Spelling suggestions: "subject:"anda security."" "subject:"ando security.""
311 |
noneSheu, Song-maw 10 July 2007 (has links)
none
|
312 |
The Behavior Analysis of PRC Exercising Veto in the UN Security CouncilLin, Kuo-Tung 29 August 2000 (has links)
Ever since her participation in UN in 1971, the PRC has exercised 23 times of veto power on non-procedural matters of UN Security Council. This thesis not only introduces thoroughly the individual case of PRC using 23 times of veto power, but also purports to apprehend, in light of the national interest, the behavior of PRC exercising veto power in the UN Security Council.
|
313 |
Enterprise Information Security - Backup Systems Planning and PracticeLin, Gary 05 July 2002 (has links)
It is well understood that competitiveness is the foundation of business. Efficient information acquisition, distribution and protection proves to not only improve business¡¦ competitiveness but also extend business value to both business partners and customers. Consequently, Information Security has been the rigorous and sustaining challenge to the business.
Thanks to the booming evolution of information technology, business nowadays has proliferated it widely for business operations. Sept 11 catastrophe in US has brought to business a significant yet unforeseen impact ¡V information security reassessment on both backup systems and disaster recovery planning. This document aims at exploring the status quo of domestic enterprises in this regard as well as possible obstacles of the implementation. Through field research and thorough understanding, we¡¦ve observed the differentiation among the industries we investigated. Meanwhile, we hoped to come out some solid recommendations and awareness to the business by applying generally acknowledged standard ¡V BS7799 rules and policies. With that in mind, enterprises then would be able to move themselves faster toward globalization.
For a long time, IT professionals tend to use tape or jukebox as primary data backup media. Today, we can only rely on those tools for alternatives. By current working field, I¡¦m taking the advantage by introducing high-level technologic system frameworks, practices and experiences from international key players in this field. Enterprises are also recommended to start the ¡§BIA ¡V Business Impact Analysis¡¨ to outline a proper DR and Contingency Plan for the sake of substantial and continual support to business interests and long-term benefits!
|
314 |
Analysis of China's Strategy for Energy SecurityLin, Tien-Lung 08 July 2002 (has links)
Abstract
China¡¦s two decades of rapid economic growth have fueled a demand for energy that has outstripped domestic sources of supply. China became a net oil importer in 1993, and the country¡¦s dependence on energy imports is expected to increase significantly over the next 20 years. It is projected that China will need to import some 60 percent of its oil and at least 30 percent of its natural gas by 2020. This scissors-like gap between domestic supply and demand has forced the Chinese government to abandon its traditional goal of energy self-sufficiency and look abroad for energy resources.
After the implementation of open and reform policy, China not only searched for new source of energy locally, but also searched for foreign source of energy. China intended to assure the safety of energy by the integration of ¡§two resources, two markets¡¨. Otherwise, from the angle of safety strategy of energy, China¡¦s strategy for energy security is not safe enough for the diffculty of implementation of the policy, the incomplete construction of strategic petroleum reserve, and the lack of infrastructure of energy.
|
315 |
Establish A Secure Environment in Ad Hoc NetworkTsai, Bing-Hung 20 August 2003 (has links)
Lately, the security in wireless network is always a really hot topic. With the popularity of wireless network in our daily life day after day, the issues of connection speed have evolved to emphasize on personal privacy and information security.
Due to the complication of membership in wireless network, it is hard to identify every member. We can reference to the security mechanism in wired network, and try to modify it to fit in wireless network. Of course, the wireless devices do not have such strong processing power and resources as personal computers or servers. So when we try to modify the security mechanism in wired network, we should think about the difference between wired and wireless devices.
In this paper, we use a special method to establish Ad Hoc network architecture, and SSL ( Security Sockets Layer ) security protocol. Because SSL has been widely implemented and is now the main standard for providing security e-commerce transactions over the Web. Besides, we use ECC ( Elliptic Curve Cryptosystems ) to replace traditional RSA. Though RSA is the most widely used public key cryptosystem today, the implementation of RSA requires expensive computation. Since battery/computing power and bandwidth are scarce in mobile and wireless systems, the use of a computationally intensive cryptosystem, such as RSA, is not a feasible choice in such environments. Then we can establish a security environment in Ad Hoc network.
We hope we can take a excellent balance between security and processing complexity. This paper goes toward the direction, and tries to move SSL to wireless networks. We believe that it is a method to give consideration to practical utility and ideal.
|
316 |
Evaluation of power system security and development of transmission pricing methodKim, Hyungchul 15 November 2004 (has links)
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing.
