Siga este enlace para ver otros tipos de publicaciones sobre el tema: Defence and security contracts.

Artículos de revistas sobre el tema "Defence and security contracts"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Defence and security contracts".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Heuninckx, Baudouin. "Defence procurement: The most effective way to grant illegal State Aid and get away with it... or is it?" Common Market Law Review 46, Issue 1 (1 de febrero de 2009): 191–211. http://dx.doi.org/10.54648/cola2009007.

Texto completo
Resumen
This article examines the ways in which the EC State aid rules apply to defence procurement in the EU and identifies the issues raised by the interplay between these two areas of the law. The award of a public contract can be found to be State aid if it is not in the form of a “normal commercial transaction”. However, even though defence procurement generally has to comply with EC public procurement law, it can be subject to a number of exemptions for reasons of public security. This raises the issue of cross–subsidization from the military to the civil sector, which could be found to constitute State aid. Moreover, defence procurement contracts are often awarded without competition and include specific pricing mechanisms, and complex military equipment usually has no civil equivalent. These particularities make it difficult to compare the award of defence contracts with “normal commercial transactions”. EC Member States usually do not consider possible interference between defence procurement and State aid rules. This creates the risk that defence contracts may have to be annulled if in breach of such rules, could undermine the regulation of State aid because of cross–subsidisation, and could also reduce the effectiveness of the EC policy to progressively open its defence market and render it more transparent. This article therefore suggests how best EC Member States could implement a policy for the award of defence contracts without breaching the EC State aid rules.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Zervos, Vasilis. "European Policies and the Space Industry Value Chain (Note 1)". Journal of Economics and Public Finance 4, n.º 1 (28 de febrero de 2018): 101. http://dx.doi.org/10.22158/jepf.v4n1p101.

Texto completo
Resumen
<p><em>The economics of contracting have received rather limited attention insofar as the implications for efficiency from the selection of types of contracts employed in the aerospace and defence sector are involved. The paper analyzes the challenges confronting the cost-plus/cost-reimbursement type of contracts of European Commission and intergovernmental organizations like the European Space Agency (ESA), who are involved in security and defence projects with significant multiplier effects within defence and security networks. The analysis indicates how institutional limitations result in contractual choice inefficiencies and anti-competitive practices that may affect the whole of the aerospace industrial base, including subcontractors. The paper concludes with policy implications and further research recommendation. </em></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Chernysheva, Galina N., Nikolay V. Rogov y Maria Vyacheslavovna Tkacheva. "Methods for ensuring the reliable fulfilment of state defence orders". Vestnik Voronezhskogo gosudarstvennogo universiteta. Ser.: Ekonomika i upravlenie = Proceedings of Voronezh State University. Series: Economics and Management, n.º 3 (30 de septiembre de 2021): 94–108. http://dx.doi.org/10.17308/econ.2021.3/3621.

Texto completo
Resumen
Introduction. The national security of the Russian Federation, both within the country and externally, is ensured by the development of its military-technical potential. The military-technical potential is viewed as an ability of the state to maintain the armed forces and to provide the army with modern and competitive military equipment. This is performed through state defence orders (SDOs). Taking into account both internal and external factors, it is impossible to fulfil SDOs without a reliable system of contract liabilities. To ensure proper fulfilment of SDOs, it is necessary to consider the following measures: 1) to retain all the liabilities of contracts for the duration of the contracts, i.e. the liabilities of the customer with regard to the financing of SDOs, and the liabilities of the contractor with regard to the production of the military equipment of high quality; 2) to prevent unauthorised use of the financing provided for the SDOs. Purpose. The purpose of our study was to analyse the factors preventing the fulfilment of SDOs and suggest measures for improving the system for managing SDOs and the economic security of defence industry enterprises. Methodology. In our study we used general scientific methods and specific economic analysis methods: systems analysis, time series analysis, modelling, and expert evaluation methods. The analysis was based on Russian and international sources, as well as the regulatory and legal framework concerning SDOs. Results. In our study, we listed and classified the factors preventing the fulfilment of SDOs, and suggested a SDO model in the form of a system of financial relations between entities. To ensure the fulfilment of SDOs, we suggest a series of measures to control the compliance of financial flows and the economic security of defence industry enterprises. Conclusions. The article presents a specific study of financial flows between the key participants of SDOs. The determined problems and suggested measures will help to reduce the risks and ensure the proper fulfilment of SDOs.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Hasnaoui, Inas, Maria Zrikem y Rajaa Elassali. "Block-AD: Blockchain Attack-Defense CTF Competition for Next-Web3 Security". International Journal of Computer Science, Engineering and Information Technology 13, n.º 5 (27 de octubre de 2023): 30–37. http://dx.doi.org/10.5121/ijcseit.2023.13503.

Texto completo
Resumen
The rapid growth of blockchain technology hasintroduced newsecurity challengesin decentralized systems.In this paper, we present Block-AD, a Blockchain Attack-Defense Capture The Flag (CTF) competition aimed at improving smart contract security skills and addressing evolving security threats in Next-Web3 environments. Unlike traditional CTF competitions, participants engage in attack and defense actions to exploit vulnerabilities and protect their smart contract services. This game-based approach concludes with rewards distributed from the competition’s vault and the allocation of non-fungible tokens (NFTs) as proof of participation. This approach aims to provide a fun and engaging way to improve the security skills of all participants, as well as to identify and fix vulnerabilities in smart contracts. By combining blockchain technology, CTF methodology, and Next-Web3 security, Block-AD provides a unique and innovative approach for enhancing cybersecurity skills in decentralized systems and smart contracts.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Sarkawi, Azizi Ahmad, Mohamad Ghozali Hassan y Mustakim Melan. "THE SIGNIFICANCE OF LEADERSHIP SUPPORT TOWARDS EFFECTIVE CONTRACT MANAGEMENT". Journal of Technology and Operations Management 18, n.º 2 (30 de diciembre de 2023): 1–8. http://dx.doi.org/10.32890/jtom2023.18.2.1.

Texto completo
Resumen
This study examines the role of leadership support in contract management within the Ministry of Defence, focusing on the asset and equipment maintenance crucial for national security. It aims to assess the current level of leadership support among Supply & Secretariate Officers in the Royal Malaysian Navy and their understanding of its importance. By addressing this gap, this study intends to improve contract management practices for enhanced national security within the ministry. A quantitative survey was used to obtain data through stratified random sampling. The survey was initiated in April 2022 and lasted five months. The questionnaires were distributed to the Supply & Secretariate Officers who handle the asset and equipment maintenance contract of the Ministry of Defence. A total of 206 questionnaires were distributed through electronic means, such as email and WhatsApp. Out of 206 questionnaires, only 204 has been analysed as the other two were not complete. The results revealed that leadership commitment significantly improves contract-related activities. When top executives prioritize contract management, it creates a corporate environment in which rules are followed, responsibility is clear, and employees are more diligent. This commitment leads organizations to allocate resources, set clear contract guidelines, and invest in advanced contract technology, making contract management more efficient. In summary, leadership commitment fosters a culture of excellence in contract management, emphasizing the importance of contracts, compliance, and attention to detail, ultimately improving overall operational efficiency.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Novruzova, Oksana B., Ilya A. Klevtsov y Elizaveta R. Shikova. "Methods and Conditions of Conclusion of State Contracts". Court administrator 1 (8 de febrero de 2024): 12–15. http://dx.doi.org/10.18572/2072-3636-2024-1-12-15.

Texto completo
Resumen
The article reveals the concept of a state contract, discusses the features and specific features of a state contract, as well as the methods and conditions for its conclusion. In addition, the work comments on the latest changes in the field of government contracts, which are aimed at increasing the efficiency of procurement for defense and national security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Derrick Lim Kin Yeap, Jason Jong Sheng Tat, Jason Ng Yong Xing, Joan Sia Yuk Ting, Mildred Lim Pei Chin y Muhammad Faisa. "Securing Industrial IoT: Blockchain-Integrated Solutions for Enhanced Privacy, Authentication, and Efficiency". International Journal of Computer Technology and Science 1, n.º 3 (17 de julio de 2024): 01–19. http://dx.doi.org/10.62951/ijcts.v1i3.18.

