To see the other types of publications on this topic, follow the link: Cooperative security.

Dissertations / Theses on the topic 'Cooperative security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Cooperative security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tate, Samuel L. "Toward multilateral cooperative security in Northeast Asia." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.

Full text
Abstract:
Due to the open nature of the medium, wireless communications systems are highly vulnerable to security attacks. In recent years, security within the physical layer has gained attention, since the underlying techniques can add to those found in traditional cryptographic approaches. In this thesis, new mathematical models were developed for the analysis of secrecy capacity and outage probability in different scenarios, following which new optimisation problems were formulated and new algorithms devised to solve those problems. The process began by analysing secrecy performance for various cooperative communication scenarios in the presence of single and multiple eavesdropper(s). A multicast cooperative system was also analysed, based on distributed Alamouti space-time coding. Furthermore, the secrecy performance of a relay selection scheme was analysed in an independent but non-identically distributed (i.n.i.d) Rayleigh fading scenario. The second part of the thesis concentrated on optimisation methods for cooperative relaying and jamming techniques. For a dual-hop system, a joint cooperative beamforming and jamming scheme was created, considering both a perfect and an imperfect eavesdropper's channel state information (CSI). Optimal solutions to degrade the eavesdropper's interception by minimising its received signal to interference and noise ratio (SINR) were also presented whilst ensuring the legitimate receiver's SINR requirement. For the multi-hop scenario, the secrecy rate, with and without transmitting artificial noise, was considered for maximisation, and an optimal power splitting solution under limited power constraints at the transmitters was also proposed. In addition, an iterative solution for the joint optimisation of transmit power and power splitting coefficient at each transmitter was posited. The analyses and optimisation algorithms developed provide new insights into secrecy performance and optimal transmission schemes in various practical scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Swahn, Joakim, and Christian Udin. "Cooperative Vehicle-Infrastructure System : Identification, Privacy and Security." Thesis, Linköping University, Department of Science and Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9399.

Full text
Abstract:

This master thesis is to highlight the importance of what needs to be identified in the CVIS system, how this could be done, how different techniques affect privacy and security and how the privacy and security mechanisms can be improved for the whole system. The report starts with a background of ERTICO – ITS Europe, followed by a description of how the CVIS project is organized, how the CVIS system will work, and a presentation of privacy, security and identification, both in general and in CVIS. After this follows the analysis and the report is finally wrapped up with conclusions and recommendations.

Why this is an important topic to highlight and discuss and the reason being for this master thesis, is because there is a clear need within the CVIS consortium to harmonise these topics. As it is today, different persons and different sub-projects have different views and opinions on what needs to be identified for example. This needs to be harmonised in order for everyone to know what is being developed, but also, and much more importantly, to in the end get acceptance for the CVIS system. If people do not feel they can trust the system, if they feel it is not secure or that it violates their privacy, they will not use it, even if it has been proved the technique works.

The key question discussed in the report is what needs to be identified. This is the most important question to solve. There must be very good reasons and consensus why a certain entity is to be identified, otherwise identification of that entity will always be questioned. This also links very tightly with privacy.

The objective of this master thesis is to bring forward this critical question about identification, to highlight different reasons for identifying or not identifying different entities and to get the discussion started.

Finally, the main conclusions and recommendations on what to actually identify is the vehicle and the different parts in the central sub-system. The best technique would be by using single sign on with a very strong encryption, for example random numbers, that will be handle by a new node Identification Management Centre or that it will be a part of the Host Management Centre. To ensure privacy in the system, the single sign on mechanism should be combined with the approach of using pseudonyms when communicating in the CVIS system.

APA, Harvard, Vancouver, ISO, and other styles
4

Maarof, M. A. B. "Integrating security services into computer supported cooperative work." Thesis, Aston University, 2000. http://publications.aston.ac.uk/7989/.

Full text
Abstract:
This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.
APA, Harvard, Vancouver, ISO, and other styles
5

Landau, Ethan. "Cooperative Security: The American Strategy for a Rising China." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/815.

Full text
Abstract:
This paper analyzes the theoretical underpinnings and strategic goals of US security strategy with respect to China. It argues that the language used in statements and publications of US strategy demonstrate the development of a strategy of cooperative security. This strategy is dependent on the security environment the United States cultivates with allies and partners in the region. The paper uses evidence from the two largest PACOM military operations--RIMPAC and Cobra Gold-to demonstrate this developing strategy.
APA, Harvard, Vancouver, ISO, and other styles
6

Ranito, Jovana Jezdimirovic. "Limitations to post-conflict cooperative security : Kosovo 1999-2009." Master's thesis, FEUC, 2009. http://hdl.handle.net/10316/11532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kassenova, Togzhan O. "Cooperative security in the post-Cold War international system : the cooperative threat reduction (CTR) process." Thesis, University of Leeds, 2004. http://etheses.whiterose.ac.uk/2656/.

Full text
Abstract:
The thesis explores cooperative security efforts between the United States and Russia in the framework of the Cooperative Threat Reduction (CTR) Programme and other non-proliferation programmes, which were established in the aftermath of the Soviet collapse as a response to nuclear proliferation threats in the former Soviet Union. One of the main objectives of CTR is to reduce nuclear dangers associated with vast nuclear arsenals, which first and foremost, means reductions in nuclear weapons. This work presents an overview of different proliferation threats ranging from proliferation of nuclear material to potential ““brain-drain”” from the former Soviet nuclear complex, explains their technical and socio-economic aspects and assesses the effectiveness of the U.S.-Russian programmes, which deal with these threats. The CTR process has encountered some major obstacles on its way. The research suggests that some important problems in the implementation of CTR programmes are of bureaucratic nature. However, bureaucratic factors are aggravated by the political factors stemming from the fact that the national security policies of the U.S. and Russia are still in part based on concepts and strategies adopted during the Cold War. This is especially evident with regard to the role assigned to nuclear weapons by both countries. Therefore, the CTR process is used as a laboratory study of the U.S.-Russian strategic relations in the post-Cold War era. The study demonstrates that the processes happening in the international security system below the surface and which might not be so obvious at a glance can be absolutely important for the future of the international system. The CTR process represents a mechanism, which can be used to build a new international system, where the role of the nuclear weapons becomes more and more obsolete.
APA, Harvard, Vancouver, ISO, and other styles
8

O'Quinn, Caitlin. "Negotiating Security: Gender, Economics and Cooperative Institutions in Costa Rica." Thesis, University of Oregon, 2018. http://hdl.handle.net/1794/23705.

Full text
Abstract:
Costa Rica is heralded as a leader in social and environmental issues and an example of a successful development story. However, how does this singular narrative minimize the more complex lived experiences of people? I introduce nuances to the story of Costa Rica by centering the lived experiences of women, drawing on primary data from questionnaires and interviews, and situating my research within the long history of cooperatives in Costa Rica, to learn more about issues women face and opportunities these institutions may offer. When looking through the lens of everyday experiences, we see that despite the significant progress in creating a safe country for all, women still experience inequality, discrimination, and violence. My hope is by including women’s voices, we move beyond the “single story” toward a more nuanced understanding of multilayered lives of Costa Rican women and an appreciation for the opportunities they seek and create.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.

Full text
Abstract:
Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement due to the application of the FFR is limited by the capacity of the legitimate channel.
APA, Harvard, Vancouver, ISO, and other styles
10

Finocchio, Chris James. "Latin American regional cooperative security : civil-military relations and economic interdependence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFinocchio.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Jeanne K. Giraldo, Harold A. Trinkunas. Includes bibliographical references (p. 67-71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
11

Spencer, Emily Rodes. "The Role of Place in Community Cooperative Food Markets in Lexington, Kentucky." UKnowledge, 2019. https://uknowledge.uky.edu/cld_etds/50.

Full text
Abstract:
Food justice movements focus on providing communities with local, sustainable, culturally appropriate, healthy food while empowering local economic systems that allow for autonomy of both producers and consumers (Caruso, C., 2014; Cadieux, K., 2015; Hayes, C. & Carbone, E., 2015). However, current food justice movements often price out and leave behind large portions of the population. Research has shown that engagement with local food systems contribute to feelings of place attachment and a sense of place (Solin, J., 2017; Alkon, A., 2011). The purpose of this study was to explore the relationship between volunteers at two alternative, cooperative community food markets in Lexington, Kentucky and their sense of place. Using an amalgamation of black feminist thought and ecofeminism, this qualitative study sought to better understand volunteer participation in the markets and, as a result, illuminate potential barriers to participation in the future. Interviews were conducted with market volunteers. Results indicate that place was significant in their decisions to participate in the markets, though participants did not conceive “place” as a geographical location, but rather a social and cultural atmosphere. In other words, volunteers presented a social construction of place. Other factors contributing to participation came about as a result of the study, including resistance and empowerment and geographies of care and responsibility. In relation to volunteer participation in alternative agro-food movements, the findings of this study indicate that more attention needs to be paid to the ways in which the social construction of place affect volunteer retention.
APA, Harvard, Vancouver, ISO, and other styles
12

Yin, Xin. "Operational security monitoring technology and cooperative control principles for complex industrial processes." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/operational-security-monitoring-technology-and-cooperative-control-principles-for-complex-industrial-processes(ee55c32d-3d72-4ced-82e5-7050852dda63).html.

