نتایج جستجو برای: interdependent security

تعداد نتایج: 185170  

2004
Adam Greenfield

In other words: what kinds of constitutional structures are appropriate to an internetworked, interdependent age? What sorts of arrangements of power between humans can account for the deep variation in beliefs and assumptions among the six billion of us who share this planet, while still providing for a common jurisprudence? What measures can be taken that enhance the common security without u...

2007
Jorge Nef

Jorge Nef responds to one of the most pressing intellectual challenges of the post-Cold War era: the search for an analytical framework that will help us understand this turbulent and chaotic period in human history. His lucid and visionary analysis rests on the concept of mutual vulnerability: that in an increasingly interdependent world, global security is only as strong as the weakest link i...

2010
Nikhil Shetty Galina Schwartz Jean C. Walrand

The interdependent nature of security on the Internet causes a negative externality that results in under-investment in technologybased defences. Previous research suggests that, in such an environment, cyber-insurance may serve as an important tool not only to manage risks but also to improve the incentives for investment in security. This paper investigates how competitive cyber-insurers affe...

2002
Geoffrey Heal

Do firms have adequate incentives to invest in protection against a risk whose magnitude depends in the actions of others? This paper characterizes the Nash equilibria for this type of interaction between agents, which we call the interdependent security (IDS) problem. When agents are identical, there are two Nash equilibria for a wide range of cost and risk parameters-either everyone invests i...

2017
Nan Yang Jeremy Clark

Throughout the years, many cryptographically verifiable voting systems have been proposed with a whole spectrum of features and security assumptions. Where the voter casts an in-person (and possibly paper) ballot and leaves, as is common in a governmental election, the majority of the proposals fall in the category of providing unconditional integrity and computational privacy. A minority of pa...

Journal: :IJISCRAM 2013
Dimitris Zisiadis George Thanos Spyros Kopsidas George Leventakis

Transportation networks are open and accessible, by design, and thus vulnerable to malicious attacks. Transportation networks are integral parts of larger systems, where individual transportation networks form a network-of-networks within a defined geographical region. A security incident on an asset can propagate to new security incidents in interconnected assets of the same or different netwo...

2010
Galina Schwartz Nikhil Shetty Jean Walrand

In this paper, we explain why existing cyber-insurance contracts condition their premiums only on a client’s general features (such as the number of employees, sales volume) but do not reflect the client’s security practices. Indeed, we show that even if a competitive insurer can monitor (and enforce) security requirements for a vast majority of his clients, with only a minor fraction of the cl...

Journal: :CoRR 2012
Kun Zhao Ginestra Bianconi

Recently, new results on percolation of interdependent networks have shown that the percolation transition can be first order. In this paper we show that, when considering antagonistic interactions between interacting networks, the percolation process might present a bistability of the equilibrium solution. To this end, we introduce antagonistic interactions for which the functionality, or acti...

2014
Qing Jin Zhen Wang

Spatial evolution game has traditionally assumed that players interact with direct neighbors on a single network, which is isolated and not influenced by other systems. However, this is not fully consistent with recent research identification that interactions between networks play a crucial rule for the outcome of evolutionary games taking place on them. In this work, we introduce the simple g...

2017
Zichao Yang John C.S. Lui

Hosts (or nodes) in the Internet often face epidemic risks such as virus and worms attack. Despite the awareness of these risks and the importance of network/system security, investment in security protection is still scare, and hence epidemic risk is still prevalent. Deciding whether to invest in security protection is an interdependent process: security investment decision made by one node ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید