Dissertations / Theses on the topic 'Cooperative security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cooperative security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tate, Samuel L. "Toward multilateral cooperative security in Northeast Asia." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA292011.
Full textAlotaibi, Esa. "Physical layer security in cooperative wireless communications." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/physical-layer-security-in-cooperative-wireless-communications(6a0c261e-c4c4-4796-a08b-95d015d7528a).html.
Full textSwahn, Joakim, and Christian Udin. "Cooperative Vehicle-Infrastructure System : Identification, Privacy and Security." Thesis, Linköping University, Department of Science and Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9399.
Full textThis master thesis is to highlight the importance of what needs to be identified in the CVIS system, how this could be done, how different techniques affect privacy and security and how the privacy and security mechanisms can be improved for the whole system. The report starts with a background of ERTICO – ITS Europe, followed by a description of how the CVIS project is organized, how the CVIS system will work, and a presentation of privacy, security and identification, both in general and in CVIS. After this follows the analysis and the report is finally wrapped up with conclusions and recommendations.
Why this is an important topic to highlight and discuss and the reason being for this master thesis, is because there is a clear need within the CVIS consortium to harmonise these topics. As it is today, different persons and different sub-projects have different views and opinions on what needs to be identified for example. This needs to be harmonised in order for everyone to know what is being developed, but also, and much more importantly, to in the end get acceptance for the CVIS system. If people do not feel they can trust the system, if they feel it is not secure or that it violates their privacy, they will not use it, even if it has been proved the technique works.
The key question discussed in the report is what needs to be identified. This is the most important question to solve. There must be very good reasons and consensus why a certain entity is to be identified, otherwise identification of that entity will always be questioned. This also links very tightly with privacy.
The objective of this master thesis is to bring forward this critical question about identification, to highlight different reasons for identifying or not identifying different entities and to get the discussion started.
Finally, the main conclusions and recommendations on what to actually identify is the vehicle and the different parts in the central sub-system. The best technique would be by using single sign on with a very strong encryption, for example random numbers, that will be handle by a new node Identification Management Centre or that it will be a part of the Host Management Centre. To ensure privacy in the system, the single sign on mechanism should be combined with the approach of using pseudonyms when communicating in the CVIS system.
Maarof, M. A. B. "Integrating security services into computer supported cooperative work." Thesis, Aston University, 2000. http://publications.aston.ac.uk/7989/.
Full textLandau, Ethan. "Cooperative Security: The American Strategy for a Rising China." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/815.
Full textRanito, Jovana Jezdimirovic. "Limitations to post-conflict cooperative security : Kosovo 1999-2009." Master's thesis, FEUC, 2009. http://hdl.handle.net/10316/11532.
Full textKassenova, Togzhan O. "Cooperative security in the post-Cold War international system : the cooperative threat reduction (CTR) process." Thesis, University of Leeds, 2004. http://etheses.whiterose.ac.uk/2656/.
Full textO'Quinn, Caitlin. "Negotiating Security: Gender, Economics and Cooperative Institutions in Costa Rica." Thesis, University of Oregon, 2018. http://hdl.handle.net/1794/23705.
Full textLiu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.
Full textFinocchio, Chris James. "Latin American regional cooperative security : civil-military relations and economic interdependence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFinocchio.pdf.
Full textThesis advisor(s): Jeanne K. Giraldo, Harold A. Trinkunas. Includes bibliographical references (p. 67-71). Also available online.
Spencer, Emily Rodes. "The Role of Place in Community Cooperative Food Markets in Lexington, Kentucky." UKnowledge, 2019. https://uknowledge.uky.edu/cld_etds/50.
Full textYin, Xin. "Operational security monitoring technology and cooperative control principles for complex industrial processes." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/operational-security-monitoring-technology-and-cooperative-control-principles-for-complex-industrial-processes(ee55c32d-3d72-4ced-82e5-7050852dda63).html.
Full textKahl, Matthias [Verfasser], and T. [Akademischer Betreuer] Leibfried. "Cooperative Predictive Control to enhance Power System Security / Matthias Kahl. Betreuer: T. Leibfried." Karlsruhe : KIT-Bibliothek, 2014. http://d-nb.info/1064504221/34.
Full textBusmire, Terence Edward. "Concept definitions and security requirements of a cooperative execution environment for distributed computing." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.
Full textAzab, Mohamed Mahmoud Mahmoud. "Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/19273.
Full textRecent research argued against the suitability of the current security solutions to CPS environments. We assert the need for new defense platforms that effectively and efficiently manage dynamic defense missions and toolsets in real-time with the following goals:
1) Achieve asymmetric advantage to CPS defenders, prohibitively increasing the cost for attackers;
2) Ensure resilient operations in presence of persistent and evolving attacks and failures; and
3) Facilitate defense alliances, effectively and efficiently diffusing defense intelligence and operations transcending organizational boundaries.
Our proposed solution comprehensively addresses the aforementioned goals offering an evolutionary CPS defense system. The presented CPS defense platform, termed CyPhyCARD (Cooperative Autonomous Resilient Defenses for Cyber-Physical systems) presents a unified defense platform to monitor, manage, and control the heterogeneous composition of CPS components. CyPhyCARD relies on three interrelated pillars to construct its defense platform. CyPhyCARD comprehensively integrates these pillars, therefore building a large scale, intrinsically resilient, self- and situation- aware, cooperative, and autonomous defense cloud-like platform that provisions adequate, prompt, and pervasive defense services for large-scale, heterogeneously-composed CPS. The CyPhyCARD pillars are:
1) Autonomous management platform (CyberX) for CyPhyCARD\'s foundation. CyberX enables application elasticity and autonomic adaptation to changes by runtime diversity employment, enhances the application resilience against attacks and failures by multimodal recovery mechanism, and enables unified application execution on heterogeneously composed platforms by a smart employment of a fine-grained environment-virtualization technology.
2) Diversity management system (ChameleonSoft) built on CyberX. ChameleonSoft encrypts software execution behavior by smart employment of runtime diversity across multiple dimensions to include time, space, and platform heterogeneity inducing a trace-resistant moving-target defense that works on securing CyPhyCARD platform against software attacks.
3) Evolutionary Sensory system (EvoSense) built on CyberX. EvoSense realizes pervasive, intrinsically-resilient, situation-aware sense and response system to seamlessly effect biological-immune-system like defense. EvoSense acts as a middle layer between the defense service provider(s) and the Target of Defense (ToD) creating a uniform defense interface that hides ToD\'s scale and heterogeneity concerns from defense-provisioning management.
CyPhyCARD is evaluated both qualitatively and quantitatively. The efficacy of the presented approach is assessed qualitatively, through a complex synthetic CPS attack scenario. In addition to the presented scenario, we devised multiple prototype packages for the presented pillars to assess their applicability in real execution environment and applications. Further, the efficacy and the efficiency of the presented approach is comprehensively assessed quantitatively by a set of custom-made simulation packages simulating each CyPhyCARD pillar for performance and security evaluation. The evaluation illustrated the success of CyPhyCARD and its constructing pillars to efficiently and effectively achieve its design objective with reasonable overhead.
Ph. D.
Lakshmanan, Sriram. "Cooperative communication in wireless networks: algorithms, protocols and systems." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42702.
Full textZhang, Pengfei. "Design and Evaluation of Cooperative Location Verification Protocol for Vehicular Ad-Hoc Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22648.
Full textMachado, Luís Rodrigo. "Cooperative security strategy in the South Atlantic : United States internal determinants and region ressignification." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/168662.
Full textThe present dissertation aims to discuss the importance of the South Atlantic to the United States of America, from the analysis of its cooperative security policies for the southern part of the Atlantic Ocean, considering mainly its internal determinants and the re-signification of the region between the years of 2003 and 2014. It is in accordance with Resolutions 114/2014 and 115/2014 of the Universidade Federal do Rio Grande do Sul, and therefore comprises three chapters, corresponding to three distinct parts. Chapter One presents three steps: First, it relates the context of the dissertation in the research line "International Security" of the Post-Graduate Program in International Strategic Studies. Second, it addresses some elements of the U.S. foreign and security policy, the importance of the sea for the conduct of these policies and a brief contextualization of the South Atlantic. Third, it highlights the main analytical points and considerations that developed in the next chapter. Chapter Two brings the article published in the Revista da Escola de Guerra Naval which leads, firstly to, a brief discussion of some important theoretical concepts to understand the U.S. position in the conduct of its foreign and security policy, using the debate of the U.S. internal policy on their international relations. Then, briefly discusses the importance of "use of the sea" for U.S. foreign policy, contextualizing the South Atlantic as a strategic region, discussing its geographical boundaries, economic aspects, and multilateral organizations. Finally, discuss some North American cooperative security programs for the South Atlantic and the region's growing importance, in line with the new strategic post-9/11 position. Chapter Three brings a brief analysis of the paper's impacts and presents possibilities of investigation agendas to follow on PPGEEI. Therefore, it was possible to verify that the article was important to bring the discussion of cooperative security, by the American bias, in the African region to the scope of the research in the PGP and to promote the visibility of this problem in the discussion forums and readers of the scientific journal of its publication, fulfilling its objectives of discussing the importance of the South Atlantic to the United States of America, from the discussion of the cooperative security policies for the African West Coast, through the internal political determinants and the change of the region relevance to the global north American grand strategy. Inferring then, the relevance of the South Atlantic in this grand strategy, evidenced by the search for collaborative security initiatives and to combat low intensity threats such as piracy, aiming to contain new threats and face non-state actors.
