Search Results

The impact of US-China relations on Taiwan's military spending (1966-1992).

Description: Previous research has shown that Taiwan's military spending is affected either by China's military buildup or the US's military pipeline. This study investigates whether it is also true an ongoing US-China relationship has dynamic effects. Three major findings are obtained from the statistical analyses. First and foremost, the level of US-China conflict has a contemporaneous positive effect on Taiwan's military spending. Second, the analyses also indicate that the volatility of US-China relations has negative effects on Taiwan's military spending. This finding suggests that instability in US-China relations will prompt Taiwan to decrease its military spending due to a higher amount of perceived security on the one hand, and Taiwan wants to avoid further provoking China on the other. Third, analyses indicate that an error correction model fares better than a simple budgetary incremental model in explaining the re-equilibrating effects of GNP growth on Taiwan's military spending. Overall, the results demonstrate the interplay of domestic and international constraints and may help to predict what will be the expected military spending when Taiwan's economy changes. I suggest that Taiwan's military spending is likely to be influenced by US-China relations as well as by foreign investment and domestic economic constraints as long as the United States policy toward the Taiwan problem remains unchanged.
Date: May 2002
Creator: Yu, Tsung-Chi Max
Partner: UNT Libraries

Adolescents' Perception of Parental Behavior toward Them and its Relationship with Sex, Delinquency, and Security

Description: This study investigated adolescents' perception of parental behavior toward them and its relationship with sex, delinquency, and security. The subjects chosen for the study were sixty boys and sixty girls from eleventh grade English classes, and sixty boys and sixty girls from two institutions for juvenile delinquents. All subjects were white, they ranged in age from fifteen through eighteen years, and they had two living parents.
Date: May 1972
Creator: Mojallali, Shah, 1938-
Partner: UNT Libraries

Security: Counterfeit Identification Raises Homeland Security Concerns

Description: Testimony issued by the General Accounting Office with an abstract that begins "GAO testified about how homeland security is vulnerable to identity fraud. Today, counterfeit identification is easily produced and used to create fraudulent identities. Tests GAO has performed over the past 3 years demonstrate that counterfeit identification documents can be used to (1) enter the United States; (2) purchase firearms; (3) gain access to government buildings and other facilities; (4) obtain genuine identification for both fictitious and stolen identities; and (5) obtain social security numbers for fictitious identities."
Date: October 1, 2003
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

DirectShow Approach to Low-Cost Multimedia Security Surveillance System

Description: In response to the recent intensive needs for civilian security surveillance, both full and compact versions of a Multimedia Security Surveillance (MSS) system have been built up. The new Microsoft DirectShow technology was applied in implementing the multimedia stream-processing module. Through Microsoft Windows Driver Model interface, the chosen IEEE1394 enabled Fire-i cameras as external sensors are integrated with PC based continuous storage unit. The MSS application also allows multimedia broadcasting and remote controls. Cost analysis is included.
Date: December 2002
Creator: Xiao, Wu
Partner: UNT Libraries

Mobile agent security through multi-agent cryptographic protocols.

Description: An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some researchers previously. The best result prior to this dissertation is a single-agent protocol which requires the participation of a trusted third party. Our research employs multi-agent protocols to eliminate the trusted third party, resulting in a protocol with minimum trust assumptions. This dissertation presents one of the first formal definitions of secure mobile agent computation, in which the privacy and integrity of the agent code and data as well as the data provided by the host are all protected. We present secure protocols for mobile agent computation against static, semi-honest or malicious adversaries without relying on any third party or trusting any specific participant in the system. The security of our protocols is formally proven through standard proof technique and according to our formal definition of security. Our second result is a more practical agent protocol with strong security against most real-world host attacks. The security features are carefully analyzed, and the practicality is demonstrated through implementation and experimental study on a real-world mobile agent platform. All these protocols rely heavily on well-established cryptographic primitives, such as encrypted circuits, threshold decryption, and oblivious transfer. Our study of these tools yields new contributions to the general field of cryptography. Particularly, we correct a well-known construction of the encrypted circuit and give ...
Date: May 2004
Creator: Xu, Ke
Partner: UNT Libraries

Joint Schemes for Physical Layer Security and Error Correction

Description: The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities of the ciphers are analyzed against known-plaintext and chosen-plaintext attacks and are found to be secure. Randomization test was also conducted on these schemes and the results are presented. For the proof of concept, the schemes were implemented in software and hardware and these shows a reduction in hardware usage compared to conventional schemes. As a result, joint schemes for error correction and security provide security to the physical layer of wireless communication systems, a layer in the protocol stack where currently little or no security is implemented. In this physical layer security approach, the properties of powerful error correcting codes are exploited to deliver reliability to the intended parties, high security against eavesdroppers and efficiency in communication system. The notion of a highly secure and reliable physical layer has the potential to significantly change how communication system designers and users think of the physical layer since the error control codes employed in this work will have the dual roles of both reliability and security.
Date: August 2011
Creator: Adamo, Oluwayomi Bamidele
Partner: UNT Libraries

Security: Breaches at Federal Agencies and Airports

Description: Testimony issued by the General Accounting Office with an abstract that begins "Pursuant to a congressional request, GAO discussed the potential security risk to the United States posed by the use of stolen or counterfeit law enforcement badges and credentials."
Date: May 25, 2000
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