Texto completo
Resumen
The Industrial Internet of Things (IIoT) enhances the connectivity and efficiency of living lifestyles. However, it also comes with significant security vulnerabilities. Traditional authentication methods are often inadequate, leading to IIoT devices opened to security threats. This paper proposes a comprehensive security framework integrating blockchain, cryptographic techniques, smart contracts, and deep learning-based Intrusion Detection Systems (IDS) to tackle the mentioned issue. Blockchain ensures data integrity and prevents tampering through a decentralized ledger. A decentralized device identity management system enhances user verification, while secure communication protocols using Hash-based Message Authentication Codes (HMAC) safeguard data integrity. Smart contracts automate transactions, providing transparent, secure record-keeping without a central authority. The deep learning-based IDS, utilizing Contractive Sparse Autoencoder (CSAE) and Attention-Based Bidirectional Long Short-Term Memory (ABiLSTM) networks, effectively detects cyber threats. Evaluation metrics, including precision, recall, F1-score, and False Acceptance Rate (FAR), demonstrate high accuracy and low false alarm rates across datasets. This framework addresses the need for secure, efficient, and scalable authentication in IIoT, combining blockchain's security features with advanced cryptographic and anomaly detection techniques, offering robust defence against cyber threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Mateaş, Florian. "GENERAL CHARACTERIZATION OF SECURITY SYSTEMS FOR OBJECTIVES, GOODS, VALUABLES AND PROTECTION OF INDIVIDUALS". Agora International Journal of Juridical Sciences 9, n.º 3 (9 de octubre de 2015): 21–28. http://dx.doi.org/10.15837/aijjs.v9i3.2113.

Texto completo
Resumen
The local police operate as a public institution with legal personality for the interest of citizens, which provides services for the security of goods, participates in the defence of public order and peace, of the life and integrity of individuals, and other rights and legitimate interests of the community.The organization and carrying out of the guarding of the goods and valuables of any kind owned, their transportation and other security services, and participation in the defence of public order and peace are done on the basis of contracts concluded between the local Police and mayors, public or private economic operators, institutions, associations of any kind, natural or legal persons as appropriate.The security provided by local police officers is carried out according to the security plan drawn up by local police commanders and beneficiaries, approved by the local committee and with the expert’s approval from the local police. In their work for performing the service at the objectives entrusted to them, the local police officers have a number of obligations including cooperation with the police bodies and the notification thereof when finding crimes committed which might damage public and private property, acts directed against individuals, fire occurrence, calamities.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ahmad Sarkawi, Azizi, Mohamad Ghozali Hassan y Mustakim Melan. "Navigating Contract Compliance in Maritime Procurement for National Security: A Study on the Ministry of Defense". Compendium by PaperASIA 39, n.º 5(b) (22 de octubre de 2023): 34–39. http://dx.doi.org/10.59953/cpa.v39i5(b).33.

Texto completo
Resumen
Public procurement involves government spending for the well-being of the people. This study was carried out to observe the management of contracts implemented by procurement officers at the Ministry of Defense (Royal Malaysian Navy) for expenses related to asset and equipment maintenance used to maintain national maritime security for the well-being of the people. This study also attempts to examine the level of understanding of the procurement officers on pre-planning of asset maintenance contract procurement planning and financial planning, as well as whether or not the mechanism used is sufficient to monitor the contract compliances and contractors' obligations to comply with the terms of the contracts. A survey was initiated in April 2022 and lasted for five months. The questionnaires were distributed to the procurement officers handling the asset and equipment maintenance contract of the Ministry of Defense. A total of 206 questionnaires were returned and analyzed. Results revealed that the procurement officers understood that pre-planning process needs to be implemented before a procurement contract is signed; additionally, they believed that pre-planning process is not a requirement and that the mechanism used is a tool to prevent unethical misconduct in contract management. However, some respondents believed the mechanism could not prevent corruption. Therefore, it is suggested that the procurement officers be given disclosure not only on how to manage the procurement contract but also to ensure that the contract is implemented efficiently through pre-planning procurement. In addition, more improvements to the existing mechanism need to be made to increase procurement officers' trust in the existing system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kim, Yong Woon y Trevor Brown. "Autonomy versus control in procurement and contracting: the use of cost-reimbursement contracts in three US federal departments". International Review of Administrative Sciences 83, n.º 1_suppl (9 de julio de 2016): 41–58. http://dx.doi.org/10.1177/0020852315619477.

Texto completo
Resumen
This article examines the efficacy of central attempts to influence the use of specific types of contracts, namely, cost-reimbursement versus fixed-price contracts, by individual departments within a decentralized procurement system. We draw five years of data (Fiscal Years 2004–2008) from the Federal Procurement Data System to examine the contract type decisions of three US federal agencies: the Department of Health and Human Services, the Department of Defense, and the Department of Homeland Security. The results of our analysis suggest that while departments have discretion to purchase products that meet their mission requirements, there is relative uniformity in the reliance on cost-reimbursement versus fixed-price contracts. Points for practitioners The driving factor in the use of one contract type over the other is not the department in question, but rather what the department buys. Following central regulatory guidance, the three departments in our sample tend to use cost-reimbursement contracts for complex products and fixed-price contracts for simple products. The practical implications for central policymakers is that focusing guidance on what departments buy may be more effective in maintaining overall budget control rather than focusing on how the department buys products.
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Irenna Wanisha, Jaymaxcklien Bravyain James, Jeremy Silas Witeno, Luqmanul Hakim Mohammad Bakery, Melvianna Samuel y Muhammad Faisal. "Multi-Factor Authentication Using Blockchain: Enhancing Privacy, Security and Usability". International Journal of Computer Technology and Science 1, n.º 3 (18 de julio de 2024): 41–55. http://dx.doi.org/10.62951/ijcts.v1i3.24.

Texto completo
Resumen
In the ever-changing digital world, strong security protocols are essential. As a vital line of defence against unwanted access, blockchain uses several verification techniques to boost security. This article investigates the use of blockchain technology to tackle privacy, security, and usability issues. By reducing the dangers associated with conventional centralised systems, blockchain's decentralised and immutable structure offers a secure platform for storing and verifying authentication credentials. This method increases user trust by using smart contracts to guarantee transparent and unchangeable authentication procedures. The suggested blockchain-based method strengthens security and enhances privacy by removing sources of failure and decreasing dependence on outside verification. Furthermore, user-centric design and expedited procedures improve the system's usability by making secure authentication more approachable and less obtrusive. This paper offers a thorough examination of the suggested system, stressing its benefits, possible drawbacks, and directions for future investigation. The results indicate that blockchain technology presents a viable solution to ensure that digital authentication frameworks combine privacy, security, and usability.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Setia, Prashant y Sandosh S. "Enhancing Cybersecurity Defense of IoT Ecosystem Using Blockchain". Suranaree Journal of Science and Technology 30, n.º 4 (9 de octubre de 2023): 010238(1–14). http://dx.doi.org/10.55766/sujst-2023-04-e01071.

Texto completo
Resumen
The expansion of IoT devices over the past years has led to the development of smart ecosystems susceptible to cyberattacks. These ecosystems include smart industries and smart home security systems. However, when these devices are widely deployed and generate significant amounts of data, this data must be securely stored on the cloud to prevent it from being compromised by serious cyber attacks. Although traditional security methods partly meet the need to protect the privacy and security of smart IoT ecosystems, their centralized structure and limited computing power make them inefficient. However, recent advancements in blockchain technology have made it possible to employ decentralized architectures to enhance the cybersecurity defense mechanisms of IoT ecosystems. The utilization of blockchain-enabled methodologies is considered one of the most auspicious advancements in the domain of the IoT. These techniques offer a secure and decentralized mode of communication among internet-connected devices. This study presents a blockchain-based novel framework to enhance the cybersecurity measures of smart IoT ecosystem installations. The proposed framework prioritizes the immutability of devices and users present in such environments and incorporates smart contracts to ensure their overall security. Furthermore, the system includes a module for regularly verifying the firmware of connected devices by comparing them to the valid firmware hashes present in the smart contract's storage. The proposed approach has also come up with the idea of blacklisting the malicious IP addresses trying to connect with IoT ecosystems network.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim y Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech". Gulf Journal of Advance Business Research 3, n.º 2 (9 de febrero de 2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.

