86,090 research outputs found

    Beyond the Notion of Security Community: What Role for the African Regional Organizations in Peace and Security?

    Get PDF
    African Union, regional economic communities, integration, multilevel governance, security community

    Perceptions of Job Security in Europe’s Ageing Workforce

    Get PDF
    Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers’ perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there are considerable cross-country variations around a median value of 23% of workers aged 50 or older ranking their job security as poor, none of our suggested macro-level variables – labour force participation rate, employment protection legislation, mean level of general social trust, and proportion disapproving of working beyond age 70 – bears statistically significant associations with individuals’ job security. Future research should aim at identifying statistically more powerful indicators of the supposed multilevel relationship between social context and older workers’ perceptions of job security. Moreover, supplementary findings indicate that further attention should be paid to the gender dimension of job insecurity.

    Applying the take-grant protection model

    Get PDF
    The Take-Grant Protection Model has in the past been used to model multilevel security hierarchies and simple protection systems. The models are extended to include theft of rights and sharing information, and additional security policies are examined. The analysis suggests that in some cases the basic rules of the Take-Grant Protection Model should be augmented to represent the policy properly; when appropriate, such modifications are made and their efforts with respect to the policy and its Take-Grant representation are discussed

    Quantum Key Distribution using Multilevel Encoding: Security Analysis

    Get PDF
    We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in finite high-dimensional Hilbert spaces. This protocol is an extension of Bennett's and Brassard's basic protocol from two bases, two state encoding to a multi bases, multi state encoding. We analyze the mutual information between the legitimate parties and the eavesdropper, and the error rate, as function of the dimension of the Hilbert space, while considering optimal incoherent and coherent eavesdropping attacks. We obtain the upper limit for the legitimate party error rate to ensure unconditional security when the eavesdropper uses incoherent and coherent eavesdropping strategies. We have also consider realistic noise caused by detector's noise.Comment: 8 pages, 3 figures, REVTe

    Creating Multilevel Security Governance in South America

    Get PDF
    South America’s security agenda demands the simultaneous management of domestic crises, interstate conflicts and transnational threats. Though located at different systemic levels (national, international, transnational), the three conflict clusters are often interrelated and tend to overlap in the region’s border areas. The region’s policy makers, aware of this highly complex agenda and in spite of their striking differences, have tended to build regional structures of authority that coordinate, manage and rule collective responses to these threats. In addition, the unilateral, bilateral and multilateral structures and the region’s capabilities to solve conflicts have become more important than the respective inter- American bodies over the past decade. Given this shift in the management of regional security affairs, we ask if a multilevel approach on the part of an overarching security architecture is more effective than separate governance schemes regarding each specific security threat. Since neither the traditional models of power balancing and alliance building nor the security-community approach can sufficiently explain the region’s security dynamics, we assume and provide evidence that different systems of security governance overlap and coexist in South America.Central African Republic, peace process, political parties, rebel movements,representation

    Finite-key security analysis for multilevel quantum key distribution

    Get PDF
    We present a detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite key length scenario. The finite secret key rates are calculated as a function of the length of the sifted key by (i) generalizing the uncertainly relation-based insight from BB84 to any d-level 2-MUB QKD protocol and (ii) by adopting recent advances in the second-order asymptotics for finite block length quantum coding (for both d-level 2- and 3-MUB QKD protocols). Since the finite and asymptotic secret key rates increase with d and the number of MUBs (together with the tolerable threshold) such QKD schemes could in principle offer an important advantage over BB84. We discuss the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons.Comment: v4: close to the published versio

    A Taxonomy for Attack Patterns on Information Flows in Component-Based Operating Systems

    Full text link
    We present a taxonomy and an algebra for attack patterns on component-based operating systems. In a multilevel security scenario, where isolation of partitions containing data at different security classifications is the primary security goal and security breaches are mainly defined as undesired disclosure or modification of classified data, strict control of information flows is the ultimate goal. In order to prevent undesired information flows, we provide a classification of information flow types in a component-based operating system and, by this, possible patterns to attack the system. The systematic consideration of informations flows reveals a specific type of operating system covert channel, the covert physical channel, which connects two former isolated partitions by emitting physical signals into the computer's environment and receiving them at another interface.Comment: 9 page

    Multilevel adaptive security system

    Get PDF
    Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ad hoc secure routing protocols and multilevel security are first reviewed. Then a new system, called the Multilevel Adaptive Security System, which incorporates the multilevel security concept at both the application layer and the network layer, is proposed to provide adaptive security services for data and routing processes. MLASS is composed of two subsystems: Content-Based Multi-level Data Security (CB-MLDS) for content-rich data protection and Multi-Level On-demand Secure Mobile Ad hoc Routing (MOSAR) for secure route selection. The structure of each sub-system is explained in detail; experiments for each sub-system were conducted and the performance was analyzed. It is shown that MLASS is a practical security solution that is flexible enough to adapt to a range of security requirements and applies appropriate level of security services to data and its distribution over ad hoc networks. MLASS provides a balance between security, performance and resource
    • …
    corecore