Results 341 to 350 of about 7,184,030 (395)
Some of the next articles are maybe not open access.

Securing states of security

2007
Thus far … we have no reason to suppose that there is any better general solution to the problem of security [than the state], and little, if any, reason to regard any other possible countervailing value as a serious rival to security as the dominant continuing human need. (John Dunn, The Cunning of Unreason , p. 212)
Neil Walker, Ian Loader
openaire   +2 more sources

The illusion of security

Communications of the ACM, 2008
A fictional scenario of daily life in a world networked with ambient intelligence illustrates the dark side of the technology and the need for appropriate safeguards.
Wright, D.   +9 more
openaire   +4 more sources

Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams

IEEE Transactions on Dependable and Secure Computing, 2018
Smart grids equipped with bi-directional communication flow are expected to provide more sophisticated consumption monitoring and energy trading. However, the issues related to the security and privacy of consumption and trading data present serious ...
Nurzhan Zhumabekuly Aitzhan   +1 more
semanticscholar   +1 more source

Security Regimes: Collective Security and Security Communities

2017
The twentieth century was marked by the proliferation of security regimes, and collective security in particular. Under a collective security arrangement, all states at either a regional or global level agree to resolve their disputes peacefully, collectively oppose acts of aggression, and actively defend those who are victims of such aggression. It is
openaire   +2 more sources

Defeating security with security

Computer Fraud & Security, 2008
Dr Andrea Pasquinucci looks at how far security has progressed and examines the security of SSH. He debunks the myths that LANs are secure and looks at the weaknesses of PKI key management. Dr Andrea Pasquinucci examines the security of SSH and challenges myths.
openaire   +2 more sources

Securing social security

The Washington Quarterly, 1999
Belt, Moynihan, and Schieber sketch out middle‐of‐the road proposals that combine a minimum income guarantee—a residue of Social Security—with expanded private savings accounts. This combination, they believe, offers the best compromise between a guarantee against poverty and the benefits of a private system. Nadler disputes the urgency of reform.
openaire   +2 more sources

Database Security and Security Patterns [PDF]

open access: possible, 2012
There are so many threats to your security that it is essential to remain ever vigilant-without ending up with your server in a bunker of lead wearing a tinfoil hat protecting data by keeping it completely inaccessible to any human eyes. Business needs connectivity to customers, and customers need connectivity to their data. Security is one of the most
Louis Davidson, Jessica M. Moss
openaire   +1 more source

Security

2022
The need for security is an essential component of Macron’s ideological thought, so much so that it has surpassed the need for freedom that liberalism is renowned for being founded on. In order to provide security, neoliberalism has fully embraced the power of the state to create markets and economic structures that liberalism once thought to be ...
openaire   +1 more source

Human Security and the Construction of Security [PDF]

open access: possibleGlobal Society, 2002
(2002). Human Security and the Construction of Security. Global Society: Vol. 16, No. 3, pp. 277-295.
openaire   +2 more sources

State Security, Societal Security, and Human Security

Jadavpur Journal of International Relations, 2017
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy