TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Author(s):  
Zhuotao Liu ◽  
Yushan Liu ◽  
Philipp Winter ◽  
Prateek Mittal ◽  
Yih-Chun Hu
2012 ◽  
Vol 198-199 ◽  
pp. 444-448
Author(s):  
Yu Lin Zheng ◽  
Yi Cai

TOR is a popular anonymous communication system nowadays. This article measures the security of TOR network by probability of disclosure communication relation between TOR user and his destination, and discusses some factors that influence it, finally gives a formula to express the relation among them. We also refer to TOR network archived directory information to evaluate the security level of TOR, and bring forward three advices for using TOR safely..


2018 ◽  
Vol 1 (1) ◽  
pp. 6-21 ◽  
Author(s):  
I. K. Razumova ◽  
N. N. Litvinova ◽  
M. E. Shvartsman ◽  
A. Yu. Kuznetsov

Introduction. The paper presents survey results on the awareness towards and practice of Open Access scholarly publishing among Russian academics.Materials and Methods. We employed methods of statistical analysis of survey results. Materials comprise results of data processing of Russian survey conducted in 2018 and published results of the latest international surveys. The survey comprised 1383 respondents from 182 organizations. We performed comparative studies of the responses from academics and research institutions as well as different research areas. The study compares results obtained in Russia with the recently published results of surveys conducted in the United Kingdom and Europe.Results. Our findings show that 95% of Russian respondents support open access, 94% agree to post their publications in open repositories and 75% have experience in open access publishing. We did not find any difference in the awareness and attitude towards open access among seven reference groups. Our analysis revealed the difference in the structure of open access publications of the authors from universities and research institutes. Discussion andConclusions. Results reveal a high level of awareness and support to open access and succeful practice in the open access publications in the Russian scholarly community. The results for Russia demonstrate close similarity with the results of the UK academics. The governmental open access policies and programs would foster the practical realization of the open access in Russia.


2020 ◽  
Author(s):  
Manuel Tavares Gomes ◽  
Eduardo Santos ◽  
Sandra Gomes ◽  
Daniel Pansarelli ◽  
Donizete Mariano ◽  
...  

This book, consisting of nine chapters, is the result of multiple theoretical and empirical research carried out by students in the post-graduate program in education (PPGE) at Universidade Nove de Julho (UNINOVE). The object of the research was to carry out a study on the new models of higher education, implemented in Brazil between 2005 and 2013. The studies carried out focus, above all, on institutional principles, student access policies, the internationalization process, quota policies, and mechanisms for inclusion in higher education for public school students. These were studies that used, as a theoretical basis, epistemological models of a counter-hegemonic character and, from a methodological point of view, an essentially qualitative approach. The studies showed, generically, the possibility of building other models of higher education capable of overcoming the elitism, characteristic of traditional universities. The inclusion of students from public school reveals that it is possible to make higher education a right for everyone, democratizing it, in the sense of establishing social and cognitive justice. Keywords: higher education; new models; empirical research; Brazil; social and cognitive justice.


2011 ◽  
Vol 22 (10) ◽  
pp. 2358-2371 ◽  
Author(s):  
Lu ZHANG ◽  
Jun-Zhou LUO ◽  
Ming YANG ◽  
Gao-Feng HE

Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


Author(s):  
Oguzhan Yilmaz ◽  
Matthew Frost ◽  
Andrew Timmis ◽  
Stephen Ison

Until recently, addressing the environmental externalities associated with the use of the private car and single occupancy vehicles has been the focus of the airport ground access policies worldwide. However, with the emerging unprecedented challenges of the COVID-19 pandemic, which have already changed the way we live, work, and travel, encouraging a change in commuter behavior has become even more important. This has necessitated that existing strategies be reconsidered in favor of adapting to a highly uncertain “COVID-19 world.” Historically, there has been a dearth of literature relating to airport employees’ ground access even though as a group employees represent an important segment of airport users with complex access requirements. This paper therefore focuses on airport employee related airport ground access strategies considering an emerging understanding of the future impacts of COVID-19 on global air travel. Pre-COVID strategies are investigated by conducting a documentary analysis of the most recent ground access strategies of 27 UK airports. The findings reveal that airport ground access strategies were mainly focused on setting targets and producing policy measures in favor of reducing car use and increasing the use of more sustainable transport modes including public transport, car sharing, and active travel (walking, cycling). However, measures encouraging public transport and car sharing will be more difficult to implement because of social distancing and fear of proximity to others. Instead, initiatives encouraging remote working, active travel, and improved staff awareness will be at the forefront of the future ground access strategy development.


Author(s):  
Fei Meng ◽  
Leixiao Cheng ◽  
Mingqiang Wang

AbstractCountless data generated in Smart city may contain private and sensitive information and should be protected from unauthorized users. The data can be encrypted by Attribute-based encryption (CP-ABE), which allows encrypter to specify access policies in the ciphertext. But, traditional CP-ABE schemes are limited because of two shortages: the access policy is public i.e., privacy exposed; the decryption time is linear with the complexity of policy, i.e., huge computational overheads. In this work, we introduce a novel method to protect the privacy of CP-ABE scheme by keyword search (KS) techniques. In detail, we define a new security model called chosen sensitive policy security: two access policies embedded in the ciphertext, one is public and the other is sensitive and hidden. If user's attributes don't satisfy the public policy, he/she cannot get any information (attribute name and its values) of the hidden one. Previous CP-ABE schemes with hidden policy only work on the “AND-gate” access structure or their ciphertext size or decryption time maybe super-polynomial. Our scheme is more expressive and compact. Since, IoT devices spread all over the smart city, so the computational overhead of encryption and decryption can be shifted to third parties. Therefore, our scheme is more applicable to resource-constrained users. We prove our scheme to be selective secure under the decisional bilinear Diffie-Hellman (DBDH) assumption.


Author(s):  
Sergio Mauricio Martinez Monterrubio ◽  
Joseph Eduardo Armas Naranjo ◽  
Lorena Isabel Barona Lopez ◽  
Angel Leonardo Valdivieso Caraguay
Keyword(s):  

2017 ◽  
Vol 38 (4) ◽  
pp. 439-448 ◽  
Author(s):  
Nicole Smith Dahmen ◽  
Erin K. Coyle

Through surveys and in-depth interviews with members of the White House News Photographers Association, this study indicates that visual journalists understand the value of the watchdog role and that current White House practices interfere with this critical function. Limiting news media access and attempting to control the visual narrative undermines the ability of the press to perform the watchdog function that is critical for democratic self-governance.


Sign in / Sign up

Export Citation Format

Share Document