR Faculty Research in Progress, 2016-2017

    Get PDF
    The production of scholarly research continues to be one of the primary missions of the ILR School. During a typical academic year, ILR faculty members published or had accepted for publication over 25 books, edited volumes, and monographs, 170 articles and chapters in edited volumes, numerous book reviews. In addition, a large number of manuscripts were submitted for publication, presented at professional association meetings, or circulated in working paper form. Our faculty's research continues to find its way into the very best industrial relations, social science and statistics journals.ResearchinProgress_2016_17.pdf: 38 downloads, before Oct. 1, 2020

    The End of Al Qaeda? Rethinking the Legal End of the War on Terror

    Get PDF
    As the war on terrorism approaches its second decade, the open-ended nature of the 2001 Authorization for the Use of Military Force (AUMF) has given rise to the legal question of when, and how, the conflict will end. The indeterminate nature of the conflict has raised fears that the war powers will continue to be exercised indefinitely-a prospect noted with concern by the Supreme Court in Boumediene v. Bush. The prevailing view among legal scholars is that under existing precedents, the AUMF and the concomitant war powers will continue indefinitely in force until the political branches officially declare the conflict to have ended. This Note argues that this binary, on/off\u27 model of conflict termination is ill-adapted to a war against a rapidly evolving, amorphous terrorist threat. Contrary to the monolithic conception of terrorism relied upon by many legal scholars, the nature and structure of the terrorist threat are disputed within the counterterrorism community. Some analysts argue that the primary terrorist threat to the United States emanates from the hierarchically organized core al Qaeda based in the Pakistani tribal areas; others, from a decentralized leaderless jihad conducted by self-directed homegrown terrorists. This Note uses this debate, together with recent historical studies analyzing how terrorist groups end, as a lens through which to demonstrate how the amorphous, evolving nature of the al Qaeda threat undermines the prevailing on/off model of the legal end of the war on terrorism. It concludes by suggesting principles for constructing a more apt legal model of how and when the war on terrorism, and the legal authorities for fighting it, will come to an end

    Composable Distributed Access Control and Integrity Policies for Query-Based Wireless Sensor Networks

    Get PDF
    An expected requirement of wireless sensor networks (WSN) is the support of a vast number of users while permitting limited access privileges. While WSN nodes have severe resource constraints, WSNs will need to restrict access to data, enforcing security policies to protect data within WSNs. To date, WSN security has largely been based on encryption and authentication schemes. WSN Authorization Specification Language (WASL) is specified and implemented using tools coded in JavaTM. WASL is a mechanism{independent policy language that can specify arbitrary, composable security policies. The construction, hybridization, and composition of well{known security models is demonstrated and shown to preserve security while providing for modifications to permit inter{network accesses with no more impact on the WSN nodes than any other policy update. Using WASL and a naive data compression scheme, a multi-level security policy for a 1000-node network requires 66 bytes of memory per node. This can reasonably be distributed throughout a WSN. The compilation of a variety of policy compositions are shown to be feasible using a notebook{class computer like that expected to be performing typical WSN management responsibilities

    A Collaborative Access Control Model for Shared Items in Online Social Networks

    Get PDF
    The recent emergence of online social networks (OSNs) has changed the communication behaviors of thousand of millions of users. OSNs have become significant platforms for connecting users, sharing information, and a valuable source of private and sensitive data about individuals. While OSNs insert constantly new social features to increase the interaction between users, they, unfortunately, offer primitive access control mechanisms that place the burden of privacy policy configuration solely on the holder who has shared data in her/his profile regardless of other associated users, who may have different privacy preferences. Therefore, current OSN privacy mechanisms violate the privacy of all stakeholders by giving one user full authority over another’s privacy settings, which is extremely ineffective. Based on such considerations, it is essential to develop an effective and flexible access control model for OSNs, accommodating the special administration requirements coming from multiple users having a variety of privacy policies over shared items. In order to solve the identified problems, we begin by analyzing OSN scenarios where at least two users should be involved in the access control process. Afterward, we propose collaborative access control framework that enables multiple controllers of the shared item to collaboratively specify their privacy settings and to resolve the conflicts among co-controllers with different requirements and desires. We establish our conflict resolution strategy’s rules to achieve the desired equilibrium between the privacy of online users and the utility of sharing data in OSNs. We present a policy specification scheme for collaborative access control and authorization administration. Based on these considerations, we devise algorithms to achieve a collaborative access control policy over who can access or disseminate the shared item and who cannot. In our dissertation, we also present the implementation details of a proof-of-concept prototype of our approach to demonstrate the effectiveness of such an approach. With our approach, sharing and interconnection among users in OSNs will be promoted in a more trustworthy environment

    Terrorism and cyber attacks as hybrid threats: defining a comprehensive approach for countering 21st century threats to global peace and security

    Get PDF
    Multimodal, kinetic and non-kinetic threats to international peace and security, including cyber-attacks, low intensity asymmetric conflict scenarios, global terrorism, piracy, transnational organized crime, resources security, retrenchment from globalization and the proliferation of weapons of mass destruction, were identified by NATO as ‘hybrid threats,’ which state actors are ill-equipped to handle. This interdisciplinary article predicts that military doctrines, traditional concepts of war and peace, and legal perceptions will be challenged by the nature of these threats

    Corporate Complicity in International Criminal Law: Potential Responsibility of European Arms Dealers for Crimes Committed in Yemen

    Get PDF
    This article examines the question of corporate complicity within the framework of international criminal law and, more specifically, at the International Criminal Court (ICC). It does so by referencing a communication to the ICC filed by several non-governmental organizations, inviting the prosecutor to examine potential criminal responsibility of several European corporate officials who are knowingly supplying weapons to the United Arab Emirates/Saudi-led coalition currently engaged in a military offensive in Yemen. This submission raises an important legal question of whether the ICC’s Rome Statute provides for the possibility to hold corporate officials accountable in cases of complicity in gross human rights and humanitarian law violations. This article purports to answer this question by scrutinizing two specific provisions of the Rome Statute: Article 25(3)(c), which discusses aiding and abetting for the purpose of facilitating the commission of a crime, and Article 25(3)(d), which criminalizes contributions to the commission of a crime by a group of persons acting with a common purpose

    DEFENSE BUDGETING DYNAMICS: THE RELATIONSHIPS AMONG LATE BUDGETS AND LATE APPROPRIATIONS AND THE CONTENT OF CONTINUING RESOLUTIONS

    Get PDF
    To better prepare the Department of Defense (DOD) against the negative effects of late appropriations and their resultant continuing resolutions (CRs), our research covers three primary areas: 50 years of Presidential Budget (PB) submissions, Congressional Budget Resolutions (BR), and DOD Authorization and Appropriation Act data. First, our research conducts a historical trend analysis intended to highlight positive, negative, and neutral tendencies. Second, our research aims to determine which federal budgetary deliverable has the strongest correlation to appropriation timeliness. Finally, our research examines how CRs have evolved over time across six basic characteristics: frequency of CRs, CR anomalies, supplemental appropriations and anomalies, CR duration, CR page length, and funding rates. Our research indicated significant evidence to support that budgetary deliverable timeliness is getting worse, that political variables are both strongly correlated and highly influential throughout the data, and that CRs have dynamically shifted in funding structure, length, and frequency throughout the years covered by this research.Captain, United States ArmyLieutenant Commander, United States NavyApproved for public release. Distribution is unlimited
    • …
    corecore