排序方式: 共有65条查询结果,搜索用时 0 毫秒
61.
62.
Daniel Le MétayerAuthor VitaeShara MonteleoneAuthor Vitae 《Computer Law & Security Report》2009,25(2):136-144
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists. 相似文献
63.
BRICS,the southern model,and the evolving landscape of development assistance: Toward a new taxonomy
In recent years, there has been an explosion of categories and labels to account for the expansion of forms of cooperation beyond the membership of the Development Assistance Committee. Such hype has led to the construction of the so‐called southern model as the archetype of development cooperation coming from non‐Development Assistance Committee countries that are somehow committed to the principles of the South–South cooperation. The present article challenges the idea of a southern model by providing an analysis of drivers, tools, and modality of development assistance. 相似文献
64.
Amir Sasan Hadian 《社会征候学》2016,26(5):541-562
This article explores the roles metaphors and analogies play in architectural design thinking. Architects, planners, and designers use these cognitive tools extensively. While the linkages between metaphors, analogies, and design thinking are not new, how architects use them is not systematically explored. Metaphors and analogies are used idiosyncratically. What a particular metaphor or analogy signifies varies from person to person and could mean different things to different people. In this study two key findings emerge from the interviews with five prominent Iranian architects, who have used metaphors or analogies in their projects. First, this study confirms the other findings that designers use metaphors/analogies in three ways: problem solving, problem definition, and explaining a problem to others. At times architects post-rationalize metaphors or analogies, or use them after the fact instead of during the conceptual design stage; second, arguably, metaphors and analogies shed some light on broader issues of public concern, that is, the authenticity (originality) vs. imitation debate. This latter debate remains contentious within the Iranian architectural circles. 相似文献
65.
To combat the problem of encryption key recovery from main memory using cold boot-attacks, various solutions has been suggested, but most of these have been implemented on the x86 architecture, which is not prevalent in the smartphone market, where instead ARM dominates.One existing solution does exist for the ARM architecture but it is limited to key sizes of 128 bits due to not being able to utilise the full width of the CPU registers used for key storage. We developed a test-implementation of CPU-bound key storage with 256-bit capacity, without using more hardware resources than the previous solution. We also show that access to the key can be restricted for programs executing outside the kernel space. 相似文献