Results for 'securities'

986 found
Order:
  1. Moral Security.Jessica Wolfendale - 2017 - Journal of Political Philosophy 25 (2):238-255.
    In this paper, I argue that an account of security as a basic human right must incorporate moral security. Broadly speaking, a person possesses subjective moral security when she believes that her basic interests and welfare will be accorded moral recognition by others in her community and by social, political, and legal institutions in her society. She possesses objective moral security if, as a matter of fact, her interests and welfare are regarded by her society as morally important—for example, when (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  2. Microbiopolitics: Security Mechanisms, the Hela Cell, and The Human Strain.Sean Erwin - 2014 - Humanities and Technology Review 33.
    This paper examines the notion of the biopolitical body from the standpoint of Foucault’s logic of the security mechanism and the history he tells of vaccine technology. It then investigates how the increasing importance of the genetic code for determining the meaning and limits of the human in the field of 20th century cell biology has been a cause for ongoing transformation in the practices that currently extend vaccine research and development. I argue that these transformations mark the emergence of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Freedom, security, and the COVID-19 pandemic.Josette Anna Maria Daemen - 2025 - Critical Review of International Social and Political Philosophy 28 (2):286-306.
    Freedom and security are often portrayed as things that have to be traded off against one another, but this view does not capture the full complexity of the freedom-security relationship. Rather, there seem to be four different ways in which freedom and security connect to each other: freedom can come at the cost of security, security can come at the cost of freedom, freedom can work to the benefit of security, and security can work to the benefit of freedom. This (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. Food security as a global public good.Cristian Timmermann - 2020 - In José Luis Vivero-Pol, Tomaso Ferrando, Olivier de Schutter & Ugo Mattei, Routledge Handbook of Food as a Commons. Routledge. pp. 85-99.
    Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good. However, there are four other ways of understanding a public good which are worthy of attention. A normative public good is a good from which nobody ought to be excluded. Alternatively, one might acknowledge the benevolent character of a public good. Others have (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Security practices in AI development.Petr Spelda & Vit Stritecky - forthcoming - AI and Society.
    What makes safety claims about general purpose AI systems such as large language models trustworthy? We show that rather than the capabilities of security tools such as alignment and red teaming procedures, it is security practices based on these tools that contributed to reconfiguring the image of AI safety and made the claims acceptable. After showing what causes the gap between the capabilities of security tools and the desired safety guarantees, we critically investigate how AI security practices attempt to fill (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Attachment, Security, and Relational Networks.Stephanie Collins & Liam Shields - forthcoming - Journal of Value Inquiry.
    The philosophical literature on personal relationships is focused on dyads: close relationships between just two people. This paper aims to characterise the value of looser and larger relational networks, particularly from the perspective of liberal political theory. We focus on relational networks' value vis-a-vis the important good of felt security. We begin by characterising felt security and analysing how felt security is produced within dyads. We highlight the ambivalent nature of dyadic relationships as a source of felt security. We then (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Virtual water and groundwater security.Minh-Hoang Nguyen & Quan-Hoang Vuong - manuscript
    In a recent study by Cai et al. about water shortages in Beijing-Tianjin-Hebei urban areas, virtual water has become the central concept of the groundwater security strategy by suggesting increasing imports of water-intensive agricultural products instead of utilizing the depleted groundwater resources for production. However, despite reviewing the content, we could not see how the authors discussed the households’ economic and financial issues from both production and consumption perspectives.
    Download  
     