Texto completo
Resumen
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abstract explores the potential of combining blockchain technology with advanced cybersecurity protocols to create a dual-layered approach to securing financial transactions and protecting customer data in fintech applications. Blockchain, with its decentralized and immutable nature, offers inherent security benefits, making it an ideal foundation for enhancing the integrity of financial transactions. Each transaction recorded on a blockchain is cryptographically secured, ensuring that data cannot be altered retroactively, thus preventing fraud and unauthorized access. However, while blockchain technology provides a robust mechanism for securing transaction data, it is not immune to all forms of cyber threats, particularly those targeting the endpoints or vulnerabilities in smart contracts. Advanced cybersecurity protocols, such as encryption, multi-factor authentication, and intrusion detection systems, complement blockchain’s capabilities by safeguarding the broader fintech ecosystem. These protocols can be used to secure access points, ensure data privacy, and enhance the detection of malicious activities that might bypass blockchain’s security features. The integration of blockchain with cybersecurity measures creates a multi-layered defense system that not only protects transaction integrity but also mitigates risks associated with data breaches, phishing attacks, and insider threats. For example, encryption techniques can ensure that sensitive customer data remains confidential, while blockchain ensures the immutability of transaction records. Furthermore, smart contract security protocols can prevent vulnerabilities in decentralized finance (DeFi) applications from being exploited by malicious actors. By combining these two technologies, fintech companies can significantly enhance the security of financial transactions, improve customer trust, and ensure compliance with regulatory standards. This dual approach strengthens the resilience of fintech platforms against evolving cyber threats and enhances the overall security posture of the industry. Keywords: Blockchain, Cybersecurity, Fintech, Financial Transactions, Data Integrity, Encryption, Smart Contracts, Decentralized Finance, Multi-Layered Security, Fraud Prevention.
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Belova, Iryna, Andrii Homotiuk y Oleksiy Yaroshchuk. "Digital transformation of administrative and business processes in Ukraine during marital state". Economic Analysis, n.º 34(1) (2024): 42–52. http://dx.doi.org/10.35774/econa2024.01.042.

Texto completo
Resumen
The article is devoted to the analysis of the digital transformation of management and business processes in Ukraine during martial law, with an emphasis on the development and application of digital tools, such as the Diya platform, chatbots and other digital services that provide important services for citizens and support state initiatives. The main focus is on the role of blockchain technologies and smart contracts in the modernization of the financial, administrative and social spheres, as well as on the potential of these technologies to increase the transparency, efficiency and security of public services. The purpose of the study is to assess the impact of martial law on the processes of digital transformation of management and business processes in Ukraine, with a special focus on the role and potential of blockchain technologies and smart contracts. The research methodology is based on a comprehensive analysis of existing digital initiatives and projects in Ukraine, an assessment of their impact on society and the country's economy. Methods of data analysis and information synthesis are used to determine the potential of digital technology implementation in management and business processes. The results of the study indicate Ukraine's significant progress in the field of digitalization of public services and management, especially during martial law. The "Action" platform and other digital initiatives demonstrate effectiveness in providing important services to citizens, promoting social initiatives and maintaining defence capabilities. At the same time, the article proposes ways to expand the functionality of the Diya platform through the creation of a site for the exhibition of defence technologies of Ukrainian inventors, digitalization of the stock market. In the field of digitalization of business processes, the use of blockchain and smart contracts is proposed for the purpose of automating financial, economic and legal aspects of activity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Ruggieri, Lynn. "Michael Bianco Inc. Immigrant Workers To Save Costs". Journal of Business Case Studies (JBCS) 7, n.º 4 (24 de junio de 2011): 91–104. http://dx.doi.org/10.19030/jbcs.v7i4.4687.

Texto completo
Resumen
Michael Bianco Inc. was a relatively small manufacturing firm employing 85 people in 2001. By 2004, the company was awarded several multimillion dollar government contracts from the Department of Defense making backpacks for troops serving in Iraq. The company increased its work force to over 500 to accommodate the contracts. The workers, however, were illegal aliens. The Department of Homeland Security raided the manufacturing facility, found and detained over 300 illegal workers for deportation. Further investigation revealed deplorable and unfair working conditions, including lack of heat and docking workers pay for talking. Employees worked double shifts and instead of being paid overtime, they were paid straight time out of two separate companies. Humanitarian groups defended the workers and some later filed suit for back pay.
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya y Muhammad Faisal. "Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme". International Journal of Computer Technology and Science 1, n.º 3 (17 de julio de 2024): 20–40. http://dx.doi.org/10.62951/ijcts.v1i3.19.

Texto completo
Resumen
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Krichen, Moez. "Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence". Computers 12, n.º 5 (18 de mayo de 2023): 107. http://dx.doi.org/10.3390/computers12050107.

Texto completo
Resumen
Smart contracts (SCs) are digital agreements that execute themselves and are stored on a blockchain. Despite the fact that they offer numerous advantages, such as automation and transparency, they are susceptible to a variety of assaults due to their complexity and lack of standardization. In this paper, we investigate the use of artificial intelligence (AI) to improve SC security. We provide an overview of Smart Contracts (SCs) and blockchain technology, as well as a discussion of possible SC-based attacks. Then, we introduce various AI categories and their applications in cybersecurity, followed by a thorough analysis of how AI can be used to enhance SC security. We also highlight the open questions and future directions of research in this field. Our research demonstrates that AI can provide an effective defense against assaults on SCs and contribute to their security and dependability. This article lays the groundwork for future research in the field of AI for SC security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Seetharam kakaraparthi, Durganjaneyulu immadisetty y Maranco M. "Enhanced honeypot security for intrusion detection and prevention systems using blockchain". World Journal of Advanced Research and Reviews 22, n.º 1 (30 de abril de 2024): 751–58. http://dx.doi.org/10.30574/wjarr.2024.22.1.1065.

Texto completo
Resumen
The project aims to enhance honeypot security through the integration of blockchain technology into an intrusion detection and prevention system (IDPS). Honeypots are decoy systems deployed to detect, deflect, or study unauthorized use of information systems. By leveraging blockchain, a decentralized and tamper-proof ledger, the project ensures the integrity and immutability of honeypot data, providing robust security against cyber threats.The system employs a blockchain-based architecture where each honeypot event is recorded as a block in the chain, ensuring the integrity of the data. Additionally, smart contracts are utilized to automatically execute predefined actions based on specific conditions detected by the honeypot system, such as blocking IP addresses upon detecting malicious activities. Furthermore, the system facilitates the sharing of threat intelligence among peers in real-time, enhancing collaborative security efforts. Through the integration of blockchain technology, smart contracts, and threat intelligence sharing, the project offers an innovative approach to honeypot security, providing organizations with a more resilient defense against cyber threats.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Bayani, Samir Vinayak, Sanjeev Prakash y Lavanya Shanmugam. "Data Guardianship: Safeguarding Compliance in AI/ML Cloud Ecosystems". Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online) 2, n.º 3 (29 de septiembre de 2023): 436–56. http://dx.doi.org/10.60087/jklst.vol2.n3.p456.

Texto completo
Resumen
AI has found widespread application across various sectors, including security, healthcare, finance, and national defense. However, alongside its transformative advancements, there has been an unfortunate trend of malicious exploitation of AI capabilities. Concurrently, the rapid evolution of cloud computing technology has introduced cloud-based AI systems. Regrettably, vulnerabilities inherent in cloud computing infrastructure also pose risks to the security of AI services. We observe that the integrity of training data is pivotal, as any compromise therein directly impacts the efficacy of AI systems. Against this backdrop, we assert the paramount importance of preserving data integrity within AI systems. To address this imperative, we propose a data integrity architecture guided by the National Institute of Standards and Technology (NIST) cyber security framework. Leveraging block chain technology and smart contracts emerges as a fitting solution to tackle integrity challenges, owing to their characteristics of shared and decentralized ledgers. Smart contracts facilitate automated policy enforcement, enable continuous monitoring of data integrity, and mitigate the risk of data tampering.
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Yachna, I., O. Kuvshynova, D. Shabanov, Ye Porуnos y M. Kostashchuk. "BLOCKCHAIN AND ITS APPLICATION IN THE DEFENCE SECTOR". Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки 20, n.º 3 (9 de octubre de 2024): 139–45. http://dx.doi.org/10.37701/dndivsovt.21.2024.17.