Full text
Abstract:
The development of modern process industries, and increasingly fierce competition in the world market, has inevitably led to new demands on process control from industrial sectors. An important question for process control is how to secure the security operation of complex industries. The power system is one of the most complex industrial systems in the world, and faults in transmission lines pose a threat to the safe and stable operation of power systems. An inspection and monitoring system for transmission lines is proposed in this thesis, and, as a case study, a comprehensive early-warning scheme for assessing the icing condition of transmission lines with probability density function (PDF) based image recognition technology is carried out. In addition, fault location technologies for both transmission lines and distribution networks are discussed as another important component of the operational security of power systems. These provide fault location methods based on distribution characteristics of faulty currents in optical ground wire (OPGW) and the travelling wave scheme with distribution generations. Finally, control algorithms for optimising the power distribution network are also discussed. Cooperative control, based upon physical network connectivity, is proposed. This is used to maintain a group of generators operating at the identical ratio in terms of their available power, which is known as fair utilisation.
APA, Harvard, Vancouver, ISO, and other styles
13

Kahl, Matthias [Verfasser], and T. [Akademischer Betreuer] Leibfried. "Cooperative Predictive Control to enhance Power System Security / Matthias Kahl. Betreuer: T. Leibfried." Karlsruhe : KIT-Bibliothek, 2014. http://d-nb.info/1064504221/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Busmire, Terence Edward. "Concept definitions and security requirements of a cooperative execution environment for distributed computing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Azab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.

Full text
Abstract:
Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usability.  Due to the proliferation of increasingly sophisticated cyber threats with exponentially destructive effects, CPS defense systems must systematically evolve their detection, understanding, attribution, and mitigation capabilities. Unfortunately most of the current CPS defense systems fall short to adequately provision defense services while maintaining operational continuity and stability of the targeted CPS applications in presence of advanced persistent attacks. Most of these defense systems use un-coordinated combinations of disparate tools to provision defense services for the cyber and physical components. Such isolation and lack of awareness of and cooperation between defense tools may lead to massive resource waste due to unnecessary redundancy, and potential conflicts that can be utilized by a resourceful attacker to penetrate the system.  
Recent research argued against the suitability of the current security solutions to CPS environments.  We assert the need for new defense platforms that effectively and efficiently manage dynamic defense missions and toolsets in real-time with the following goals:
1) Achieve asymmetric advantage to CPS defenders, prohibitively increasing the cost for attackers;
2) Ensure resilient operations in presence of persistent and evolving attacks and failures; and  
3) Facilitate defense alliances, effectively and efficiently diffusing defense intelligence and operations transcending organizational boundaries.
Our proposed solution comprehensively addresses the aforementioned goals offering an evolutionary CPS defense system. The presented CPS defense platform, termed CyPhyCARD (Cooperative Autonomous Resilient Defenses for Cyber-Physical systems) presents a unified defense platform to monitor, manage, and control the heterogeneous composition of CPS components. CyPhyCARD relies on three interrelated pillars to construct its defense platform. CyPhyCARD comprehensively integrates these pillars, therefore building a large scale, intrinsically resilient, self- and situation- aware, cooperative, and autonomous defense cloud-like platform that provisions adequate, prompt, and pervasive defense services for large-scale, heterogeneously-composed CPS. The CyPhyCARD pillars are:
1) Autonomous management platform (CyberX) for CyPhyCARD\'s foundation. CyberX enables application elasticity and autonomic adaptation to changes by runtime diversity employment, enhances the application resilience against attacks and failures by multimodal recovery mechanism, and enables unified application execution on heterogeneously composed platforms by a smart employment of a fine-grained environment-virtualization technology.
2) Diversity management system (ChameleonSoft) built on CyberX. ChameleonSoft encrypts software execution behavior by smart employment of runtime diversity across multiple dimensions to include time, space, and platform heterogeneity inducing a trace-resistant moving-target defense that works on securing CyPhyCARD platform against software attacks.
3) Evolutionary Sensory system (EvoSense) built on CyberX. EvoSense realizes pervasive, intrinsically-resilient, situation-aware sense and response system to seamlessly effect biological-immune-system like defense. EvoSense acts as a middle layer between the defense service provider(s) and the Target of Defense (ToD) creating a uniform defense interface that hides ToD\'s scale and heterogeneity concerns from defense-provisioning management.
CyPhyCARD is evaluated both qualitatively and quantitatively. The efficacy of the presented approach is assessed qualitatively, through a complex synthetic CPS attack scenario. In addition to the presented scenario, we devised multiple prototype packages for the presented pillars to assess their applicability in real execution environment and applications. Further, the efficacy and the efficiency of the presented approach is comprehensively assessed quantitatively by a set of custom-made simulation packages simulating each CyPhyCARD pillar for performance and security evaluation.  The evaluation illustrated the success of CyPhyCARD and its constructing pillars to efficiently and effectively achieve its design objective with reasonable overhead.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
16

Lakshmanan, Sriram. "Cooperative communication in wireless networks: algorithms, protocols and systems." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42702.

Full text
Abstract:
Current wireless network solutions are based on a link abstraction where a single co-channel transmitter transmits in any time duration. This model severely limits the performance that can be obtained from the network. Being inherently an extension of a wired network model, this model is also incapable of handling the unique challenges that arise in a wireless medium. The prevailing theme of this research is to explore wireless link abstractions that incorporate the broadcast and space-time varying nature of the wireless channel. Recently, a new paradigm for wireless networks which uses the idea of 'cooperative transmissions' (CT) has garnered significant attention. Unlike current approaches where a single transmitter transmits at a time in any channel, with CT, multiple transmitters transmit concurrently after appropriately encoding their transmissions. While the physical layer mechanisms for CT have been well studied, the higher layer applicability of CT has been relatively unexplored. In this work, we show that when wireless links use CT, several network performance metrics such as aggregate throughput, security and spatial reuse can be improved significantly compared to the current state of the art. In this context, our first contribution is Aegis, a framework for securing wireless networks against eavesdropping which uses CT with intelligent scheduling and coding in Wireless Local Area networks. The second contribution is Symbiotic Coding, an approach to encode information such that successful reception is possible even upon collisions. The third contribution is Proteus, a routing protocol that improves aggregate throughput in multi-hop networks by leveraging CT to adapt the rate and range of links in a flow. Finally, we also explore the practical aspects of realizing CT using real systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhang, Pengfei. "Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22648.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) have attracted much attention over the last few years. VANETs own several significant characteristics, such as the high-rate changing topology led by velocity of vehicles, time-and-location critical safety applications, and Global Positioning System (GPS) devices. In VANETs, as vehicle movement is usually restricted in just bidirectional movements along the roads and streets, geographical location information becomes very useful. In addition, many studies show that position-based routing protocol is a more promising routing strategy for VANETs; therefore security and verification of location information are necessary to be researched. In this thesis, a location verification approach, namely the Cooperative Location Verification (CLV) protocol, is proposed, aiming to prevent position-spoofing attacks on VANETs. The CLV basically uses two vehicles, a Verifier and a Cooperator, to verify the claimed position of a vehicle (Prover), according to two challenge-response procedures. Additionally, the security analysis of the CLV is presented. In order to enhance the CLV by reduce the network overhead, a reputation management system is designed. It utilizes the verification results of the CLV application and maintain every vehicle's reliability in the network. In addition, the solution to sparse networks is briefly discussed. In the simulation, the results show that the proposed CLV performs better than another location verification algorithm, namely the Secure Location Verification (SLV). And the effectiveness of the reputation management system is also demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
18

Machado, Luís Rodrigo. "Cooperative security strategy in the South Atlantic : United States internal determinants and region ressignification." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/168662.

Full text
Abstract:
Esta dissertação tem como objetivo central discutir a importância do Atlântico Sul para os Estados Unidos da América, a partir da análise das suas políticas de segurança cooperativa para a parcela sul do Oceano Atlântico considerando, principalmente, seus determinantes internos e a própria ressignificação da região entre os anos de 2003 e 2014. Ela se enquadra nas Resoluções nº 114/2014 e 115/2014 da Câmara de Pós-Graduação da UFRGS e, portanto, é dividida em três capítulos, correspondendo a três partes distintas. O Primeiro Capítulo é desenvolvido em três etapas: Primeiro, relaciona o contexto da dissertação na linha de pesquisa “Segurança Internacional” do PPGEEI/UFRGS. Segundo, aborda alguns elementos das políticas externa e de segurança dos EUA, a importância do mar para a condução dessas políticas e uma breve contextualização do Atlântico Sul. Terceiro, ressalta os principais pontos analíticos e considerações desenvolvidos no capítulo seguinte. O Segundo Capítulo traz o artigo publicado na Revista da Escola de Guerra Naval que conduz, primeiro, uma breve discussão de alguns conceitos teóricos importantes para entender a postura dos Estados Unidos na condução de sua política externa e de segurança, recorrendo ao debate da influência da política interna nas suas relações internacionais. Em seguida, discute brevemente a importância do "uso do mar" para a política externa dos EUA, contextualizando o Atlântico Sul como uma região estratégica, discutindo suas fronteiras geográficas, aspectos econômicos e organizações multilaterais. Finalmente, discute alguns dos programas norte-americanos de segurança cooperativa para o Atlântico Sul e a crescente importância da região, em linha com o novo posicionamento estratégico pós-11 de setembro. O Capitulo três faz uma breve análise dos resultados do artigo e também apresenta agendas de pesquisas possíveis de serem conduzias no PPGEEI. Foi verificada a importância do artigo para trazer a discussão da segurança cooperativa, pelo viés estadunidense, no âmbito da pesquisa no PPG e também para fomentar a visibilidade deste problema nos fóruns de discussão e leitores do periódico científico de sua publicação. Assim,foram cumpridos os objetivos de discutir a importância do Atlântico Sul para os Estados Unidos da América, a partir da discussão das políticas de segurança cooperativa, dos determinantes políticos internos e da mudança da relevância da região para a grande estratégia norte-americana. Inferindo então, a pertinência do Atlântico Sul, evidenciada pela busca de iniciativas de segurança colaborativa e combate às ameaças de baixa intensidade, visando conter novas ameaças e enfrentar atores não estatais.
The present dissertation aims to discuss the importance of the South Atlantic to the United States of America, from the analysis of its cooperative security policies for the southern part of the Atlantic Ocean, considering mainly its internal determinants and the re-signification of the region between the years of 2003 and 2014. It is in accordance with Resolutions 114/2014 and 115/2014 of the Universidade Federal do Rio Grande do Sul, and therefore comprises three chapters, corresponding to three distinct parts. Chapter One presents three steps: First, it relates the context of the dissertation in the research line "International Security" of the Post-Graduate Program in International Strategic Studies. Second, it addresses some elements of the U.S. foreign and security policy, the importance of the sea for the conduct of these policies and a brief contextualization of the South Atlantic. Third, it highlights the main analytical points and considerations that developed in the next chapter. Chapter Two brings the article published in the Revista da Escola de Guerra Naval which leads, firstly to, a brief discussion of some important theoretical concepts to understand the U.S. position in the conduct of its foreign and security policy, using the debate of the U.S. internal policy on their international relations. Then, briefly discusses the importance of "use of the sea" for U.S. foreign policy, contextualizing the South Atlantic as a strategic region, discussing its geographical boundaries, economic aspects, and multilateral organizations. Finally, discuss some North American cooperative security programs for the South Atlantic and the region's growing importance, in line with the new strategic post-9/11 position. Chapter Three brings a brief analysis of the paper's impacts and presents possibilities of investigation agendas to follow on PPGEEI. Therefore, it was possible to verify that the article was important to bring the discussion of cooperative security, by the American bias, in the African region to the scope of the research in the PGP and to promote the visibility of this problem in the discussion forums and readers of the scientific journal of its publication, fulfilling its objectives of discussing the importance of the South Atlantic to the United States of America, from the discussion of the cooperative security policies for the African West Coast, through the internal political determinants and the change of the region relevance to the global north American grand strategy. Inferring then, the relevance of the South Atlantic in this grand strategy, evidenced by the search for collaborative security initiatives and to combat low intensity threats such as piracy, aiming to contain new threats and face non-state actors.
APA, Harvard, Vancouver, ISO, and other styles
19

