The impact of US-China relations on Taiwan's military spending (1966-1992).

The impact of US-China relations on Taiwan's military spending (1966-1992).

Date: May 2002
Creator: Yu, Tsung-Chi Max
Description: Previous research has shown that Taiwan's military spending is affected either by China's military buildup or the US's military pipeline. This study investigates whether it is also true an ongoing US-China relationship has dynamic effects. Three major findings are obtained from the statistical analyses. First and foremost, the level of US-China conflict has a contemporaneous positive effect on Taiwan's military spending. Second, the analyses also indicate that the volatility of US-China relations has negative effects on Taiwan's military spending. This finding suggests that instability in US-China relations will prompt Taiwan to decrease its military spending due to a higher amount of perceived security on the one hand, and Taiwan wants to avoid further provoking China on the other. Third, analyses indicate that an error correction model fares better than a simple budgetary incremental model in explaining the re-equilibrating effects of GNP growth on Taiwan's military spending. Overall, the results demonstrate the interplay of domestic and international constraints and may help to predict what will be the expected military spending when Taiwan's economy changes. I suggest that Taiwan's military spending is likely to be influenced by US-China relations as well as by foreign investment and domestic economic constraints as long as ...
Contributing Partner: UNT Libraries
Adolescents' Perception of Parental Behavior toward Them and its Relationship with Sex, Delinquency, and Security

Adolescents' Perception of Parental Behavior toward Them and its Relationship with Sex, Delinquency, and Security

Date: May 1972
Creator: Mojallali, Shah, 1938-
Description: This study investigated adolescents' perception of parental behavior toward them and its relationship with sex, delinquency, and security. The subjects chosen for the study were sixty boys and sixty girls from eleventh grade English classes, and sixty boys and sixty girls from two institutions for juvenile delinquents. All subjects were white, they ranged in age from fifteen through eighteen years, and they had two living parents.
Contributing Partner: UNT Libraries
Security: Counterfeit Identification Raises Homeland Security Concerns

Security: Counterfeit Identification Raises Homeland Security Concerns

Date: October 1, 2003
Creator: United States. General Accounting Office.
Description: Testimony issued by the General Accounting Office with an abstract that begins "GAO testified about how homeland security is vulnerable to identity fraud. Today, counterfeit identification is easily produced and used to create fraudulent identities. Tests GAO has performed over the past 3 years demonstrate that counterfeit identification documents can be used to (1) enter the United States; (2) purchase firearms; (3) gain access to government buildings and other facilities; (4) obtain genuine identification for both fictitious and stolen identities; and (5) obtain social security numbers for fictitious identities."
Contributing Partner: UNT Libraries Government Documents Department
DirectShow Approach to Low-Cost Multimedia Security Surveillance System

DirectShow Approach to Low-Cost Multimedia Security Surveillance System

Date: December 2002
Creator: Xiao, Wu
Description: In response to the recent intensive needs for civilian security surveillance, both full and compact versions of a Multimedia Security Surveillance (MSS) system have been built up. The new Microsoft DirectShow technology was applied in implementing the multimedia stream-processing module. Through Microsoft Windows Driver Model interface, the chosen IEEE1394 enabled Fire-i cameras as external sensors are integrated with PC based continuous storage unit. The MSS application also allows multimedia broadcasting and remote controls. Cost analysis is included.
Contributing Partner: UNT Libraries
Action Alert Benefits Chart

Action Alert Benefits Chart

Date: March 2010
Creator: unknown
Description: Overview of benefits of renewable energy systems.
Contributing Partner: UNT Libraries
Mobile agent security through multi-agent cryptographic protocols.

Mobile agent security through multi-agent cryptographic protocols.