Texto completo
Resumen
The digital transformation of the economy affects many sectors, including the defence sector, which is sensitive from both a national and international perspective. The digitalisation of the economy is based on technologies such as robotics, autonomy, additive manufacturing technologies (3D printing), augmented reality, big data, quantum computers, artificial intelligence and blockchains. In this article, we will take a closer look at the latter, namely blockchain technology. We will briefly outline its main properties and advantages, which make it particularly attractive for use in the defence sector, and dwell on its application to implement such a tool as smart contracts. One of the key advantages of blockchain in the context of military operations is ensuring transparency and traceability of supplies. In today's realities, logistical problems can cost lives, but blockchain helps prevent fraud and improve coordination between interacting communication nodes. Thanks to the use of blockchain technologies, each unit of supply can be recorded in an immutable register, which allows you to track its path from sender to recipient. This reduces the risk of loss or theft, and simplifies the process of monitoring and verifying the accuracy of information about deliveries. In addition, the decentralised nature of the blockchain enhances the security of military communications, protecting them from interception and attack. Each message is encrypted in such a way that it can only be read by the addressee. This ensures a high level of confidentiality and data protection, as information transmitted through the blockchain is distributed among numerous network nodes, making it difficult for attackers to access. By using cryptographic methods, the blockchain ensures that even in the event of a successful attack, attackers will not be able to alter or falsify information. Creating a tamper-proof ID system will help fight counterfeiting and improve the process of identifying wounded or fallen soldiers. By assigning unique and unchangeable authenticators to personnel, equipment or weapons, one hundred per cent identification of military entities can be ensured. This allows for accurate tracking of the movement and status of each soldier and equipment, which contributes to more efficient resource management. This system also increases the level of trust in the information provided, as it is recorded in the blockchain and cannot be changed or deleted. The introduction of blockchain technology in the defence sector can bring significant benefits, including increased security, transparency and efficiency. However, this process is accompanied by numerous challenges and risks that need to be considered and overcome for successful integration.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Kostopoulos, Nikos, Yannis C. Stamatiou, Constantinos Halkiopoulos y Hera Antonopoulou. "Blockchain Applications in the Military Domain: A Systematic Review". Technologies 13, n.º 1 (6 de enero de 2025): 23. https://doi.org/10.3390/technologies13010023.

Texto completo
Resumen
Background: Blockchain technology can transform military operations, increasing security and transparency and gaining efficiency. It addresses many problems related to data security, privacy, communication, and supply chain management. The most researched aspects are its integration with emerging technologies, such as artificial intelligence, the IoT, application in uncrewed aerial vehicles, and secure communications. Methods: A systematic review of 43 peer-reviewed articles was performed to discover the applications of blockchain in defense. Key areas analyzed include the role of blockchain in securing communications, fostering transparency, promoting real-time data sharing, and using smart contracts for maintenance management. Challenges were assessed, including scalability, interoperability, and integration with the legacy system, alongside possible solutions, such as sharding and optimized consensus mechanisms. Results: In the case of blockchain, great potential benefits were shown in enhancing military operations, including secure communication, immutable record keeping, and real-time integration of data with the IoT and AI. Smart contracts optimized resource allocation and reduced maintenance procedures. However, challenges remain, such as scalability, interoperability, and high energy requirements. Proposed solutions, like sharding and hybrid architecture, show promise to address these issues. Conclusions: Blockchain is set to revolutionize the efficiency and security of the military. Its potential is enormous, but it must overcome scalability, interoperability, and integration issues. Further research and strategic adoption will thus allow blockchain to become one of the cornerstones of future military operations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Rautio, Samu, Timo Tuomi y Jan Akmal. "Legal Aspects of Additive Manufacturing in the Military Logistics". Security Dimensions 40, n.º 40 (31 de marzo de 2022): 154–95. http://dx.doi.org/10.5604/01.3001.0015.8153.

Texto completo
Resumen
Background: The use of Additive Manufacturing (AM) in military logistics is limited by the uncertainty about the legal risks of using the method. Objectives: The purpose of this study was to identify the potential legal risks associated with AM of military materiel and its effects. The study was conducted as a case study, where AM is considered in military logistics. Methods: Legal issues were approached from the normative point of view in the context of potential legal dispute situations in four different cases. The topic was studied by reviewing and analyzing literature sources, official sources, and Finnish Defence Forces military materiel purchasing contracts and interviews. The study interpreted and systematized the general principles of IPR and contract law when using AM in the military. Results: An identified result of the study was that the use of AM to print military materiel under normal conditions may entail risks that should be contractually managed. In other cases, e.g. crises or wartime, there are risks, but they are difficult to predict and manage or are acceptable. The results of the study concern countries with a similar military economic system to Finland in terms of military logistics. The results can be applied to the activities of different security sectors, due to the similarity of their activities. Conclusions: The use of AM can enable the material to be used in safety situations where speed and versatility are required for material readiness. The use of the method requires a legal right, the holder of which has the right to manufacture the product. In different situations, the legal basis is open to interpretation and may pose risks to the decision-maker. The research will provide information to decision-makers for the preparation of contracts for the acquisition and maintenance of military material and implementing AM to military logistics.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Romas, Maria. "Procedure for Concluding Civil Law Contracts with the Participation of the State of Ukraine under Martial Law". Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi 2, n.º 15(27) (16 de junio de 2023): 187–94. http://dx.doi.org/10.33098/2078-6670.2023.15.27.2.187-194.

Texto completo
Resumen
Purpose. The purpose of the article is to establish the peculiarities of the participation of the state of Ukraine in contractual obligations, to analyze the legal regulation of the procedure for concluding civil law contracts with the participation of the state of Ukraine, in particular, in the conditions of martial law, to make relevant theoretical conclusions. Methodology. The methodology includes a comprehensive analysis and generalization of the available scientific and theoretical material and the formulation of relevant conclusions and recommendations. The following methods of scientific knowledge were used during the research: formal-logical, analysis, comparative analysis, systemic-structural, terminological, normative. Results. In the process of research, it was recognized that the state of Ukraine is an equal participant in contractual obligations, however, certain exceptions to this rule may be established in the conditions of martial law. This is related to issues of ensuring national security and defense of Ukraine. Originality. In the process of research, it was established that the state of Ukraine is the party to the concluded contracts, and not the state body that represents it. The State of Ukraine may be a party to sales contracts, leases, concession contracts, product distribution agreements, etc. The procedure for concluding, changing and terminating contractual obligations with the participation of the state of Ukraine is provided exclusively by law, in particular, taking into account the requirements of martial law. Practical significance. The results of the study can be used in law-making and law-enforcement activities to resolve important issues related to the national security and defense of Ukraine.
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Chen, Yongle, Xiaojian Wang, Yuli Yang y Hong Li. "Location-Aware Wi-Fi Authentication Scheme Using Smart Contract". Sensors 20, n.º 4 (15 de febrero de 2020): 1062. http://dx.doi.org/10.3390/s20041062.

Texto completo
Resumen
Advanced wireless technology in Internet of Things (IoT) devices is increasing and facing various security threats. The authentication of IoT devices is the first line of defense for the wireless network. Especially in a Wi-Fi network, the existing authentication methods mainly use a password or digital certificate, these methods are inconvenient to manage due to certificate issuance or prone to be attacked because passwords are easily cracked. In this paper, we propose a location-aware authentication scheme using smart contracts to ensure that IoT devices can securely perform Wi-Fi network authentication. The scheme adopts the concept of secondary authentication and consists of two phases: the registration phase, which is mainly designed to complete the generation of the public and private keys, and to link the device information with its related device information; the authentication phase, which is mainly designed to determine whether the requesting device is within a legal location range. We use the smart contract to ensure the credibility and irreparability of the authentication process. Analysis of the attack model and the attacks at different stages proves that this certification scheme is assured, and the simulation results show that the overhead introduced by this scheme is acceptable, this scheme can provide greater security for the Wi-Fi authentication of IoT devices.
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Wyszomirska, Monika. "Tax and Legal Issues Related to the Implementation of Research and Development Projects in the Area of "Security and Defense"". Safety & Fire Technology 58, n.º 2 (2021): 22–36. http://dx.doi.org/10.12845/sft.58.2.2021.2.

