Security Mechanisms
Mostrando 13-24 de 67 artigos, teses e dissertações.
-
13. Um esquema de seleção de rotas para o balanceamento de segurança e desempenho em redes em malha sem fio / Um Esquema de Seleção de Rotas para o Balanceamento de Segurança e Desempenho em Redes em Malha Sem Fio
Wireless mesh networks (WMNs) have been used to support multimedia applications on different domains, such as health care and entertainment, that require high levels of security and performance simultaneously. Those networks comprise of a wireless backbone of routers that cooperate to provide data communication among mobile devices, such as notebooks, PDAs a
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 09/05/2011
-
14. O trabalho informal perante o sistema de previdência social, à luz da teoria comunicacional do direito / O trabalho informal perante o sistema de previdência social, à luz da teoria comunicacional do direito / The informal work in the social security system, from the viewpoint of the communicational theory of law / The informal work in the social security system, from the viewpoint of the communicational theory of law
This research has the scope of analyzing the informal work, very common in the current Brazilian scenario, into the current social insurance system, starting from the communicative conception of law. Indeed, the informality of employment relationship proves to be a major challenge for contemporary states, notably in the social insurance sphere, in which the
Publicado em: 2011
-
15. Estudo sobre a exploração de vulnerabilidades via estouros de buffer sobre mecanismos de proteção e suas fraquezas / Study about the exploitation of vulnerabilities through buffer overflow, about protection mechanisms and their weaknesses
Este trabalho tem como objetivo apresentar detalhadamente o que são, como ocorrem e os riscos dos ataques baseados em estouros de buffer. Também faz parte da proposta deste artigo analisar a ferramenta Stack-Smashing Protector usada para proteger contra essas explorações, detalhar seu funcionamento e apresentar suas vulnerabilidades. Estouro de buffer é
Publicado em: 2010
-
16. Middleware seguro para redes de sensores sem fio
There is a variety of application scenarios in wireless sensor networks such as medical monitoring, military, home and office security, agriculture and so on. These applications deal with Wireless Sensor Networks (WSNs) odd particularities such as limited power and computational capacities, hardware heterogeneity, low bandwidth, dynamic topology and scalabil
Publicado em: 2009
-
17. A previdência social brasileira sob pressão neoliberal
This study aims to analyse the neoliberal thinking influence in the Social Welfare debate and its use in policies, especially in the Brazilian one. After years 1980, as Neoliberalism was becoming more powerful, the Social Security systems that count on the State effective participation started to be questioned by the neoliberal thinking believers, who were i
Publicado em: 2009
-
18. A efetividade da delação premiada como instrumento de controle do crime organização transnacional
This paper aims to assess the effectiveness of the procedure cooperation by the defendant, known in Brazil as rewarded delation, as a means to deter and repress the illegal activities carried out by transnational criminal organizations. Given their special characteristics, the criminal organizations have showed a lot of resilience against the institutes and
Publicado em: 2009
-
19. Modelling ant colony behavior in a dynamic environment and its applications to packet routing systems / Modelagem do comportamento de colônias de formigas em ambientes dinâmicos e sua aplicação em sistemas de roteamento de pacotes
The modeling of the behavior of a colony of foraging ants in a dynamic environment presented in this dissertation is based on experiments with the Argentine ant Linepithema humile under laboratory condition, using an experimental device similar to a network, consisting of tunnels and bifurcations, which is placed between the colonys nest and the food source.
Publicado em: 2009
-
20. CritÃrios para AplicaÃÃo do Programa Produtor de Ãgua - Estudo de Caso no Alto Rio Grande / Criteria for application of the Water Producing Program â Case studies in the Alto Rio Grande, MG.
The creation of mechanisms to compensate, financially, the agricultural producers by preservation actions is very recent in Brazil, and began through the Water National Agency proposal â through the Water Producer Program. The proposed model as well as other models that are recently being applied, aims at offer to the agricultural producers a defined value
Publicado em: 2009
-
21. Implantação de ferramentas e técnicas de segurança da informação em conformidade com as normas ISO 27001 e ISO 17799
The technical evolution that we are living both in relation to the computer programs and to the hardware equipments that supply the market, it also happens to the threats in the virtual world. Besides the technological advance, we also have the popularization of the broadband Internet access, which makes possible a faster threats proliferation. However, the
Publicado em: 2008
-
22. Xenia: a security system for grid computing based on trust chains / Xenia: um sistema de segurança para grades computacionais baseado em cadeias de confiança
Grid Computing Systems are inherently more vulnerable to security threats than traditional systems, since they potentially encompass a large number of users, resources, and applications managed by different administrative domains. Authentication and authorization are imperative for grid systems. Since scalability and distribution are major concerns on grid e
Publicado em: 2008
-
23. Sed quis custodiet ipso custodes? o controle da atividade de inteligência em regimes democráticos: os casos de Brasil e Canadá
The main objective of this Dissertation is to study intelligence and the mechanisms of control over secret services, particularly in Brazil and Canada. The first part of the Dissertation is dedicated to analyze the influence of intelligence in international relations along history. It also contains a presentation of theoretical and methodological approaches
Publicado em: 2008
-
24. Gestão de risco nas atividades de investimentos praticada pelos municípios do Estado do Rio Grande do Sul em seus regimes próprios de previdência social
The social security system is one the main structural problems in the Brazilian public administration, because of the high level of deficit in the national social security system. The social security reform was initiated in the end of the ninety s with the purpose of reducing the social security expenses and looking for financial and actuarial equilibrium. O
Publicado em: 2008