McCallum, Christopher M. "Cooperative security in Northeast Asia : ramifications of change in the U.S. and ROK maritime strategies /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMcCallum.pdf.
Full textThesis advisor(s): Edward A. Olsen, H. Lyman Miller. Includes bibliographical references (p. 73-76). Also available online.
Serrat, Olmos Manuel David. "Cooperation techniques to improve peer-to-peer wireless networks security." Doctoral thesis, Editorial Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/32831.
Full textSerrat Olmos, MD. (2013). Cooperation techniques to improve peer-to-peer wireless networks security [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/32831
Alfresco
Jieke, Pan. "Cooperative Intrusion Detection For The Next Generation Carrier Ethernet." Master's thesis, Department of Informatics, University of Lisbon, 2008. http://hdl.handle.net/10451/13881.
Full textHocking, Christopher George. "Authentication aura : a cooperative and distributed approach to user authentication on mobile devices." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3469.
Full textPierrot, Alexandre Jean Louis J. "Coding techniques for multi-user physical layer security." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53836.
Full textKalogiannis, Konstantinos. "Investigating Attacks on Vehicular Platooning and Cooperative Adaptive Cruise Control." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292951.
Full textSjälvkörande fordon är en framväxande teknologi med mål att ändra människors framtida inställning till mobilitet. Ett kritiskt steg mot målet är att försäkra sig om att aktörer med ont uppsåt inte kan orsaka olyckor som kan leda till skador eller dödsfall. För närvarande används fordonståg, alltså fordon som samarbetar för att minska bränsleförbrukning och öka körkomfort, i avgränsade miljöer med fokus på att anpassa dessa för verklig användning. Att garantera att fordonet kan köras tillsammans med andra enheter är då inte tillräckligt eftersom dessa system kan bli mål för externa och interna attacker som kan ha förödande konsekvenser. Denna uppsats fokuserar på det senare fallet och undersöker interna datafalsifierings- och frekvensstörningsattacker avsedda att destabilisera fordonståg i syfte att minska deras fördelar eller provocera fram en olycka. Dessa attacker är svåra att urskilja och inkluderar allt från enkla falsifikationsattacker till komplexa attacker som syftar till att kringgå specifika försvarsmekanismer. Med det i åtanke inriktar vi våra experiment mot de manövrar som är en del av fordonstågens grundfunktionalitet och krävs för deras nominella drift. Resultaten av arbetet visar att under fordonstågmanövrar så kan flertalet av de utvärderade attackerna orsaka olyckor och att attacker genom förfalskning av position var speciellt förödande. Vi har även påvisat att en fordonstågsledare med ont uppsåt utgör ett speciellt allvarligt hot mot fordonstågets funktionalitet på grund av dennes unika möjlighet att interagera med alla medlemmar. Attacker under manövrar har visats utgöra ett hot, inte bara mot stabiliteten av formationen, men även mot de grundläggande egenskaperna hos systemet själv såsom att isolera fordonståget från nya medlemmar.
Aguilar, Sérgio Luiz Cruz [UNESP]. "Relações militares no Cone Sul: da rivalidade à cooperação na área de segurança (1964-2007)." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/93379.