In power system security assessment, the following issues are discussed 1) The description of probabilistic methods for power system security assessment 2) The computation time of simulation methods 3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation.
This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
|
317 |
Quality of Service (QoS) security in mobile ad hoc networksLu, Bin 30 October 2006 (has links)
With the rapid proliferation of wireless networks and mobile computing applications,
Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased
attention. Security is a critical aspect of QoS provisioning in the MANET environment.
Without protection from a security mechanism, attacks on QoS signaling system could
result in QoS routing malfunction, interference of resource reservation, or even failure of
QoS provision.
Due to the characteristics of the MANETs, such as rapid topology change and limited
communication and computation capacity, the conventional security measures cannot be
applied and new security techniques are necessary. However, little research has been
done on this topic. In this dissertation, the security issues will be addressed for MANET
QoS systems.
The major contributions of this research are: (a) design of an authentication mechanism
for ad hoc networks; (b) design of a security mechanism to prevent and detect attacks on
the QoS signaling system; (c) design of an intrusion detection mechanism for bandwidth
reservation to detect QoS attacks and Denial of Service (DoS) attacks. These three
mechanisms are evaluated through simulation.
|
318 |
A quantitative man-machine model for cyber security efficiency analysisJung, Sung-Oh 25 April 2007 (has links)
The analysis of security defense processes is of utmost importance in the
management of various cyber-security attacks, which are increasing in scope and
rapidity. Organizations need to optimize their resources based on a sound understanding
of the level of their security defense processes' efficiency and the impact of their
investment.
Modeling and characterization of the dynamics of cyber security management are
essential to risk prediction, damage assessment, and resource allocations. This
dissertation addresses the interactions between human factors and information systems.
On the basis of the spiral life cycle model of software development processes, we
develop a realistic, holistic security attack-defense model - Man-Machine Model (M3),
which combines human factors and information systems' (i.e., machine) states under an
integrated analytical framework. M3 incorporates man and machine components. The
man component is comprised of several variables such as Skill & Knowledge (SKKN)
and Teamwork Quality (TWQ). The machine component is composed of variables such
as traffic volume and the amount of downtime. M3 enables the analysis of intrusion
detection and incident response process efficiency, i.e., security defense team
performance.
With data analysis, we formulate and test four major research hypotheses based
on the data collected during security experiments. Through hypothesis testing, we
evaluate regression models to estimate the security defense team performance (i.e.
efficiency) at different levels of human intelligence (e.g., skill and knowledge) and teamwork (e.g., teamwork quality). We assess the fitness and significance of the
regression models, and verify their assumptions. Based on these results, organizations
can hire those who have an appropriate level of skill and knowledge when it concerns
investments to increase the level of skill and knowledge of security personnel. They also
can attempt to increase the level of skill and knowledge of security personnel.
|
319 |
Energy Security and Fossil Fuel Transportation in ChinaChen, Chih-wei 16 July 2008 (has links)
It is no doubt that 21th century is a high oil price period. It does not cause every country emphasize on itself is energy security and it increases the competition of oil resource so much, Now the threat to China energy security also includes economic development makes all the parts need the oil energy so immensely that the supply is unable to meet the demand. Till 2007, the outer oil requirement is up to 47 percent and almost half one is gotten from other countries import. And this amount will expand as time goes by.
Nowadays China has to face not only high oil price but fossil fuel transportation security.This is the key point.The main point of this article is to talk about 90 percent marine transportation.China develops land transportation positively recently to decrease marine transportation.The cost of land transportation is too expensive that China can not improve their transportation structure within a short time.Therefore,all I want to describe is China government how to deal with these issues and international situations.
|
320 |
Design and Implementation of an Intelligent SIP User Agent to Avoid ¡§Invite/Bye¡¨ AttackHuang, Tun-ling 29 July 2008 (has links)
As Voice-over-IP (VoIP) technology developed, VoIP services alternate the traditional PSTN gradually with their advantage of low rates. Instead of using the public switched telephone network, VoIP services exchange voice information over Internet. As the result, VoIP services have to suffer from the weaknesses of the IP network infrastructure and VoIP devices are easier to be attacked than traditional phones.
In our research, we analyze authentication mechanisms of Session Initiation Protocol, and address the weakness of current authentication mechanisms and the security threats to SIP. We use limited resources to implement an authentication mechanism in our embedded SIP user agent. The results of the Invite/Bye attack experiments confirm that our authentication mechanism in Direct Call and Proxy Call can both avoid malicious Invite/Bye attack.
|
Page generated in 0.4371 seconds