Date: May 2004
Creator: Xu, Ke
Description: An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some researchers previously. The best result prior to this dissertation is a single-agent protocol which requires the participation of a trusted third party. Our research employs multi-agent protocols to eliminate the trusted third party, resulting in a protocol with minimum trust assumptions. This dissertation presents one of the first formal definitions of secure mobile agent computation, in which the privacy and integrity of the agent code and data as well as the data provided by the host are all protected. We present secure protocols for mobile agent computation against static, semi-honest or malicious adversaries without relying on any third party or trusting any specific participant in the system. The security of ...
Contributing Partner: UNT Libraries
Joint Schemes for Physical Layer Security and Error Correction

Joint Schemes for Physical Layer Security and Error Correction

Date: August 2011
Creator: Adamo, Oluwayomi Bamidele
Description: The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities of the ciphers are analyzed against known-plaintext and chosen-plaintext attacks and are found to be secure. Randomization test was also conducted on these schemes and the results are presented. For the proof of concept, the schemes were implemented in software and hardware and these shows a reduction in hardware usage compared to conventional schemes. As a result, joint schemes for error correction and security provide security to the physical layer of wireless communication systems, a layer in the protocol stack where currently little or no security is implemented. In this physical layer security approach, the properties of powerful error correcting codes are exploited to deliver reliability to the intended parties, high security against eavesdroppers and efficiency in communication system. The notion of a highly secure and reliable ...
Contributing Partner: UNT Libraries
Security: Breaches at Federal Agencies and Airports

Security: Breaches at Federal Agencies and Airports

Date: May 25, 2000
Creator: United States. General Accounting Office.
Description: Testimony issued by the General Accounting Office with an abstract that begins "Pursuant to a congressional request, GAO discussed the potential security risk to the United States posed by the use of stolen or counterfeit law enforcement badges and credentials."
Contributing Partner: UNT Libraries Government Documents Department
Towards Sustainable Global Health

Towards Sustainable Global Health

Date: 2008
Creator: Exner, Martin; Klein, G√ľnter; Rechkemmer, Andreas & Schmidt, Falk
Description: Global health has in recent years drawn increasing scientific, political and popular attention not only due to global epidemics themselves,but also because of the social activities and environmental conditions that shape health threats and influence those who are affected. The study dealswith the issue of 'Sustainable Global Health'which has evolved from the realization that there will be no alleviation of poverty without success in control of serious public health threats, no economic prosperity and sustainability without a healthy workforce, and no social stability and peace as long as people have to suffer from insufficient health services, from malnutrition, from HIV/AIDS pandemics, or from lack of safe water. The study addresses a broad range of issues related to human health at regional and global levels. It includes the theme of Technical and Vocational Education and Training (TVET) as a tool for the private sector to exercise responsibility and interest in using the workplaces as a route and as means for education, and for a wide participation of every citizen in securing his or her individual health and well-being. Highlighted throughout the study are integrated approaches towards sustainable health.These approaches shed light on both the importance of multilevel health governance and the ...
Contributing Partner: UNT Libraries
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks

Classification of Attributes and Behavior in Risk Management Using Bayesian Networks

Date: March 2007
Creator: Dantu, Ram; Kolan, Prakash; Loper, Kall & Akl, Robert G.
Description: This paper discusses issues in security.
Contributing Partner: UNT College of Engineering
Secure Embedded Platform Networked Automotive Systems

Secure Embedded Platform Networked Automotive Systems

Date: March 2011
Creator: Gomathisankaran, Mahadevan & Namuduri, Kamesh
Description: This paper discusses secure embedded platforms for networked automotive systems.
Contributing Partner: UNT College of Engineering
A Security Model for Mobile Agents using X.509 Proxy Certificates

A Security Model for Mobile Agents using X.509 Proxy Certificates

Date: December 2002
Creator: Raghunathan, Subhashini
Description: Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their primary purpose is temporary delegation of authority. Exploiting the similarity between Grid applications and mobile agent applications, this thesis motivates the use of Proxy Certificates as credentials for mobile agents. A new extension for Proxy Certificates is proposed in order to make them suited to mobile agent applications, and mechanisms are presented for agent-to-host authentication, restriction of agent privileges, and secure delegation of authority during spawning of new agents. Finally, the implementation of the proposed security mechanisms as modules within a multi-lingual and modular agent infrastructure, the Distributed Agent Delivery System, is discussed.
Contributing Partner: UNT Libraries
Security: Counterfeit Identification and Indentification Fraud Raise Security Concerns

Security: Counterfeit Identification and Indentification Fraud Raise Security Concerns

Date: September 9, 2003
Creator: United States. General Accounting Office.
Description: Testimony issued by the General Accounting Office with an abstract that begins "This testimony summarizes some of our recent investigations that demonstrate security vulnerabilities that exist because counterfeit identification can be easily produced and used to create fraudulent identities. It is based in part on the recently issued restricted report Security: Vulnerabilities Found in Driver's License Applications Process. This also encompasses results from security tests we have performed over the past 3 years. These tests revealed security weaknesses at federal buildings and other facilities, airports and our nation's borders, and exposed identity fraud vulnerabilities in both the Social Security number (SSN) application process and in the administration of federal gun control laws. A number of these problems have been addressed by the responsible agencies."
Contributing Partner: UNT Libraries Government Documents Department
The DataRes Research Project on Data Management

The DataRes Research Project on Data Management

Date: February 2012
Creator: Halbert, Martin; Moen, William E. & Keralis, Spencer D. C.
Description: Paper for the 2012 International iConference. This presentation discusses data management and the DataRes Project.
Contributing Partner: UNT Libraries
Security Within the Family in Relation to Reading Achievement of the Second-Grade Child

Security Within the Family in Relation to Reading Achievement of the Second-Grade Child

Date: 1950
Creator: Covington, Era M.
Description: The purpose of this study is to determine some of the effects of child security within the family in relation to the achievement in reading in the second grade.
Contributing Partner: UNT Libraries
Chronicles in Preservation Project

Chronicles in Preservation Project

Date: February 2012
Creator: Halbert, Martin & Skinner, Katherine
Description: Paper for the 2012 International iConference. This paper discusses the chronicles in preservation project.
Contributing Partner: UNT Libraries
A Study of the Government's Loyalty and Security Programs

A Study of the Government's Loyalty and Security Programs

Date: 1953
Creator: Johnagin, L. A
Description: The purpose of this study is to show just how a loyalty or security program may affect the government employee or armed service personnel as individuals and as a unit of a department.
Contributing Partner: UNT Libraries
Science & Technology Review, August 1996

Science & Technology Review, August 1996

Date: August 1996
Creator: Lawrence Livermore National Laboratory
Description: Serial publication produced by Lawrence Livermore National Laboratory regarding the institution's research in technology to address concerns about energy, bioscience, and the environment. "Science & Technology Review (formerly Energy and Technology Review) is published ten times a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments [...]. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world" (inside cover).
Contributing Partner: UNT Libraries Government Documents Department
Implementation of Scalable Secure Multicasting

Implementation of Scalable Secure Multicasting

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a concern in group communication due to group membership dynamics. Joining and leaving of members requires the distribution of a new session key to all the existing members of the group. The two approaches to key management namely centralized and distributed approaches are reviewed. A hybrid solution is then provided, which represents a improved scalable and robust approach for a secure multicast framework. This framework then is implemented in an example application of a multicast news service.
Contributing Partner: UNT Libraries
Radio Frequency Identification: The Current and Future Solutions for Privacy and Security

Radio Frequency Identification: The Current and Future Solutions for Privacy and Security

Date: Summer 2006
Creator: Jain, Vivek
Description: Thesis written by a student in the UNT Honors College discussing the standards, protocols, "attack models," and security algorithms of Radio Frequency Identification technology.
Contributing Partner: UNT Honors College
[News Clip: False Alarm]

[News Clip: False Alarm]

Date: January 14, 1986
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story by reporter Ron Trumbla about penalties for false alarms from commercial burglary alarm systems in Fort Worth. City representatives are interviewed. The story aired at 6:00 P.M.
Contributing Partner: UNT Libraries Special Collections
[News Clip: Mass Transit Security (2)]

[News Clip: Mass Transit Security (2)]

Date: July 8, 2005
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story about security on mass transit and public transportation in the Dallas Fort Worth area following attacks on the London subway system. This b-roll footage shows DART and TRE transit vehicles and commuters. The story aired at 6:00 A.M.
Contributing Partner: UNT Libraries Special Collections
[News Clip: Mass Transit Security]

[News Clip: Mass Transit Security]

Date: July 8, 2005
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story about the attacks on the London subway system. This b-roll footage shows the transit system, security, and commuters. Passengers are interviewed. The story aired at 6:00 A.M.
Contributing Partner: UNT Libraries Special Collections