48 research outputs found

    Could and Should America Have Made an Ottoman Republic in 1919?

    Get PDF
    Numerous Americans, perhaps especially American lawyers, have since the 1780s presumed to tell other peoples how to govern themselves. In 2006, that persistent impulse was once again echoed in an address to the American Bar Association by a Justice of the Supreme Court. The purpose of this essay is to question the wisdom of this evangelical ambition, especially when the form of instruction includes military force. It is draws on Spreading America\u27s Word (2005) and directs attention to the hopes of American Protestant Zionists to make a democratic republic in Ottoman Palestine. It suggests that chances were better in 1919 than they are in 2008, but were none to good at that time. It rejects the appeal of the militant neo-conservatives who expressed their hopes and expectations in The Project for A New American Century, an instrument that should be read and remembered for centuries to come

    Self-certified sybil-free pseudonyms

    Get PDF
    Accurate and trusted identifiers are a centerpiece for any security architecture. Protecting against Sybil attacks in a privacy-friendly manner is a non-trivial problem in wireless infrastructureless networks, such as mobile ad hoc networks. In this paper, we introduce self-certified Sybil-free pseudonyms as a means to provide privacy-friendly Sybil-freeness without requiring continuous online availability of a trusted third party. These pseudonyms are self-certified and computed by the users themselves from their cryptographic longterm identities. Contrary to identity certificates, we preserve location privacy and improve protection against some notorious attacks on anonymous communication systems

    Privacy for Peer Profiling in Collective Adaptive Systems

    Get PDF
    Part 5: Project Workshops and Tutorial PapersInternational audienceIn this paper, we introduce a privacy-enhanced Peer Manager, which is a fundamental building block for the implementation of a privacy-preserving collective adaptive systems computing platform. The Peer Manager is a user-centered identity management platform that keeps information owned by a user private and is built upon an attribute-based privacy policy. Furthermore, this paper explores the ethical, privacy and social values aspects of collective adaptive systems and their extensive capacity to transform lives. We discuss the privacy, social and ethical issues around profiles and present their legal privacy requirements from the European legislation perspective

    COVID-19 symptoms at hospital admission vary with age and sex: results from the ISARIC prospective multinational observational study

    Get PDF
    Background: The ISARIC prospective multinational observational study is the largest cohort of hospitalized patients with COVID-19. We present relationships of age, sex, and nationality to presenting symptoms. Methods: International, prospective observational study of 60 109 hospitalized symptomatic patients with laboratory-confirmed COVID-19 recruited from 43 countries between 30 January and 3 August 2020. Logistic regression was performed to evaluate relationships of age and sex to published COVID-19 case definitions and the most commonly reported symptoms. Results: ‘Typical’ symptoms of fever (69%), cough (68%) and shortness of breath (66%) were the most commonly reported. 92% of patients experienced at least one of these. Prevalence of typical symptoms was greatest in 30- to 60-year-olds (respectively 80, 79, 69%; at least one 95%). They were reported less frequently in children (≤ 18 years: 69, 48, 23; 85%), older adults (≥ 70 years: 61, 62, 65; 90%), and women (66, 66, 64; 90%; vs. men 71, 70, 67; 93%, each P < 0.001). The most common atypical presentations under 60 years of age were nausea and vomiting and abdominal pain, and over 60 years was confusion. Regression models showed significant differences in symptoms with sex, age and country. Interpretation: This international collaboration has allowed us to report reliable symptom data from the largest cohort of patients admitted to hospital with COVID-19. Adults over 60 and children admitted to hospital with COVID-19 are less likely to present with typical symptoms. Nausea and vomiting are common atypical presentations under 30 years. Confusion is a frequent atypical presentation of COVID-19 in adults over 60 years. Women are less likely to experience typical symptoms than men

    Contributions of LiU/ADIT to Informational Privacy

    No full text
    In this article we provide an overview of the contributions of LiU/ADIT to the field of informational privacy. We refer to some recent publications of our group in the area related to Cloud Computing and the Smart Grid. Furthermore, we revisit our results in the field of privacy in participatory sensing, which is a new paradigm that is grounded on the ubiquitous presence of sensors in personal devices, such as smart phones

    iKUP Keeps Users' Privacy in the Smart Grid

    No full text
    Privacy-enhancing technologies for the Smart Grid address either the consolidation of users' energy consumption or the verification of billing information. The goal of this paper is to introduce iKUP, a protocol that addresses both problems simultaneously. iKUP is an efficient privacy-enhancing protocol based on DC-Nets and Elliptic Curve Cryptography as Commitment. It covers the entire cycle of power provisioning, consumption, billing, and verification. iKUP allows: (i) utility providers to obtain a consolidated energy consumption value that relates to the consumption of a user set, (ii) utility providers to verify the correctness of this consolidated value, and (iii) the verification of the correctness of the billing information by both utility providers and users. iKUP prevents utility providers from identifying individual contributions to the consolidated value and, therefore, protects the users' privacy. The analytical performance evaluation of iKUP is validated through simulation using as input a real-world data set with over 157 million measurements collected from 6,345 smart meters. Our results show that iKUP has a worse performance than other protocols in aggregation and decryption, which are operations that happen only once per round of measurements and, thus, have a low impact in the total protocol performance. iKUP heavily outperforms other protocols in encryption, which is the most demanded cryptographic function, has the highest impact on the overall protocol performance, and it is executed in the smart meters

    Analysis of Privacy-Enhancing ProtocolsBased on Anonymity Networks

    No full text
    In this paper, we analyze privacy-enhancing protocolsfor Smart Grids that are based on anonymity networks. Theunderlying idea behind such protocols is attributing two distinctpartial identities for each consumer. One is used to send realtimeinformation about the power consumption, and the otherfor transmitting the billing information. Such protocols providesender-anonymity for the real-time information, while consolidateddata is sent for billing. In this work, the privacy propertiesof such protocols are analyzed, and their computational efficiencyis evaluated and compared using simulation to other solutionsbased on homomorphic encryption

    Towards Anonymity in Mobile Ad Hoc Networks : The Chameleon Protocol and its Anonymity Analysis

    No full text
    This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As far we know, Chameleon is the first low-latency anonymous overlay network applied in a mobile ad hoc setting. It was designed with the special characteristics of mobile ad hoc networks in mind, such as limited battery lifetime, user mobility and vanishing nodes. In this paper, we also evaluate Chameleon against a number of requirements that an anonymous overlay network should adhere to in order to be suitable for mobile ad hoc networks. In particular, the anonymity properties of Chameleon are thoroughly analyzed
    corecore