12,486 research outputs found

    THE EMERGING OF A MULTILATERAL FORUM FOR DEBT RESTRUCTURING: THE PARIS CLUB

    Get PDF
    This paper describes the evolution of intergovernmental relationships on debt rescheduling. It starts describing some experiences that aroused in the 18th Century and which negotiations were carried out, in many occasions, with the help of gunboat diplomacy. The settlement of liabilities that were created at the aftermath of the two 20th Century World Wars, which were – at least for some countries –- not exactly debt but war reparations, gave some insights in how to deal with these problems allowing the debtor country to find its own path to get out of the debt overhang. The settlement of these foreign liabilities may give some guidelines for dealing with debt restructuring in more general cases The creation of the Paris Club – which is a very civilized way to settle debt defaults compared to gunboat diplomacy – is analyzed and described here: first its emergency as an ad hoc transitory institution and later its evolution toward its definitive establishment in the international financial system landscape. It is also suggested that for a combination of events, which included the launch in Evian of the G-8’s so-called Evian Approach for the Paris Club, as well as the lack of support of some major industrialized countries to the implementation of a Sovereign Debt Restructuring Mechanism (SDRM), the Paris Club has become the only feasible international intergovernmental debt restructuring mechanism in spite of numerous shortcomings embodied in it. On this basis, some improvements of the actual mechanism are proposed, without precluding the possibility of the implementation of a more equilibrated SDRM in the future.

    Control Over Dispute-System Design and Mandatory Commercial Arbitration

    Get PDF
    This article argues that mandatory arbitration is not itself the problem. The problem is instead that in some instances, one party to the dispute has exclusive control of the design of the dispute-resolution system. Consequently, research on mandatory arbitration should concentrate on who is structuring it, how they structure it, why this is so and how these choices affect dispute outcomes

    Modelling, validating, and ranking of secure service compositions

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this recordIn the world of large-scale applications, software as a service (SaaS) in general and use of microservices, in particular, is bringing service-oriented architectures to a new level: Systems in general and systems that interact with human users (eg, sociotechnical systems) in particular are built by composing microservices that are developed independently and operated by different parties. At the same time, SaaS applications are used more and more widely by enterprises as well as public services for providing critical services, including those processing security or privacy of relevant data. Therefore, providing secure and reliable service compositions is increasingly needed to ensure the success of SaaS solutions. Building such service compositions securely is still an unsolved problem. In this paper, we present a framework for modelling, validating, and ranking secure service compositions that integrate both automated services as well as services that interact with humans. As a unique feature, our approach for ranking services integrates validated properties (eg, based on the result of formally analysing the source code of a service implementation) as well as contractual properties that are part of the service level agreement and, thus, not necessarily ensured on a technical level

    2021 June 15 – Board of Trustees Agenda and Minutes

    Get PDF

    Estabelecimento de redes de comunidades sobreponĂ­veis

    Get PDF
    Doutoramento em Engenharia InformĂĄticaUma das ĂĄreas de investigação em TelecomunicaçÔes de interesse crescente prende-se com os futuros sistemas de comunicaçÔes mĂłveis de 4a geração e alĂ©m destes. Nos Ășltimos anos tem sido desenvolvido o conceito de redes comunitĂĄrias, no qual os utilizadores se agregam de acordo com interesses comuns. Estes conceitos tĂȘm sido explorados de uma forma horizontal em diferentes camadas da comunicação, desde as redes comunitĂĄrias de comunicação (Seattle Wireless ou Personal Telco, p.ex.) atĂ© Ă s redes de interesses peer-to-peer. No entanto, estas redes sĂŁo usualmente vistas como redes de overlay, ou simplesmente redes de associação livre. Na prĂĄtica, a noção de uma rede auto-organizada, completamente orientada ao serviço/comunidade, integralmente suportada em termos de arquitetura, nĂŁo existe. Assim este trabalho apresenta uma realização original nesta ĂĄrea de criação de redes comunitĂĄrias, com uma arquitetura subjacente orientada a serviço, e que suporta integralmente mĂșltiplas redes comunitĂĄrias no mesmo dispositivo, com todas as caracterĂ­sticas de segurança, confiança e disponibilização de serviço necessĂĄrias neste tipo de cenĂĄrios (um nĂł pode pertencer simultaneamente a mais do que uma rede comunitĂĄria). Devido Ă  sua importĂąncia para os sistemas de redes comunitĂĄrias, foi dado particular atenção a aspetos de gestĂŁo de recursos e controlo de acessos. Ambos realizados de uma forma descentralizada e considerando mecanismos dotados de grande escalabilidade. Para isso, Ă© apresentada uma linguagem de polĂ­ticas que suporta a criação de comunidades virtuais. Esta linguagem nĂŁo Ă© apenas utilizada para o mapeamento da estrutura social dos membros da comunidade, como para, gerir dispositivos, recursos e serviços detidos pelos membros, de uma forma controlada e distribuĂ­da.One of the research areas with increasing interest in the field of telecommunications, are the ones related to future telecommunication systems, both 4th generation and beyond. In parallel, during the last years, several concepts have been developed related to clustering of users according to their interested, in the form of community networks. Solutions proposed for these concepts tackle the challenges horizontally, for each layer of the communication stack, ranging from community based communication networks (e.g. Seattle Wireless, or Personal Telco), to interest networks based on peer-to-peer protocols. However, these networks are presented either as free joining, or overlay networks. In practice, the notion of a self-organized, service and community oriented network, with these principles embedded in its design principles, is yet to be developed. This work presents an novel instantiation of a solution in the area of community networks, with a underlying architecture which is fully service oriented, and envisions the support for multiple community networks in the same device. Considerations regarding security, trust and service availability for this type of environments are also taken. Due to the importance of resource management and access control, in the context of community driven communication networks, a special focus was given to the support of scalable and decentralized management and access control methods. For this purpose, it is presented a policy language which supports the creation and management of virtual communities. The language is not only used for mapping the social structure of the community members, but also to, following a distributed approach, manage devices, resources and services owned by each community member