McCallum, Christopher M. "Cooperative security in Northeast Asia : ramifications of change in the U.S. and ROK maritime strategies /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMcCallum.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Edward A. Olsen, H. Lyman Miller. Includes bibliographical references (p. 73-76). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
20

Serrat, Olmos Manuel David. "Cooperation techniques to improve peer-to-peer wireless networks security." Doctoral thesis, Editorial Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/32831.

Full text
Abstract:
Computer networks security is a topic which has been extensively researched. This research is fully justified when one notices the dimensions of the problem faced. One can easily identify different kinds of networks, a large quantity of network protocols, and an overwhelming amount of user applications that make extensive use of networks for the purposes those applications were built. This conforms a vast research field, where it is possible for a researcher to set his or her interests over a set of threats, vulnerabilities, or types of attacks, and devise a mechanism to prevent the attack, mitigate its effects or repair the final damages, based upon the specific characteristics of the scenario. Our research group on Computer Networks has been researching on certain kinds of computer networks security risks, specially those affecting wireless networks. In previous doctoral works [13], detection and exclusion methods for dealing with malicious nodes in mobile ad hoc networks (MANETs) had been proposed, from the point of view of every individual network node, using a technique called Intrusion Detection Systems (IDS) based on Watchdog methods. In this scope, we pretend to optimize network throughput removing misbehaved nodes from the network communication processes, a task performed specifically by the Watchdog systems. When isolated security techniques obtain good results on dealing with one type of attacks, a way to improve the whole network performance could be establishing mechanisms for cooperatively sharing information between well-behaved nodes to speed up misbehaved node detection and increase accuracy. Obviously, these mechanisms will have a cost in terms of network transmission overhead and also a small computing time overhead needed to analize the received data and to obtain an opinion about a suspect node. The key issue here it to adequately balance the costs and the benefits related to these cooperation techniques to ensure that the overall network performance is increased if compared with a non-collaborative one.
Serrat Olmos, MD. (2013). Cooperation techniques to improve peer-to-peer wireless networks security [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/32831
Alfresco
APA, Harvard, Vancouver, ISO, and other styles
21

Jieke, Pan. "Cooperative Intrusion Detection For The Next Generation Carrier Ethernet." Master's thesis, Department of Informatics, University of Lisbon, 2008. http://hdl.handle.net/10451/13881.

Full text
Abstract:
Current OSI model layer 2 network elements (NEs, e.g., bridges, switches) are complex hardware and software boxes, often running an operating system, service and administration software, that can be vulnerable to attacks, including to remote code execution inside them. The purpose of this thesis is to present an architecture to protect the Carrier Ethernet network infrastructure from attacks performed by malicious NEs against the link management protocol, Spanning Tree Protocol, and its variations. This thesis proposes that NEs are equipped with an intrusion detection component. Each detector uses a specification-based intrusion detection mechanism in order to inspect the behaviour of other NEs through the analysis of the received messages. The correct behaviour of the NEs is crafted from the standard specification of the STP protocol. If there is a deviation between current and expected behaviour, then the NE is considered to be malicious. The specification is extended with temporal pattern annotations, in order to detect certain deviations from the protocol. The results of the local detection are then transmitted to the other NEs, in order to cooperatively establish a correlation between all the NEs, so that malicious NEs can be logically removed from the network (disconnecting the ports connected to them)
APA, Harvard, Vancouver, ISO, and other styles
22

Hocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.

Full text
Abstract:
As information technology pervades our lives we have increasingly come to rely on these evermore sophisticated and ubiquitous items of equipment. Portability and the desire to be connected around the clock has driven the rapid growth in adoption of mobile devices that enable us to talk, message, tweet and inform at will, whilst providing a means to shop and administer bank accounts. These high value, high risk, desirable devices are increasingly the target of theft and improvement in their protection is actively sought by Governments and security agencies. Although forms of security are in place they are compromised by human reluctance and inability to administer them effectively. With typical users operating across multiple devices, including traditional desktop PCs, laptops, tablets and smartphones, they can regularly find themselves having a variety of devices open concurrently. Even if the most basic security is in place, there is a resultant need to repeatedly authenticate, representing a potential source of hindrance and frustration. This thesis explores the need for a novel approach to user authentication, which will reduce the authentication burden whilst providing a secure yet adaptive security mechanism; a so called Authentication Aura. It proposes that the latent security potential contained in surrounding devices and possessions in everyday life can be leveraged to augment security, and provides a framework for a distributed and cooperative approach. An experiment was performed to ascertain the technological infrastructure, devices and inert objects that surround individuals throughout the day. Using twenty volunteers, over a fourteen-day period a dataset of 1.57 million recorded observations was gathered, which confirmed that between 6am and 12pm a significant device or possession is in near proximity 97.84% of the time. Using the data provided by the experiment as the basis for a simulation of the framework, it suggests a reduction of up to 80.36% in the daily number of required authentications for a user operating a device once every 30 minutes, with a 10 minute screen lock in place. Examining the influence of location alone indicated a reduction of 50.74% in user interventions lowering the average from 32 to 15.76, the addition of the surroundings reducing this further to 13.00. The analysis also investigated how a user’s own authentication status could be used to negate the need to repeatedly manually authenticate and it was found that it delayed the process for up to 90 minutes for an individual user. Ultimately, it confirms that during device activation it is possible to remove the need to authenticate with the Authentication Aura providing sufficient assurance.
APA, Harvard, Vancouver, ISO, and other styles
23

Pierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.

Full text
Abstract:
The fast development of wireless networks, which are intrinsically exposed to eavesdropping, has created a growing concern for confidentiality. While classical cryptographic schemes require a key provided by the end-user, physical-layer security leverages the randomness of the physical communication medium as a source of secrecy. The main benefit of physical-layer security techniques is their relatively low cost and their ability to combine with any existing security mechanisms. This dissertation provides an analysis including the theoretical study of the two-way wiretap channel to obtain a better insight into how to design coding mechanisms, practical tests with experimental systems, and the design of actual codes. From a theoretical standpoint, the study confirms the benefits of combining several multi-user coding techniques including cooperative jamming, coded cooperative jamming and secret key generation. For these different mechanisms, the trade-off between reliability, secrecy and communication rate is clarified under a stringent strong secrecy metric. Regarding the design of practical codes, spatially coupled LDPC codes, which were originally designed for reliability, are modified to develop a coded cooperative jamming code. Finally, a proof-of-principle practical wireless system is provided to show how to implement a secret key generation system on experimental programmable radios. This testbed is then used to assess the realistic performance of such systems in terms of reliability, secrecy and rate.
APA, Harvard, Vancouver, ISO, and other styles
24

Kalogiannis, Konstantinos. "Investigating Attacks on Vehicular Platooning and Cooperative Adaptive Cruise Control." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292951.

