Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  proxy
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements. By doing so, we revisit the ideas initially proposed in [1, 2] with the Netalyzr tool and in [3] with Inmap-t. Our contributions lie in a simplified and more powerful design that enables the platform to be used for a variety of tasks, such as conformance verification, security testing, network configuration understanding, etc. The specifications, design and implementation choices of the platform are presented and discussed. Two use cases are revealed to illustrate how the platform can be used. We welcome any interest shown by others in deploying our tool in different environments, and encourage any subsequent collaboration in improving its expressiveness.
EN
Contemporary “premodern” conflicts, or “new wars” are characterized by the de-professionalization of the use of force and the emergence of various non-state actors: warlords, paramilitary units, sectarian militias, proxies, etc., and their growing role as security providers. This paper examines the status, activities and effectiveness of a non-state actor, Dwekh Nawsha (DN), as a security provider in northern Iraq during the Daesh (aka the so-called “Islamic State”) invasion. The author investigates DN’s status as a self-defense group and ethno-religious militia; its independence and proxy status; its effectiveness in realizing self-assumed tasks of providing security to the local population; and group participation in combat operations and in the coalition counter-terrorism endeavors. This article is based on the results of qualitative investigation methods, i.e., interviews with the DN members conducted by the author in Duhok, northern Iraq, in March 2015, follow-up e-mail and telephone exchange, social media analysis, complemented with an overview of existing academic reports, literature, and the news. The research results allow us to conclude that non-state actors can be of various use to local communities, and not necessarily only comb at-related, but also self-assurance for the local population and propagation of their challenges in the international media. However, in order for such a group to exist, it may be necessary to assume patronage and thus become someone’s proxy. Considering DN’s overall limited potential (modest manpower, lack of equipment, diverse training, operational limitations), the author favorably assesses (proportionally to its capacity) the group’s role as a security provider in the Daesh - occupied Iraq.
3
Content available ID-based, Proxy, Threshold Signature Scheme
EN
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
EN
The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
EN
The paper addresses the issues of invoking services from within workflows which are becoming an increasingly popular paradigm of distributed programming.The main idea of our research is to develop a facility which enables load balancing between the available services and their instances. The system consists of three main modules: a proxy generator for a specific service according to its interface type, a proxy that redirects requests to a concrete instance of the service and load-balancer (LB) to choose the least loaded virtual machine (VM) which hosts a single service instance. The proxy generator was implemented as a bean (in compliance to EJB standard) which generates proxy according to the WSDL service interface description using XSLT engine and then deploys it on a GlassFish application server using GlassFish API, the proxy is a BPEL module and load-balancer is a stateful Web Service.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.