| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910133161903321 |
|
|
Titolo |
Legal and ethical lessons of NATO's Kosovo campaign / / Andru E. Wall, editor [[electronic resource]] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Newport, R.I., : Naval War College, 2002 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxx, 571 p. ) |
|
|
|
|
|
|
Collana |
|
International law studies Legal and ethical lessons of NATO's Kosovo campaign |
International law studies ; ; v. 78 |
|
|
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Kosovo War, 1998-1999 - Law and legislation |
International Law |
Law, Politics & Government |
International Law - General |
Treaties, International |
Electronic books |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Proceedings from a scholarly colloquium entitled Legal and Ethical lessons of NATO's Kosovo Campaign, which was hosted here at the Naval War College on 8-10 August 2001."--Foreword. |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Part I: Keynote addresses. Opening remarks / Arthur Cebrowski -- Judging Kosovo: the legal process, the Law of armed conflict, and the Commander In Chief / James E. Baker -- Operation Allied Force from the perspective of the NATO Commander / Michael Short -- Discussion -- Part II: The applicability of the law of armed conflict. Introduction / Scott Silliman -- The applicability of International humanitarian law and the Law of neutrality to the Kosovo campaign / Christopher Greenwood -- Rules of conduct during humanitarian intervention / Ivan Shearer -- Application of the Law of armed conflict during Operation Allied Force: maritime interdiction and prisoner of war issues / George Walker -- Commentary / Judith A. Miller -- Commentary / Natalino Ronzitti -- Commentary / Richard Sorenson -- Discussion. The UN Security Council and the creation of International law ; The Law of neutrality |
|
|
|
|
|
|
|
|
|
|
under the UN Charter ; Peacekeepers or an occupying force? ; The legality of blockade or visit & search ; Applying the LOAC: a question of intent or act? ; Enforcement of the Laws of armed conflict and 20/20 hindsight ; Are the Laws of war a constraint? -- Part III: Targeting. Introduction / Robert F. Turner -- Legitimate military objectives under the current jus in bello / Yoram Dinstein -- Targeting / Michael Bothe -- Legal perspective from the EUCOM targeting cell / Tony Montgomery -- Commentary / Harvey Dalton -- Commentary / Wolff H. von Heinegg -- Commentary / Henry Shue -- Discussion. Reasonable military commanders and reasonable civilians ; Legal advisors and time-sensitive targets ; Coalition approval of targets ; When civilian objects become military objectives ; Relating the permissible mission to the military advantage ; "Dual-purpose" targets ; Targeting regime elites. |
Part IV: Collateral damage. Introduction / John Norton Moore -- Some legal (and a few ethical) dimensions of the collateral damage resulting from NATO's Kosovo campaign / John F. Murphy -- International humanitarian law after Kosovo: is Lex Lata sufficient? / Ove Bring -- Commentary / Yves Sandoz -- Commentary / W. Hays Parks -- Commentary / Barry Strauss -- Discussion. Modern technology: is there an obligation to use it? ; Human shields: can abuse of the Law of war be a force multiplier? ; Do we need an additional protocol for humanitarian intervention? ; Reciprocity in war and the Law of war ; Target priority and collateral damage ; "No body bags" war and the value of human lives ; Does Kosovo provide lessons for the future? ; Cluster bombs and long-term collateral damage ; The principle of proportionality ; Flying at 15,000 feet -- Part V: Coalition operations. Introduction / Nicholas Rostow -- Coalition warfare and differing legal obligations of coalition members under International humanitarian law / Torsten Stein -- To what extent is Protocol I customary international law? / Fausto Pocar -- Commentary / Rudolph Dolzer -- Commentary / Leslie C. Green -- Commentary / David Graham -- Discussion. Can a coalition member be held responsible for the actions of other members? ; The United States and Protocol I ; The status of Protocol I as customary international law ; Reprisals ; The Martens Clause and the margin of appreciation ; The relationship between Human rights law and the Law of armed conflict -- Part VI: The road ahead. Introduction / Joel Rosenthal -- The Laws of war after Kosovo / Adam Roberts -- Propositions on the Law of war after the Kosovo campaign / Ruth Wedgwood -- Commentary / Rein Müllerson -- Commentary / Horace B. Robertson, Jr. -- Commentary / Harvey Dalton -- Discussion. Does the US have a unilateralist approach to International law? ; Is there a right of humanitarian intervention? |
Humanitarian intervention: ethically right, although legally wrong? ; Is there a link between the jus ad bellum and the jus in bello? ; Critiquing the report to the prosecutor ; Applying the Law of armed conflict in the future -- Appendix A. Final report to the prosecutor by the Committee established to review the NATO bombing campaign against the Federal Republic of Yugoslavia -- Appendix B. Contributors. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996466279703316 |
|
|
Titolo |
Stabilization, Safety, and Security of Distributed Systems [[electronic resource] ] : 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings / / edited by Rachid Guerraoui, Franck Petit |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2009.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 801 p.) |
|
|
|
|
|
|
Collana |
|
Theoretical Computer Science and General Issues, , 2512-2029 ; ; 5873 |
|
|
|
|
|
|
Classificazione |
|
004 |
DAT 250f |
DAT 461f |