Full text
Abstract:
Autonomous vehicles are a rising technology that aims to change the way people think about mobility in the future. A crucial step towards that goal is the assurance that malicious actors cannot instigate accidents that could lead to damages or loss of life. Currently, vehicle platoons, that is vehicles cooperating together to increase fuel saving and driver comfort, are used in limited environments and are the focus of research aimed to make them suitable for real-world wide usage. In that regard, guaranteeing that the vehicle is able to operate alongside other entities, autonomous or not, in the traditional sense is not adequate. The computer systems involved can be the target or the source of a malicious act without the knowledge of the operator in either case. In the context of platooning, these acts can have devastating effects and can originate either from other vehicles on the road or from within, from compromised vehicles that are part of the formation. In this thesis, the focus is centered around the latter. We investigate jamming and data falsification attacks that aim to either destabilize the platoon, thus, reducing its benefits or provoke an accident. These attacks are more difficult to discern and will range from simple falsification attacks to more complex ones that aim to bypass defensive mechanisms. In that sense, we direct our experiments against the platoon maneuvers that are a core functionality of platooning and are required for its nominal operation. The results of this analysis show that several attacks can lead to accidents with position falsification being the most productive. It is also demonstrated that a malicious leader can pose a serious threat to the viability of the platoon because of his unique capability of interacting with all the platoon members. Attacks during the platoon maneuvers are demonstrated to pose a threat, not only to the stability of the formation but also the nature of the platooning application itself. This is achieved by effectively isolating the platoon from potential joiners.
Självkörande fordon är en framväxande teknologi med mål att ändra människors framtida inställning till mobilitet. Ett kritiskt steg mot målet är att försäkra sig om att aktörer med ont uppsåt inte kan orsaka olyckor som kan leda till skador eller dödsfall. För närvarande används fordonståg, alltså fordon som samarbetar för att minska bränsleförbrukning och öka körkomfort, i avgränsade miljöer med fokus på att anpassa dessa för verklig användning. Att garantera att fordonet kan köras tillsammans med andra enheter är då inte tillräckligt eftersom dessa system kan bli mål för externa och interna attacker som kan ha förödande konsekvenser. Denna uppsats fokuserar på det senare fallet och undersöker interna datafalsifierings- och frekvensstörningsattacker avsedda att destabilisera fordonståg i syfte att minska deras fördelar eller provocera fram en olycka. Dessa attacker är svåra att urskilja och inkluderar allt från enkla falsifikationsattacker till komplexa attacker som syftar till att kringgå specifika försvarsmekanismer. Med det i åtanke inriktar vi våra experiment mot de manövrar som är en del av fordonstågens grundfunktionalitet och krävs för deras nominella drift. Resultaten av arbetet visar att under fordonstågmanövrar så kan flertalet av de utvärderade attackerna orsaka olyckor och att attacker genom förfalskning av position var speciellt förödande. Vi har även påvisat att en fordonstågsledare med ont uppsåt utgör ett speciellt allvarligt hot mot fordonstågets funktionalitet på grund av dennes unika möjlighet att interagera med alla medlemmar. Attacker under manövrar har visats utgöra ett hot, inte bara mot stabiliteten av formationen, men även mot de grundläggande egenskaperna hos systemet själv såsom att isolera fordonståget från nya medlemmar.
APA, Harvard, Vancouver, ISO, and other styles
25

Aguilar, Sérgio Luiz Cruz [UNESP]. "Relações militares no Cone Sul: da rivalidade à cooperação na área de segurança (1964-2007)." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/93379.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:26:37Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-04-28Bitstream added on 2014-06-13T19:47:26Z : No. of bitstreams: 1 aguilar_slc_dr_assis_parcial.pdf: 63758 bytes, checksum: 0cf6d488a8b8a55412979a80f6509c27 (MD5) Bitstreams deleted on 2015-06-25T13:00:51Z: aguilar_slc_dr_assis_parcial.pdf,. Added 1 bitstream(s) on 2015-06-25T13:03:16Z : No. of bitstreams: 1 000596610_20160430.pdf: 55601 bytes, checksum: 07cde3fd20455858a35e08006f3dccb2 (MD5) Bitstreams deleted on 2016-05-04T13:08:33Z: 000596610_20160430.pdf,. Added 1 bitstream(s) on 2016-05-04T13:09:35Z : No. of bitstreams: 1 000596610.pdf: 1152118 bytes, checksum: 130c2a22e3dee2ff1ad443bab84aa38e (MD5)
A tese apresenta as relações militares que se estabeleceram entre os Estados do Cone Sul (Argentina, Bolívia, Brasil, Chile, Paraguai e Uruguai) a partir da década de 1960 com o objetivo de analisar a construção da cooperação no campo da segurança. A análise foi balizada pelos entendimentos que essas relações foram ditadas pelos interesses internos de cada Estado; que a busca pela consecução desses objetivos sofreu a influência de fatores externos (mundial, regional e sub-regional), resultando em períodos de inimizade/amizade, cordialidade/rivalidade, conflito/cooperação; e que o processo de segurança se deu por interações (públicas e privadas, civis e militares) que permitiram alterações nas percepções de ameaças e, por conseguinte, nas práticas de segurança e defesa. Priorizando a representação documental da história e a empiria sobre a teoria e entendendo que a dinâmica de segurança faz com que haja uma interconexão por meio da qual a estabilidade global influencia na estabilidade regional e vice-versa, a análise englobou o sistema internacional, as organizações internacionais, os interesses dos Estados Unidos (EUA) e sua influência nos arranjos regionais de segurança; e os relacionamentos bilaterais e multilaterais dos Estados e os fatores internos que influenciaram o processo. Durante a Guerra Fria, os regimes militares, a estruturação do aparato de defesa dos Estados do Cone Sul e as relações que se estabeleceram entre eles relacionaram-se aos interesses de segurança dos EUA e a concepções geopolíticas próprias. Nesse período, alguns fatores conduziram a momentos de divergências ou rivalidade ao mesmo tempo em que sua lógica permitiu relações amistosas em decorrência da necessidade de preservação dos regimes e da própria segurança continental. Com o reordenamento do sistema pós-Guerra Fria, as tendências regionalistas, as ações das organizações internacionais, os processos de redemocratização e as alterações dos interesses de segurança dos EUA conduziram a relações baseadas na cooperação com o desenvolvimento das chamadas medidas de confiança mútua, a aceitação do conceito multidimensional de segurança e a novos arranjos de cooperação sub-regionais. Nesse quadro, os mecanismos criados entre os Estados do Cone Sul, especialmente no período pós-Guerra Fria, permitiram a configuração de uma rede de cooperação em segurança na sub-região.
The thesis shows the military relations that were established between the states of the Southern Cone (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) from the 1960s, aiming at analyzing the construction of cooperation in the field of security. The analysis was marked by the understandings that these relations were dictated by the internal interests of each state, the quest for achieving those goals has suffered the influence of external factors (global, regional and sub regional) resulting in periods of enmity/friendship, cordiality/rivalry, conflict/ cooperation, and that the security process was made by interactions (public, private, civil and military) that allowed changes in perceptions of threats and, therefore, in the security and defense practices. Prioritizing the documentary representation of history and empirism above the theory and comprehending that the dynamics of security means that there is an interconnection through which global stability influences on regional stability and vice versa, the analysis included the international system, international organizations, the U.S. interests and their influence on regional security arrangements; and the states’ bilateral and multilateral relations, and internal factors that influenced the process. During the Cold War, the military regimes, the structuring of the apparatus for the Southern Cone’s protection and the relationships established between them related to the security interests of the U.S. and geopolitical designs. In this period, some factors led to moments of disagreements and rivalry, in the same time that your logic allowed friendly relations due to the need for preservation of the military regimes and the continental security. The system redevelopment in the post-Cold War, regionalists trends, the international organizations actions, the redemocratization processes and changes in U.S. security interests have led to relations based on cooperation with the development of so-called confidence building measures, the acceptance of the multidimensional security concept and to new sub-regional cooperation arrangements. In this framework, the mechanisms established by the Southern Cone’s states, especially in the post-Cold War, allowed the setup of network cooperation’s security in the sub-region.
APA, Harvard, Vancouver, ISO, and other styles
26

Timilsina, Santosh. "Physical Layer Security in Training-Based Single-Hop/Dual-Hop Massive MIMO Systems." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2376.

Full text
Abstract:
The broadcast nature of wireless medium has made information security as one of the most important and critical issues in wireless systems. Physical layer security, which is based on information-theoretic secrecy concepts, can be used to secure the wireless channels by exploiting the noisiness and imperfections of the channels. Massive multiple-input multiple-output (MIMO) systems, which are equipped with very large antenna arrays at the base stations, have a great potential to boost the physical layer security by generating the artificial noise (AN) with the exploitation of excess degrees-of-freedom available at the base stations. In this thesis, we investigate physical layer security provisions in the presence of passive/active eavesdroppers for single-hop massive MIMO, dual-hop relay-assisted massive MIMO and underlay spectrum-sharing massive MIMO systems. The performance of the proposed security provisions is investigated by deriving the achievable rates at the user nodes, the information rate leaked into the eavesdroppers, and the achievable secrecy rates. Moreover, the effects of active pilot contamination attacks, imperfect channel state information (CSI) acquisition at the base-stations, and the availability of statistical CSI at the user nodes are quantified. The secrecy rate/performance gap between two AN precoders, namely the random AN precoder and the null-space based AN precoder, is investigated. The performance of hybrid analog/digital precoding is compared with the full-dimensional digital precoding. Furthermore, the physical layer security breaches in underlay spectrum-sharing massive MIMO systems are investigated, and thereby, security provisions are designed/analyzed against active pilot contamination attacks during the channel estimation phase. A power-ratio based active pilot attack detection scheme is investigated, and thereby, the probability of detection is derived. Thereby, the vulnerability of uplink channel estimation based on the pilots transmitted by the user nodes in time division duplexing based massive MIMO systems is revealed, and the fundamental trade-offs among physical layer security provisions, implementation complexity and performance gains are discussed.
APA, Harvard, Vancouver, ISO, and other styles
27

Chen, Kan. "Physical layer security in co-operative MIMO networks - key generation and reliability evaluation." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32839.