Texto completo
Resumen
Purpose: The aim of the article is to discuss tax issues related to the settlement of subsidies for the implementation of projects in the area of"Security and Defense". The grant beneficiaries face numerous problems with the interpretation of the provisions of the VAT Act, which may result in serious financial consequences in the event of incorrect application of the VAT Act. This publication analyses and indicates solutions to these problems, which are most often raised by consortia, both in applications for tax interpretations and in complaints to administrative courts of both instances. Introduction: Among the important forms of activity for the security and defence of the state, a special role is played by scientific and research and development projects, which not only increase the potential of scientific and industrial entities, but also create Polish know-how in the field of critical technologies in the area of "Security and defence". The implementation of projects financed from the state budget places on the beneficiaries the obligation of a "regime" method of settling public funds, both by applying the provisions on public procurement, constructing civil contracts, taking into account the fact that funds from subsidies are available, as well as performing special diligence in tax settlements with the tax authorities. Methodology: The theoretical research methods were used in the work, including the analysis of literature, judgments of common courts and the Pro - vincial and Supreme Administrative Court, as well as tax interpretations issued by the Director of the National Revenue Administration. The publication also provides an interpretation of national regulations as well as directives and case law of the Court of Justice of the European Union. Conclusions: Tax law is the branch of law that arouses the greatest emotions and controversy. It affects all of us, and in the event of incorrect application of the rules – it has serious financial consequences. Members of consortia implementing projects financed by the The National Centre for Research and Development (NCBR) also remain taxpayers, to whom the author of the article proposed the interpretation of the provisions of the VAT Act and discussed national and EU jurisprudence in order to facilitate the correct implementation of tax obligations by the consortia. Keywords: VAT taxation of subsidies, eligibility of expenses, right to deduct input tax, transfer of proprietary copyrights to the State Treasury, commer - cialization of results of scientific research and development works Type of article: review article
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Terpstra, J. "Particuliere beveiligers als publieke handhavers". Justitiële verkenningen 38, n.º 8 (diciembre de 2012): 35–50. https://doi.org/10.5553/jv/016758502012038008004.

Texto completo
Resumen
Private security officers as public enforcers Dutch local governments increasingly decide to contract private security officers for surveillance and enforcement tasks in the public space. This article presents an analysis of the daily work of these private security officers. Local governments contract these private workers because they are faced with problems of social disorder and crime. Although the police should formally manage the work of these private security workers, in practice this task is hardly realized. These private workers are faced with four problems: their work is boring, they are uncertain about what they are expected to do, don’t know exactly what their formal powers are, and are unsatisfied about their lack of means for self-defence. Although they don’t differ in their work style from their public colleagues, their position as private worker and the flexible job they have, are hard to reconcile with what they are expected to do (like reassuring citizens).
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Soroka, Larysa, Anna Danylenko, Maksym Sokiran, Diana Levchenko y Oksana Zubko. "Public-private collaboration for national security: challenges and opportunities". Revista Amazonia Investiga 12, n.º 70 (30 de octubre de 2023): 43–50. http://dx.doi.org/10.34069/ai/2023.70.10.4.

Texto completo
Resumen
The purpose of the article is to study public-private collaboration as the main tool to guarantee national security and the sustainability of the State. Research results. The article examines the content, characteristics, and development prospects of public-private collaboration. The system of legal instruments of Ukraine regulating this issue is analyzed. The principles of implementation of the public-private partnership are characterized, as well as the key requirements for its effectiveness. It is summarized that the public-private partnership in the field of national security and defense is a form of cooperation that must guarantee the effectiveness of the implementation of protection and defense measures in the form chosen by the parties in the relevant contracts or agreements. Practical implementation. Public-private collaboration has been used to: build military infrastructure; develop new defense technologies; train military personnel Value/originality. To improve administrative and legal regulation of the public-private partnership, we propose to perform its full transition to online procedures, as it will facilitate the access to information and resources for private companies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Papanikolaou, Alexandros, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis y Konstantinos Rantos. "A Blockchained AutoML Network Traffic Analyzer to Industrial Cyber Defense and Protection". Electronics 12, n.º 6 (21 de marzo de 2023): 1484. http://dx.doi.org/10.3390/electronics12061484.

Texto completo
Resumen
Network traffic analysis can raise privacy concerns due to its ability to reveal sensitive information about individuals and organizations. This paper proposes a privacy-preserving Block-chained AutoML Network Traffic Analyzer (BANTA). The system securely stores network traffic logs in a decentralized manner, providing transparency and security. Differential privacy algorithms protect sensitive information in the network flow logs while allowing administrators to analyze network traffic without the risk of leakages. The BANTA uses blockchain technology, where smart contracts automate the process of network traffic analysis, and a multi-signature system ensures the system’s security, safety, and reliability. The proposed approach was evaluated using a real-world network traffic dataset. The results demonstrate the system’s high accuracy and real-time anomaly detection capabilities, which makes it well-suited for scalable cybersecurity operations. The system’s privacy protection, decentralized storage, automation, multi-signature system, and real-world effectiveness ensure that the organization’s data is private, secure, and effectively protected from cyber threats, which are the most vexing issue of modern cyber-physical systems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Xu, Ziqiang, Ahmad Salehi Shahraki y Carsten Rudolph. "Blockchain-Based Malicious Behaviour Management Scheme for Smart Grids". Smart Cities 6, n.º 5 (23 de octubre de 2023): 3005–31. http://dx.doi.org/10.3390/smartcities6050135.

Texto completo
Resumen
The smart grid optimises energy transmission efficiency and provides practical solutions for energy saving and life convenience. Along with a decentralised, transparent and fair trading model, the smart grid attracts many users to participate. In recent years, many researchers have contributed to the development of smart grids in terms of network and information security so that the security, reliability and stability of smart grid systems can be guaranteed. However, our investigation reveals various malicious behaviours during smart grid transactions and operations, such as electricity theft, erroneous data injection, and distributed denial of service (DDoS). These malicious behaviours threaten the interests of honest suppliers and consumers. While the existing literature has employed machine learning and other methods to detect and defend against malicious behaviour, these defence mechanisms do not impose any penalties on the attackers. This paper proposes a management scheme that can handle different types of malicious behaviour in the smart grid. The scheme uses a consortium blockchain combined with the best–worst multi-criteria decision method (BWM) to accurately quantify and manage malicious behaviour. Smart contracts are used to implement a penalty mechanism that applies appropriate penalties to different malicious users. Through a detailed description of the proposed algorithm, logic model and data structure, we show the principles and workflow of this scheme for dealing with malicious behaviour. We analysed the system’s security attributes and tested the system’s performance. The results indicate that the system meets the security attributes of confidentiality and integrity. The performance results are similar to the benchmark results, demonstrating the feasibility and stability of the system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Ghosh, Samadrita. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (10 de abril de 2024): 303–22. http://dx.doi.org/10.60087/jaigs.v3i1.122.

Texto completo
Resumen
Artificial intelligence (AI) has become ubiquitous across various industries, including security, healthcare, finance, and national defense. However, alongside its transformative potential, there has been a concerning rise in malicious exploitation of AI capabilities. Simultaneously, the rapid advancement of cloud computing technology has led to the emergence of cloud-based AI systems. Unfortunately, vulnerabilities inherent in cloud infrastructure also pose security risks to AI services. We recognize the critical role of maintaining the integrity of training data, as any compromise therein directly impacts the effectiveness of AI systems. In response to this challenge, we emphasize the paramount importance of preserving data integrity within AI systems. To address this need, we propose a data integrity architecture guided by the National Institute of Standards and Technology (NIST) cybersecurity framework. Leveraging blockchain technology and smart contracts presents a suitable solution for addressing integrity challenges, given their features of shared and decentralized ledgers. Smart contracts enable automated policy enforcement, facilitate continuous monitoring of data integrity, and help mitigate the risk of data tampering.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Rana, Sohel. "Ensuring Compliance Integrity in AI ML Cloud Environments: The Role of Data Guardianship". Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 3, n.º 1 (10 de abril de 2024): 161–78. http://dx.doi.org/10.60087/jaigs.vol03.issue01.p178.

Texto completo
Resumen
Artificial intelligence (AI) has become ubiquitous across various industries, including security, healthcare, finance, and national defense. However, alongside its transformative potential, there has been a concerning rise in malicious exploitation of AI capabilities. Simultaneously, the rapid advancement of cloud computing technology has led to the emergence of cloud-based AI systems. Unfortunately, vulnerabilities inherent in cloud infrastructure also pose security risks to AI services. We recognize the critical role of maintaining the integrity of training data, as any compromise therein directly impacts the effectiveness of AI systems. In response to this challenge, we emphasize the paramount importance of preserving data integrity within AI systems. To address this need, we propose a data integrity architecture guided by the National Institute of Standards and Technology (NIST) cybersecurity framework. Leveraging blockchain technology and smart contracts presents a suitable solution for addressing integrity challenges, given their features of shared and decentralized ledgers. Smart contracts enable automated policy enforcement, facilitate continuous monitoring of data integrity, and help mitigate the risk of data tampering.
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Adegbite, Olusola Babatunde. "War Profiteering and Armed Conflicts: Examining Applicable Aspects of International Law". Groningen Journal of International Law 10, n.º 1 (3 de mayo de 2023): 21–42. http://dx.doi.org/10.21827/grojil.10.1.21-42.

Texto completo
Resumen
The proliferation of armed conflicts is perhaps the biggest challenge of the 21st Century international system. These conflicts have become a monumental lucrative industry, where parties external to the fighting, i.e., third parties, smile to the bank, from proceeds made on major deals in defence contracts and arms sales. In the process, they leave behind a trail of civilian fatalities. Notwithstanding the extensive literature on armed conflicts, the scholarly focus on the accountability framework related to war profiteering remains limited. This article examines the applicability of certain aspects of international law, in particular, human rights and humanitarian law, to war profiteering and highlights the fact that the current framework doesn’t sufficiently deal with the problem. It submits that the danger that war profiteering poses to world peace and security is one that must be taken seriously. In the absence of clear guidance under these regimes of international law, the article stresses the need to address the problem in a manner that responds adequately, especially with respect to determining a specific accountability framework.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Yasa, Abdul Rahman. "From Security Sector Reform to Endemic Corruption: The Case of Afghanistan". Journal of Strategic Security 13, n.º 3 (octubre de 2020): 99–119. http://dx.doi.org/10.5038/1944-0472.13.3.1755.

Texto completo
Resumen
Corruption and insecurity are reinforcing each other. It can hinder the democratic processes and jeopardize the security sector through creating corrupt administrative systems, manipulation of contracts and procurement. After the decomposition of the Taliban in 2001, the U.S.-led coalition carried out Security Sector Reform (SSR) to (re) construct the Afghan National Police (ANP) and Afghan National Army (ANA) together known as Afghan National Defense and Security Forces (ANDSF). Over critical literature, there are serious critiques concerning the U.S. and its allies’ scrimmage for their role in conducting the SSR in Afghanistan. The research argues that the lack of a long-term strategic vision for conducting SSR as part of the state-building process by the international community was a critical challenge. This crux has further been exacerbated by the privatization of SSR and the contrast between the U.S. and its European allies on the role of the police. This dichotomy affected the anti-corruption and law enforcement potentials of police, which resulted in the present crisis. Additionally, this research figures out that insufficient oversight of contracts and procurement, training and advising processes of the ANDSF gave more room for misappropriation, theft, and fraud by both the local and international contractors. Finally, all these shortfalls together with constant turnover have undermined the counterinsurgency efforts of Afghan forces on the ground. Therefore, endless military operation without any tangible results has wearied the people, and further added fodder to the terrorist propaganda machine.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Pinheiro, Alexandre, Edna Dias Canedo, Robson de Oliveira Albuquerque y Rafael Timóteo de Sousa Júnior. "Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts". Sensors 21, n.º 13 (29 de junio de 2021): 4440. http://dx.doi.org/10.3390/s21134440.

Texto completo
Resumen
The management practicality and economy offered by the various technological solutions based on cloud computing have attracted many organizations, which have chosen to migrate services to the cloud, despite the numerous challenges arising from this migration. Cloud storage services are emerging as a relevant solution to meet the legal requirements of maintaining custody of electronic documents for long periods. However, the possibility of losses and the consequent financial damage require the permanent monitoring of this information. In a previous work named “Monitoring File Integrity Using Blockchain and Smart Contracts”, the authors proposed an architecture based on blockchain, smart contract, and computational trust technologies that allows the periodic monitoring of the integrity of files stored in the cloud. However, the experiments carried out in the initial studies that validated the architecture included only small- and medium-sized files. As such, this paper presents a validation of the architecture to determine its effectiveness and efficiency when storing large files for long periods. The article provides an improved and detailed description of the proposed processes, followed by a security analysis of the architecture. The results of both the validation experiments and the implemented defense mechanism analysis confirm the security and the efficiency of the architecture in identifying corrupted files, regardless of file size and storage time.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Silva, Mário Herbert Souza da y Prof Me Dênis Márcio Jesus Oliveira. "Responsabilidade Civil por vício oculto na venda de veículos usados". RCMOS - Revista Científica Multidisciplinar O Saber 3, n.º 1 (22 de enero de 2024): 1–8. http://dx.doi.org/10.51473/ed.al.v3i1.516.

Texto completo
Resumen
With the advancement of business modalities in current times, platforms and applications have streamlined business. It is up to legal operators to monitor social demands in order to guarantee legal security in these relationships. Contracts for the purchase and sale of used vehicles by private individuals are an important vector of trade, therefore requiring an investigation of the legal framework that will protect this specifi c business. This work, therefore, analyzes the possibilities of application of the Consumer Defense Code and the Civil Code.
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Witanto, Elizabeth Nathania, Yustus Eko Oktian y Sang-Gon Lee. "Toward Data Integrity Architecture for Cloud-Based AI Systems". Symmetry 14, n.º 2 (29 de enero de 2022): 273. http://dx.doi.org/10.3390/sym14020273.

Texto completo
Resumen
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. In parallel, there is rapid development in cloud computing technology, introducing a cloud-based AI system. Unfortunately, the vulnerabilities in cloud computing will also affect the security of AI services. We observe that compromising the training data integrity means compromising the results in the AI system itself. From this background, we argue that it is essential to keep the data integrity in AI systems. To achieve our goal, we build a data integrity architecture by following the National Institute of Standards and Technology (NIST) cybersecurity framework guidance. We also utilize blockchain technology and smart contracts as a suitable solution to overcome the integrity issue because of its shared and decentralized ledger. Smart contracts are used to automate policy enforcement, keep track of data integrity, and prevent data forgery. First, we analyze the possible vulnerabilities and attacks in AI and cloud environments. Then we draw out our architecture requirements. The final result is that we present five modules in our proposed architecture that fulfilled NIST framework guidance to ensure continuous data integrity provisioning towards secure AI environments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

van Meegdenburg, Hilde. "‘We don’t do that’: A constructivist perspective on the use and non-use of private military contractors by Denmark". Cooperation and Conflict 54, n.º 1 (10 de abril de 2018): 25–43. http://dx.doi.org/10.1177/0010836718765901.

Texto completo
Resumen
In this article I put forward a social constructivist perspective on state use of Private Military and Security Contractors (PMSCs). I will argue that state outsourcing decisions are, to a large extent, shaped by nationally shared values, understandings and dispositions. Concretely, I first provide a detailed overview of the extent of domestic and deployed contracting by the Danish Defence and, thereafter, based on a number of semi-structured interviews, I expose the dominant understandings that shaped how PMSCs have come to be understood in Denmark. By so doing I can show that the employment of PMSCs by the Danish Defence remains comparatively limited because it is largely perceived as inappropriate and as incompatible with what it means to be ‘Danish’. Although Denmark too has to balance its international engagements with the limited resources allocated to defence (the typical functional pressures) Danish particular ‘soft’ neoliberalism and ‘hard’ commitments to IHL speak against using private actors to make that possible. This means I take in the more abstract, macro-level discussions on the end of the Cold War and the advent of neoliberalism but go beyond by asking whether, and if so how, these and other collective experiences and understandings actually (co-)shape(d) outsourcing decisions.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

ADEYINKA, Tajudeen Yusuf, Musediq Olufemi LAWAL, Olawale Olufemi AKINRINDE y Remi Kasali ALATIS. "Nigeria’s Development Trajectory, Security Conundrum and the State-Citizens Relations". BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, n.º 1 (8 de abril de 2024): 194–211. http://dx.doi.org/10.53477/2284-9378-24-13.

Texto completo
Resumen
Crime represents a profound threat to societal well-being, generating misery and disorder. Understanding its nature, causes, patterns, and consequences is vital for its effective prevention and control. In Nigeria, the past two decades have witnessed a steady rise in criminal activities, straining resources and impeding national development. Relying on the Social Contract thesis, this study examines how the preponderance of criminality and insecurity has systematically hindered Nigeria’s developmental aspirations. In this study, we contend that the state’s primary duty is to safeguard citizens and their property, as espoused by the social contract theory. However, the relentless wAve of criminality in the last two decades in Nigeria has greatly undermined the social agreement between the Nigerian state and its citizens. This is in addition to the diversion of resources from other state’s responsibilities to the security of the citizenry and the defence of the state. The implication of this situation, as revealed in this study, is the general hampering of the comprehensive national progress and prosperity of the Nigerian state. In this regard, we, therefore, recommend the imperativeness of a communal approach towards tackling the spate of security challenges in Nigeria whilst also recognizing that safeguarding the society remains a collective responsibility of both the Nigerian state and its citizenry. By fostering a culture of security amongst all, the Nigerian state and its citizenry can address the pervasive triggers and impact of crime whilst building a safer and prosperous future for all.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

GACEK, Józef, Bronisław MARCINIAK y Ryszard WOŹNIAK. "Major Conditions of Shooting Range Operation in Poland". Problems of Mechatronics Armament Aviation Safety Engineering 9, n.º 3 (30 de septiembre de 2018): 89–104. http://dx.doi.org/10.5604/01.3001.0012.2741.