Full textA tese apresenta as relações militares que se estabeleceram entre os Estados do Cone Sul (Argentina, Bolívia, Brasil, Chile, Paraguai e Uruguai) a partir da década de 1960 com o objetivo de analisar a construção da cooperação no campo da segurança. A análise foi balizada pelos entendimentos que essas relações foram ditadas pelos interesses internos de cada Estado; que a busca pela consecução desses objetivos sofreu a influência de fatores externos (mundial, regional e sub-regional), resultando em períodos de inimizade/amizade, cordialidade/rivalidade, conflito/cooperação; e que o processo de segurança se deu por interações (públicas e privadas, civis e militares) que permitiram alterações nas percepções de ameaças e, por conseguinte, nas práticas de segurança e defesa. Priorizando a representação documental da história e a empiria sobre a teoria e entendendo que a dinâmica de segurança faz com que haja uma interconexão por meio da qual a estabilidade global influencia na estabilidade regional e vice-versa, a análise englobou o sistema internacional, as organizações internacionais, os interesses dos Estados Unidos (EUA) e sua influência nos arranjos regionais de segurança; e os relacionamentos bilaterais e multilaterais dos Estados e os fatores internos que influenciaram o processo. Durante a Guerra Fria, os regimes militares, a estruturação do aparato de defesa dos Estados do Cone Sul e as relações que se estabeleceram entre eles relacionaram-se aos interesses de segurança dos EUA e a concepções geopolíticas próprias. Nesse período, alguns fatores conduziram a momentos de divergências ou rivalidade ao mesmo tempo em que sua lógica permitiu relações amistosas em decorrência da necessidade de preservação dos regimes e da própria segurança continental. Com o reordenamento do sistema pós-Guerra Fria, as tendências regionalistas, as ações das organizações internacionais, os processos de redemocratização e as alterações dos interesses de segurança dos EUA conduziram a relações baseadas na cooperação com o desenvolvimento das chamadas medidas de confiança mútua, a aceitação do conceito multidimensional de segurança e a novos arranjos de cooperação sub-regionais. Nesse quadro, os mecanismos criados entre os Estados do Cone Sul, especialmente no período pós-Guerra Fria, permitiram a configuração de uma rede de cooperação em segurança na sub-região.
The thesis shows the military relations that were established between the states of the Southern Cone (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) from the 1960s, aiming at analyzing the construction of cooperation in the field of security. The analysis was marked by the understandings that these relations were dictated by the internal interests of each state, the quest for achieving those goals has suffered the influence of external factors (global, regional and sub regional) resulting in periods of enmity/friendship, cordiality/rivalry, conflict/ cooperation, and that the security process was made by interactions (public, private, civil and military) that allowed changes in perceptions of threats and, therefore, in the security and defense practices. Prioritizing the documentary representation of history and empirism above the theory and comprehending that the dynamics of security means that there is an interconnection through which global stability influences on regional stability and vice versa, the analysis included the international system, international organizations, the U.S. interests and their influence on regional security arrangements; and the states’ bilateral and multilateral relations, and internal factors that influenced the process. During the Cold War, the military regimes, the structuring of the apparatus for the Southern Cone’s protection and the relationships established between them related to the security interests of the U.S. and geopolitical designs. In this period, some factors led to moments of disagreements and rivalry, in the same time that your logic allowed friendly relations due to the need for preservation of the military regimes and the continental security. The system redevelopment in the post-Cold War, regionalists trends, the international organizations actions, the redemocratization processes and changes in U.S. security interests have led to relations based on cooperation with the development of so-called confidence building measures, the acceptance of the multidimensional security concept and to new sub-regional cooperation arrangements. In this framework, the mechanisms established by the Southern Cone’s states, especially in the post-Cold War, allowed the setup of network cooperation’s security in the sub-region.
Timilsina, Santosh. "Physical Layer Security in Training-Based Single-Hop/Dual-Hop Massive MIMO Systems." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2376.
Full textChen, Kan. "Physical layer security in co-operative MIMO networks - key generation and reliability evaluation." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32839.
