73 research outputs found

    Multifaceted Faculty Network Design and Management: Practice and Experience Report

    Get PDF
    We report on our experience on multidimensional aspects of our faculty's network design and management, including some unique aspects such as campus-wide VLANs and ghosting, security and monitoring, switching and routing, and others. We outline a historical perspective on certain research, design, and development decisions and discuss the network topology, its scalability, and management in detail; the services our network provides, and its evolution. We overview the security aspects of the management as well as data management and automation and the use of the data by other members of the IT group in the faculty.Comment: 19 pages, 11 figures, TOC and index; a short version presented at C3S2E'11; v6: more proofreading, index, TOC, reference

    Lessons Learned Too Well: Anonymity in a Time of Surveillance

    Get PDF
    It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator\u27s identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names. This Article traces the global development of technologies and regulations hostile to online anonymity, beginning with the early days of the Internet. Offering normative and pragmatic arguments for why communicative anonymity is important, this Article argues that anonymity is the bedrock of online freedom, and it must be preserved. U.S. anti-anonymity policies not only enable repressive policies abroad but also place at risk the safety of anonymous communications that Americans may someday need. This Article, in addition to providing suggestions on how to save electronic anonymity, calls for proponents of anti-anonymity policies to provide stronger justifications for such policies and to consider alternatives less likely to destroy individual liberties. In a time where surveillance technology and laws demanding identification abound, protecting the right to speak freely without fear of official retribution is critical to protecting these liberties

    The role of non-state actors in regime formation: Case study on Internet governance.

    Get PDF
    Many scholars argue that the Internet is a symbol of globalization and avoidance of state control. The Internet governance negotiations, which aims to establish an international regime for the Internet, is conducted through a multi-stakeholder setting associated with extensive involvement of non-state actors. This has been viewed as an indicator for a \u27diminishing state role\u27 in international relations; particularly, formation of international regimes. This study indicates that the role of states does not diminish in regime formation. States, especially great powers, are the main actors that set international principles, norms, rules and decision-making procedures. They create regimes in order to regulate international behavior as to global sectors, including the Internet. States deliberately enable certain non-state actors to participate in regime formation and governance of some global sectors, based on conscious perception of the utility and usefulness of such participation

    Contribution to the Design of Digital Supply Chain Governance Concepts for Sustainable Development of Biodiesel