Texto completo
Resumen
Under the "Authorisations of the Minister of National Defence" (latest - No. 57/MON dated 22 December 2014), a Permanent Expert Team operates at the Institute of Armament Technology of the Faculty of Mechatronics and Aerospace of the Military University of Technology (Warsaw, Poland), performing test shootings for the purpose of verifying the fulfilment of technical requirements to be met by garrison shooting ranges and their locations. During almost 20 years of its activity, the Team has conducted research studies under more than 325 civil law contracts concluded with operators of shooting ranges, numerous expert analyses and prepared specialist opinions for courts and prosecutor's offices, and participated in the creation of normative acts and documents, concerning - among others - provision of safety of the operated field training facilities, mainly garrison and training ground shooting ranges. The results of the Team's work have been used, among others, by the Ministry of National Defence (with the active participation of the Team) to prepare regulations of the Minister of National Defence concerning the technical conditions to be met by garrison shooting ranges and their locations. The first of these regulations was issued on 4 October 2001 (Polish Journal of Laws of 2001, no. 132, item 1479), and its latest revision on 15 December 2017 (Polish Journal of Laws of 2018, item 113). The paper presents selected results of studies of the Permanent Expert Team related to, among others, ensuring the safety of users of garrison and training ground shooting ranges, which form a part of the field training facilities of the Armed Forces of the Republic of Poland, the Police, the Border Guard, the Customs Service, security companies, hunting and sports organisations. Of particular value are the conclusions and propositions of the Expert Team related to, for example: improvement of quality of the law created in Poland, concerning in particular training facilities; ensuring safety at shooting ranges during training with firearms of various types and calibres, utilising various types of ammunition; expert supervision over construction, acceptance and operation of shooting ranges; principles of safe operation of shooting ranges, ensuring longevity of the facilities, etc.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Hum, Derek. "Tenure, Faculty Contracts and Bargaining Conflict". Canadian Journal of Higher Education 28, n.º 3 (3 de mayo de 2017): 47–70. http://dx.doi.org/10.47678/cjhe.v28i3.183320.

Texto completo
Resumen
Tenure is sometimes charged as giving faculty lifetime job security, with little accountability and sporadic monitoring of performance. Scholars have traditionally defended tenure as necessary for academic freedom. This paper takes a different approach by examining the academic "employment contract relationship," and explaining how tenure can lead to bargaining conflict. Tenure is costly to the university but extremely valued by the faculty member. The opportunity cost of granting tenure to someone is the lost teaching and research output of younger people who cannot be hired in future. Tenure is necessary because without it, incumbents would never recommend hiring people who might be better than they are, for fear of being replaced. Tenure is also efficient because faculty have better information about incumbents than either university administrators or outside consultants. Tenure is therefore necessary to motivate older faculty to hire the best. With staff budget dollars able to be shifted back or forwards across time periods, tenure secures the truthful revelation of who are the good candidates over all periods, and the university is guaranteed that those who are in the best position to judge (namely, faculty rather than administrators) have every incentive to make the best decisions. It follows, then, that the naive suggestion to get rid of tenure so that older, expensive professors can be fired and replaced with younger, cheaper professors would be disastrous in the long run. A simple model is presented explaining why (a) recent cutbacks in government grants, (b) cost pressures on university budgets, (c) limits to tuition increases, and (d) declining interests in attending a less "excellent" university have all resulted in pressure on tenure. Because there is no previously agreed-to mechanism in place to adjust staff, university administrations and faculty unions are not so much bargaining over an acceptable contract outcome as they are contesting the very rules of the bargaining game. Accordingly, unless tenure is reconsidered, universities may increasingly face bargaining conflict. Tenure could be reformed by making the term of tenure limited but related to rank, and establishing a maximum eligibility period during which a faculty may apply for promotion.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Vladu, Mircea y Stelian Popescu. "Considerations on the Impact of Emerging and Disruptive Technologies on Security Policies". Scientific Bulletin 26, n.º 2 (1 de diciembre de 2021): 211–16. http://dx.doi.org/10.2478/bsaft-2021-0026.

Texto completo
Resumen
Abstract The issue of the impact of emerging and disruptive technologies on security policy is a major concern of the North Atlantic Treaty Alliance. This is also demonstrated by the meeting between the Board members and the newly-established Advisory Group for Emerging and Disruptive Technologies, consisting of top experts in the fields of Cyber, Artificial Intelligence, Quantum Computing, Big Data, Space, Robotics and Autonomous or Biotechnological Systems, to find new synergies between NATO, the private, governmental and academic sectors and to maintain the technological supremacy of the Alliance. At the same time, the fact that the Romanian Army has mastered the defining elements of the impact of emerging and disrupted technologies on security policy and acts to make them operational is demonstrated by the meeting of July 12, 2021, of the Minister of National Defense, Nicolae-Ionel Ciuca with Heidi Grant, director of the US Defense and Security Cooperation Agency, on which occasion Romania received from the US the name of “Dependable Undertaking (DU)” under which contracts for the purchase of military equipment can be concluded without any payment in advance. Based on these elements, we would like to continue to talk about some aspects of innovation in dual military technologies, such as the influence of emerging and disruptive technologies on the organization and use of the armed forces. The research method undertaken consisted in identifying bibliographic resources, studying them, drawing relevant conclusions and formulating points of view on the impact of emerging and disruptive technologies on security policies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Kobroń-Gąsiorowska, Łucja. "The employee and their social security in flexible forms of employment on the example of Poland – selected issues. Part I". Kwartalnik Prawa Międzynarodowego IV, n.º IV (30 de marzo de 2024): 187–206. http://dx.doi.org/10.5604/01.3001.0054.4285.

Texto completo
Resumen
The regulation of employment and social policy – with safe and secure conditions of employment in terms of remuneration, safe employment conditions, protection in the event of dismissal, social dialogue, personal data protection, work-life balance, and finally a healthy, safe and well-adjusted work environment – constitutes the foundations of decent working conditions. At the same time, the task of a democratic state is to adjust the dynamically changing economic and market realities to ensure the maximum level of protection in the areas mentioned above relevant to each employee. This situation is also due to the radically progressing digitization that is changing the challenges of the modern labour market. In this article, the author endeavours to address the social security issue of selected flexible (atypical) forms of employment, including employee and non-employee forms of employment. The author chose fixed-term contracts and employment on digital platforms as the subject of analysis, while remaining aware of the multifaceted nature of social security. In this paper, she defends the thesis that the so-called “flexibility of employment relations” should be subject to the broader impact of social security regulations in situations where there are no normative obstacles to them being extended.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Polychronaki, Maria, Dimitrios G. Kogias, Helen C. Leligkou y Panagiotis A. Karkazis. "Blockchain Technology for Access and Authorization Management in the Internet of Things". Electronics 12, n.º 22 (10 de noviembre de 2023): 4606. http://dx.doi.org/10.3390/electronics12224606.

Texto completo
Resumen
The Internet of Things (IoT) continues to suffer from security issues, even after 20 years of technological evolution and continuing efforts. While the decentralization of the IoT seems to be a solution for improved resource management and scalability, most of the services remain centralized, exposing IoT systems to malicious attacks. As a result, this leads to functionality failures and endangers user and data integrity. Identity and Access Management (IAM) has the ability to provide defense against a great number of security threats. Additionally, blockchain is a technology which can natively support decentralization, as well as access and authorization management techniques, using the corresponding programmable logic and leveraging cryptographic mechanisms for privacy and security. Using standardized frameworks (e.g., Decentralized Identifiers and Verifiable Credentials), a blockchain-based access and authorization solution can present the basis for a uniform decentralized IAM framework for the IoT. To this end, this paper presents a proof-of-concept design and implementation of an IAM solution based on Solidity smart contracts, targeting two areas: firstly, supporting the fact that blockchain can seamlessly provide the basis for a decentralized IAM framework, while secondly (and most importantly) exploring the challenge of integrating within existing IoT systems, avoiding redesigning and redeveloping on behalf of IoT manufacturers.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Fleming, Courtney, Mark Reith y Wayne Henry. "Securing Commercial Satellites for Military Operations: A Cybersecurity Supply Chain Framework". International Conference on Cyber Warfare and Security 18, n.º 1 (28 de febrero de 2023): 85–92. http://dx.doi.org/10.34190/iccws.18.1.1062.