Full textDepartment of Electrical and Computer Engineering
Balasubramaniam Natarajan
Widely recognized security vulnerabilities in current wireless radio access technologies undermine the benefits of ubiquitous mobile connectivity. Security strategies typically rely on bit-level cryptographic techniques and associated protocols at various levels of the data processing stack. These solutions have drawbacks that have slowed down the progress of new wireless services. Physical layer security approaches derived from an information theoretic framework have been recently proposed with secret key generation being the primary focus of this dissertation. Previous studies of physical layer secret key generation (PHY-SKG) indicate that a low secret key generation rate (SKGR) is the primary limitation of this approach. To overcome this drawback, we propose novel SKG schemes to increase the SKGR as well as improve the security strength of generated secret keys by exploiting multiple input and multiple output (MIMO), cooperative MIMO (co-op MIMO) networks. Both theoretical and numerical results indicate that relay-based co-op MIMO schemes, traditionally used to enhance LTE-A network throughput and coverage, can also increase SKGR. Based on the proposed SKG schemes, we introduce innovative power allocation strategies to further enhance SKGR. Results indicate that the proposed power allocation scheme can offer 15% to 30% increase in SKGR relative to MIMO/co-op MIMO networks with equal power allocation at low-power region, thereby improving network security. Although co-op MIMO architecture can offer significant improvements in both performance and security, the concept of joint transmission and reception with relay nodes introduce new vulnerabilities. For example, even if the transmitted information is secured, it is difficult but essential to monitor the behavior of relay nodes. Selfish or malicious intentions of relay nodes may manifest as non-cooperation. Therefore, we propose relay node reliability evaluation schemes to measure and monitor the misbehavior of relay nodes. Using a power-sensing based reliability evaluation scheme, we attempt to detect selfish nodes thereby measuring the level of non-cooperation. An overall node reliability evaluation, which can be used as a guide for mobile users interested in collaboration with relay nodes, is performed at the basestation. For malicious behavior, we propose a network tomography technique to arrive at node reliability metrics. We estimate the delay distribution of each internal link within a co-op MIMO framework and use this estimate as an indicator of reliability. The effectiveness of the proposed node reliability evaluations are demonstrated via both theoretical analysis and simulations results. The proposed PHY-SKG strategies used in conjunction with node reliability evaluation schemes represent a novel cross-layer approach to enhance security of cooperative networks.
Jackson, David. "Exploiting Rogue Signals to Attack Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3072.
Full textToplu, Esra. "The Euro-Mediterranean Partnership: Critical Assessment of the Security Aspects." Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2650.
Full textThis thesis attempts to assess the security aspect of the Barcelona Process (Process), or so called Euro-Mediterranean Partnership (EMP) within the theoretical framework of new regionalism and the Copenhagen School (Security complex theory) which agrees with neo/realism, neo-liberal institutionalism and constructivism in some aspects. The end of the Cold War broadened the security agenda and new security concerns emerged. Actually, most of the so- called security threats are not new, but the perception of them by the states has changed with globalization which increased the interconnectedness and density of the interaction. Global challenges have made states more vulnerable so appreciated the cooperative interaction at regional level. Comprehensive and cooperative security approaches gained importance and led regional security partnership among states. The construction of Euro-Mediterranean security partnership is one case stemming from the high level of interdependence between the European and the Mediterranean countries. The historical ties, economic dependency, geographical proximity increased the EU’s interest towards the Mediterranean. While new regionalism enables to grasp systemic factors in the Process, the Copenhagen School permits to understand security partnership at the regional level. The rise of illegal immigration flows and religious fundamentalism in the Mediterranean as well as tension in the Middle East conflict, the Iraqi War, and terrorist attacks to the US, Algeria and recently Turkey appreciated the importance of the EMP policy and security cooperation so make this study more crucial.
This study showed that the security challenges in five sectors of the security defined by the Copenhagen School are observable in the EMP’s case. Both military and non-military concerns threaten the stability and prosperity in the Mediterranean Basin. The three baskets of the EMP depict its comprehensive security approach. Having made an overview of the Barcelona Process, the thesis evaluated the security challenges in general and the thematic areas of concerns in depth. Since security cannot be defined without reference to the perceptions and security cultures of the actors, the study examined the perceptions and security cultures in the EMP.
The evaluation of the EMP showed that the EMP has shown certain developments on the way for the security cooperation. However, it could not produce tangible results due to the fundamental shortcomings categorized as inter and intra-institutional incoherence, definitional/perceptional problems and multi- actor involvement in the region. The lack of institutional structures, asymmetrical relations among partners, unbalanced distribution of powers and lack of commitment of the EU are crucial problems. On the basis of all problems lie the gap between the perceptions and security culture of Europe and the Arab world. Thus, this thesis emphasizes the enhancement of inter- subjective understanding and cultural dialogue in order to improve trust and interaction among partners. The EMP is on right track to build zone of peace in the Basin, but it requires longue durée to achieve this.
Aguilar, Sérgio Luiz Cruz. "Relações militares no Cone Sul : da rivalidade à cooperação na área de segurança (1964-2007) /." Assis : [s.n.], 2009. http://hdl.handle.net/11449/93379.
