833 research outputs found
The Life and Legacy of James I, King of England
As the first member of the Stuart line to hold the Kingdoms of England, Ireland, and Scotland under his suzerainty, the life and reign of King James I was always going to mark a serious turning point in the histories of the lands under his control. The Tudors, who had dominated English politics, religion, and culture since the end of the War of the Roses, had been extinguished with the death of the childless Queen Elizabeth I. Their successors, the Stuarts, would find that their personal rule over the British Isles would mark some of the most defining moments in not only British political, cultural, and religious history, but that of the wider Western world as well. James I, the progenitor of this impactful tenure, would have a lasting influence on the reigns through both his life and his work. A monarch of scholarly persuasion, James I has left the historical record a number of personal works on political philosophy, theology, and proper monarchical conduct. Not content merely to rule while others debated political theory, James I was a very active and important participant in many of the philosophical debates over the role of a monarch in a commonwealth that raged through the early modern period in Europe. While the importance and impact of James I’s political philosophy can be seen immediately in his own reign, the ideas which he advanced and the lessons he imparted to his heirs clearly set the stage for the next hundred years of British history. Although the early Jacobean era often seems to be overlooked in the historical records in favor of the events surrounding the English Civil War, it is imperative to understanding James I’s life and legacy in order to explain the tumultuous events that would follow. James I’s prolificity as a writer has left contemporary historians with a number of important literary works and primary sources that help the chart both his personal history and the history of the kingdoms which he ruled. Chief among these documents are James I’s Basilikon Doron, The Trew Law of Free Monarchies (hereafter referred to as “The True Law of Free Monarchies” or “The True Law”), and his speech to Parliament in 1603. These three works each present primary source evidence of James I’s importance as a historical figure and, taken together, they are providential in understanding many of the dominant political, religious, and cultural issues of the Stuart era. By combining James I’s own words and works with more contemporary historical analyses of his reign and the context in which he was acting, the significance of James I’s life and legacy becomes truly apparent
The Design of Efficient Internetwork Authentication for Ubiquitous Wireless Communications
A variety of wireless technologies have been
standardized and commercialized, but no single solution is
considered the best to satisfy all communication needs due
to different coverage and bandwidth limitations. Therefore,
internetworking between heterogeneous wireless networks
is extremely important for ubiquitous and high performance
wireless communications. The security problem is
one of the major challenges in internetworking. To date,
most research on internetwork authentication has focused
on centralized authentication approaches, where the home
network participates in each authentication process. For
high latency between the home and visiting networks, such
approaches tend to be inefficient. In this paper, we describe
chained authentication, which requires collaboration between
adjacent networks without involvement of the home
network. After categorizing chained protocols, we propose
a novel design of chained authentication methods under
3G-WLAN internetworking. The experiments show that
proactive context transfer and ticket forwarding reduce the
3G authentication latency to 36.8% and WLAN EAP-TLS
latency to 23.1% when RTT between visiting and home
networks is 200 ms
An empirical study on behavioural intention to reuse e-learning systems in rural China
The learner’s acceptance of e-learning systems has received extensive attention in prior studies, but how their experience of using e-learning systems impacts on their behavioural intention to reuse those systems has attracted limited research. As the applications of e-learning are still gaining momentum in developing countries, such as China, it is necessary to examine the relationships between e-learners’ experience and perceptions and their behavioural intention to reuse, because it is argued that system reuse is an important indicator of the system’s success. Therefore, a better understanding of the multiple factors affecting the e-learner’s intention to reuse could help e-learning system researchers and providers to develop more effective and acceptable e-learning systems. Underpinned by the information system success model, technology acceptance model and self-efficacy theory, a theoretical framework was developed to investigate the learner’s behavioural intention to reuse e-learning systems. A total of 280 e-learners were surveyed to validate the measurements and proposed research model. The results demonstrated that e-learning service quality, course quality, perceived usefulness, perceived ease of use and self-efficacy had direct effects on users’ behavioural intention to reuse. System functionality and system response have an indirect effect, but system interactivity had no significant effect. Furthermore, self-efficacy affected perceived ease of use that positively influenced perceived usefulness
Gravitating Toward Sensible Resolutions: The PCA Optional Rules for the Arbitration of Disputes Relating to Outer Space Activity
Design space exploration and optimization of path oblivious RAM in secure processors
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external memory. Even if we encrypt all data that leaves the trusted processor, however, the address sequence that goes off-chip may still leak information. To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM). ORAM has mainly been explored in server/file settings which assume a vastly different computation model than secure processors. Not surprisingly, naïvely applying ORAM to a secure processor setting incurs large performance overheads.
