نتایج جستجو برای: interdependent security
تعداد نتایج: 185170 فیلتر نتایج به سال:
In other words: what kinds of constitutional structures are appropriate to an internetworked, interdependent age? What sorts of arrangements of power between humans can account for the deep variation in beliefs and assumptions among the six billion of us who share this planet, while still providing for a common jurisprudence? What measures can be taken that enhance the common security without u...
Jorge Nef responds to one of the most pressing intellectual challenges of the post-Cold War era: the search for an analytical framework that will help us understand this turbulent and chaotic period in human history. His lucid and visionary analysis rests on the concept of mutual vulnerability: that in an increasingly interdependent world, global security is only as strong as the weakest link i...
The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technologybased defences. Previous research suggests that, in such an environment, cyber-insurance may serve as an important tool not only to manage risks but also to improve the incentives for investment in security. This paper investigates how competitive cyber-insurers affe...
Do firms have adequate incentives to invest in protection against a risk whose magnitude depends in the actions of others? This paper characterizes the Nash equilibria for this type of interaction between agents, which we call the interdependent security (IDS) problem. When agents are identical, there are two Nash equilibria for a wide range of cost and risk parameters-either everyone invests i...
Throughout the years, many cryptographically verifiable voting systems have been proposed with a whole spectrum of features and security assumptions. Where the voter casts an in-person (and possibly paper) ballot and leaves, as is common in a governmental election, the majority of the proposals fall in the category of providing unconditional integrity and computational privacy. A minority of pa...
Transportation networks are open and accessible, by design, and thus vulnerable to malicious attacks. Transportation networks are integral parts of larger systems, where individual transportation networks form a network-of-networks within a defined geographical region. A security incident on an asset can propagate to new security incidents in interconnected assets of the same or different netwo...
In this paper, we explain why existing cyber-insurance contracts condition their premiums only on a client’s general features (such as the number of employees, sales volume) but do not reflect the client’s security practices. Indeed, we show that even if a competitive insurer can monitor (and enforce) security requirements for a vast majority of his clients, with only a minor fraction of the cl...
Recently, new results on percolation of interdependent networks have shown that the percolation transition can be first order. In this paper we show that, when considering antagonistic interactions between interacting networks, the percolation process might present a bistability of the equilibrium solution. To this end, we introduce antagonistic interactions for which the functionality, or acti...
Spatial evolution game has traditionally assumed that players interact with direct neighbors on a single network, which is isolated and not influenced by other systems. However, this is not fully consistent with recent research identification that interactions between networks play a crucial rule for the outcome of evolutionary games taking place on them. In this work, we introduce the simple g...
Hosts (or nodes) in the Internet often face epidemic risks such as virus and worms attack. Despite the awareness of these risks and the importance of network/system security, investment in security protection is still scare, and hence epidemic risk is still prevalent. Deciding whether to invest in security protection is an interdependent process: security investment decision made by one node ca...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید