RESUMO: Este estudo, na perspectiva de promoção de uma disciplina comum dos mecanismos defensivos de autotutela privada, parte da análise dos problemas advindos do tratamento assistemático do direito de retenção no ordenamento jurídico... more
RESUMO: Este estudo, na perspectiva de promoção de uma disciplina comum dos mecanismos defensivos de autotutela privada, parte da análise dos problemas advindos do tratamento assistemático do direito de retenção no ordenamento jurídico brasileiro. Mediante análise da jurisprudência brasileira sobre a matéria e, ainda, mediante breve confronto com a experiência normativa estrangeira, propõe-se um esboço de disciplina unitária do direito de retenção. Enfrenta-se, na sequência, a problemática atinente à suposta taxatividade do direito de retenção. Ao término do estudo, investigam-se as convergências e divergências entre o direito de retenção e a exceção de contrato não cumprido, ambos relevantes mecanismos defensivos de autotutela privada.
ABSTRACT: This study, in the perspective of promotion of a common discipline to defensive mechanisms of private self-protection, departs from the analysis of the problems deriving from the non-systematic treatment of the right of retention in Brazilian law. Through analysis of Brazilian jurisprudence about the theme, and after a brief remark on the foreign experience, this work proposes a first draft for a common discipline of the right of retention. It then approaches the problem of applying retention in cases in which the law did not mention it. At the end, this study shows the similarities and differences between the right of retention and the exception of non-performance, both relevant defensive mechanisms of private self-protection.
— Protection of data in cloud computing is a critical problem for many enterprises. We propose a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the... more
— Protection of data in cloud computing is a critical problem for many enterprises. We propose a solution that protects sensitive data outsourced to a cloud throughout their entire life cycle—both in the cloud as well as outside of the cloud (e.g., during transmission to or from the cloud). Our solution, known as Active Data Bundles using Secure Multi-Party Computation (ADB-SMC), uses: (i) active data bundles (ADBs)—for self-protecting data; (ii) ciphertext-policy attribute-based encryption—for fine-grained access control; and, (iii) threshold RSA—for secure key management. We describe components and design of ADB-SMC and present the pseudocode for creating ADB to outsource data to the cloud. We implemented a prototype of the solution and compared its overhead with the overhead of the approach known as Active Bundles with Trusted Third Party (ABTTP). The results of performance tests show that the execution time overhead for ADB-SMC is acceptable.
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in ord...
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in ord...
Despite its potential to tackle many security challenges of large-scale systems such as pervasive networks, self-managed protection has been little explored. This paper addresses the problem from a policy management perspective by... more
Despite its potential to tackle many security challenges of large-scale systems such as pervasive networks, self-managed protection has been little explored. This paper addresses the problem from a policy management perspective by presenting a policy-driven framework for self-protection of pervasive systems called ASPF (Autonomic Security Policy Framework). Enforced authorization policies in a device are adapted according to the security context, both at the network and device levels. ASPF describes how an autonomic security manager may control OS-level authorization mechanisms supporting multiple classes of policies. Evaluation of an ASPF implementation shows that the framework enables effective self-protection of pervasive systems. ASPF is also applicable for autonomic security management of other types of large-scale infrastructures such as cloud environments.
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems... more
— Current business-critical systems have stringent requirements for the significant and measurable increase in the end-to-end intelligence, security, scalability, self-adaptation and resilience. Existing state-of-the-art messaging systems achieve arbitrary resilience by a brute-force approach. Self-healing is either rudimentary or non-existent. In this study we present a self-healing and secure adaptive messaging middleware that provides solutions to overcome limitations in robustness, resilience, self-adaptability, scalability, and assurance against security threats and erroneous input during run-time in the face of changing threats. This developed system supports a messaging infrastructure which enables adaptive functions and assurance against security vulnerabilities and erroneous input vulnerabilities to improve the reliability, robustness and dependability of business-critical infrastructures. It provides autonomous adjustments of the run-time configuration of the system in ord...
People tend to believe they are more (less) likely to experience positive (negative) outcomes than similar others. While research has consistently shown that feeling unrealistically optimistic about future events influences the adoption... more
People tend to believe they are more (less) likely to experience positive (negative) outcomes than similar others. While research has consistently shown that feeling unrealistically optimistic about future events influences the adoption of self-protective behaviors, much less is known about the opposite relationship. We address this gap by examining whether and how self-protective behaviors influence unrealistic optimism in the context of the COVID-19 pandemic. Across two preregistered, high-powered experiments (N = 4,707), we document a generalized unrealistic optimism about the health risks associated with COVID-19. Critically, we show that prompting people to think about a precautionary behavior they often perform (i.e., mask wearing) magnifies this preexisting tendency. Egocentrism, but not self-enhancement and/or better-than-average effects, helps to explain the phenomenon. Theoretical contributions and substantive implications to health risk research and policy are discussed. Public Significance Statement This research shows that past self-protective behaviors (e.g., mask wearing) enhance people's propensity to feel unrealistically safer than similar others. This finding suggests that although encouraging precautionary measures is fundamental to boost self-protection, communication strategies should not just focus on the safety benefits of such measures, but also ask individuals to be wary of this potential unintended psychological consequence.
Das World Internet Project (WIP) ist ein internationales, kollaboratives Wissenschaftsprojekt, das seit 1999 die Verbreitung und Nutzung des Internet im internationalen Vergleich erfasst. Die Schweiz hat 2019 mit dem World Internet... more
Das World Internet Project (WIP) ist ein internationales, kollaboratives Wissenschaftsprojekt, das seit 1999 die Verbreitung und Nutzung des Internet im internationalen Vergleich erfasst. Die Schweiz hat 2019 mit dem World Internet Project – Switzerland (WIP-CH) zum fünften Mal eine repräsentative WIP-Befragung durchgeführt und die Schweizer Bevölkerung zu ihrer Internetnutzung und ihren Einstellungen zum Internet befragt. Im Rahmen des WIP-CH wurden seit 2011 mehr als 5'500 Interviews durchgeführt, deren Ergebnisse in vier Themenberichten ausgewiesen werden: Internetverbreitung und digitale Bruchlinien, Internet und Politik, Internetanwendungen und deren Nutzung sowie Vertrauen und Sorgen bei der Internetnutzung in der Schweiz. Der vorliegende Bericht liefert Ergebnisse zu Vertrauen und Sorgen bei der Internetnutzung in der Schweiz im Jahr 2019.