Towards Sustainable Global Health

Description: Global health has in recent years drawn increasing scientific, political and popular attention not only due to global epidemics themselves,but also because of the social activities and environmental conditions that shape health threats and influence those who are affected. The study dealswith the issue of 'Sustainable Global Health'which has evolved from the realization that there will be no alleviation of poverty without success in control of serious public health threats, no economic prosperity and sustainability without a healthy workforce, and no social stability and peace as long as people have to suffer from insufficient health services, from malnutrition, from HIV/AIDS pandemics, or from lack of safe water. The study addresses a broad range of issues related to human health at regional and global levels. It includes the theme of Technical and Vocational Education and Training (TVET) as a tool for the private sector to exercise responsibility and interest in using the workplaces as a route and as means for education, and for a wide participation of every citizen in securing his or her individual health and well-being. Highlighted throughout the study are integrated approaches towards sustainable health.These approaches shed light on both the importance of multilevel health governance and the understanding of human health as an issue of human security in responding to health threats. Furthermore,the study emphasizes the links between the phenomena of global environmental change, which often further increases pressure on health systems, and the crucial role urban areas play in this realm.
Date: 2008
Creator: Exner, Martin; Klein, G√ľnter; Rechkemmer, Andreas & Schmidt, Falk
Partner: UNT Libraries

A Security Model for Mobile Agents using X.509 Proxy Certificates

Description: Mobile agent technology presents an attractive alternative to the client-server paradigm for several network and real-time applications. However, for most applications, the lack of a viable agent security model has limited the adoption of the agent paradigm. This thesis presents a security model for mobile agents based on a security infrastructure for Computational Grids, and specifically, on X.509 Proxy Certificates. Proxy Certificates serve as credentials for Grid applications, and their primary purpose is temporary delegation of authority. Exploiting the similarity between Grid applications and mobile agent applications, this thesis motivates the use of Proxy Certificates as credentials for mobile agents. A new extension for Proxy Certificates is proposed in order to make them suited to mobile agent applications, and mechanisms are presented for agent-to-host authentication, restriction of agent privileges, and secure delegation of authority during spawning of new agents. Finally, the implementation of the proposed security mechanisms as modules within a multi-lingual and modular agent infrastructure, the Distributed Agent Delivery System, is discussed.
Date: December 2002
Creator: Raghunathan, Subhashini
Partner: UNT Libraries

Security: Counterfeit Identification and Indentification Fraud Raise Security Concerns

Description: Testimony issued by the General Accounting Office with an abstract that begins "This testimony summarizes some of our recent investigations that demonstrate security vulnerabilities that exist because counterfeit identification can be easily produced and used to create fraudulent identities. It is based in part on the recently issued restricted report Security: Vulnerabilities Found in Driver's License Applications Process. This also encompasses results from security tests we have performed over the past 3 years. These tests revealed security weaknesses at federal buildings and other facilities, airports and our nation's borders, and exposed identity fraud vulnerabilities in both the Social Security number (SSN) application process and in the administration of federal gun control laws. A number of these problems have been addressed by the responsible agencies."
Date: September 9, 2003
Creator: United States. General Accounting Office.
Partner: UNT Libraries Government Documents Department

Science & Technology Review, August 1996

Description: Serial publication produced by Lawrence Livermore National Laboratory regarding the institution's research in technology to address concerns about energy, bioscience, and the environment. "Science & Technology Review (formerly Energy and Technology Review) is published ten times a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments [...]. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world" (inside cover).
Date: August 1996
Creator: Lawrence Livermore National Laboratory
Partner: UNT Libraries Government Documents Department

Implementation of Scalable Secure Multicasting

Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a concern in group communication due to group membership dynamics. Joining and leaving of members requires the distribution of a new session key to all the existing members of the group. The two approaches to key management namely centralized and distributed approaches are reviewed. A hybrid solution is then provided, which represents a improved scalable and robust approach for a secure multicast framework. This framework then is implemented in an example application of a multicast news service.
Access: This item is restricted to UNT Community Members. Login required if off-campus.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Partner: UNT Libraries

[News Clip: Mass Transit Security (2)]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story about security on mass transit and public transportation in the Dallas Fort Worth area following attacks on the London subway system. This b-roll footage shows DART and TRE transit vehicles and commuters. The story aired at 6:00 A.M.
Date: July 8, 2005
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections

[News Clip: Mass Transit Security]

Description: Video footage from the KXAS-TV/NBC station in Fort Worth, Texas, to accompany a news story about the attacks on the London subway system. This b-roll footage shows the transit system, security, and commuters. Passengers are interviewed. The story aired at 6:00 A.M.
Date: July 8, 2005
Creator: KXAS-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections

[News Script: Carr]

Description: Script from the WBAP-TV/NBC station in Fort Worth, Texas, covering a news story about the speech of State Attorney General Vincent Waggoner Carr at a luncheon of the North Texas Chamber of Commerce; Carr spoke of providing better security to visiting high officials, and that Dallas has been cleared of the stain of President Kennedy's assassination.
Date: October 7, 1964
Creator: WBAP-TV (Television station : Fort Worth, Tex.)
Partner: UNT Libraries Special Collections