• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 9
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 35
  • 11
  • 8
  • 6
  • 6
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Revisibilidade das licenças ambientais / Revisibilty of environmental permits

Thiago Serpa Erthal 26 August 2014 (has links)
Este trabalho tem como escopo analisar e delimitar o conceito, espécies, requisitos e consequências da revisibilidade das licenças ambientais. Não raras vezes, empreendedores, administradores públicos, juízes e todos os demais operadores do direito se veem em situações que contrapõem a estabilidade das relações jurídicas e a confiança legítima do comportamento estatal à necessidade de proteger o meio ambiente equilibrado para as presentes e futuras gerações. A revisão de licenças ambientais ainda vigentes é exatamente um dos campos onde essa análise tem espaço. Seja em circunstâncias provisórias ou definitivas, seja advinda de uma nulidade anterior ou de um fato ulterior, em determinadas hipóteses a iminência de dano ambiental faz com que o poder público não possa esperar o término da vigência do ato autorizativo para agir. Ao longo do texto, fixam-se as premissas para examinar cinco espécies de revisão: suspensão, modificação, cassação, invalidação e revogação das licenças ambientais, todas orientadas por algumas ideias comuns, mas cada uma delas com suas especificidades. Apresentam-se, outrossim, alguns contrapontos ao cabimento dessas medidas, notadamente a garantia constitucional de proteção do direito adquirido, não como objeção indiscriminada à atuação estatal, mas como forma de limitação dessa nos estreitos contornos traçados pelos princípios envolvidos. Ao final, trata-se também das consequências que podem advir desse ato revisor, em especial no que tange ao eventual cabimento de indenização ao empreendedor por ele afetado. / This work has the objective to analyze and define the concept, species, requirements and consequences of revisibility environmental licenses. Too often, entrepreneurs, public administrators, judges and all other law enforcement officers find themselves in situations that contradict the stability of legal relations and the legitimate expectations of state behavior to the need to protect the balanced environment for present and future generations. A further review of existing environmental permits is one of the fields where this analysis has room. Whether in temporary or definitive circumstances, whether arising from an earlier invalidity or an ulterior fact, under certain circumstances the imminence of environmental damage means that the government can not expect the expiration date of the primitive act to take action. Throughout the text, the assumptions set up to examine five species for revision: suspension, modification, revocation, invalidation and revocation of environmental licenses, all guided by some common ideas, but each with its specificities. They appear, moreover, some counterpoints to the appropriateness of these reviews, notably the constitutional guarantee of protection granted, not as indiscriminate objection to state action, but by way of limitation in this narrow contours outlined by the principles involved. Finally, it is also about the consequences that this act reviewer, in particular with regard to the appropriateness of any compensation to the entrepreneur affected by it.
32

Revisibilidade das licenças ambientais / Revisibilty of environmental permits

Thiago Serpa Erthal 26 August 2014 (has links)
Este trabalho tem como escopo analisar e delimitar o conceito, espécies, requisitos e consequências da revisibilidade das licenças ambientais. Não raras vezes, empreendedores, administradores públicos, juízes e todos os demais operadores do direito se veem em situações que contrapõem a estabilidade das relações jurídicas e a confiança legítima do comportamento estatal à necessidade de proteger o meio ambiente equilibrado para as presentes e futuras gerações. A revisão de licenças ambientais ainda vigentes é exatamente um dos campos onde essa análise tem espaço. Seja em circunstâncias provisórias ou definitivas, seja advinda de uma nulidade anterior ou de um fato ulterior, em determinadas hipóteses a iminência de dano ambiental faz com que o poder público não possa esperar o término da vigência do ato autorizativo para agir. Ao longo do texto, fixam-se as premissas para examinar cinco espécies de revisão: suspensão, modificação, cassação, invalidação e revogação das licenças ambientais, todas orientadas por algumas ideias comuns, mas cada uma delas com suas especificidades. Apresentam-se, outrossim, alguns contrapontos ao cabimento dessas medidas, notadamente a garantia constitucional de proteção do direito adquirido, não como objeção indiscriminada à atuação estatal, mas como forma de limitação dessa nos estreitos contornos traçados pelos princípios envolvidos. Ao final, trata-se também das consequências que podem advir desse ato revisor, em especial no que tange ao eventual cabimento de indenização ao empreendedor por ele afetado. / This work has the objective to analyze and define the concept, species, requirements and consequences of revisibility environmental licenses. Too often, entrepreneurs, public administrators, judges and all other law enforcement officers find themselves in situations that contradict the stability of legal relations and the legitimate expectations of state behavior to the need to protect the balanced environment for present and future generations. A further review of existing environmental permits is one of the fields where this analysis has room. Whether in temporary or definitive circumstances, whether arising from an earlier invalidity or an ulterior fact, under certain circumstances the imminence of environmental damage means that the government can not expect the expiration date of the primitive act to take action. Throughout the text, the assumptions set up to examine five species for revision: suspension, modification, revocation, invalidation and revocation of environmental licenses, all guided by some common ideas, but each with its specificities. They appear, moreover, some counterpoints to the appropriateness of these reviews, notably the constitutional guarantee of protection granted, not as indiscriminate objection to state action, but by way of limitation in this narrow contours outlined by the principles involved. Finally, it is also about the consequences that this act reviewer, in particular with regard to the appropriateness of any compensation to the entrepreneur affected by it.
33

Bez názvu / Untitled

Cáb, Martin Unknown Date (has links)
The diploma thesis is based on the personal experience of burnout and stagnation in artistic practice. It is a personal reflection of boredom and work with unpredictability. Works in several layers with art theory, existential subtext and subliminal humor.
34

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa 30 May 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.
35

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa January 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.

Page generated in 0.0589 seconds