Full text
Abstract:
Doctor of Philosophy
Department of Electrical and Computer Engineering
Balasubramaniam Natarajan
Widely recognized security vulnerabilities in current wireless radio access technologies undermine the benefits of ubiquitous mobile connectivity. Security strategies typically rely on bit-level cryptographic techniques and associated protocols at various levels of the data processing stack. These solutions have drawbacks that have slowed down the progress of new wireless services. Physical layer security approaches derived from an information theoretic framework have been recently proposed with secret key generation being the primary focus of this dissertation. Previous studies of physical layer secret key generation (PHY-SKG) indicate that a low secret key generation rate (SKGR) is the primary limitation of this approach. To overcome this drawback, we propose novel SKG schemes to increase the SKGR as well as improve the security strength of generated secret keys by exploiting multiple input and multiple output (MIMO), cooperative MIMO (co-op MIMO) networks. Both theoretical and numerical results indicate that relay-based co-op MIMO schemes, traditionally used to enhance LTE-A network throughput and coverage, can also increase SKGR. Based on the proposed SKG schemes, we introduce innovative power allocation strategies to further enhance SKGR. Results indicate that the proposed power allocation scheme can offer 15% to 30% increase in SKGR relative to MIMO/co-op MIMO networks with equal power allocation at low-power region, thereby improving network security. Although co-op MIMO architecture can offer significant improvements in both performance and security, the concept of joint transmission and reception with relay nodes introduce new vulnerabilities. For example, even if the transmitted information is secured, it is difficult but essential to monitor the behavior of relay nodes. Selfish or malicious intentions of relay nodes may manifest as non-cooperation. Therefore, we propose relay node reliability evaluation schemes to measure and monitor the misbehavior of relay nodes. Using a power-sensing based reliability evaluation scheme, we attempt to detect selfish nodes thereby measuring the level of non-cooperation. An overall node reliability evaluation, which can be used as a guide for mobile users interested in collaboration with relay nodes, is performed at the basestation. For malicious behavior, we propose a network tomography technique to arrive at node reliability metrics. We estimate the delay distribution of each internal link within a co-op MIMO framework and use this estimate as an indicator of reliability. The effectiveness of the proposed node reliability evaluations are demonstrated via both theoretical analysis and simulations results. The proposed PHY-SKG strategies used in conjunction with node reliability evaluation schemes represent a novel cross-layer approach to enhance security of cooperative networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.

Full text
Abstract:
Cognitive radios are currently presented as the solution to the ever-increasing spectrum shortage problem. However, their increased capabilities over traditional radios introduce a new dimension of security threats. Cooperative Spectrum Sensing (CSS) has been proposed as a means to protect cognitive radio networks from the well known security threats: Primary User Emulation (PUE) and Spectrum Sensing Data Falsification (SSDF). I demonstrate a new threat to trust-based CSS protocols, called the Rogue Signal Framing (RSF) intrusion. Rogue signals can be exploited to create the illusion of malicious sensors which leads to the framing of innocent sensors and consequently, their removal from the shared spectrum sensing. Ultimately, with fewer sensors working together, the spectrum sensing is less robust for making correct spectrum access decisions. The simulation experiments illustrate the impact of RSF intrusions which, in severe cases, shows roughly 40\% of sensors removed. To mitigate the RSF intrusion's damage to the network's trust, I introduce a new defense based on community detection from analyzing the network's Received Signal Strength (RSS) diversity. Tests show a 95\% damage reduction in terms of removed sensors from the shared spectrum sensing, thus retaining the benefits of CSS protocols.
APA, Harvard, Vancouver, ISO, and other styles
29

Toplu, Esra. "The Euro-Mediterranean Partnership: Critical Assessment of the Security Aspects." Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2650.

Full text
Abstract:

This thesis attempts to assess the security aspect of the Barcelona Process (Process), or so called Euro-Mediterranean Partnership (EMP) within the theoretical framework of new regionalism and the Copenhagen School (Security complex theory) which agrees with neo/realism, neo-liberal institutionalism and constructivism in some aspects. The end of the Cold War broadened the security agenda and new security concerns emerged. Actually, most of the so- called security threats are not new, but the perception of them by the states has changed with globalization which increased the interconnectedness and density of the interaction. Global challenges have made states more vulnerable so appreciated the cooperative interaction at regional level. Comprehensive and cooperative security approaches gained importance and led regional security partnership among states. The construction of Euro-Mediterranean security partnership is one case stemming from the high level of interdependence between the European and the Mediterranean countries. The historical ties, economic dependency, geographical proximity increased the EU’s interest towards the Mediterranean. While new regionalism enables to grasp systemic factors in the Process, the Copenhagen School permits to understand security partnership at the regional level. The rise of illegal immigration flows and religious fundamentalism in the Mediterranean as well as tension in the Middle East conflict, the Iraqi War, and terrorist attacks to the US, Algeria and recently Turkey appreciated the importance of the EMP policy and security cooperation so make this study more crucial.

This study showed that the security challenges in five sectors of the security defined by the Copenhagen School are observable in the EMP’s case. Both military and non-military concerns threaten the stability and prosperity in the Mediterranean Basin. The three baskets of the EMP depict its comprehensive security approach. Having made an overview of the Barcelona Process, the thesis evaluated the security challenges in general and the thematic areas of concerns in depth. Since security cannot be defined without reference to the perceptions and security cultures of the actors, the study examined the perceptions and security cultures in the EMP.

The evaluation of the EMP showed that the EMP has shown certain developments on the way for the security cooperation. However, it could not produce tangible results due to the fundamental shortcomings categorized as inter and intra-institutional incoherence, definitional/perceptional problems and multi- actor involvement in the region. The lack of institutional structures, asymmetrical relations among partners, unbalanced distribution of powers and lack of commitment of the EU are crucial problems. On the basis of all problems lie the gap between the perceptions and security culture of Europe and the Arab world. Thus, this thesis emphasizes the enhancement of inter- subjective understanding and cultural dialogue in order to improve trust and interaction among partners. The EMP is on right track to build zone of peace in the Basin, but it requires longue durée to achieve this.

APA, Harvard, Vancouver, ISO, and other styles
30

Aguilar, Sérgio Luiz Cruz. "Relações militares no Cone Sul : da rivalidade à cooperação na área de segurança (1964-2007) /." Assis : [s.n.], 2009. http://hdl.handle.net/11449/93379.

Full text
Abstract:
Orientador: Clodoaldo Bueno
Banca: Amado Luiz Cervo
Banca: Shiguenoli Myamoto
Banca: Tullo Vigevani
Banca: José Luis Bendicho Beired
Resumo: A tese apresenta as relações militares que se estabeleceram entre os Estados do Cone Sul (Argentina, Bolívia, Brasil, Chile, Paraguai e Uruguai) a partir da década de 1960 com o objetivo de analisar a construção da cooperação no campo da segurança. A análise foi balizada pelos entendimentos que essas relações foram ditadas pelos interesses internos de cada Estado; que a busca pela consecução desses objetivos sofreu a influência de fatores externos (mundial, regional e sub-regional), resultando em períodos de inimizade/amizade, cordialidade/rivalidade, conflito/cooperação; e que o processo de segurança se deu por interações (públicas e privadas, civis e militares) que permitiram alterações nas percepções de ameaças e, por conseguinte, nas práticas de segurança e defesa. Priorizando a representação documental da história e a empiria sobre a teoria e entendendo que a dinâmica de segurança faz com que haja uma interconexão por meio da qual a estabilidade global influencia na estabilidade regional e vice-versa, a análise englobou o sistema internacional, as organizações internacionais, os interesses dos Estados Unidos (EUA) e sua influência nos arranjos regionais de segurança; e os relacionamentos bilaterais e multilaterais dos Estados e os fatores internos que influenciaram o processo. Durante a Guerra Fria, os regimes militares, a estruturação do aparato de defesa dos Estados do Cone Sul e as relações que se estabeleceram entre eles relacionaram-se aos interesses de segurança dos EUA e a concepções geopolíticas próprias. Nesse período, alguns fatores conduziram a momentos de divergências ou rivalidade ao mesmo tempo em que sua lógica permitiu relações amistosas em decorrência da necessidade de preservação... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The thesis shows the military relations that were established between the states of the Southern Cone (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) from the 1960s, aiming at analyzing the construction of cooperation in the field of security. The analysis was marked by the understandings that these relations were dictated by the internal interests of each state, the quest for achieving those goals has suffered the influence of external factors (global, regional and sub regional) resulting in periods of enmity/friendship, cordiality/rivalry, conflict/ cooperation, and that the security process was made by interactions (public, private, civil and military) that allowed changes in perceptions of threats and, therefore, in the security and defense practices. Prioritizing the documentary representation of history and empirism above the theory and comprehending that the dynamics of security means that there is an interconnection through which global stability influences on regional stability and vice versa, the analysis included the international system, international organizations, the U.S. interests and their influence on regional security arrangements; and the states' bilateral and multilateral relations, and internal factors that influenced the process. During the Cold War, the military regimes, the structuring of the apparatus for the Southern Cone's protection and the relationships established between them related to the security interests of the U.S. and geopolitical designs. In this period, some factors led to moments of disagreements and rivalry, in the same time that your logic allowed friendly... (Complete abstract click electronic access below)
Doutor
APA, Harvard, Vancouver, ISO, and other styles
31

Nahiduzzaman, Kh Md. "HOUSING THE URBAN POOR: AN INTEGRATED GOVERNANCE PERSPECTIVE : The Case of Dhaka, Bangladesh." Doctoral thesis, KTH, Urbana och regionala studier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-90297.