Full textBanca: Amado Luiz Cervo
Banca: Shiguenoli Myamoto
Banca: Tullo Vigevani
Banca: José Luis Bendicho Beired
Resumo: A tese apresenta as relações militares que se estabeleceram entre os Estados do Cone Sul (Argentina, Bolívia, Brasil, Chile, Paraguai e Uruguai) a partir da década de 1960 com o objetivo de analisar a construção da cooperação no campo da segurança. A análise foi balizada pelos entendimentos que essas relações foram ditadas pelos interesses internos de cada Estado; que a busca pela consecução desses objetivos sofreu a influência de fatores externos (mundial, regional e sub-regional), resultando em períodos de inimizade/amizade, cordialidade/rivalidade, conflito/cooperação; e que o processo de segurança se deu por interações (públicas e privadas, civis e militares) que permitiram alterações nas percepções de ameaças e, por conseguinte, nas práticas de segurança e defesa. Priorizando a representação documental da história e a empiria sobre a teoria e entendendo que a dinâmica de segurança faz com que haja uma interconexão por meio da qual a estabilidade global influencia na estabilidade regional e vice-versa, a análise englobou o sistema internacional, as organizações internacionais, os interesses dos Estados Unidos (EUA) e sua influência nos arranjos regionais de segurança; e os relacionamentos bilaterais e multilaterais dos Estados e os fatores internos que influenciaram o processo. Durante a Guerra Fria, os regimes militares, a estruturação do aparato de defesa dos Estados do Cone Sul e as relações que se estabeleceram entre eles relacionaram-se aos interesses de segurança dos EUA e a concepções geopolíticas próprias. Nesse período, alguns fatores conduziram a momentos de divergências ou rivalidade ao mesmo tempo em que sua lógica permitiu relações amistosas em decorrência da necessidade de preservação... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The thesis shows the military relations that were established between the states of the Southern Cone (Argentina, Bolivia, Brazil, Chile, Paraguay and Uruguay) from the 1960s, aiming at analyzing the construction of cooperation in the field of security. The analysis was marked by the understandings that these relations were dictated by the internal interests of each state, the quest for achieving those goals has suffered the influence of external factors (global, regional and sub regional) resulting in periods of enmity/friendship, cordiality/rivalry, conflict/ cooperation, and that the security process was made by interactions (public, private, civil and military) that allowed changes in perceptions of threats and, therefore, in the security and defense practices. Prioritizing the documentary representation of history and empirism above the theory and comprehending that the dynamics of security means that there is an interconnection through which global stability influences on regional stability and vice versa, the analysis included the international system, international organizations, the U.S. interests and their influence on regional security arrangements; and the states' bilateral and multilateral relations, and internal factors that influenced the process. During the Cold War, the military regimes, the structuring of the apparatus for the Southern Cone's protection and the relationships established between them related to the security interests of the U.S. and geopolitical designs. In this period, some factors led to moments of disagreements and rivalry, in the same time that your logic allowed friendly... (Complete abstract click electronic access below)
Doutor
Nahiduzzaman, Kh Md. "HOUSING THE URBAN POOR: AN INTEGRATED GOVERNANCE PERSPECTIVE : The Case of Dhaka, Bangladesh." Doctoral thesis, KTH, Urbana och regionala studier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-90297.
Full textQC 20120221
Dyalvane, Ncumisa. "The role of agricultural co-operatives in food security in the Eastern Cape, Province of South Africa : the case of the Nkonkobe Local Municipality." Thesis, University of Fort Hare, 2015. http://hdl.handle.net/10353/2867.
Full textOgunleye, Olaoluwa. "Power to the People: Assessing Renewable Energy Cooperatives in Ontario." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37985.
Full textManoch, Karel. "Možnosti reformy OBSE v kontextu evropského dialogu o bezpečnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-113684.
Full textAlves, H. (Hirley). "On the performance analysis of full-duplex networks." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526207667.
