4,191 research outputs found

    The EU’s common foreign, security and defense policies and the Turkish perceptions

    Get PDF
    The EU's common foreign and security role is tied to the EU's normative role and this has been one of the critical aspects of the debate concerning Turkey's accession. Turkey's membership negotiations are critical in terms of the future of the European integration process, specifically with respect to the EU's role as a global actor. How Turkey perceives the EU's CFSP is critical in assessing Turkey's potential role in the larger integration process, as well as the future development of the EU's international role. The article investigates whether there are wide differences among the Turkish public vis-a-vis the EU's CFSP and to what extent these differences are visible in Turkey's negotiation talks with the EU. The paper explores the extent to which European norms in foreign policy has diffused into Turkey and how this diffusion might have impacted the process of foreign policy making in Turkey

    Survey on detecting and preventing web application broken access control attacks

    Get PDF
    Web applications are an essential component of the current wide range of digital services proposition including financial and governmental services as well as social networking and communications. Broken access control vulnerabilities pose a huge risk to that echo system because they allow the attacker to circumvent the allocated permissions and rights and perform actions that he is not authorized to perform. This paper gives a broad survey of the current research progress on approaches used to detect access control vulnerabilities exploitations and attacks in web application components. It categorizes these approaches based on their key techniques and compares the different detection methods in addition to evaluating their strengths and weaknesses. We also spotted and elaborated on some exciting research gaps found in the current literature, Finally, the paper summarizes the general detection approaches and suggests potential research directions for the future

    Dynamic deployment of context-aware access control policies for constrained security devices

    Get PDF
    Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identi ed based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., con guring, those security components and mechanisms so that the system behavior be nally the one speci ed by the policy. The deployment issue becomes more di cult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modi cations introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action speci cation languages

    Annual report 2006

    Get PDF
    Podeu consultar la versió en català a: http://hdl.handle.net/11703/87770Podeu consultar la versió en castellà a: http://hdl.handle.net/11703/8777

    On second thought: Low-effort thought promotes hierarchy values

    Get PDF
    Values are associated with political attitudes and political conservatism is promoted with low-effort thought. Does low-effort thought similarly promote the conservative value of hierarchy while reducing the value of equality? Values are conceptualized as stable, yet research suggests that values may be processed with automatic and controlled processes. I examined the automaticity of hierarchy values across four studies. In Study 1, bar patrons with higher blood alcohol levels rated hierarchy values as more important and egalitarian values as less important. In Study 2, participants asked to evaluate values superficially rated hierarchy values as more important and egalitarian values as less important than those asked to deliberate carefully. Study 3 sought to replicate Study 2 adjusting for the influence of affect. Participants asked to evaluate values superficially rated hierarchy values as more important but did not shift in equality values. Study 4 used ego depletion to manipulate cognitive effort while assessing values. Participants' value ratings under ego depletion did not significantly differ from those in the control group. Results of three studies suggest that low-effort thought processing may encourage support for hierarchical values at the expense of egalitarian values

    The Challenges of Enlargement and GATT Trade Negotiations: Explaining the Resilience of the European Community’s Common Agricultural Policy in the 1970s

    Get PDF
    Both a flagship policy and a costly and wasteful liability – since its inception in the 1960s, the common agricultural policy (CAP) of the European Community (EC) has been controversial. This article investigates why the CAP survived largely unchanged through the 1970s, a decade of economic and political crisis and transformation, and maintained its centrality in the Community. The article focuses first on the entrenched institutional interests in the Council of Ministers and the Commission before analyzing two key events that could have led to a shift of interests in the EC and a reform of the policy: the accession of the United Kingdom to the EC in 1973 and the Tokyo Round of the General Agreement on Tariffs and Trade (GATT) (1973-9). The decision of the Community to protect the CAP against these challenges is revealing with regard to the state and outlook of the Community in the 1970s. The article argues that in a period of uncertainty and transformation, the CAP maintained a reluctant centrality in the EC, underscoring European unity and commitment to European integration. Internal challenges such as enlargement with the UK and external ones such as the GATT trade negotiations were thus met with the determination to keep the CAP intact

    3rd EGEE User Forum

    Get PDF
    We have organized this book in a sequence of chapters, each chapter associated with an application or technical theme introduced by an overview of the contents, and a summary of the main conclusions coming from the Forum for the chapter topic. The first chapter gathers all the plenary session keynote addresses, and following this there is a sequence of chapters covering the application flavoured sessions. These are followed by chapters with the flavour of Computer Science and Grid Technology. The final chapter covers the important number of practical demonstrations and posters exhibited at the Forum. Much of the work presented has a direct link to specific areas of Science, and so we have created a Science Index, presented below. In addition, at the end of this book, we provide a complete list of the institutes and countries involved in the User Forum

    Context-Based Access for Infrequent Requests in Tanzania\u27s Health Care System

    Get PDF
    Access control is an important aspect of any information system. It is a way of ensuring that users can only access what they are authorised to and no more. This can be achieved by granting users access to resources based on pre-defined organisational and legislative rules. Although access control has been extensively studied, and as a result, a wide range of access control models, mechanisms and systems have been proposed, specific access control requirements for healthcare systems that needs to support the continuity of care in an accountable manner have not been addressed. This results in a gap between what is required by the application domain and what is actually practised, and thus access control solutions implemented for the domain become too restrictive. The continuity of care is defined as the delivery of seamless health care services to patients through integration, coordination and sharing of information between providers. This thesis, therefore, designs a context-based access control model that allows healthcare professionals to bypass access rules in an accountable manner in case of an infrequent access request involving an emergency situation. This research uses the Tanzania\u27s healthcare system as a case study domain
    corecore