    Political Regimes, Bureaucracy, and Scientific Productivity

    Get PDF
    Can a scientist trust that the government is going to pay him or her fairly? In the science–government relationship, an incumbent may be better off if he or she does not provide—or does not provide a fair pay to public scientists. We propose a simple game-theoretic model for understanding the trust problem in the relationship between governments and scientists. The model shows how with reliable governments (democracies), bureaucratic contracts (e.g., secure tenure) are not optimal since they have low-powered incentives (in contrast to the highpowered private-sector type of contracts) and run against scientists’ responsiveness to government demands. However, with nonreliable governments (dictatorships), bureaucratic contracts are second-best solutions because they protect scientists against the possibility of governments’ misbehavior (i.e., ex post opportunistic defections, such as canceling research programs overnight). An empirical analysis confirms the predictions: bureaucratic contracts enhance scientific productivity with nonreliable governments (dictatorships) but hamper scientific productivity with reliable governments (democracies).Publicad

    Assured information sharing for ad-hoc collaboration

    Get PDF
    Collaborative information sharing tends to be highly dynamic and often ad hoc among organizations. The dynamic natures and sharing patterns in ad-hoc collaboration impose a need for a comprehensive and flexible approach to reflecting and coping with the unique access control requirements associated with the environment. This dissertation outlines a Role-based Access Management for Ad-hoc Resource Shar- ing framework (RAMARS) to enable secure and selective information sharing in the het- erogeneous ad-hoc collaborative environment. Our framework incorporates a role-based approach to addressing originator control, delegation and dissemination control. A special trust-aware feature is incorporated to deal with dynamic user and trust management, and a novel resource modeling scheme is proposed to support fine-grained selective sharing of composite data. As a policy-driven approach, we formally specify the necessary pol- icy components in our framework and develop access control policies using standardized eXtensible Access Control Markup Language (XACML). The feasibility of our approach is evaluated in two emerging collaborative information sharing infrastructures: peer-to- peer networking (P2P) and Grid computing. As a potential application domain, RAMARS framework is further extended and adopted in secure healthcare services, with a unified patient-centric access control scheme being proposed to enable selective and authorized sharing of Electronic Health Records (EHRs), accommodating various privacy protection requirements at different levels of granularity

    Energy management in mobile devices with the cinder operating system

    Get PDF
    We argue that controlling energy allocation is an increasingly useful and important feature for operating systems, especially on mobile devices. We present two new low-level abstractions in the Cinder operating system, reserves and taps, which store and distribute energy for application use. We identify three key properties of control -- isolation, delegation, and subdivision -- and show how using these abstractions can achieve them. We also show how the architecture of the HiStar information-flow control kernel lends itself well to energy control. We prototype and evaluate Cinder on a popular smartphone, the Android G1.National Science Foundation (U.S.) (grant #0831163)National Science Foundation (U.S.) (grant #0846014)Natural Sciences and Engineering Research Council of Canada (NSERC)King Abdullah University of Science and TechnologyMicrosoft ResearchNational Science Foundation (U.S.) (Cybertrust award CNS-0716806)National Science Foundation (U.S.) (POMI (Programmable Open Mobile Internet) 2020 Expedition Grant #0832820)T-Mobile US
    • 

    corecore