12 research outputs found

    Le véritable auteur du Traité Kèlim

    No full text
    Graubart D. Le véritable auteur du Traité Kèlim . In: Revue des études juives, tome 32, n°64, avril-juin 1896. pp. 200-225

    Pitching for each others' team: the North American Free Trade Agreement and labor transnationalism

    Get PDF
    The North American Free Trade Agreement's side accord – the 1994 North American Agreement on Labor Cooperation – has been portrayed as providing an ineffective, bureaucratic procedure for dealing with labor complaints about infringements of national labor legislation. This paper reviews two decades of experience. It argues that after an initial period of formal activity, which did indeed expose the accord's severe limitations, a new era of intensified international links at grassroots level commenced. Despite its limitations, the accord initiated positive learning processes and intensified exchanges between the trade union movements in the USA, Canada and Mexico

    Cyber Resiliency Engineering Overview of the Architectural Assessment Process

    Get PDF
    AbstractMissions, business functions, organizations, and nations are increasingly dependent on cyberspace where attacks are no longer limited to simple discrete events such as the spread of a virus or a denial-of-service attack. Therefore, architecture and systems engineering must assume systems or components have been compromised and missions and business functions must continue to operate despite compromises. A growing number of technologies and architectural practices can be used to improve resilience to cyber threats. However, these improvements come with costs as well as benefits. Cyber resiliency assessments are intended to identify where, how, and when cyber resiliency techniques can be applied to improve architectural resiliency in a cost-effective way

    Intrusion Confinement By Isolation In Information Systems

    No full text
    System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore used to supplement them. However, damage could have occurred before an intrusion is detected. In many computing systems the requirement for a high degree of soundness of intrusion reporting can yield poor performance in detecting intrusions, and can cause long detection latency. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. The process of bounding the damage caused by intrusions during the process of intrusion detection is referred to as intrusion confinement. We justify the necessity for intrusion confinement during detection by a probabilistic analysis model, and propose a general solution to achieve intrusion confinement. The crux of the solution is to isolate likely suspicious actions before a definite determi..
    corecore