22,641 research outputs found
When mobility is not a choice Problematising asylum seekersâ secondary movements and their criminalisation in the EU. CEPS Paper in Liberty and Security in Europe No. 2019-11, December 2019
The notion of âsecondary movementsâ is commonly used to describe the mobility of third country
nationals for the purpose of seeking international protection in an EU member state other than the
one of first irregular entry according to the EU Dublin Regulation. Secondary movements are often
identified as a major insecurity factor undermining the sustainability of the Schengen regime and
the functioning of the EU Dublin system. Consequently, EU policies have focused on their
âcriminalisationâ, as testified by the range of sanctions included in the 2016 CEAS reform package,
and on a âpolicingâ approach, which has materialised in the expanded access to data stored in the
EURODAC database by police authorities, and its future interconnection with other EU databases
under the 2019 EU Interoperability Regulations.
This Paper shows that the EU notion of secondary movements is flawed and must be reconsidered
in any upcoming reform of the CEAS. The concept overlooks the fact that asylum seekersâ mobility
may be non-voluntary and thus cannot be understood as a matter of âfree choiceâ or in terms of
âpreferencesâ about the member state of destination. Such an understanding is based on the wrong
assumption that asylum seekersâ decisions to move to a different EU country are illegitimate, as all
EU member states are assumed to be âsafeâ for people in need of international protectio
PKI Interoperability: Still an Issue? A Solution in the X. 509 Realm
There exist many obstacles that slow the global adoption of public key infrastructure (PKI) technology. The PKI interoperability problem, being poorly understood, is one of the most confusing. In this paper, we clarify the PKI interoperability issue by exploring both the juridical and technical domains. We demonstrate the origin of the PKI interoperability problem by determining its root causes, the latter being legal, organizational and technical differences between countries, which mean that relying parties have no one to rely on. We explain how difficult it is to harmonize them. Finally, we propose to handle the interoperability problem from the trust management point of view, by introducing the role of a trust broker which is in charge of helping relying parties make informed decisions about X.509 certificates
Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010
It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of âsecurityâ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U
Recommended from our members
Jurisdiction and cloud computing: Further challenges to Internet jurisdiction
Copyright © 2013 Kluwer Law InternationalThe importance of this timely research can also be evidenced by the recent European Commission Decision of 18.06.2013 on setting up the Commission Expert Group on Cloud Computing Contracts ((2013/C 174/04)
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
Secure data sharing and processing in heterogeneous clouds
The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes. The public sector, however, lacks the necessary technology to enable effective, interoperable and secure integration of a multitude of its computing clouds and services. In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities. We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments. We identify the main challenges and frame the future work that serve as an enabler of interoperability among heterogeneous infrastructures and services. Our goal is to enable both security and legal conformance as well as to facilitate transparency, privacy and effectivity of private cloud federations for the public sector needs. © 2015 The Authors
MSUO Information Technology and Geographical Information Systems: Common Protocols & Procedures. Report to the Marine Safety Umbrella Operation
The Marine Safety Umbrella Operation (MSUO) facilitates the cooperation between Interreg
funded Marine Safety Projects and maritime stakeholders. The main aim of MSUO is to
permit efficient operation of new projects through Project Cooperation Initiatives, these
include the review of the common protocols and procedures for Information Technology (IT)
and Geographical Information Systems (GIS).
This study carried out by CSA Group and the National Centre for Geocomputation (NCG)
reviews current spatial information standards in Europe and the data management
methodologies associated with different marine safety projects.
International best practice was reviewed based on the combined experience of spatial data
research at NCG and initiatives in the US, Canada and the UK relating to marine security
service information and acquisition and integration of large marine datasets for ocean
management purposes.
This report identifies the most appropriate international data management practices that could
be adopted for future MSUO projects
- âŠ