2,653 research outputs found

    Sovereign Debt: Now What?

    Get PDF
    The sovereign debt restructuring regime looks like it is coming apart. Changing patterns of capital flows, old creditors’ weakening commitment to past practices, and other stakeholders’ inability to take over, or coalesce behind a viable alternative, have challenged the regime from the moment it took shape in the mid-1990s. By 2016, its survival cannot be taken for granted. Crises in Argentina, Greece, and Ukraine since 2010 exposed the regime’s perennial failures and new shortcomings. Until an alternative emerges, there may be messier, more protracted restructurings, more demands on public resources, and more pressure on national courts to intervene in disputes that they are ill-suited to resolve. Initiatives emanating from wildly different actors — the United Nations General Assembly, the International Monetary Fund, the International Capital Market Association and the Jubilee coalition, among others — reflect broad-based demand for reform. Now is the time to reconsider the institutional architecture of sovereign debt restructuring, along with the norms and alliances that underpin it. In this symposium essay, I suggest broad criteria for evaluating a successor regime, and offer a package of incremental measures to advance sustainability, fairness, and accountability

    Mecanismos dinâmicos de segurança para redes softwarizadas e virtualizadas

    Get PDF
    The relationship between attackers and defenders has traditionally been asymmetric, with attackers having time as an upper hand to devise an exploit that compromises the defender. The push towards the Cloudification of the world makes matters more challenging, as it lowers the cost of an attack, with a de facto standardization on a set of protocols. The discovery of a vulnerability now has a broader impact on various verticals (business use cases), while previously, some were in a segregated protocol stack requiring independent vulnerability research. Furthermore, defining a perimeter within a cloudified system is non-trivial, whereas before, the dedicated equipment already created a perimeter. This proposal takes the newer technologies of network softwarization and virtualization, both Cloud-enablers, to create new dynamic security mechanisms that address this asymmetric relationship using novel Moving Target Defense (MTD) approaches. The effective use of the exploration space, combined with the reconfiguration capabilities of frameworks like Network Function Virtualization (NFV) and Management and Orchestration (MANO), should allow for adjusting defense levels dynamically to achieve the required security as defined by the currently acceptable risk. The optimization tasks and integration tasks of this thesis explore these concepts. Furthermore, the proposed novel mechanisms were evaluated in real-world use cases, such as 5G networks or other Network Slicing enabled infrastructures.A relação entre atacantes e defensores tem sido tradicionalmente assimétrica, com os atacantes a terem o tempo como vantagem para conceberem uma exploração que comprometa o defensor. O impulso para a Cloudificação do mundo torna a situação mais desafiante, pois reduz o custo de um ataque, com uma padronização de facto sobre um conjunto de protocolos. A descoberta de uma vulnerabilidade tem agora um impacto mais amplo em várias verticais (casos de uso empresarial), enquanto anteriormente, alguns estavam numa pilha de protocolos segregados que exigiam uma investigação independente das suas vulnerabilidades. Além disso, a definição de um perímetro dentro de um sistema Cloud não é trivial, enquanto antes, o equipamento dedicado já criava um perímetro. Esta proposta toma as mais recentes tecnologias de softwarização e virtualização da rede, ambas facilitadoras da Cloud, para criar novos mecanismos dinâmicos de segurança que incidem sobre esta relação assimétrica utilizando novas abordagens de Moving Target Defense (MTD). A utilização eficaz do espaço de exploração, combinada com as capacidades de reconfiguração de frameworks como Network Function Virtualization (NFV) e Management and Orchestration (MANO), deverá permitir ajustar dinamicamente os níveis de defesa para alcançar a segurança necessária, tal como definida pelo risco actualmente aceitável. As tarefas de optimização e de integração desta tese exploram estes conceitos. Além disso, os novos mecanismos propostos foram avaliados em casos de utilização no mundo real, tais como redes 5G ou outras infraestruturas de Network Slicing.Programa Doutoral em Engenharia Informátic

    Research at Worcester Polytechnic Institute, Fall 2013

    Get PDF
    https://digitalcommons.wpi.edu/wpiresearch-all/1001/thumbnail.jp

    A Bargaining Power Theory of Gap-Filling

    Full text link

    Washington University Record, February 9, 2001

    Get PDF
    https://digitalcommons.wustl.edu/record/1886/thumbnail.jp

    Washington University Record, July 15, 2005

    Get PDF
    https://digitalcommons.wustl.edu/record/2041/thumbnail.jp

    Opportunities for WPI in Washington D.C.

    Get PDF
    The purpose of this project was to determine ways to raise awareness of opportunities available to WPI in the Washington, D.C. area. The team\u27s focus was to locate federal funding opportunities for WPI\u27s faculty, and to create relationships with foreign embassies where WPI currently has project centers. A database was created, detailing opportunities in D.C. to facilitate the identification of funding for WPI faculty. Recommendations were created to outline greatest potential mutual benefits between WPI and agencies. Visits occurred with officials at the South African and Thailand embassies. The team created and presented pamphlets outlining student projects completed in these countries. The embassy visits could lead to future collaboration between WPI and these nations

    An Assessment of U.S. Drug Problems and Policy

    Get PDF
    This PDF document was made available from www.rand.org as a public service of the RAND Corporation. Jump down to document6 INTERNATIONAL AFFAIR

    The Accelerator, Volume 8 Issue 15, Summer 2015

    Get PDF

    Building an Effective Health Insurance Exchange Website

    Get PDF
    Offers lessons and resources from Massachusetts about teams and partnerships, vendors, stakeholder input, system requirements, and ongoing improvement to help states plan, build, and implement Web sites for health insurance exchanges
    • …
    corecore