Full textTiivistelmä Tässä työssä tutkitaan kaksisuuntaisia (Full-Duplex, FD) yhteistoiminnallisia verkkoja informaatioteorian, tietoliikenneteorian ja sovelletun tilastotieteen näkökulmista. Työssä suoritetaan kattava suorityskykyarviointi yhteistoiminnallisten FD-välittimien muodostamassa tietoliikenneverkossa. FD-releointi osoitetaan toimintakelpoiseksi useissa toimintaympäristöissä ja sovelluksissa jopa voimakkaan omahäiriön vallitessa. Mikä tärkeintä, työssä saavutetut tulokset muodostavat vertailukohdan sekä nykyisten että tulevien langattomien verkkoteknologioiden suunnitteluun ja toteutukseen. Aluksi esitetään perusteellinen katsaus uusimpiin FD-tiedonsiirtomenetelmiin, etenkin FD-välitykseen, sekä kerrataan yhteistoiminnallisten tekniikoiden pääpiirteet. Seuraavaksi analysoidaan laajasti FD-välitinyhteyden luotettavuutta sekä spektrinkäyttö- ja energiatehokkuutta Rayleigh-häipyvissä radiokanavissa. Matemaattisen viitekehyksen lisäksi osoitetaan myös, että joissain tapauksissa yhteistoiminnalliset vuorosuuntaiset (Half-Duplex, HD) menetelmät ovat parempia kuin FD-releointi omahäiriön vallitessa. Niinpä työssä käydään keskustelua kaupankäynnistä HD- ja FD -menetelmien kesken kuten myös spektrinkäyttö- ja energiatehokkuuden kesken. Seuraavaksi tutkitaan FD-releoinnin suorityskykyä yleistetymmässä häipymäympäristössä eli Nakagami-m -kanavassa. Saavutetut tulokset auttavat ymmärtämään paremmin jäljelle jäävän omahäiriön ja näköyhteyslinkkien vuorovaikutussuhteet FD-välitinjärjestelmän suunnittelussa. Lopuksi käsitellään tietoturvattuja yhteistoiminnallisia verkkoja informaatioteoreettisin mittarein, joilla pyritään tarjoamaan langattomien verkkojen käyttäjille parempaa yksityisyyden suojaa ja luottamuksellisuutta. Tätä varten työssä esitetään perusteelliset matemaattiset puitteet yhdistettyjen häipyvien kanavien tutkimiseen. Tuloksena osoitetaan, että myös salassapitokriteerien kannalta on mahdollista käyttää voimakkaan omahäiriön kokemaa FD-releointia vahvan salauksen saavuttamiseen
Kanpachai, Saisak. "ASEAN and Thailand's regional security cooperation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341341.
Full text"December 1997." Thesis advisor(s): Mary P. Callahan. Includes bibliographical references (p. 137-139). Also available online.
Björnstjerna, Magnus. "Reexamining Nordic Security : A Case Study on Contemporary Nordic Security Cooperation." Thesis, Södertörns högskola, Institutionen för samhällsvetenskaper, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-10512.
Full textKulendi, Yonny. "Security cooperation in Africa : lessons from ECOMOG /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA342226.
Full text"December 1997." Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 99-140). Also available online.
Boxall, Sheryl Maree. "Pacific Islands Forum: Facilitating Regional Security Cooperation." Thesis, University of Canterbury. Political Science and Communication, 2006. http://hdl.handle.net/10092/952.
Full textWohlfeld, Monika Johanna. "Security cooperation in central Europe : Polish views." Thesis, King's College London (University of London), 1995. https://kclpure.kcl.ac.uk/portal/en/theses/security-cooperation-in-central-europe--polish-views(7fd587ae-3d3f-4aff-a9f4-c4ef4447ea82).html.
Full textAris, Stephen. "Central Asian regional security : Shanghai Cooperation Organisation." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/660/.
Full textWeissinger, Laurin Benedikt. "Assessment, trust, and cooperation in IT-security." Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a1e310e3-023f-4228-8acc-a988af0a0a64.
Full textFebrica, Senia. "Explaining Indonesia's participation in maritime security cooperation." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5429/.
Full textOswald, Mace J. "Ukraine's relations with Russia competition or cooperation?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://bosun.nps.edu/uhtbin/hyperion.exe/02Dec%5FOswald.pdf.
Full textThesis Advisor(s): Jeff Knopf, Mikhail Tsypkin. "December 2002." Includes bibliographical references (p. 117-120). Also available in print.
Silva, Anderson Aparecido Alves da. "Uma arquitetura para agrupamento de controles de segurança em ambientes de tecnologia da informação baseada em barganhas cooperativas irrestritas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-21032017-154023/.
Full textSecurity controls, also called protection mechanisms, focused on forecasting and detection of unwanted events are increasingly employed in Information Technology (IT) environments. The little understanding about the characteristics of unwanted events which act on the systems and the low rate of compatibility among several protection mechanisms are both problems that arise in that scenario. Different settings make difficult combining the results of these mechanisms and two or more controls rarely complement each other. Due to that, grouping mechanisms of detection and forecasting is not a trivial matter. In this work a framework called Strategic Grouping Architecture (SGA) is proposed to grouping security controls focused on detection and/or forecasting. SGA is based on the search for equilibrium between the settings and the individual results of each protection mechanism involved. In order to reach this equilibrium the proposed framework divide the analysis of events (legitimates and malicious) which go through the security controls in two abstract levels: the technical level, where the settings and the results of security controls are collected; and the strategic level, where the data obtained in the technical level are analyzed through Unrestricted Cooperative Bargains (UCB), concept from Game Theory that seeks to optimize and balance the results. Precisely because it is performed on a different level of abstraction, the analysis generated by the SGA identifies the influence that each setting has on the clustered results. In order to exploit the capability of the proposed architecture, two experiments, quite different, involving the action of unwanted events in IT environments, are conducted. The obtained findings show the feasibility of grouping detection and forecasting security controls and the possibility of using the SGA in other environments that are not necessarily related to IT security. Based on scientific literature SGA validation consists of a previous transformation in the category of strategy games used - cooperative to non-cooperative - and the search for situations such as the Nash Equilibrium (NE) and the Pareto optimal, indicating the best results a game.
Massey, Anthony Shintaro. "Maritime security cooperation in the Strait of Malacca." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Jun%5FMassey.pdf.
Full textThesis Advisor(s): Malley, Michael S. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 73-79). Also available in print.
Matthews, Alfred Daniel. "Indonesian maritime security cooperation in the Malacca Straits." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45897.
Full textThis thesis argues that Indonesia’s sensitivity about its sovereignty in the Malacca Straits and Indonesia’s preference toward regional security cooperation determines Indonesia’s policy in rejecting and accepting multilateral cooperation in the Straits. This thesis then analyzes the Regional Maritime Security Initiative (RMSI), MALSINDO, Eyes-in-the-Sky (EiS), and the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships (ReCAAP) initiatives, and examines how Indonesia responded to these initiatives. This thesis finds the following: First, regarding international effort to enhance the security cooperation in the Straits, Indonesia’s sensitivity and its wariness of internationalizing the Straits remains a big challenge for the extraregional states’ security initiatives in securing the Malacca Straits. Second, regarding the regional cooperation in the Straits, even though Indonesia prefers regional cooperation, it would still limit its cooperation when dealing with the sovereignty issue. Third, regarding the security cooperation with extraregional powers, Indonesia prefers a bilateral security cooperation framework in securing the Straits.
Delbourg, Esther. "Achieving water security through cooperation and food trade." Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLX077/document.
Full textThis thesis contributes to the ongoing debate about whether water scarcity will lead to growing water conflicts and potential threats to food security. Using quantitative and econometric tools, it addresses the empirical allocation of water resources in the context of shared water and international trade of agriculture.Chapter 1, co-authored with Prof. Eric Strobl, studies transboundary water management between upstream and downstream African countries (1949-2007). We find very little evidence for water conflicts over the years, even though cooperation is likelier when there is little economic and water asymmetries between countries. We also show that wealthy downstream nations mostly take the lead in cooperation, allowing geographical asymmetries to be offset by economics. Results indicate that cooperation is independent from the past, meaning that transboundary basins with a history of tensions over water may likely cooperate in the near future.Chapter 2, co-authored with Prof. Shlomi Dinar, investigates whether countries produce and trade food according to their comparative advantage in water. Using panel data of bilateral trade at a global level (1994-2007), we find that the driest countries use trade as a means to alleviate water scarcity. Relative water productivity and food trade display an inverted u-shape, suggesting a threshold effect in demand and a disregard for water resources relative to the lack of other inputs (such as capital, technology or qualified labor) in water-scarce countries. Countries do not take water endowments enough into consideration when deciding about production and food is traded in the wrong direction, from less to relatively more water productive nations.Because agricultural-dependence is water-dependence, we end by asking whether water scarcity can be a threat to development. Chapter 3 shows that exports concentrate with growth but diversify with water availability. The interaction effect is positive, suggesting that countries, as they develop, concentrate on fewer products for which they have comparative advantage in water. As water intensive goods display lower subsistence in time in water-scarce countries, we argue that inefficient management of water prevents countries from developing and exiting the state of water/agriculture dependency and slow growth. We recommend that water-scarce countries focus on improving the water footprint of a small number of goods in order to trigger positive spillovers
Burkett, Jeffrey W. "Opening the Mexican door : continental defense cooperation." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FBurkett.pdf.
Full textThesis Advisor(s): Harold Trinkunas. Includes bibliographical references (p. 57-62). Also available online.
Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.
Full text