85,458 research outputs found
Secrecy and Group Creation
AbstractWe add an operation of group creation to the typed pi-calculus, where a group is a type for channels. Creation of fresh groups has the effect of statically preventing certain communications, and can block the accidental or malicious leakage of secrets. We adapt a notion of secrecy introduced by Abadi, and prove a preservation of secrecy property. When applied to the ambient calculus, the same notion of group creation can be used to create and preserve shared secrets among mobile agents
A Tale of Two Paranoids: A Critical Analysis of the Use of the Paranoid Style and Public Secrecy by Donald Trump and Viktor OrbƔn
Within the last decade, a rising tide of right-wing populism across the globe has inspired a renewed push toward nationalism. Capitalizing on an increasingly chaotic public sphere, leaders are stoking fear in their constituents such that their radical ideologies and hardline policy decisions may be enacted. This article offers a comparative study of two leaders exploiting the vulnerabilities of their respective citizenries: United States President Donald Trump and Hungarian Prime Minister Victor OrbĆ”n. Drawing from and reimagining Richard Hofstadterās germane essay, āThe Paranoid Style in American Politics,ā we argue that both represent a new manifestation of the paranoid style as it enables (and is enabled by) āpublic secrecy.ā By controlling the media and redirecting collective attention by way of rhetorical sleight of hand, the two are able to sow disorder and confusion such that their secrecy may persist out in the open. Despite using similar issues to promulgate fear and paranoia, most prominently the refugee and immigration crises, and their similar end goals, the two must nonetheless engage in different discursive strategies that reflect the distinct cultures and histories of their respective countries
Name-passing calculi and crypto-primitives: A survey
The paper surveys the literature on high-level name-passing process calculi, and their extensions with cryptographic primitives. The survey is by no means exhaustive, for essentially two reasons. First, in trying to provide a coherent presentation of different ideas and techniques, one inevitably ends up leaving out the approaches that do not fit the intended roadmap. Secondly, the literature on the subject has been growing at very high rate over the years. As a consequence, we decided to concentrate on few papers that introduce the main ideas, in the hope that discussing them in some detail will provide sufficient insight for further reading
Tolkien and the Deadly Sin of Greed
Tolkienās genius as a writer and insight as a philosopher and theologian (of sorts) are reflected in his subtle yet impactful interweaving of the consequences of greed within the lives of the peoples of Middle-Earth. He shows readers that greed is not simply the love of money. Greed is the root of all evil, and it takes a variety of forms, as represented by Sauronās desire to possess power over and control others, Sarumanās imitative desire, and Feanorās over-possessiveness of his sub-creative acts. Tolkien also reveals that a proper relationship with nature can provide recovery from the drab familiarity which the appropriation of nature can cause. Ultimately, Tolkien shows that in relinquishing possession of the things and people we most desire, we can find a greater sense of personhood, relationality, and peace within the world
Open secrets
The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and institutional roles as well. Somewhat surprisingly, given the lawās focus on secrecy, among the institutional products of trade secrets law are commons, or managed openness: environments designed to facilitate the structured sharing of information. The paper illustrates with examples drawn from existing literature on cuisine, magic, and Internet search.
Parenting and child development in families with a child conceived through embryo donation
Concerns have been raised regarding the potentially negative effects of conception using donated embryos on parenting and child development. Findings are presented of an exploratory study of families with a child conceived through embryo donation. Twenty-one embryo donation families were compared with 28 adoptive families and 30 in vitro fertilization families on standardized interview and questionnaire measures of the parents' marital and psychological state, the quality of parent-child relationships, and the child's development. In all 3 groups, the children were aged 2-5 years. The differences indicated higher emotional overinvolvement and defensive responding in the embryo donation families, along with greater secrecy about the child's origins. The children were not at increased risk of psychological problems. The study provides interesting but preliminary findings on parent-child relationships and child development in a new family form
ANALYSING FACTORS INFLUENCING INTANGIBLE ASSET DISCLOSURE (STUDY IN SOUTH-EAST ASIA AND AUSTRALIA TELECOMMUNICATION INDUSTRY)
This study aims to examine intangible asset voluntary disclosure practices
in annual report telecommunication company in South East Asia and Australia.
This research sample is 75 telecommunication company at year 2007, 2008 dan
2009. Intangible asset disclosure study consist of three categories; structural
capital, relational capital and human capital, based on Oliveira et al. categories.
This study using content analysis method in annual report sample
companies with index developed by Oliveira et al. as dependent variable.
Independent variable which are firm size, leverage, ownership concentration,
EBITDA margin, legal system of home country and secrecy accounting value, are
analysed as factors influencing intangible asset voluntary disclosure practices.
A significant positive relationship was observed between intangible asset
voluntary disclosure and firm size and secrecy accounting value. However,
leverage, ownership concentration, EBITDA margin and legal system of home
country did not influence intangible asset voluntary disclosure practices
Secrecy and Intelligence: Introduction
The catalyst for this special issue of Secrecy and Society stems from a workshop titled āSecrecy and Intelligence: Opening the Black Boxā at North Carolina State University, April, 2016. This workshop brought together interested scholars, intelligence practitioners, and civil society members from the United States and Europe to discuss how different facets of secrecy and other practices shape the production of knowledge in intelligence work. This dialogue aimed to be reflective on how the closed social worlds of intelligence shape what intelligence actors and intelligence analysts, who include those within the intelligence establishment and those on the outside, know about security threats and the practice of intelligence. The papers in this special issue reflect conversations that occurred during and after the workshop
Secrecy in the American Revolution
This paper analyzes how the use of various cryptographic and cryptanalytic techniques affected the American Revolution. By examining specific instances of and each country\u27s general approaches to cryptography and cryptanalysis, it is determined that America\u27s use of these techniques provided the rising nation with a critical advantage over Great Britain that assisted in its victory
- ā¦