85,458 research outputs found

    Secrecy and Group Creation

    Get PDF
    AbstractWe add an operation of group creation to the typed pi-calculus, where a group is a type for channels. Creation of fresh groups has the effect of statically preventing certain communications, and can block the accidental or malicious leakage of secrets. We adapt a notion of secrecy introduced by Abadi, and prove a preservation of secrecy property. When applied to the ambient calculus, the same notion of group creation can be used to create and preserve shared secrets among mobile agents

    A Tale of Two Paranoids: A Critical Analysis of the Use of the Paranoid Style and Public Secrecy by Donald Trump and Viktor OrbƔn

    Get PDF
    Within the last decade, a rising tide of right-wing populism across the globe has inspired a renewed push toward nationalism. Capitalizing on an increasingly chaotic public sphere, leaders are stoking fear in their constituents such that their radical ideologies and hardline policy decisions may be enacted. This article offers a comparative study of two leaders exploiting the vulnerabilities of their respective citizenries: United States President Donald Trump and Hungarian Prime Minister Victor OrbĆ”n. Drawing from and reimagining Richard Hofstadterā€™s germane essay, ā€œThe Paranoid Style in American Politics,ā€ we argue that both represent a new manifestation of the paranoid style as it enables (and is enabled by) ā€œpublic secrecy.ā€ By controlling the media and redirecting collective attention by way of rhetorical sleight of hand, the two are able to sow disorder and confusion such that their secrecy may persist out in the open. Despite using similar issues to promulgate fear and paranoia, most prominently the refugee and immigration crises, and their similar end goals, the two must nonetheless engage in different discursive strategies that reflect the distinct cultures and histories of their respective countries

    Name-passing calculi and crypto-primitives: A survey

    No full text
    The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons. First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap. Secondly, the literature on the subject has been growing at very high rate over the years. As a consequence, we decided to concentrate on few papers that introduce the main ideas, in the hope that discussing them in some detail will provide sufficient insight for further reading

    Tolkien and the Deadly Sin of Greed

    Get PDF
    Tolkienā€™s genius as a writer and insight as a philosopher and theologian (of sorts) are reflected in his subtle yet impactful interweaving of the consequences of greed within the lives of the peoples of Middle-Earth. He shows readers that greed is not simply the love of money. Greed is the root of all evil, and it takes a variety of forms, as represented by Sauronā€™s desire to possess power over and control others, Sarumanā€™s imitative desire, and Feanorā€™s over-possessiveness of his sub-creative acts. Tolkien also reveals that a proper relationship with nature can provide recovery from the drab familiarity which the appropriation of nature can cause. Ultimately, Tolkien shows that in relinquishing possession of the things and people we most desire, we can find a greater sense of personhood, relationality, and peace within the world

    Open secrets

    Get PDF
    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and institutional roles as well. Somewhat surprisingly, given the lawā€™s focus on secrecy, among the institutional products of trade secrets law are commons, or managed openness: environments designed to facilitate the structured sharing of information. The paper illustrates with examples drawn from existing literature on cuisine, magic, and Internet search.

    Parenting and child development in families with a child conceived through embryo donation

    Get PDF
    Concerns have been raised regarding the potentially negative effects of conception using donated embryos on parenting and child development. Findings are presented of an exploratory study of families with a child conceived through embryo donation. Twenty-one embryo donation families were compared with 28 adoptive families and 30 in vitro fertilization families on standardized interview and questionnaire measures of the parents' marital and psychological state, the quality of parent-child relationships, and the child's development. In all 3 groups, the children were aged 2-5 years. The differences indicated higher emotional overinvolvement and defensive responding in the embryo donation families, along with greater secrecy about the child's origins. The children were not at increased risk of psychological problems. The study provides interesting but preliminary findings on parent-child relationships and child development in a new family form

    ANALYSING FACTORS INFLUENCING INTANGIBLE ASSET DISCLOSURE (STUDY IN SOUTH-EAST ASIA AND AUSTRALIA TELECOMMUNICATION INDUSTRY)

    Get PDF
    This study aims to examine intangible asset voluntary disclosure practices in annual report telecommunication company in South East Asia and Australia. This research sample is 75 telecommunication company at year 2007, 2008 dan 2009. Intangible asset disclosure study consist of three categories; structural capital, relational capital and human capital, based on Oliveira et al. categories. This study using content analysis method in annual report sample companies with index developed by Oliveira et al. as dependent variable. Independent variable which are firm size, leverage, ownership concentration, EBITDA margin, legal system of home country and secrecy accounting value, are analysed as factors influencing intangible asset voluntary disclosure practices. A significant positive relationship was observed between intangible asset voluntary disclosure and firm size and secrecy accounting value. However, leverage, ownership concentration, EBITDA margin and legal system of home country did not influence intangible asset voluntary disclosure practices

    Secrecy and Intelligence: Introduction

    Get PDF
    The catalyst for this special issue of Secrecy and Society stems from a workshop titled ā€œSecrecy and Intelligence: Opening the Black Boxā€ at North Carolina State University, April, 2016. This workshop brought together interested scholars, intelligence practitioners, and civil society members from the United States and Europe to discuss how different facets of secrecy and other practices shape the production of knowledge in intelligence work. This dialogue aimed to be reflective on how the closed social worlds of intelligence shape what intelligence actors and intelligence analysts, who include those within the intelligence establishment and those on the outside, know about security threats and the practice of intelligence. The papers in this special issue reflect conversations that occurred during and after the workshop

    Secrecy in the American Revolution

    Full text link
    This paper analyzes how the use of various cryptographic and cryptanalytic techniques affected the American Revolution. By examining specific instances of and each country\u27s general approaches to cryptography and cryptanalysis, it is determined that America\u27s use of these techniques provided the rising nation with a critical advantage over Great Britain that assisted in its victory
    • ā€¦
    corecore