    Get PDF
    Biodiesel sowie Biokraftstoffe wurden in der letzten Zeit zunehmend in mehreren Vorträgen und Konferenzen diskutiert. Während viele der wissenschaftlichen Untersuchungen die Produktionsprobleme, wie Effizienz, Diversifizierung und Prozesstechnologie (1, 2, 3 generation) behandelten, wurde jedoch nur in einigen davon Biodiesel aus der logistischen Perspektive betrachtet. Trotzdem stellt Biodiesel ein Problem für die logistischen Prozesse dar, so wie Anlagenplanung, Transport und Tourenplanung verbunden mit der Qualitätskontrolle entlang der Kontinuität der Rohmaterialversorgung. In einigen Entwicklungsländern ist das Management der Biodiesel-Industrie in eine Zwangslage geraten. Obwohl Entwicklungsländer gemeinsam eine nationale Behörde für das Biodiesel-Geschäft eingeführt haben, ist die Institution nach wie vor in den frühen Stadien der Standardisierung sowie Qualitätskontrolle. Derzeit gibt es keine Agentur für die Supply Chain Führung, die für die Integration des Biodiesel-Geschäftes zwischen vorgelagerten und nachgelagerten Bereiche fähig ist. In dieser Arbeit stellt der Autor eine Prozesstechnik vor, um die die Biodiesel-Industrie zu bewerten. Diese Prozedur kombiniert Geschäftsmodell/-analyse (unter Nutzung der General Electric/Mc. Kinsey Matrix), Simulation, Konzeptentwurf und ein Prototyping-System. Die Studie leistet einen wissenschaftlichen Beitrag für die Planung einer digitalen Biodiesel Supply Chain und bildet einen Rahmen für die Führung eines solchen Systems vom vorgelagertem zum nachgelagerten Bereich. Der Forscher verwendet eine ganzheitliche Betrachtung, wo Biodiesel nicht als eine gesonderte Einheit gesehen wird, aufgrund der Tatsache, dass es den Konsumenten, abhängig von unterschiedlichen Aspekten, von einer langen Kette ankommt. Um ihre Geschäfte zu managen, haben viele Unternehmen Enterprise-Resource-Planning eingeführt, aber leider waren sie nicht in der Lage die gesamte Wertschöpfungskette damit zu erreichen. Digitalisierung ist bei der Integration des Informationssystems von allen Supply Chain Mitgliedern wünschenswert. Um solch eine Idee anzupassen sowie den gesamten Prozess zu überwachen, muss ein Kontrollturm gebaut werden. In Folge dessen könnte die beste standardisierte Qualität und Nachhaltigkeit erreicht werden. Der Autor schlägt ebenso ein Übergangskonzept in der Implementierungsebene vor, aufgrund der Tatsache, dass die Supply Chain Mitglieder in der Realität keine ähnlichen Informationssystem-Standards zur Verfügung haben. Das Ergebnis der Literatur-Studien, Simulationen, Prototypenentwicklungen, theoretischen Argumente und Konzeptentwürfen präsentiert eine Digitalisierungsmuster in der Supply Chain von Biodiesel für die nachhaltige Entwicklung.Recently, biodiesel and biofuel have increasingly been discussed in several papers and conferences. However, only a few have examined biodiesel from the logistics perspective, while most of the scientific investigations have addressed the production issues, e.g. efficiency, diversification and processing technology (1st, 2nd or 3rd generation). In spite of this, biodiesel poses a problem for logistic processes, such as facility planning, transport, and routing-scheduling associated with quality control along with continuity of feedstock supply. In some developing countries, the management of the biodiesel industry has also become a predicament. Even though developed countries have commonly established a national agency in charge of the biodiesel business, the institution is still in the early stages of standardisation and quality control. Currently, there is no agency concerned with supply chain governance that is capable of integrating the biodiesel business from upstream to downstream. In this thesis, the author presents a procedural technique to assess the biodiesel industry. This procedure combines business modelling/analysis (using General Electric/Mc. Kinsey Matrix), simulation, conceptual design and a prototyping system. The study provides scientific insight for planning a digital biodiesel supply chain and proposes a framework for governing such a system from upstream to downstream. The researcher employs a holistic approach, where biodiesel is not seen as a separate entity because it comes to the consumers through a long chain dependent on various aspects. Currently, a number of companies have implemented Enterprise-Resource-Planning to manage their businesses, but unfortunately, they have not been able to reach the entire value chain. Digitalisation is desirable when integrating the Information Systems of all supply chain members. A control tower must be built to accommodate such an idea and monitor the entire process. Then, the best standardised quality and sustainability can be achieved. The author also offers a transition concept in the implementation level, because, in reality, the members in the supply chain have no similar Informastion-System standard. The results from literature studies, simulations, prototyping, theoretical arguments, and conceptual design present a digitalisation pattern in the biodiesel supply chain for sustainable development

    MPTCP Robustness Against Large-Scale Man-in-the-Middle Attacks

    Get PDF
    International audienceMultipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed at large scale. Recently, the Multipath Transmission Control Protocol (MPTCP) extension was standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers to core networks. Among its major benefits-i.e., reliability thanks to backup path rerouting, through-put increase thanks to link aggregation, and confidentiality being more difficult to intercept a full connection-the latter has attracted lower attention. How effective would be to use MPTCP, or an equivalent multipath transport layer protocol, to exploit multiple Internet-scale paths and decrease the probability of Man-in-the-Middle (MITM) attacks is a question which we try to answer. By analyzing the Autonomous System (AS) level graph, we identify which countries and regions show a higher level of robustness against MITM AS-level attacks, for example due to core cable tapping or route hijacking practices.

    Compilation of thesis abstracts, September 2009

    Get PDF
    NPS Class of September 2009This quarter’s Compilation of Abstracts summarizes cutting-edge, security-related research conducted by NPS students and presented as theses, dissertations, and capstone reports. Each expands knowledge in its field.http://archive.org/details/compilationofsis109452751
    corecore