Selective Security


Book Description

In contrast to the common perception that the United Nations is, or should become, a system of collective security, this paper advances the proposition that the UN Security Council embodies a necessarily selective approach. Analysis of its record since 1945 suggests that the Council cannot address all security threats effectively. The reasons for this include not only the veto power of the five permanent members, but also the selectivity of all UN member states: their unwillingness to provide forces for peacekeeping or other purposes except on a case-by-case basis, and their reluctance to involve the Council in certain conflicts to which they are parties, or which they perceive as distant, complex and resistant to outside involvement. The Council’s selectivity is generally seen as a problem, even a threat to its legitimacy. Yet selectivity, which is rooted in prudence and in the UN Charter itself, has some virtues. Acknowledging the necessary limitations within which the Security Council operates, this paper evaluates the Council’s achievements in tackling the problem of war since 1945. In doing so, it sheds light on the division of labour among the Council, regional security bodies and states, and offers a pioneering contribution to public and governmental understanding of the UN’s past, present and future roles.







The United Nations and Collective Security


Book Description

The role of the United Nations in collective security has been evolving since its inception in 1945. This book explores collective security as practiced within the legal framework provided by the United Nations Charter, with a particular focus upon activity undertaken under the auspices of the UN Security Council, the body conferred by the Charter with the primary responsibility for the maintenance of international peace and security. Although the book is primarily grounded in international law, where appropriate it also draws upon relevant political insights in order to present a clear picture of the UN collective security system in operation and the factors which impact upon the way in which it functions. Offering a comprehensive analysis it considers the full range of measures which can be utilised by the UN in the performance of its collective security remit including military enforcement action, peacekeeping, non-military sanctions and diplomacy. The book considers each of these measures in detail, assessing the legal framework applicable to the form of action, the main legal controversies which arise in respect of their appropriate utilisation, and the UN’s use of this collective security ‘tool’ in practice. The book draws conclusions about the main strengths and shortcomings of the various means through which the UN can attempt to prevent, minimise or end conflict.




Theory of Cryptography


Book Description

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016. The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.




Real-Time Data Analytics for Large Scale Sensor Data


Book Description

Real-Time Data Analytics for Large-Scale Sensor Data covers the theory and applications of hardware platforms and architectures, the development of software methods, techniques and tools, applications, governance and adoption strategies for the use of massive sensor data in real-time data analytics. It presents the leading-edge research in the field and identifies future challenges in this fledging research area. The book captures the essence of real-time IoT based solutions that require a multidisciplinary approach for catering to on-the-fly processing, including methods for high performance stream processing, adaptively streaming adjustment, uncertainty handling, latency handling, and more. - Examines IoT applications, the design of real-time intelligent systems, and how to manage the rapid growth of the large volume of sensor data - Discusses intelligent management systems for applications such as healthcare, robotics and environment modeling - Provides a focused approach towards the design and implementation of real-time intelligent systems for the management of sensor data in large-scale environments




Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication


Book Description

This volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. The 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. They are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile application security and privacy.




Protection of Civilians


Book Description

The protection of civilians is a highly topical issue at the forefront of international discourse, and has taken a prominent role in many international deployments. It has been at the centre of debates on the NATO intervention in Libya, UN deployments in Darfur, South Sudan, and the Democratic Republic of the Congo, and on the failures of the international community in Sri Lanka and Syria. Variously described as a moral responsibility, a legal obligation, a mandated peacekeeping task, and the culmination of humanitarian activity, it has become a high-profile concern of governments, international organisations, and civil society, and a central issue in international peace and security. This book offers a multidisciplinary treatment of this important topic, harnessing perspectives from international law and international relations, traversing academia and practice. Moving from the historical and philosophical development of the civilian protection concept, through relevant bodies of international law and normative underpinnings, and on to politics and practice, the volume presents coherent cross-cutting analysis of the realities of conflict and diplomacy. In doing so, it engages a series of current debates, including on the role of politics in what has often been characterized as a humanitarian endeavour, and the challenges and impacts of the use of force. The work brings together a wide array of eminent academics and respected practitioners, incorporating contributions from legal scholars and ethicists, political commentators, diplomats, UN officials, military commanders, development experts and humanitarian aid workers. As the most comprehensive publication on the subject, this will be a first port of call for anyone studing or working towards a better protection of civilians in conflict.




Public-Key Cryptography – PKC 2019


Book Description

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.​




Automata, Languages and Programming


Book Description

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.




Military, State, and Society in Israel


Book Description

There have been many books on the place of war, security, or military service in Israeli society. The Military, State, and Society in Israel makes contributions to the debate-theoretical, empirical, and polemical-that are related to the Israeli case and to wider debates about the place of war and the military in contemporary industrialized societies. The Israeli case is important in the development of more macro approaches to the study of "things military" as war has played a central role in Israel's history and continues to do so. The book encapsulates in a very explicit manner tensions in the relationships between the military, state, and society and stands at the core of contemporary debates between two fundamental approaches to the study of the relations between the military society and the state: the "armed forces and society" school and the "state-making and war" perspective. Contemporary Israel is the site of debates about many of the fundamental assumptions that have undergirded the Jewish nation-state: the ethnic character of nationhood and statehood; the role of the Jewish diaspora vis-Ó-vis Israel; the legitimacy of Jewish "ethnic pluralism"; the meaning of the Holocaust; privatization of social life and the spread of consumerism; and weakening of the centralized state as the agent of social transformation affecting housing, language, health, technology, production, dress, and child-rearing. One important consequence of these internal conflicts and struggles has been a significant erosion in the almost sacred status once enjoyed by state institutions, and especially the military, among the majority of Jewish population. "Theoretical and Comparative Perspectives," situates Israel in its wider theoretical and comparative context and shows how the study of Israel contributes to the theoretical understanding of contemporary changes in civil-military relations. "The Politics of Civil-Military Relations," concentrates on current changes in Israeli politics, the character of the conflict with the Palestinians, and the place of military in society. "The State and War-Making-Creating Citizens, Soldiers, and Men and Women," indicates how war and the military are not only instruments for state-making, but are also important factors in the formation of individual identities. "The Notion of 'National Security'-Institutions and Concepts," raises the basic question of whether the institutional mechanisms and the strategic conceptions crystallized during the first 50 years of Israel's existence are still relevant in a changing post-cold war world. "The Armed Forces as Organization, Continuity and Change," focuses on the lines of continuity and trends of change in several aspects of the Israeli Defense Forces' internal organizational structure. Studies based on Israeli cases, data, and scholarship have been central to the development of expertise in such fields as applied psychology and psychotherapy. This volume contributes to these areas of study, and will be of central importance to professionals interested in civil-military.