482 research outputs found

    Foreword

    Get PDF

    Advancing Human Rights Through the United Nations

    Get PDF

    EU Policy-Making: Reform of the CAP and EU Trade in Beef & Dairy with Developing Countries

    Get PDF
    The present study is part of the PPLPI effort to identify significant political and institutional factors and processes that currently hinder or prevent the poor in developing countries from taking greater advantage of opportunities to benefit from livestock. The study examines the political economy of policy-making concerning trade in livestock and livestock products (LLPs) between the European Union (EU) and developing countries (DCs). The main objective is to determine and assess how relevant EU policy is made, including the role of key actors and forces both domestic and international. The political economy of relevant LLP trade-related issues are examined at four levels: (a) the EU member state, (b) the European Union itself, (c) the international trading system, and (d) developing countries. Several issues cross, or are relevant to, the different levels of analysis. A related objective is to identify "entry points" and provide strategic recommendations aimed at achieving positive change. Two livestock commodities, beef and dairy, were selected as central to the study. The EU is a prodigious producer of livestock and livestock products, and it plays a major role in international trade in LLPs. EU subsidies and trade barriers have been the subject of intense criticism by some European Union member states, developed and developing country trading partners, international organizations, academics, advocacy NGOs and others.European Union, Common Agricultural Policy (CAP), Policy Making, Trade, Developing Countries, Livestock, Beef, Dairy, Agricultural and Food Policy, Livestock Production/Industries,

    TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone

    Full text link
    The rapid evolution of Internet-of-Things (IoT) technologies has led to an emerging need to make it smarter. A variety of applications now run simultaneously on an ARM-based processor. For example, devices on the edge of the Internet are provided with higher horsepower to be entrusted with storing, processing and analyzing data collected from IoT devices. This significantly improves efficiency and reduces the amount of data that needs to be transported to the cloud for data processing, analysis and storage. However, commodity OSes are prone to compromise. Once they are exploited, attackers can access the data on these devices. Since the data stored and processed on the devices can be sensitive, left untackled, this is particularly disconcerting. In this paper, we propose a new system, TrustShadow that shields legacy applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone technology and partitions resources into the secure and normal worlds. In the secure world, TrustShadow constructs a trusted execution environment for security-critical applications. This trusted environment is maintained by a lightweight runtime system that coordinates the communication between applications and the ordinary OS running in the normal world. The runtime system does not provide system services itself. Rather, it forwards requests for system services to the ordinary OS, and verifies the correctness of the responses. To demonstrate the efficiency of this design, we prototyped TrustShadow on a real chip board with ARM TrustZone support, and evaluated its performance using both microbenchmarks and real-world applications. We showed TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201

    Comparing "challenge-based" and "code-based" internet voting verification implementations

    Get PDF
    Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting. Voters might be concerned about their vote being recorded correctly and included in the final tally. To mitigate mistrust, many Internet-enabled voting systems build verifiability into their systems. This allows voters to verify that their votes have been cast as intended, stored as cast and tallied as stored at the conclusion of the voting period. Verification implementations have not been universally successful, mostly due to voter difficulties using them. Here, we evaluate two cast as intended verification approaches in a lab study: (1) "Challenge-Based" and (2) "Code-Based". We assessed cast-as-intended vote verification efficacy, and identified usability issues related to verifying and/or vote casting. We also explored acceptance issues post-verification, to see whether our participants were willing to engage with Internet voting in a real election. Our study revealed the superiority of the code-based approach, in terms of ability to verify effectively. In terms of real-life Internet voting acceptance, convenience encourages acceptance, while security concerns and complexity might lead to rejection

    Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

    Full text link
    Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and active devices. Since such additional traffic may lead to an unexpected behavior of devices, active scanning methods should be avoided in critical infrastructure networks. In such cases, passive network monitoring offers an alternative, which is often used in conjunction with complex deep-packet inspection techniques. There are very few publications on lightweight passive scanning methodologies for industrial networks. In this paper, we propose a lightweight passive network monitoring technique using an efficient Media Access Control (MAC) address-based identification of industrial devices. Based on an incomplete set of known MAC address to device associations, the presented method can guess correct device and vendor information. Proving the feasibility of the method, an implementation is also introduced and evaluated regarding its efficiency. The feasibility of predicting a specific device/vendor combination is demonstrated by having similar devices in the database. In our ICS testbed, we reached a host discovery rate of 100% at an identification rate of more than 66%, outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.

    Blanche Armwood of Tampa and the Strategy of Interracial Cooperation

    Get PDF
    Blanche Armwood was born in Tampa on January 3, 1890, into a well-established middle-class black family. Her maternal grandfather, Adam Holloman, had been appointed in 1875 to the Hillsborough County Commission by then-Governor Marcellus L. Stearns. That same year he purchased four parcels of land which totalled 123 acres. Her great uncle, John Armwood, had been a negotiator between the Seminoles and white settlers on the southern Florida frontier. He also became an early landowner when he successfully homesteaded 159 acres in Hillsborough County. Her father, Levin Armwood, was Tampa’s first black policeman and subsequently served as county deputy sheriff. He and Blanche’s brother, Walter, jointly owned and operated the Gem, which was for many years Tampa’s only black drugstore. Walter Armwood also held positions as professor at Bethune-Cookman College and, during World War I, as Florida state supervisor for the U.S. Bureau of Negro Economics. One of her sisters, Idela Street, became a licensed businesswoman in Tampa in 1910. Blanche matriculated from St. Peter Claver Catholic School, Tampa’s best school for blacks at the time, at the age of twelve. She then passed the Florida State Uniform Teachers Examination that same year. Enrolling immediately at Spelman Institute in Atlanta, she graduated at age 16 with a degree in English and Latin.1 During the next seven years she taught in the Tampa public schools. During those early years she developed a deep and lasting concern for the social questions which her education and experiences raised in her
    corecore