    Export citation  
     
    Bookmark  
  9.  81
    Enhancing Security of Cloud-Native Microservices with Service Mesh Technologies.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1.
    : As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  10. Economic Security of the Enterprise Within the Conditions of Digital Transformation.Yuliia Samoilenko, Igor Britchenko, Iaroslava Levchenko, Peter Lošonczi, Oleksandr Bilichenko & Olena Bodnar - 2022 - Economic Affairs 67 (04):619-629.
    In the context of the digital economy development, the priority component of the economic security of an enterprise is changing from material to digital, constituting an independent element of enterprise security. The relevance of the present research is driven by the need to solve the issue of modernizing the economic security of the enterprise taking into account the new risks and opportunities of digitalization. The purpose of the academic paper lies in identifying the features of preventing internal and external negative (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Freedom, security and justice in the European Union: a short genealogy of the "Security Union".Elisa Orru - 2022 - Eunomia 11 (1):143–162.
    This article focuses on the so-called “Area of Freedom, Security and Justice” (ASFJ), namely the policy field of the European Union (EU) that covers judicial and police cooperation, migration and asylum policies and the control of external borders. The article explores how the AFSJ has emerged and how, within it, the relationship between freedom and security has evolved over time and brought about a shift towards a “Security Union”.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  71
    Secure Microservice Communication in Optical Networks.Jagdish Jangid - 2025 - Journal of Information Systems Engineering and Management 10 (21s):911-926.
    As optical network functions increasingly adopt microservice architectures, traditional con-tainer security mechanisms are proving insufficient against sophisticated attacks targeting these critical infrastructure components. This paper introduces a novel framework for securing microser-vice communications in optical networks through the application of Memory Protection Keys (MPK) for enhanced container isolation. Converging containerization technologies with optical networking introduces unique security challenges, particularly in maintaining isolation between sensitive optical control functions while preserving the ultra-low latency requirements essential for network operations. The proposed approach leverages (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  13. Self Control and Moral Security.Jessica Wolfendale & Jeanette Kennett - 2019 - In David Shoemaker, Oxford Studies in Agency and Responsibility Volume 6. pp. 33-63.
    Self-control is integral to successful human agency. Without it we cannot extend our agency across time and secure central social, moral, and personal goods. But self-control is not a unitary capacity. In the first part of this paper we provide a taxonomy of self-control and trace its connections to agency and the self. In part two, we turn our attention to the external conditions that support successful agency and the exercise of self-control. We argue that what we call moral security (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  14.  92
    SECURING CLOUD-NATIVE MICROSERVICES WITH SERVICE MESH TECHNOLOGIES.Sharma Sidharth - 2019 - Journal of Theoretical and Computationsl Advances in Scientific Research (Jtcasr) 3 (1):1-6.
    As cloud-native architectures continue to evolve, microservices have become the foundation for scalable and resilient applications. However, the decentralized nature of microservices introduces significant security challenges, including service-to-service communication security, identity management, and traffic control. Service mesh technologies, such as Istio, Linkerd, and Consul, provide a powerful solution by offering decentralized security enforcement, mutual TLS (mTLS) encryption, fine-grained access control, and observability without modifying application code. This paper explores how service meshes enhance microservices security by implementing zero-trust policies, automatic traffic (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  15. Perceptually Secured Knowledge.Elijah Chudnoff - 2025 - In Ori Beck & Farid Masrour, The Relational View of Perception: New Philosophical Essays. New York, NY:
    Perceptually secured knowledge consists of beliefs that amount to knowledge just because they are based on suitable perceptual states. Relationism about the ground of perceptually secured knowledge is the view that if a perceptual state can make a belief based on it amount to knowledge, then it can do that because it constitutes an appropriate kind of relational state, e.g., a state of perceptual acquaintance. I explore the prospects of both maintaining that some beliefs amount to perceptually secured knowledge and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Philosophy of Global Security.Vihren Bouzov - 2015 - In Mihai-Dan Chiţoiu Ioan-Alexandru Tofan, Proceedings of the International Conference “Humanities and Social Sciences Today. Classical and Contemporary Issues” – Philosophy and Other Humanities. Pro Universitaria. pp. 43-51.
    We are living in an imbalanced and insecure world. It is torn by violent conflicts on a global scale: between the West and the East, between rich and poor countries, between Christianity and Islam, between the Great Forces and naughty countries, between a global capitalist elite and workers and between the global democratic community and global terrorism. An optimistic thesis will be grounded asserting that varied cultures and civilizations can solve all existing problems and contradictions peacefully and can carry out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves away from studying security formations, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. SECURITY AND PRIVACY TECHNIQUE IN BIG DATA: A REVIEW.Pamarthi Kartheek - 2024 - North American Journal of Engineering Research 5 (1).
    The importance of Big Data as a foundational component of the AI and ML landscape is not going away anytime soon. As a result, the past fifteen years have seen a tremendous investment in Big Data research. The purpose of this literature review is to compile the most recent results from Big Data studies conducted over the past fifteen years. The study will address questions about the main applications of Big Data analytics, the main challenges and limitations encountered by researchers, (...)
    Download  
     
    Export citation  
     
    Bookmark   15 citations  
  20. Environmental Security and Just Causes for War.Juha Räikkä & Andrei Rodin - 2015 - Almanac: Discourses of Ethics 10 (1):47-54.
    This article asks whether a country that suffers from serious environmental problems caused by another country could have a just cause for a defensive war? Danish philosopher Kasper Lippert-Rasmussen has argued that under certain conditions extreme poverty may give a just cause for a country to defensive war, if that poverty is caused by other countries. This raises the question whether the victims of environmental damages could also have a similar right to self-defense. Although the article concerns justice of war, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Modal Security and Evolutionary Debunking.Daniel Z. Korman & Dustin Locke - 2023 - Midwest Studies in Philosophy 47:135-156.
    According to principles of modal security, evidence undermines a belief only when it calls into question certain purportedly important modal connections between one’s beliefs and the truth (e.g., safety or sensitivity). Justin Clarke-Doane and Dan Baras have advanced such principles with the aim of blocking evolutionary moral debunking arguments. We examine a variety of different principles of modal security, showing that some of these are too strong, failing to accommodate clear cases of undermining, while others are too weak, failing to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  53
    Security in Storage Area Networks: A Technical Overview.Talluri Durvasulu Mohan Babu - 2025 - International Journal of Advances in Engineering and Management 7 (2):368-376.
    Storage Area Network (SAN) security has emerged as a critical component of modern enterprise infrastructure, addressing the challenges posed by exponential data growth and evolving cyber threats. This technical article examines the fundamental components and implementation strategies for securing SAN environments, encompassing access control management, data protection mechanisms, network security infrastructure, physical security controls, compliance frameworks, and best practices. The comprehensive article covers advanced technologies including artificial intelligence-driven monitoring systems, quantumresistant encryption protocols, and automated incident response capabilities, while highlighting the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular focus on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Human Security Paradigm and Cosmopolitan Democracy.Andreea Iancu - 2014 - Symposion: Theoretical and Applied Inquiries in Philosophy and Social Sciences 1 (2): 167-174.
    This paper discusses the relation between the human security paradigm and the cosmopolitan democracy scenario as models for humanizing and changing the current international system and transforming it in a global security and development system centered on the individual rather than on the nation state. The main idea for which I argue is that the human security paradigm and the changes it determined in international relations (especially through the responsibility to protect principle) are compatible with the cosmopolitan democracy scenario for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Security Through Mutual Understanding and Co-existence or Military Might?: Somali and U.S. Perspectives.Gail M. Presbey - 2011 - In Elavie Ndura-Ouédraogo, Matt Meyer & Judith Atiri, Seeds Bearing Fruit: Pan African Peace Action in the 21st Century. Africa World Press. pp. 323-351.
    Download  
     
    Export citation  
     
    Bookmark  
  26.  99
    Secure the Drug Components using Data Mining.Santhosh Kumar DrK. V. Shiny, Sujay Sharvesh A. S., Sridhar D. - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    In the pharmaceutical and healthcare industries, the secure handling of sensitive drug component data is crucial. This project presents a comprehensive system for the secure storage, encryption, and controlled access of drug datasets using modern encryption techniques and cloud-based storage. Users can upload drug-related CSV files through a web interface, which are then processed and encrypted selectively before being uploaded to Amazon S3. Each file is associated with a unique encryption key, which is securely stored and can only be retrieved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  80
    Network Security Issues and Protection Against Attacks.Sanchita Kuldeep Jedhe, Nikhita Joshi & Aparna Mote - 2022 - International Journal of Scientific Research in Science, Engineering and Technology 9 (2).
    Network Security Secure Network has now become a need of any organization. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. The need is also induced in to the areas like defence, where secure and authenticated access of resources are the key issues related to information security. The security measures should be designed and provided, first a company should know its need of security on the different levels of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. A Proficient Two Level Security Contrivances for Storing Data in Cloud.R. Sugumar K. Anbazhagan - 2016 - Indian Journal of Science and Technology 9 (48):1-5.
    Cloud Computing provides vast storage facility. The requirement of this system is to improve the security and transmission performance in the cloud storage environment. Methods: This system provides two level of security for the cloud data. The Client Data Security Contrivance (CDSC) and Cloud Service Provider (CSP) Data Security Contrivance are the two methods which transforms the original data to cipher text. The security algorithm used in CDSC is Linguistic Steganography. Blowfish algorithm is used in CSP Data Security Contrivance to (...)
    Download  
     
    Export citation  
     
    Bookmark   64 citations  
  30.  64
    Network Security Threat Detection in IoT-Enabled Smart Cities.Reddy Pothireddy Nirup Kumar - 2022 - International Journal of Scientific Research in Science and Technology 9 (4):784-799.
    Since security threats in IoT-enabled smart cities may not appear clear and present to detection mechanisms, efforts have been made to use artificial intelligence methods for anomaly detection. Anomaly detection has been performed using unsupervised learning approaches (Autoencoders, GANs, One Class SVMs) in turn, with these instances considered security threats. In addition, an element for patches and traffic redirection in real time is included in the framework. Results show that the AI detection in general has much more security resilience, decreasing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice:
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, agricultural (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while aggravating (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. An Ontology of Security from a Risk Treatment Perspective.Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - 2022 - In Ítalo Oliveira, Tiago Prince Sales, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi, 41th International Conference, ER 2022, Proceedings. Cham: Springer. pp. 365-379.
    In Risk Management, security issues arise from complex relations among objects and agents, their capabilities and vulnerabilities, the events they are involved in, and the value and risk they ensue to the stakeholders at hand. Further, there are patterns involving these relations that crosscut many domains, ranging from information security to public safety. Understanding and forming a shared conceptualization and vocabulary about these notions and their relations is fundamental for modeling the corresponding scenarios, so that proper security countermeasures can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. An intelligent tutoring system for teaching advanced topics in information security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
    Recently there is an increasing technological development in intelligent tutoring systems. This field has become interesting to many researchers. In this paper, we present an intelligent tutoring system for teaching information security. This intelligent tutoring systems target the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza. Through which the student will be able to study the course and solve related problems. An evaluation of the intelligent tutoring systems (...)
    Download  
     
    Export citation  
     
    Bookmark   50 citations  
  35. Ontology-based security modeling in ArchiMate.Ítalo Oliveira, Tiago Prince Sales, João Paulo A. Almeida, Riccardo Baratella, Mattia Fumagalli & Giancarlo Guizzardi - forthcoming - Software and Systems Modeling.
    Enterprise Risk Management involves the process of identification, evaluation, treatment, and communication regarding risks throughout the enterprise. To support the tasks associated with this process, several frameworks and modeling languages have been proposed, such as the Risk and Security Overlay (RSO) of ArchiMate. An ontological investigation of this artifact would reveal its adequacy, capabilities, and limitations w.r.t. the domain of risk and security. Based on that, a language redesign can be proposed as a refinement. Such analysis and redesign have been (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Robust evidence and secure evidence claims.Kent W. Staley - 2004 - Philosophy of Science 71 (4):467-488.
    Many philosophers have claimed that evidence for a theory is better when multiple independent tests yield the same result, i.e., when experimental results are robust. Little has been said about the grounds on which such a claim rests, however. The present essay presents an analysis of the evidential value of robustness that rests on the fallibility of assumptions about the reliability of testing procedures and a distinction between the strength of evidence and the security of an evidence claim. Robustness can (...)
    Download  
     
    Export citation  
     
    Bookmark   60 citations  
  37. Post-Quantum Cryptography: Readying Security for the Quantum Computing Revolution.Sharma Sidharth - 2018 - International Journal of Science, Management and Innovative Research (Ijsmir) 2 (1):1-5.
    The rapid advancement of quantum computing poses a significant threat to classical cryptographic systems, particularly those based on RSA, ECC, and other public-key algorithms. With Shor’s algorithm capable of efficiently factoring large numbers and breaking current encryption standards, the transition to postquantum cryptography (PQC) has become a global priority. This paper explores the impact of quantum computing on cryptographic security, the need for quantum-resistant cryptographic algorithms, and ongoing standardization efforts led by organizations such as NIST. We analyze various post-quantum cryptographic (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
  38. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Cesc - manuscript
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine learning algorithm, and finally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Security Institutions, Use of Force and the State: A Moral Framework.Shannon Ford - 2016 - Dissertation, Australian National University
    This thesis examines the key moral principles that should govern decision-making by police and military when using lethal force. To this end, it provides an ethical analysis of the following question: Under what circumstances, if any, is it morally justified for the agents of state-sanctioned security institutions to use lethal force, in particular the police and the military? Recent literature in this area suggests that modern conflicts involve new and unique features that render conventional ways of thinking about the ethics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  42. Multi-Cloud Environments: Reducing Security Risks in Distributed Architectures.Sharma Sidharth - 2021 - Journal of Artificial Intelligence and Cyber Security (Jaics) 5 (1):1-6.
    The adoption of multi-cloud environments has become a strategic necessity for organizations seeking scalability, flexibility, and operational efficiency. However, distributing workloads across multiple cloud providers introduces significant security challenges, including authentication vulnerabilities, inconsistent security policies, data breaches, and compliance risks. Traditional security approaches often fail to address the complexity of multi-cloud ecosystems, requiring a more comprehensive risk mitigation strategy. This paper analyses key security risks in multi-cloud architectures and evaluates industry-standard risk assessment frameworks to prioritize effective countermeasures. Our findings indicate (...)
    Download  
     