Texto completo
Resumen
The increased reliance on commercial satellites for military operations has made it essential for the Department of Defense (DoD) to adopt a supply chain framework to address cybersecurity threats in space. This paper presents a satellite supply chain framework, the Cybersecurity Supply Chain (CSSC) Framework, for the DoD in the evaluation and selection of commercial satellite contracts. The proposed strategy is informed by research on cybersecurity threats to commercial satellites, national security concerns, current DoD policy, and previous cybersecurity frameworks. This paper aims to provide a comprehensive approach for safeguarding commercial satellites used by the DoD and ensuring the security of their supporting components. Inspired by the National Institute of Standards and Technology (NIST) 800-171 requirements and the DoD’s future Cybersecurity Maturity Model Certification (CMMC) process, the two-part framework significantly streamlines the NIST requirements to accommodate small businesses. It also extends key NIST requirements to commercial-off-the-shelf (COTS) suppliers. The CSSC Framework complements the CMMC certification process by addressing the need for cybersecurity requirements for all subcontractors supporting a commercial space asset. The framework incorporates a scoring process similar to CMMC scoring, granting points to a subcontractor for meeting the cybersecurity requirements outlined by the framework. In addition, the framework creates a space architecture overview that details the overall bid score and establishes a matrix based on individual requirements. This model and matrix allow DoD acquisition personnel to closely analyze each contract bid, comparing the subcontractor's strengths and weaknesses to other bidders. The CSSC Framework will allow the DoD to apply NIST standards to subcontractors who do not meet the requirements for CMMC certification.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Slepak, Vitaly Yu. "Legal Regulation of Financing of Scientific Studies by Means of Awarding State Contracts in the Area of Security and Defense". Jurist 8 (29 de julio de 2020): 2–9. http://dx.doi.org/10.18572/1812-3929-2020-8-2-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Tiverios, Nicholas. "A Uniform Hermeneutic Thesis". University of Queensland Law Journal 40, n.º 2 (29 de junio de 2021): 181–214. http://dx.doi.org/10.38127/uqlj.v40i2.5483.

Texto completo
Resumen
At a broad level of generality, the orthodox approach to interpreting contracts, trusts, wills, security documents, company constitutions and so forth is the same: a search for the objective meaning to be attributed to the author or authors of the instrument (the ‘uniform hermeneutic thesis’). This article has two primary objectives. The first is to respond to a common criticism of this uniform objective approach. The criticism is that, as each species of legal obligation is different, different rules of interpretation should apply when the given legal context changes. For example, why not ask the settlor of an inter vivos trust what she meant to say when an interpretational dispute arises? The second reason is to demonstrate that the explanations most commonly given in defence of an objective approach to interpretation, namely to promote legal certainty and economic efficiency, fail to capture the essential reason why the objective approach permeates the general law. The thesis put forward in this article is that an objective theory of interpretation is a justifiable aspect of private law because language (being a form of communication) does not operate unilaterally, but rather requires stable and dependable shared conventions. This argument is supported by the further claim that, where the author of a legal instrument utilises these publicly recognised conventions in order to affect her or his legal relations with others, she or he ought to be bound by those conventions. One cannot have the benefit of ‘conventions for me but not for thee’.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Zhang, Ying. "Increasing Cyber Defense in the Music Education Sector Using Blockchain Zero-Knowledge Proof Identification". Computational Intelligence and Neuroscience 2022 (28 de junio de 2022): 1–7. http://dx.doi.org/10.1155/2022/9922167.

Texto completo
Resumen
Music creation and its promotion are encouraged both in music education and through activities organized in the context of artistic creation as part of the education in question. Although copyright registration is the primary way authors protect their rights, this is not feasible in most cases, as the processes take a long time to complete and incur high costs. We utilize modern innovative technologies and their developments in copyright protection matters to increase security and trust in music education. In particular, an advanced model of ensuring the methods and innovation produced in music education processes is proposed, using blockchain technology and smart contracts. But given that, even in an advanced system like the proposed one, authentication evidence can be easily intercepted, this work proposes a single and robust identification scheme based on an innovative zero-knowledge proof (ZNP) system, which allows one side of communication to convince the other of its validity.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Manin, Iaroslav. "Defense of the Fatherland: Conscription for Military Service on Mobilization". Полицейская и следственная деятельность, n.º 3 (marzo de 2022): 42–63. http://dx.doi.org/10.25136/2409-7810.2022.3.38878.

Texto completo
Resumen
The object of the study is constitutional legal relations for the protection of Russian citizens of their state in connection with conscription for military service in the Armed Forces of the Russian Federation, the subject of the study is normative legal acts regulating military duty. The author explains the legal meaning of the constitutional duty to protect the Fatherland, proposes an addition to the Russian concept of national security with a provision on preventive self-defense, amendments to the Federal Law "On Defense", the Federal Law "On Military Duty and Military Service", the Federal Law "On Mobilization Training and Mobilization" and other regulatory legal acts. The article analyzes the international legal and constitutional regulation of the current problems of defense and security of the Russian Federation in the light of current historical events and the formation of four new regions of Russia: the Donetsk People's Republic, the Luhansk People's Republic, the Zaporozhye region and the Kherson region. The main legal problems of conscription of Russian citizens for military service on mobilization are considered, their solutions are proposed. The author pays special attention to the postponement of military service for mobilization, the legal responsibility of citizens and organizations in connection with the partial mobilization of the population. The article substantiates the exemption of scientists from military duty, determines the status of the mobilized, and gives a legal description of mobilization contracts. Conclusions and suggestions are presented in the text of the current study, which contains fundamentally new information on the subject of scientific work.
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Ma, Xingbang, Dongsheng Yu, Yanhui Du, Lanting Li, Wenkai Ni y Haibin Lv. "A Blockchain-Based Incentive Mechanism for Sharing Cyber Threat Intelligence". Electronics 12, n.º 11 (29 de mayo de 2023): 2454. http://dx.doi.org/10.3390/electronics12112454.

Texto completo
Resumen
With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to alleviate the pressure on organizational or individual cyber security defense. However, the current cyber threat intelligence sharing lacks effective incentive mechanisms, resulting in mutual distrust and a lack of motivation to share among sharing members, making the security of sharing questionable. In this paper, we propose a blockchain-based cyber threat intelligence sharing mechanism (B-CTISM) to address the problems of free riding and lack of trust among sharing members faced in cyber threat intelligence sharing. We use evolutionary game theory to analyze the incentive strategy; the resulting evolutionarily stable strategy achieves the effect of promoting sharing and effectively curbing free-riding behavior. Then, the incentive strategy is deployed to smart contracts running in the trusted environment of blockchain, whose decentralization and tamper-evident properties can provide a trusted environment for participating members and establish trust without a third-party central institution to achieve secure and efficient cyber threat intelligence sharing. Finally, the effectiveness of the B-CTISM in facilitating and regulating threat intelligence sharing is verified through experimental simulation and comparative analysis.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Varney, Eliza. "Redefining contractual capacity? the UN Convention on the Rights of Persons with Disabilities and the incapacity defence in English contract law". Legal Studies 37, n.º 3 (septiembre de 2017): 493–519. http://dx.doi.org/10.1111/lest.12166.

Texto completo
Resumen
How can the incapacity defence in contract law coexist with the concept of universal legal capacity advanced by the UN Convention on the Rights of Persons with Disabilities (CRPD)? In the absence of clear guidance from the CRPD on the link between legal capacity and mental capacity, and given the silence of this Convention on the concept of contractual capacity, this article stresses the need to redefine contractual capacity in a manner that responds not only to economic interests (eg upholding the security of transactions) but also to social interests (including the protection of values such as dignity). The discussion insists that incapacity and disability must never be conceptually equated and calls for a definition of contractual incapacity that moves beyond the medical condition of individuals (whether this is known by or apparent to the other contracting party) and which considers the circumstances of the transaction. These arguments are explored in the context of English contract law, focusing on the question of contractual validity when a party lacked the mental capacity to understand the transaction and the other party was unaware of the incapacity and acted in good faith.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía