220 research outputs found

    Some examples of exemplary practice by Portuguese architects in the 70s

    Get PDF
    Ponència presentada a: Session 4: Etnografìas, fenomenología, fenomenología social y dialogía social / Ethnographies in the studios, phenomenology, social dialog

    Enhanced secure interface for a portable e-voting terminal

    Get PDF
    This paper presents an enhanced interface for an e-voting client application that partially runs inside a small, portable terminal with reduced interaction capabilities. The interface was enhanced by cooperating with the hosting computer where the terminal is connected to: the hosting computer shows a detailed image of the filled ballot. The displayed image does not convey any personal information, namely the voter's choices, to the hosting computer; voter's choices are solely presented at the terminal. Furthermore, the image contains visual authentication elements that can be validated by the voter using information presented at the terminal. This way, hosting computers are not able to gather voters' choices or to deceive voters, by presenting tampered ballots, without being noticed

    Alguns aspectos e problemas do planeamento de transportes

    Get PDF

    Protection of LAN-wide, P2P interactions: a holistic approach

    Get PDF
    This article advocates the need of a holistic approach to protect LAN interactions and presents a solution for implementing it based on secure LAN (SLAN), a novel security architecture. SLAN uses the 802.1X access control mechanisms and is supported by a key distribution centre (KDC) built upon an 802.1X authentication server. The KDC is used, together with a new host identification policy and modified DHCP servers, to provide proper resource allocation and message authentication in DHCP transactions. The KDC is used to authenticate ARP transactions and to distribute session keys to pairs of LAN hosts, allowing them to set up arbitrary, LAN-wide peer-to-peer security associations using such session keys. We show how PPPoE and IPSec security associations may be instantiated and present a prototype implementation for IPSec

    The morality of political speech in parliamentary debates: an analysis of parliamentary party dynamics, based on what they say and how they say it

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Data Science and Advanced Analytics, specialization in Data ScienceMoral Foundations Theory (MFT) is an area of study with multiple and varied applications, including political science. Indeed, many studies have denoted that part of the reason for the deepening divide between American liberals and conservatives is due to the fact that both of these groups rely on fundamentally different moral principles. While this research has started to pan outside of the United States of America, it has yet to be applied to the context of the Portuguese republic, which differs from the American political reality. Portugal’s democracy is built on top of a multi-party system, and conventional wisdom divides it into a right and left wing, rather than liberal and conservative. As such, we developed a Moral Foundations Dictionary (MFD) in European Portuguese and analyzed 10 years’ worth of transcripts from parliamentary sessions through the prism of MFT, in an effort to find out which are the parliamentary dynamics in Portuguese political speech. Indeed, we found evidence that the Portuguese political parties place themselves on a right/left wing spectrum when looked at through the lens of MFT, but also that there appears to be a government/opposition dichotomy at play, which could affect party dynamics.A Teoria dos Fundamentos Morais é uma área de estudo com múltiplas e variadas aplicações, incluindo no campo da ciência política. De facto, vários estudos notaram que parte da razão pela qual a divisão entre liberais e conservadores nos Estados Unidos da América (EUA) se tem vindo a aprofundar deve-se ao facto de que estes grupos têm por base princípios morais fundamentalmente diferentes. Embora esta pesquisa se tenha começado a expandir para além dos EUA, tem ainda de ser aplicada no contexto da república portuguesa, que difere da realidade política americana. A democracia portuguesa baseia-se num sistema multipartidário e a convenção geral dita que os partidos se dividem como sendo de direita ou esquerda, em vez de liberais ou conservadores. Deste modo, desenvolvemos um Dicionário de Fundamentos Morais em português europeu e analisámos 10 anos de transcrições do diário da assembleia da república pelo prima da Teoria dos Fundamentos Morais, numa tentativa de descobrir as dinâmicas parlamentares do discurso moral português. De facto, descobrimos evidências de que os partidos políticos portugueses se encontram num eixo direita/esquerda quando são analisados pela lente da Teoria dos Fundamentos Morais, mas também aparenta existir uma dinâmica governo/oposição, que afeta também a forma como os partidos se relacionam

    Novos tempos, novos ventos? A extrema-direita europeia e o Islão

    Get PDF
    Desde o início deste milénio que a investigação académica tem identificado o sentimento anti muçulmano como uma característica-chave da extrema-direita europeia. Este artigo discute a história e a validade do termo “islamofobia”, assim como a emergência e consolidação do tema da “Eurábia” na ideologia da extrema-direita. Analisa ainda a forma como as concepções de uma tomada de poder pelos muçulmanos na Europa têm contribuído para reconfigurar a ideologia da extrema-direita e para formar novas convergências entre diferentes margens do espaço político

    Apocalyptic Movements: Year In Review 2012

    Get PDF

    Social networking for anonymous communication systems: a survey

    Get PDF
    Anonymous communication systems have been around for sometime, providing anonymity, enhanced privacy, and censorship circumvention. A lot has been done, since Chaum's seminal paper on mix networks, in preventing attacks able to undermine the anonymity provided by these systems. This, however, is goal difficult to achieve due to the de-centralized nature of these systems. In the end it boils down to finding a subset of trusted nodes to be placed in critical positions of the communication path. But the question remains: "How to know if a given node can be trusted?". In this paper we present a survey of a new research area which goal is to exploit trust in social links to solve some of the shortcomings of anonymous communication systems. Recent research shows that by using social networking features it is possible to prevent traffic analysis attacks and even detect Sybil attacks

    Identification of source applications for enhanced traffic analysis and anomaly detection

    Get PDF
    This article presents an architecture for managing the identification of applications responsible for generating traffic in a network. The identification is to be explored by network auditing systems, which cooperate with surveyed systems to get the relevant information about the source applications. The ultimate goal of the system is to provide network auditors, such as NIDS, enough information about the exact sources of network traffic. This way, auditors are able to detect unauthorized applications or to detect anomalies in the traffic created by known applications, possibly as a consequence of the action of some malware in the source application or host
    corecore