Full text
Abstract:
It is claimed that low-income people in Dhaka city do not have the financial ability to enjoy adecent housing environment. There is a clear lack of knowledge on how low-income people,drawing upon both their available income together and support from formal financial institutions,would be able to afford housing. It is commonly considered a fact that their access to formalfinancial means is largely hindered by their poor financial status, along with the absence of anyform of land tenure security. The case of this study demonstrates, on the contrary, the adequatefinancial ability of the urban poor when it comes to meeting rent and payments for other necessaryservices. This study therefore primarily responds to the critical issue of whether the government isunaware of informal housing practices, or is simply ignorant of low-income housing provision.In this study, perspectives on change are analyzed in order to comprehend the obstacles andchallenges embedded within the housing organizations of Dhaka city. Within the local governanceparadigm, the concepts of deliberative dialogue and partnership are explored with the aim toreveal both the resources rooted in ‘informal’ low-income housing practices, and the resources atstake for the ‘formal’ housing gatekeepers. Different land tenure security options are explored inorder to understand their compatibility with the informal nature of low-income housing. Thetheory of social business is critically reviewed, and used to examine whether low-incomeaffordable housing could be seen as a product resulting from partnerships between vested actors,for whom the low-income community could be considered to be both a beneficiary and a partner.This study suggests that outside the boundary of ‘formal’ housing, there is an unexplored andfunctional ‘informal’ housing market where de facto owners purchase ‘business tenure security’from the slum lords, while de facto tenants buy ‘house rental tenure security’ in exchange forregular rental payments. Within this informality, an innovative financial organization (the JhilparCooperative) has emerged as a creative platform for business investment. This study reveals thatJhilpar’s inhabitants pay more than 30 percent of their monthly income for housing. As anabsolute value, this is more than what is being paid by middle-class – and even many high-income– people. The slum inhabitants also pay more for a limited supply of basic services, such aselectricity.This study concludes that the formal housing gatekeepers lack a complete knowledge of‘informality’ – a notion reflected in, for example, the actual financial ability of the urban poor; thestrength and potentials of systematic community-based cooperative business; and housing relocationdecisions (employment-housing nexus). This fundamental lack of knowledge precludesthe housing gatekeepers from taking the right decisions to achieve affordable low-incomehousing. These deficiencies have led to low-income housing projects that have barely benefitedthe urban poor, benefiting other income groups instead. Low-income housing projects utilizingland title provision, sites and services schemes, and relocation to other places (amongst otherstrategies) disregard the nature, strength, and potentials of housing ‘informality’ in the slums inthe most pronounced manner. This identified knowledge gap also rules out private and publichousing gatekeepers employing their resources as enablers or providers. To improve this impassewith regard to affordable low-income housing, this study advocates a ‘social business model forlow-income housing’ as the most effective option for the Jhilpar community, wherebypartnerships would be built on an ‘investment’ mindset, through a shift away from conventional‘give away’ practices.
QC 20120221
APA, Harvard, Vancouver, ISO, and other styles
32

Dyalvane, Ncumisa. "The role of agricultural co-operatives in food security in the Eastern Cape, Province of South Africa : the case of the Nkonkobe Local Municipality." Thesis, University of Fort Hare, 2015. http://hdl.handle.net/10353/2867.

Full text
Abstract:
This study highlights the contribution of agricultural co-operatives in promoting food security in the Nkonkobe Local Municipality in the Eastern Cape Province of South Africa.Although the dawn of democracy saw the government making efforts to address food insecurity and provide solutions to the challenges related to it a lot remains to be done. As a result, food insecurity remains a fundamental concern in South Africa in particular among villagers in the Nkonkobe Local Municipality. Consequently, the study focuses on the state of Agricultural Co-operatives in the Nkonkobe Municipality and their role in food security. Therefore, this dissertation therefore discusses problems plaguing Agricultural Co-operatives in Nkonkobe. This study highlights the contribution of agricultural co-operatives in promoting food security in the Nkonkobe Local Municipality in the Eastern Cape Province of South Africa.Although the dawn of democracy saw the government making efforts to address food insecurity and provide solutions to the challenges related to it a lot remains to be done. As a result, food insecurity remains a fundamental concern in South Africa in particular among villagers in the Nkonkobe Local Municipality. Consequently, the study focuses on the state of Agricultural Co-operatives in the Nkonkobe Municipality and their role in food security. Therefore, this dissertation therefore discusses problems plaguing Agricultural Co-operatives in Nkonkobe. The qualitative methodology was used because it seeks to dig out in-depth information so as to understand the causes of food insecurity despite agricultural co-operatives and government assistance being in place. The food security situation was analysed using the sustainable livelihoods and basic needs approaches. The findings of the study reveal that agricultural co-operatives face a number of challenges. These include inadequate funds, poor market places, transport problems, shortage of farming equipment and insufficient water supply. In addition, the ability of agricultural co-operatives to make a worthy contribution to food security is being adversely hindered by poor implementation capacity and financial management. This in turn makes them unable to strengthen and expand their business operations. The study suggests that the government or the municipality should build sustainable water sources like dams as well as provide taps in the community to boost productivity all year round in the agricultural cooperatives hence guaranteeing food security in Nkonkobe Local Municipality,the Eastern Cape and South Africa at large.
APA, Harvard, Vancouver, ISO, and other styles
33

Ogunleye, Olaoluwa. "Power to the People: Assessing Renewable Energy Cooperatives in Ontario." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37985.

Full text
Abstract:
There is need for increased production of electricity from renewable energy technologies. The transition to a low-carbon economy, whilst achieving energy security and meeting the Sustainable Development Goal 7 (SDG7) is an ongoing challenge for many countries. Local communities instituting an energy co-operative model may be instrumental to reducing greenhouse gas emissions to attain the 2030 goal. Renewable energy co-operatives (RECs) are one approach that can contribute to environmentally and socially equitable energy transitions in order to meet the SDG7. This thesis examines the factors that affect the success of RECs within Ontario to better discern how RECs are set up and how government policy affects their development. The main research question of this study is “How can Ontario’s renewable energy co-ops grow, experience long-term viability, be updated or expanded?” This thesis argues that the quest towards energy transition, a low-carbon economy and to achieve both the federal and provincial targets by 2030 should take on a multi-stakeholders approach. In theory, this should reflect community desires, goals and energy equity since a community should have its own supported role in energy generation towards the whole of Ontario. With the absence of provincial support from the removal of the Feed-In Tariff (FIT) program in 2017, it is now imperative that municipal governments become involved in REC developments within their community. The methodological approach of this thesis uses a combination of the Strengths, Weaknesses, Opportunities and Threats (SWOT) and sustainability analyses in order to interpret the data collected from semi-structured interviews with co-ops and policymakers as well as their websites and reports. This study examines the support structures and barriers for the growth of RECs in Ontario and how their growth can contribute to the SDG7. Through document review and interviews with representatives from the co-ops, I discovered that barriers include unstable government policy, inadequate funding, and a lack of support from financial institutions due to the smaller size of the projects developed by power co-ops. Comparisons with REC policy and progress in European countries show Ontario can do more to support RECs. This thesis concludes that one of the many available options for Ontario to contribute substantially to the transition to a low-carbon-economy is through applying the Pan-Canadian Framework on Clean Growth and Climate Change and the SDG7 by supporting citizen-led initiatives like RECs and to encourage large financial institutions to invest in their communities.
APA, Harvard, Vancouver, ISO, and other styles
34

Manoch, Karel. "Možnosti reformy OBSE v kontextu evropského dialogu o bezpečnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-113684.

Full text
Abstract:
The diploma thesis deals with the contemporary position of the Organization for Security and Co-operation in Europe in the European security architecture and, in particular, it is devoted to the assessment of the reform possibilities of this organization whose efficiency and relevance are being questioned these days. The thesis concentrates on the unique features of the OSCE as well as on the analysis of its strong and weak points and of the interests of the key players too. Previous attempts of the OSCE's reform including the most recent initiatives and proposals in a wide European security negotiations framework are also profoundly discussed. On the basis of preceding findings, summarizing conclusions are finally drawn and the thesis predicts probable scenarios concerning the future of OSCE and its reform process.
APA, Harvard, Vancouver, ISO, and other styles
35

Alves, H. (Hirley). "On the performance analysis of full-duplex networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526207667.

Full text
Abstract:
Abstract In this thesis we study Full-Duplex (FD) cooperative networks from different perspectives, using concepts of information theory, communication theory and applied statistics. We provide a comprehensive performance analysis of cooperative communications systems operating with FD relays. We demonstrate that FD relaying is feasible even when experiencing strong self-interference, and we show its application under different scenarios. More importantly, the results attained through this work serve as a benchmark for design as well as deployment of current and future wireless communications technologies. Our first contribution is a comprehensive overview of the state-of-the-art on FD communications, more specifically on FD relaying, and we revisit some of the main properties of cooperative schemes. Another contribution comes from an extensive analysis of outage probability, throughput and energy efficiency of FD relaying over Rayleigh fading channels. Besides the mathematical framework introduced herein, we also show that in some cases cooperative Half-Duplex (HD) schemes achieve better performance than FD relaying with self-interference. Therefore, we draw a discussion on the trade-offs between HD and FD schemes as well as between throughput and energy efficiency. Then, we investigate the performance of FD relaying protocols under general fading settings, namely Nakagami-m fading. Our findings allow a better understanding of effects of the residual self-interference and line-of-sight on a FD relaying setup. Our final contribution lies on the performance analysis of secure cooperative networks relying on information theoretical metrics to provide enhanced privacy and confidentiality to wireless networks. Thus, we provide a comprehensive mathematical framework for composite fading channels. Even though experiencing strong self-interference, we demonstrate that FD relaying is feasible also under secrecy constraints, thus perfect secrecy can be achieved
Tiivistelmä Tässä työssä tutkitaan kaksisuuntaisia (Full-Duplex, FD) yhteistoiminnallisia verkkoja informaatioteorian, tietoliikenneteorian ja sovelletun tilastotieteen näkökulmista. Työssä suoritetaan kattava suorityskykyarviointi yhteistoiminnallisten FD-välittimien muodostamassa tietoliikenneverkossa. FD-releointi osoitetaan toimintakelpoiseksi useissa toimintaympäristöissä ja sovelluksissa jopa voimakkaan omahäiriön vallitessa. Mikä tärkeintä, työssä saavutetut tulokset muodostavat vertailukohdan sekä nykyisten että tulevien langattomien verkkoteknologioiden suunnitteluun ja toteutukseen. Aluksi esitetään perusteellinen katsaus uusimpiin FD-tiedonsiirtomenetelmiin, etenkin FD-välitykseen, sekä kerrataan yhteistoiminnallisten tekniikoiden pääpiirteet. Seuraavaksi analysoidaan laajasti FD-välitinyhteyden luotettavuutta sekä spektrinkäyttö- ja energiatehokkuutta Rayleigh-häipyvissä radiokanavissa. Matemaattisen viitekehyksen lisäksi osoitetaan myös, että joissain tapauksissa yhteistoiminnalliset vuorosuuntaiset (Half-Duplex, HD) menetelmät ovat parempia kuin FD-releointi omahäiriön vallitessa. Niinpä työssä käydään keskustelua kaupankäynnistä HD- ja FD -menetelmien kesken kuten myös spektrinkäyttö- ja energiatehokkuuden kesken. Seuraavaksi tutkitaan FD-releoinnin suorityskykyä yleistetymmässä häipymäympäristössä eli Nakagami-m -kanavassa. Saavutetut tulokset auttavat ymmärtämään paremmin jäljelle jäävän omahäiriön ja näköyhteyslinkkien vuorovaikutussuhteet FD-välitinjärjestelmän suunnittelussa. Lopuksi käsitellään tietoturvattuja yhteistoiminnallisia verkkoja informaatioteoreettisin mittarein, joilla pyritään tarjoamaan langattomien verkkojen käyttäjille parempaa yksityisyyden suojaa ja luottamuksellisuutta. Tätä varten työssä esitetään perusteelliset matemaattiset puitteet yhdistettyjen häipyvien kanavien tutkimiseen. Tuloksena osoitetaan, että myös salassapitokriteerien kannalta on mahdollista käyttää voimakkaan omahäiriön kokemaa FD-releointia vahvan salauksen saavuttamiseen
APA, Harvard, Vancouver, ISO, and other styles
36

Kanpachai, Saisak. "ASEAN and Thailand's regional security cooperation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341341.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, December 1997.
"December 1997." Thesis advisor(s): Mary P. Callahan. Includes bibliographical references (p. 137-139). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
37

Björnstjerna, Magnus. "Reexamining Nordic Security : A Case Study on Contemporary Nordic Security Cooperation." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-10512.

Full text
Abstract:
This study explores the driving forces and motives behind contemporary Nordic security cooperation. It asks and investigates whether the security cooperation has a foundation based on a shared (peace) identity or is founded on rational and functionalistic calculations. Through applying a theoretical model based on the theory of Regional Security Complexes the study reveal how external and internal transformations affect the Nordic nations and forces them to respond. The study reveals how both these factors are important when explaining the responses of the Nordic states and the development of the Nordic security cooperation. While national strategies differ there is a need to look to the own region which has led the Nordic states to search for a security structure at home. The study concludes that all of the Nordic nations have had to respond to a changing external environment which has put pressure on their defense budgets which problematizes their national foreign policy and security strategies. A strong Nordic amity and tradition of cooperation has eased a stronger formal structure which increases cost-effectiveness and functionalism for the Nordic states security structures. This structure has replaced older identity based and influence searching structures. Conclusively, contemporary Nordic security cooperation can be said to increase the Nordic states‟ security while simultaneously letting them follow their national security strategies. Norden is thus regaining importance and Nordic security cooperation show that the region is both active and proactive in dealing with their regional issues.
APA, Harvard, Vancouver, ISO, and other styles
38

Kulendi, Yonny. "Security cooperation in Africa : lessons from ECOMOG /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA342226.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations) Naval Postgraduate School, December 1997.
"December 1997." Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 99-140). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

Boxall, Sheryl Maree. "Pacific Islands Forum: Facilitating Regional Security Cooperation." Thesis, University of Canterbury. Political Science and Communication, 2006. http://hdl.handle.net/10092/952.

Full text
Abstract:
Oceania is an example of a region where traditional security theory based on historical enmity and competition does not fit. A history of amity and cooperation has evolved through regionalism and the region's pre-eminent organisation, the Pacific Islands Forum (the Forum). In 2004, the Forum was tasked to develop the 'Pacific Plan' (the Plan) to facilitate closer cooperation and deeper integration. Security is one of the four pillars of the Plan. The objective of this thesis is to analyse the institutions of the Forum as facilitators of regional security cooperation. The Forum is reviewed and the idea of a logic of action is introduced. To help explain security in an environment with a history of cooperation, traditional security theory is re-defined. A security environment equation is created as a framework to help analyse the Forum's structures and security mechanisms. The Forum Regional Security Committee is examined closely resulting in suggestions to strengthen the region's security environment.
APA, Harvard, Vancouver, ISO, and other styles
40

Wohlfeld, Monika Johanna. "Security cooperation in central Europe : Polish views." Thesis, King's College London (University of London), 1995. https://kclpure.kcl.ac.uk/portal/en/theses/security-cooperation-in-central-europe--polish-views(7fd587ae-3d3f-4aff-a9f4-c4ef4447ea82).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Aris, Stephen. "Central Asian regional security : Shanghai Cooperation Organisation." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/660/.

Full text
Abstract:
The Shanghai Cooperation Organisation (SCO) is emerging as a significant security organisation in Central Asia, but remains understudies in academia. This thesis analyses SCO using primary research interviews across its member-states, and by drawing on theoretical literatures developed for security and regionalism in the developing world. The role of SCO as a security provider and the nature of cooperation within its framework are examined, challenging existing assumptions. It is argued that the SCO is not an "empty vessel" aimed at countering Western influence, but a framework for cooperation on the primary interest of its member-states,regime security. To this end, it is focussed on addressing non-traditional security challenges within Central Asia, and has developed an institutional framework that takes into account the reservations of its member-states' elites about ceding national sovereignty. The thesis concludes that this approach has enabled SCO to become an important element in its member-states' regional policy. In addition, mainstream literatures on regional institutions are critiqued, in particular the impliciit assumption that cooperation between states that are not pluralistic liberal-democracies is inherently limited. To the contrary, in regions of weak states, regime security provides the basis for a different form of cooperation that should not be dismissed.
APA, Harvard, Vancouver, ISO, and other styles
42

Weissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.

Full text
Abstract:
This is a study of how IT-Security experts build trust and cooperate within and across organisations. The key research questions are 1) how do these specialists learn to trust others, and 2) why their preferences and strategies evolved the way they did. Using qualitative interviews and quantitative network analysis, the project finds that in this microcosm of risk-aware specialists, cooperation is rational due to complexity and uncertainty, while social control mechanisms are overly costly. In order to ascertain who is trustworthy and skilled, IT-Security specialists take precautions and then screen and probe potential co-operators thoroughly by querying and triangulating multiple information sources. Experts believe that generally, trusting individuals is possible, while they tend not to trust organisations as such, due to their complexity, and their political and economic incentives. Thus, when having to rely on organisations, security experts combine bureaucratic means, like standard compliance and performing audits, with their preferred approach based on interpersonal trust, networks, and individual assessment. Nevertheless, IT-Security experts efficiently manage assessment means and comprehensiveness. The in-depth network study of a security team finds that advice is given based on shared experience and nationality, while friendship nominations are value-driven: besides a strong tendency to not nominate anyone, the smaller group of those who see value in official certifications and education tend to nominate fewer friends, distinctly shunning those who consider these signals unimportant. This finding speaks to the growing institutionalisation and professionalisation of IT-Security caused by sector growth and state in- volvement. Most interviewees oppose this development, which is seen to water down security objectives. This thesis is based on primary data: expert interviews with specialists from over 30 countries, and longitudinal network data from an IT-Security team. The interviews explore how trust and cooperation are established, while the network data are used to quantitatively investigate network evolution.
APA, Harvard, Vancouver, ISO, and other styles
43

Febrica, Senia. "Explaining Indonesia's participation in maritime security cooperation." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5429/.

Full text
Abstract:
Indonesia’s cooperation in maritime security initiatives is vitally important because half of the world’s trading goods and oil pass through Indonesian waters including the Straits of Malacca, the Strait of Sunda and the Strait of Lombok. Consequently, Indonesia’s active engagement in maritime cooperation is a matter of some import for the international community. However, Indonesia’s varying participation across maritime cooperation arrangements is puzzling. Indonesia has joined some of these cooperation initiatives and opted out of others despite the presence of United States leadership. This thesis addresses this puzzle by carrying out a comparative analysis of 26 cooperation arrangements using government documents and elite interviews in Indonesia, Malaysia, Singapore and New York. In addition to addressing an empirical puzzle, this thesis also contributes to the theoretical debate on international cooperation. The International Relations literature on cooperation tends to focus on great power bargaining. Whether, why and how middle powers decide to join international initiatives over which they have little influence has been overlooked. The implication of this study suggests that neither the calculation of relative gains as argued by neorealists, the constructivist expectation regarding the importance of shared identity, the neorealist or the neoliberal argument on the role of hegemonic leadership nor the bureaucratic politics approach emphasis on competing government actors’ preferences can explain the variation in Indonesia’s engagement with cooperation initiatives. I argue that Indonesia’s decision to cooperate is formed by the calculation of absolute gains. Indonesia cooperated as long as the benefits of cooperation exceeded the costs.
APA, Harvard, Vancouver, ISO, and other styles
44

Oswald, Mace J. "Ukraine's relations with Russia competition or cooperation?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://bosun.nps.edu/uhtbin/hyperion.exe/02Dec%5FOswald.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, December 2002.
Thesis Advisor(s): Jeff Knopf, Mikhail Tsypkin. "December 2002." Includes bibliographical references (p. 117-120). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
45

Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.

Full text
Abstract:
Controles de segurança, também chamados de mecanismos de proteção, voltados para previsão e detecção de eventos indesejados são cada vez mais empregados em ambientes de Tecnologia da Informação (TI). O pouco entendimento sobre as características dos eventos indesejados que agem nos sistemas e a baixa compatibilidade existente entre os diversos mecanismos de proteção são problemas que se destacam neste tipo de cenário. Diferentes configurações dificultam a combinação dos resultados destes mecanismos e raramente dois ou mais controles de segurança se complementam. Por esse motivo, o agrupamento entre mecanismos de detecção e de previsão não é trivialmente resolvido. Neste trabalho é proposta uma arquitetura, denominada de Arquitetura Estratégica de Agrupamento - Strategic Grouping Architecture (SGA) - para agrupamento de controles de segurança voltados para detecção e/ou previsão, que tem como base a busca de um equilíbrio entre as configurações e os resultados individuais de cada mecanismo de proteção envolvido. Para alcançar este equilíbrio a arquitetura proposta divide a análise dos eventos (legítimos e maliciosos) que passam pelos controles de segurança em dois níveis de abstração: o técnico, onde são coletadas as configurações e os resultados dos controles de segurança; e o estratégico, onde os dados obtidos no nível técnico são analisados por meio de barganhas cooperativas irrestritas - Unrestricted Cooperative Bargains (UCB), conceito proveniente da Teoria dos Jogos, que busca a otimização e equilíbrio entre resultados. Justamente por ser realizada em um nível de abstração diferente, a análise gerada pelo SGA identifica a influência que cada configuração exerce nos resultados agrupados. Para explorar a capacidade da arquitetura proposta, dois experimentos, bastante diferentes, que envolvem a ação de eventos indesejados em ambientes de TI são conduzidos. Os resultados obtidos mostram a viabilidade do agrupamento de controles de segurança de detecção e previsão e a possibilidade do uso do SGA em outros ambientes, que não estejam necessariamente ligados à segurança de TI. Baseada na literatura científica a validação do SGA consiste de uma transformação prévia na categoria dos jogos estratégicos usados - cooperativos para não-cooperativos - e na busca de situações como o Equilíbrio de Nash (EN) e o ótimo de Pareto, que indicam os melhores resultados de um jogo.
Security controls, also called protection mechanisms, focused on forecasting and detection of unwanted events are increasingly employed in Information Technology (IT) environments. The little understanding about the characteristics of unwanted events which act on the systems and the low rate of compatibility among several protection mechanisms are both problems that arise in that scenario. Different settings make difficult combining the results of these mechanisms and two or more controls rarely complement each other. Due to that, grouping mechanisms of detection and forecasting is not a trivial matter. In this work a framework called Strategic Grouping Architecture (SGA) is proposed to grouping security controls focused on detection and/or forecasting. SGA is based on the search for equilibrium between the settings and the individual results of each protection mechanism involved. In order to reach this equilibrium the proposed framework divide the analysis of events (legitimates and malicious) which go through the security controls in two abstract levels: the technical level, where the settings and the results of security controls are collected; and the strategic level, where the data obtained in the technical level are analyzed through Unrestricted Cooperative Bargains (UCB), concept from Game Theory that seeks to optimize and balance the results. Precisely because it is performed on a different level of abstraction, the analysis generated by the SGA identifies the influence that each setting has on the clustered results. In order to exploit the capability of the proposed architecture, two experiments, quite different, involving the action of unwanted events in IT environments, are conducted. The obtained findings show the feasibility of grouping detection and forecasting security controls and the possibility of using the SGA in other environments that are not necessarily related to IT security. Based on scientific literature SGA validation consists of a previous transformation in the category of strategy games used - cooperative to non-cooperative - and the search for situations such as the Nash Equilibrium (NE) and the Pareto optimal, indicating the best results a game.
APA, Harvard, Vancouver, ISO, and other styles
46

Massey, Anthony Shintaro. "Maritime security cooperation in the Strait of Malacca." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Jun%5FMassey.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Far East, Southeast Asia))--Naval Postgraduate School, June 2008.
Thesis Advisor(s): Malley, Michael S. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 73-79). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
47

Matthews, Alfred Daniel. "Indonesian maritime security cooperation in the Malacca Straits." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45897.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis argues that Indonesia’s sensitivity about its sovereignty in the Malacca Straits and Indonesia’s preference toward regional security cooperation determines Indonesia’s policy in rejecting and accepting multilateral cooperation in the Straits. This thesis then analyzes the Regional Maritime Security Initiative (RMSI), MALSINDO, Eyes-in-the-Sky (EiS), and the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships (ReCAAP) initiatives, and examines how Indonesia responded to these initiatives. This thesis finds the following: First, regarding international effort to enhance the security cooperation in the Straits, Indonesia’s sensitivity and its wariness of internationalizing the Straits remains a big challenge for the extraregional states’ security initiatives in securing the Malacca Straits. Second, regarding the regional cooperation in the Straits, even though Indonesia prefers regional cooperation, it would still limit its cooperation when dealing with the sovereignty issue. Third, regarding the security cooperation with extraregional powers, Indonesia prefers a bilateral security cooperation framework in securing the Straits.
APA, Harvard, Vancouver, ISO, and other styles
48

Delbourg, Esther. "Achieving water security through cooperation and food trade." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX077/document.

Full text
Abstract:
Cette thèse de doctorat en économie s’inscrit dans le grand débat sur la rareté des ressources en eau et des impacts potentiels sur nos économies et notre sécurité alimentaire. Avec l’usage d’outils quantitatifs et économétriques, elle étudie les mécanismes de répartition de l’eau d’abord lorsqu’elle doit être partagée par plusieurs pays et ensuite lorsqu’elle est utilisée par l’agriculture et expédiée à travers les aliments sous forme virtuelle par le commerce international alimentaire.Le premier chapitre, co-écrit avec Prof. Eric Strobl, étudie les conflits de l’eau entre pays Africains situés en amont-aval d’un fleuve et contraints de partager la ressource. Entre 1949 et 2007 nous trouvons peu de traces de conflits, même si la paix est souvent contingente à une situation égalitaire en termes d’accès à l’eau. En effet, c’est l’asymétrie de l’approvisionnement qui est en jeu mais le pays en aval, défavorisé par sa position, arrive souvent à contrecarrer ce désavantage en exerçant une pression économique sur ses voisins (comme dans le cas de l’Egypte, à l’aval, face à l’Ethiopie). Nos analyses montrent également que l’absence de coopération ne présage en rien des coopérations futures, un résultat encourageant pour les bassins transfrontaliers où l’entente est encore difficile.Le deuxième chapitre, co-écrit avec Prof. Shlomi Dinar, s’intéresse à la question des avantages comparatifs liés à l’eau dans le commerce international alimentaire. En étudiant les flux commerciaux entre 1994 et 2007, on comprend que les pays les plus pauvres en eau sont bien obligés d’importer les produits qu’ils ne peuvent eux-mêmes produire sur place, faute d’eau. Il y a un bien un avantage comparatif à la ressource. En revanche, nous montrons qu’en termes de productivité-eau (la quantité produite par litre d’eau utilisé), les pays s’échangent des biens pour lesquels ils n’ont pas nécessairement d’avantage, voire bien le contraire. L’eau est donc négligée dans l’équation lorsqu’il s’agit des stratégies de production et d’exports.La thèse se penche ensuite sur ces pays pauvres en eau et pourtant souvent dépendants du secteur agricole. En particulier, le troisième chapitre s’inspire des théories qui suggèrent que le développement économique va de pair avec la diversification de la production et des exportations. Or un manque d’eau contraint nécessairement les pays dans leur stratégie de diversification. Nous montrons que les pays avec eau rare et une productivité-eau faible ne peuvent se développer par l’agriculture, à moins de se concentrer sur un petit nombre de produits. Investir dans des technologies de l’eau pour un nombre restreint de produits permet d’intensifier la production et d’avoir des externalités positives sur d’autres cultures potentielles. La concentration est donc souhaitable avant la diversification. Une meilleure gestion de l’eau (dans sa quantité et sa productivité) peut ainsi, à terme, être bénéfique pour le développement économique
This thesis contributes to the ongoing debate about whether water scarcity will lead to growing water conflicts and potential threats to food security. Using quantitative and econometric tools, it addresses the empirical allocation of water resources in the context of shared water and international trade of agriculture.Chapter 1, co-authored with Prof. Eric Strobl, studies transboundary water management between upstream and downstream African countries (1949-2007). We find very little evidence for water conflicts over the years, even though cooperation is likelier when there is little economic and water asymmetries between countries. We also show that wealthy downstream nations mostly take the lead in cooperation, allowing geographical asymmetries to be offset by economics. Results indicate that cooperation is independent from the past, meaning that transboundary basins with a history of tensions over water may likely cooperate in the near future.Chapter 2, co-authored with Prof. Shlomi Dinar, investigates whether countries produce and trade food according to their comparative advantage in water. Using panel data of bilateral trade at a global level (1994-2007), we find that the driest countries use trade as a means to alleviate water scarcity. Relative water productivity and food trade display an inverted u-shape, suggesting a threshold effect in demand and a disregard for water resources relative to the lack of other inputs (such as capital, technology or qualified labor) in water-scarce countries. Countries do not take water endowments enough into consideration when deciding about production and food is traded in the wrong direction, from less to relatively more water productive nations.Because agricultural-dependence is water-dependence, we end by asking whether water scarcity can be a threat to development. Chapter 3 shows that exports concentrate with growth but diversify with water availability. The interaction effect is positive, suggesting that countries, as they develop, concentrate on fewer products for which they have comparative advantage in water. As water intensive goods display lower subsistence in time in water-scarce countries, we argue that inefficient management of water prevents countries from developing and exiting the state of water/agriculture dependency and slow growth. We recommend that water-scarce countries focus on improving the water footprint of a small number of goods in order to trigger positive spillovers
APA, Harvard, Vancouver, ISO, and other styles
49

Burkett, Jeffrey W. "Opening the Mexican door : continental defense cooperation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBurkett.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Harold Trinkunas. Includes bibliographical references (p. 57-62). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
50

Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography