• Aucun résultat trouvé

Peace and Security

Governance, peace and security in Burundi, Mali and Uganda

Governance, peace and security in Burundi, Mali and Uganda

... governance, peace and security (GPS), whose work programme was formally approved in Yamoussoukro in ...AU and with facilitation and funds from the UNDP Africa Region, representatives of ...

7

From promoting peace to fighting terrorism : a review of the United Nations Security Council chapter VII Resolutions to maintain peace from 1990 to 2015

From promoting peace to fighting terrorism : a review of the United Nations Security Council chapter VII Resolutions to maintain peace from 1990 to 2015

... mankind, and to reaffirm faith in fundamental human rights, in the dignity and worth of the human person, in the equal rights of men and women and of nations large and small, and ...

52

When (and how) regions become peaceful : Explaining transitions from war to peace

When (and how) regions become peaceful : Explaining transitions from war to peace

... cold peace in some parts of the Middle East, peacemaking has not progressed much beyond this ...at peace since 1979), let alone from the Israeli-Syrian arena, where there are still many unresolved substan- ...

75

A Peace Proposal for the War of the Sexes

A Peace Proposal for the War of the Sexes

... However, that principle has been corrupted. Tenure today, for most members of the academie profession means job security, freedom from anything but minimal performance requirements. There is no requirement that ...

2

Building peace by supporting post-conflict electoral processes

Building peace by supporting post-conflict electoral processes

... the security sector for the success of post-conflict elections? In the case of Liberia 2005, the fact that following a peace deal, President Charles Taylor resigned and went into exile, there was ...

269

Norm Transmission in Peace- and State-building: Lessons from Democracy Promotion in Sudan and Lebanon

Norm Transmission in Peace- and State-building: Lessons from Democracy Promotion in Sudan and Lebanon

... in peace- and statebuilding settings to find two (or more) competing systems of authority on the same ...Liberal peace ac- tors and their local partners share authority and legitimacy ...

16

Why do peace negotiations fail? : a case study of the 2012-2015 peace talks between Turkey and the PKK

Why do peace negotiations fail? : a case study of the 2012-2015 peace talks between Turkey and the PKK

... peasants and initiation of guerrilla warfare); strategic balance (reducing the capacity and influence of the state while building up an alternative government-in-waiting); and offense (regular ...

135

Towards Safety and Security Co-engineering

Towards Safety and Security Co-engineering

... safety and security The use of field data to validate a mathematical model for attack prediction seems a consistent ...for security assessment may need to be validated in larger case studies ...

15

Common Security and Defence Policy Module

Common Security and Defence Policy Module

... of security and defence during the initial education and training of the future national military ...European Security and Defence College (ESDC) structure and supported by its ...

164

Social Security, Ageing and Economic Integration

Social Security, Ageing and Economic Integration

... not and whether it implies flexible or mandatory early retirement ...PAYG and mandatory retirement age and one with fully funding and flexible retirement form an economic union 2 ...

16

Interoperability and Negotiation of Security Policies

Interoperability and Negotiation of Security Policies

... and it makes such an approach very vulnerable to attacks such as identity usurpation [ 25 ...characteristics and those of the subject, and not the wills of the object owner [ 26 ...jects’ and ...

178

Security and privacy in RFID systems

Security and privacy in RFID systems

... secure and privacy preserving, but must also fit the stringent characteristics of RFID tags in terms of gate equivalents ...short) and power consumption; a tag is assumed to provide 10000 ...average ...

228

Guiding the selection of security patterns based on security requirements and pattern classification

Guiding the selection of security patterns based on security requirements and pattern classification

... (System and software Engineering with Multi- Concerns) SEMCO [Hamid et ...2013][Hamid and Percebois 2014] during the design ...(security and dependability) patterns can be stored in a first ...

19

Compound-specific radiocarbon analysis to evaluate the contribution of Peace River flooding to the PAH background in the Peace-Athabasca Delta.

Compound-specific radiocarbon analysis to evaluate the contribution of Peace River flooding to the PAH background in the Peace-Athabasca Delta.

... Compound-specific Radiocarbon Analysis to Evaluate the Contribution of Peace River Floodings to the PAH Background in the Peace-Athabasca Delta. JOSUÉ JAUTZY,* , 1 JASON M. E. AHAD, 2 ROLAND I. HALL, 3 ...

1

Semantics and Security Issues in JavaScript

Semantics and Security Issues in JavaScript

... We have seen that the window object is key to data privacy protection. Never- theless, we have pointed out how JavaScript exposes window to the entire environ- ment constraining any security approach. We have ...

40

Trading and rational security pricing bubbles

Trading and rational security pricing bubbles

... g and z j = min f0; z j ...a security - in other words, giving a cash loan and receiving a security as collateral that is worth ...banks and insurance companies) do not face such ...

38

A Security Ontology for Security Requirements Elicitation

A Security Ontology for Security Requirements Elicitation

... of security makes it possible to predict threats and their impacts and define adequate security requirements before the system is in ...place. Security requirements are difficult to ...

22

Security Mechanisms Planning to Enforce Security Policies

Security Mechanisms Planning to Enforce Security Policies

... company, and that it should be able to perform mathematical and statistical operations such as data mining over this part of ...II, and to anonymize Data III in or- der to preserve its ...

17

Watermarking security

Watermarking security

... technique and the same secret ...the security level of a technique starts with the assumption that the attacker knows everything except the secret ...embedding and the decoding ...write, and ...

31

Security Transitions

Security Transitions

... level and, for consistency, we report results for the most de- manding specifications at this ...in security perceptions matches the changes we observed in the tactical ...reported security improved ...

79

Show all 10000 documents...

Sujets connexes