    Export citation  
     
    Bookmark   36 citations  
  43. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both of these purposes are minimally (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. Peter Sloterdijk and the ‘Security Architecture of Existence’: Immunity, Autochthony, and Ontological Nativism.Thomas Sutherland - 2019 - Theory, Culture and Society 36 (7-8):193-214.
    Centred on 'Foams', the third volume of his Spheres trilogy, this article questions the privilege granted by Peter Sloterdijk to motifs of inclusion and exclusion, contending that whilst his prioritization of dwelling as a central aspect of human existence provides a promising counterpoint to the dislocative and isolative effects of post-industrial capitalism, it is compromised by its dependence upon an anti-cosmopolitan outlook that views cultural distantiation as a natural and preferable state of human affairs, and valorizes a purported ontological security (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Security, Local Community, and the Democratic Political Culture in Africa.Krzysztof Trzcinski - 2021 - In Olajumoke Yacob-Haliso Adeshina Afolayan, Pathways to Alternative Epistemologies in Africa. Springer Verlag. pp. 111-122.
    In this study, the idea of the local African community as a social structure ensuring the security of its members is presented. An understanding of the concept of security is first briefly discussed, followed by the meaning of the concept of the local African community. The chapter also makes an a priori distinction between what one can call “moderate” and “radical” types of communal life and two case studies exemplifying them are presented. The chapter aims to analyze the trade off, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Perpetual anarchy : From economic security to financial insecurity.S. M. Amadae - 2017 - Finance and Society 2 (3):188-96.
    This forum contribution addresses two major themes in de Goede’s original essay on ‘Financial security’: (1) the relationship between stable markets and the proverbial ‘security dilemma’; and (2) the development of new decision-technologies to address risk in the post-World War II period. Its argument is that the confluence of these two themes through rational choice theory represents a fundamental re-evaluation of the security dilemma and its relationship to the rule of law governing market relations, ushering in an era of perpetual (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive association between cyber security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Debunking Arguments: Mathematics, Logic, and Modal Security.Justin Clarke-Doane - 2017 - In Michael Ruse & Robert J. Richards, The Cambridge Handbook of Evolutionary Ethics. New York: Cambridge University Press.
    I discuss the structure of genealogical debunking arguments. I argue that they undermine our mathematical beliefs if they undermine our moral beliefs. The contrary appearance stems from a confusion of arithmetic truths with (first-order) logical truths, or from a confusion of reliability with justification. I conclude with a discussion of the cogency of debunking arguments, in light of the above. Their cogency depends on whether information can undermine all of our beliefs of a kind, F, without giving us direct reason (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  49. Cloud Security Posture Management (CSPM): Automating Security Policy Enforcement in Cloud Environments.Faraz Ahmed - 2023 - Esp International Journal of Advancements in Computational Technology 1 (3).
    Abstract: Cloud computing has transformed IT by offering scalability, cost efficiency, and flexibility, yet it has also introduced complex security risks, including misconfigurations, identity mismanagement, and compliance violations. Cloud Security Posture Management (CSPM) has emerged as a critical solution to address these challenges by automating the continuous assessment and remediation of cloud environments. This paper explores the architecture, working mechanisms, and benefits of CSPM, focusing on its role in enforcing security policies through automation. It highlights common cloud security threats, the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Whose Justice is it Anyway? Mitigating the Tensions Between Food Security and Food Sovereignty.Samantha Noll & Esme G. Murdock - 2020 - Journal of Agricultural and Environmental Ethics 33 (1):1-14.
    This paper explores the tensions between two disparate approaches to addressing hunger worldwide: Food security and food sovereignty. Food security generally focuses on ensuring that people have economic and physical access to safe and nutritious food, while food sovereignty movements prioritize the right of people and communities to determine their agricultural policies and food cultures. As food sovereignty movements grew out of critiques of food security initiatives, they are often framed as conflicting approaches within the wider literature. This paper explores (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 986