In this paper, a recent proposal called Path ORAM is studied. We demonstrate techniques to make Path ORAM practical in a secure processor setting. We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration. We propose a concept called super blocks to further improve Path ORAM's performance, and also show an efficient integrity verification scheme for Path ORAM. With our optimizations, Path ORAM overhead drops by 41.8%, and SPEC benchmark execution time improves by 52.4% in relation to a baseline configuration. Our work can be used to improve the security level of previous secure processors.National Science Foundation (U.S.). Graduate Research Fellowship Program (Grant 1122374)American Society for Engineering Education. National Defense Science and Engineering Graduate FellowshipUnited States. Defense Advanced Research Projects Agency (Clean-slate design of Resilient, Adaptive, Secure Hosts Contract N66001-10-2-4089
Making Peace the Old Fashioned Way: Infusing Traditional Tribal Practices into Modern ADR
Native Americans have their own unique traditional method of resolving disputes. Their processes, called peacemaking by some tribes, place the emphasis not on the guilt of the wrongdoer, but on restoring relationships and finding a solution that is amenable to all involved. This emphasis on saving the relationship has many similarities to current practices of mediation. Among the similar goals between mediation and peacemaking are the use of ADR allows both sides to reach a better conclusion and the desire to spend less money and to satisfy more people. However, this approach has critics who see it as another attempt to force Anglo culture on tribal communities. Other critics feel this approach cannot work because of unequal bargaining power between the two parties and the fact that tribes are forced to win a court battle before they can come to the mediation or negotiation tables. Part II of this paper examines the resource disputes that have arisen between tribes and the government in recent years. Part III looks at the unique problems of Indian gaming. Part IV explores tribal methods of dispute resolution and its possible impact on disputes over resources and gaming. Part V illustrates the practical application of ADR to tribal disputes and possible problems that can result thereby preventing success. Part VI looks at a recent settlement reached in Washington State and compares that process to the theoretical application of ADR to similar disputes. Part VII concludes, arguing that ADR, being more analogous to traditional tribal practices, provides a better way to resolve these disputes than litigation
The Price of Safety in an Active Network
Security is a major challenge for "Active Networking," accessible programmability creates numerous opportunities for mischief. The point at which programmability is exposed, e.g., through the loading and execution of code in network elements, must therefore be carefully crafted to ensure security. The SwitchWare active networking research project has studied the architectural implications of various tradeoffs between performance and security. Namespace protection and type safety were achieved with a module loader for active networks, ALIEN, which carefully delineated boundaries for privilege and dynamic updates. ALIEN supports two extensions, the Secure Active Network Environment (SANE), and the Resource Controlled Active Network Environment (RCANE). SANE extends ALIEN's node protection model into a distributed setting, and uses a secure bootstrap to guarantee integrity of the namespace protection system. RCANE provides resource isolation between active network node users, including separate heaps and robust time-division multiplexing of the node. The SANE and RCANE systems show that convincing active network security can be achieved. This paper contributes a measurement-based analysis of the costs of such security with an analysis of each system based on both execution traces and end-to-end behavior
Student Satisfaction and Performance in an Online Teacher Certification Program
The article presents a study which demonstrates the effectiveness of an online post baccalaureate teacher certification program developed by a Wisconsin university. The case method approach employing multiple methods and multiple data sources were used to investigate the degree to which pre-service teachers were prepared to teach. It was concluded that the study supports online delivery as an effective means of teacher preparation, but it was limited in the number of students followed into their first year of teaching
In the Spotlight: Supporting Focus Teachers in Video-Based Collaborative Learning Settings
In this chapter, we explore the role of the focus teacher—the teacher in the spotlight—in video-based collaborative professional development settings for the purpose of understanding variation in the felt risks of the focus teacher in relation to their learning goals. Using a comparative case study design, this research documented the differential impact of felt risks associated with the spotlight teacher role. This exploratory study contributes insights that help guide the essential support and facilitation work mathematics education leaders must provide for developing, supporting, and sustaining video-based professional learning communities
Tree-formed Verification Data for Trusted Platforms
The establishment of trust relationships to a computing platform relies on
validation processes. Validation allows an external entity to build trust in
the expected behaviour of the platform based on provided evidence of the
platform's configuration. In a process like remote attestation, the 'trusted'
platform submits verification data created during a start up process. These
data consist of hardware-protected values of platform configuration registers,
containing nested measurement values, e.g., hash values, of loaded or started
components. Commonly, the register values are created in linear order by a
hardware-secured operation. Fine-grained diagnosis of components, based on the
linear order of verification data and associated measurement logs, is not
optimal. We propose a method to use tree-formed verification data to validate a
platform. Component measurement values represent leaves, and protected
registers represent roots of a hash tree. We describe the basic mechanism of
validating a platform using tree-formed measurement logs and root registers and
show an logarithmic speed-up for the search of faults. Secure creation of a
tree is possible using a limited number of hardware-protected registers and a
single protected operation. In this way, the security of tree-formed
verification data is maintained.Comment: 15 pages, 11 figures, v3: Reference added, v4: Revised, accepted for
publication in Computers and Securit
- …