SS 4800 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
User interfaces (Computer systems) |
Human-computer interaction |
Computers, Special purpose |
Computer science |
Algorithms |
Data protection |
Computer Communication Networks |
User Interfaces and Human Computer Interaction |
Special Purpose and Application-Based Systems |
Theory of Computation |
Data and Information Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
International conference proceedings. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Invited Talks -- Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE -- Local Algorithms: Self-stabilization on Speed -- As Good as It Gets: Competitive Fault Tolerance in Network Structures -- Regular Papers -- Multicore Constraint-Based Automated Stabilization -- A Theory of Network Tracing -- Developing Autonomic |
|
|
|
|
|
|
|
|
|
and Secure Virtual Organisations with Chemical Programming -- Making Population Protocols Self-stabilizing -- Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios -- Consensus When All Processes May Be Byzantine for Some Time -- A Superstabilizing log(n)-Approximation Algorithm for Dynamic Steiner Trees -- Looking for the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems: Is the End of the Road? -- Optimal Byzantine Resilient Convergence in Asynchronous Robots Networks -- FoG: Fighting the Achilles’ Heel of Gossip Protocols with Fountain Codes -- How to Improve Snap-Stabilizing Point-to-Point Communication Space Complexity? -- Fault-Containment in Weakly-Stabilizing Systems -- Stability of Distributed Algorithms in the Face of Incessant Faults -- Dependability Engineering of Silent Self-stabilizing Systems -- Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective -- Efficient Robust Storage Using Secret Tokens -- An Optimal Self-stabilizing Firing Squad -- Anonymous Transactions in Computer Networks -- Nash Equilibria in Stabilizing Systems -- ACCADA: A Framework for Continuous Context-Aware Deployment and Adaptation -- A Self-stabilizing Approximation Algorithm for Vertex Cover in Anonymous Networks -- Separation of Circulating Tokens -- Visiting Gafni’s Reduction Land: From the BG Simulation to the Extended BG Simulation -- Randomized Gathering of Mobile Robots with Local-Multiplicity Detection -- Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat -- CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks -- Cached Sensornet Transformation of Non-silent Self-stabilizing Algorithms with Unreliable Links -- Analysis of an Intentional Fault Which Is Undetectable by Local Checks under an Unfair Scheduler -- Exploring Polygonal Environments by Simple Robots with Faulty Combinatorial Vision -- Finding Good Partners in Availability-Aware P2P Networks -- Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables -- Distributed Power Control with Multiple Agents in a Distributed Base Station Scheme Using Macrodiversity -- Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage Systems -- Model Checking Coalition Nash Equilibria in MAD Distributed Systems -- OpenMP Support for NBTI-Induced Aging Tolerance in MPSoCs -- A Self-stabilizing Algorithm for Graph Searching in Trees -- A Metastability-Free Multi-synchronous Communication Scheme for SoCs -- From Local Impact Functions to Global Adaptation of Service Compositions -- A Wireless Security Framework without Shared Secrets -- Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks -- Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning -- Network-Friendly Gossiping -- Black Hole Search with Tokens in Interconnected Networks -- Oracle-Based Flocking of Mobile Robots in Crash-Recovery Model -- Speculation for Parallelizing Runtime Checks -- Optimistic Fair Exchange Using Trusted Devices -- Application Data Consistency Checking for Anomaly Based Intrusion Detection -- Self Adaptive High Interaction Honeypots Driven by Game Theory -- Cooperative Autonomic Management in Dynamic Distributed Systems -- Brief Announcements -- Brief Announcement: Consistent Fixed Points and Negative Gain -- Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems -- Safer Than Safe: On the Initial State of Self-stabilizing Systems -- Brief Announcement: Unique Permutation Hashing -- Randomization Adaptive Self-stabilization -- Brief Announcement: On the Time Complexity of Distributed Topological Self-stabilization -- Brief |
|
|
|
|
|
|
|
|
|
Announcement: An OS Architecture for Device Self-protection -- Brief Announcement: Towards Secure Cloud Computing -- Brief Announcement: Robust Self-stabilizing Construction of Bounded Size Weight-Based Clusters -- Brief Announcement: A Stabilizing Algorithm for Finding Two Disjoint Paths in Arbitrary Networks -- Relocation Analysis of Stabilizing MAC -- Brief Announcement: A Simple and Quiescent Omega Algorithm in the Crash-Recovery Model -- Brief Announcement: How to Overcome the Limits of Bounds -- Brief Announcement: The Design and Evaluation of a Distributed Reliable File System. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009, held in Lyon, France, in November 2009. The 49 revised full papers and 14 brief announcements presented together with three invited talks were carefully reviewed and selected from 126 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The special topics were alternative systems and models, autonomic computational science, cloud computing, embedded systems, fault-tolerance in distributed systems / dependability, formal methods in distributed systems, grid computing, mobility and dynamic networks, multicore computing, peer-to-peer systems, self-organizing systems, sensor networks, stabilization, and system safety and security. |
|
|
|
|
|
|
|
| |