06549nam 2200625 a 450 991013316190332120120608025036.01-884733-25-5(CKB)3390000000045522(MH)009088220-2(SSID)ssj0000614859(PQKBManifestationID)12283092(PQKBTitleCode)TC0000614859(PQKBWorkID)10605276(PQKB)10833915(EXLCZ)99339000000004552220021106d2002 uy 0engtxtccrLegal and ethical lessons of NATO's Kosovo campaign /Andru E. Wall, editor[electronic resource]Newport, R.I. Naval War College20021 online resource (xxx, 571 p. )International law studies Legal and ethical lessons of NATO's Kosovo campaign International law studies ;v. 78"Proceedings from a scholarly colloquium entitled Legal and Ethical lessons of NATO's Kosovo Campaign, which was hosted here at the Naval War College on 8-10 August 2001."--Foreword.Includes bibliographical references and index.Part I: Keynote addresses. Opening remarks / Arthur Cebrowski -- Judging Kosovo: the legal process, the Law of armed conflict, and the Commander In Chief / James E. Baker -- Operation Allied Force from the perspective of the NATO Commander / Michael Short -- Discussion -- Part II: The applicability of the law of armed conflict. Introduction / Scott Silliman -- The applicability of International humanitarian law and the Law of neutrality to the Kosovo campaign / Christopher Greenwood -- Rules of conduct during humanitarian intervention / Ivan Shearer -- Application of the Law of armed conflict during Operation Allied Force: maritime interdiction and prisoner of war issues / George Walker -- Commentary / Judith A. Miller -- Commentary / Natalino Ronzitti -- Commentary / Richard Sorenson -- Discussion. The UN Security Council and the creation of International law ; The Law of neutrality under the UN Charter ; Peacekeepers or an occupying force? ; The legality of blockade or visit & search ; Applying the LOAC: a question of intent or act? ; Enforcement of the Laws of armed conflict and 20/20 hindsight ; Are the Laws of war a constraint? -- Part III: Targeting. Introduction / Robert F. Turner -- Legitimate military objectives under the current jus in bello / Yoram Dinstein -- Targeting / Michael Bothe -- Legal perspective from the EUCOM targeting cell / Tony Montgomery -- Commentary / Harvey Dalton -- Commentary / Wolff H. von Heinegg -- Commentary / Henry Shue -- Discussion. Reasonable military commanders and reasonable civilians ; Legal advisors and time-sensitive targets ; Coalition approval of targets ; When civilian objects become military objectives ; Relating the permissible mission to the military advantage ; "Dual-purpose" targets ; Targeting regime elites.Part IV: Collateral damage. Introduction / John Norton Moore -- Some legal (and a few ethical) dimensions of the collateral damage resulting from NATO's Kosovo campaign / John F. Murphy -- International humanitarian law after Kosovo: is Lex Lata sufficient? / Ove Bring -- Commentary / Yves Sandoz -- Commentary / W. Hays Parks -- Commentary / Barry Strauss -- Discussion. Modern technology: is there an obligation to use it? ; Human shields: can abuse of the Law of war be a force multiplier? ; Do we need an additional protocol for humanitarian intervention? ; Reciprocity in war and the Law of war ; Target priority and collateral damage ; "No body bags" war and the value of human lives ; Does Kosovo provide lessons for the future? ; Cluster bombs and long-term collateral damage ; The principle of proportionality ; Flying at 15,000 feet -- Part V: Coalition operations. Introduction / Nicholas Rostow -- Coalition warfare and differing legal obligations of coalition members under International humanitarian law / Torsten Stein -- To what extent is Protocol I customary international law? / Fausto Pocar -- Commentary / Rudolph Dolzer -- Commentary / Leslie C. Green -- Commentary / David Graham -- Discussion. Can a coalition member be held responsible for the actions of other members? ; The United States and Protocol I ; The status of Protocol I as customary international law ; Reprisals ; The Martens Clause and the margin of appreciation ; The relationship between Human rights law and the Law of armed conflict -- Part VI: The road ahead. Introduction / Joel Rosenthal -- The Laws of war after Kosovo / Adam Roberts -- Propositions on the Law of war after the Kosovo campaign / Ruth Wedgwood -- Commentary / Rein Müllerson -- Commentary / Horace B. Robertson, Jr. -- Commentary / Harvey Dalton -- Discussion. Does the US have a unilateralist approach to International law? ; Is there a right of humanitarian intervention?Humanitarian intervention: ethically right, although legally wrong? ; Is there a link between the jus ad bellum and the jus in bello? ; Critiquing the report to the prosecutor ; Applying the Law of armed conflict in the future -- Appendix A. Final report to the prosecutor by the Committee established to review the NATO bombing campaign against the Federal Republic of Yugoslavia -- Appendix B. Contributors.Kosovo War, 1998-1999Law and legislationKosovo War, 1998-1999Law and legislationInternational LawHILCCLaw, Politics & GovernmentHILCCInternational Law - GeneralHILCCTreaties, InternationalHILCCElectronic booksKosovo War, 1998-1999Law and legislation.Kosovo War, 1998-1999Law and legislationInternational LawLaw, Politics & GovernmentInternational Law - GeneralTreaties, International341 s949.703Wall Andru E.1968-1234548DLCDLCMH-LBOOK9910133161903321Legal and ethical lessons of NATO's Kosovo campaign2867791UNINAThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress08697nam 22008535 450 99646627970331620230406034238.03-642-05118-910.1007/978-3-642-05118-0(CKB)1000000000804458(SSID)ssj0000355631(PQKBManifestationID)11256498(PQKBTitleCode)TC0000355631(PQKBWorkID)10340826(PQKB)11757425(DE-He213)978-3-642-05118-0(MiAaPQ)EBC3064764(PPN)139962379(EXLCZ)99100000000080445820100301d2009 u| 0engurnn|008mamaatxtccrStabilization, Safety, and Security of Distributed Systems[electronic resource] 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings /edited by Rachid Guerraoui, Franck Petit1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (XVIII, 801 p.) Theoretical Computer Science and General Issues,2512-2029 ;5873International conference proceedings.3-642-05117-0 Includes bibliographical references and index.Invited Talks -- Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE -- Local Algorithms: Self-stabilization on Speed -- As Good as It Gets: Competitive Fault Tolerance in Network Structures -- Regular Papers -- Multicore Constraint-Based Automated Stabilization -- A Theory of Network Tracing -- Developing Autonomic and Secure Virtual Organisations with Chemical Programming -- Making Population Protocols Self-stabilizing -- Analysis of Wireless Sensor Network Protocols in Dynamic Scenarios -- Consensus When All Processes May Be Byzantine for Some Time -- A Superstabilizing log(n)-Approximation Algorithm for Dynamic Steiner Trees -- Looking for the Weakest Failure Detector for k-Set Agreement in Message-Passing Systems: Is the End of the Road? -- Optimal Byzantine Resilient Convergence in Asynchronous Robots Networks -- FoG: Fighting the Achilles’ Heel of Gossip Protocols with Fountain Codes -- How to Improve Snap-Stabilizing Point-to-Point Communication Space Complexity? -- Fault-Containment in Weakly-Stabilizing Systems -- Stability of Distributed Algorithms in the Face of Incessant Faults -- Dependability Engineering of Silent Self-stabilizing Systems -- Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective -- Efficient Robust Storage Using Secret Tokens -- An Optimal Self-stabilizing Firing Squad -- Anonymous Transactions in Computer Networks -- Nash Equilibria in Stabilizing Systems -- ACCADA: A Framework for Continuous Context-Aware Deployment and Adaptation -- A Self-stabilizing Approximation Algorithm for Vertex Cover in Anonymous Networks -- Separation of Circulating Tokens -- Visiting Gafni’s Reduction Land: From the BG Simulation to the Extended BG Simulation -- Randomized Gathering of Mobile Robots with Local-Multiplicity Detection -- Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat -- CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks -- Cached Sensornet Transformation of Non-silent Self-stabilizing Algorithms with Unreliable Links -- Analysis of an Intentional Fault Which Is Undetectable by Local Checks under an Unfair Scheduler -- Exploring Polygonal Environments by Simple Robots with Faulty Combinatorial Vision -- Finding Good Partners in Availability-Aware P2P Networks -- Churn-Resilient Replication Strategy for Peer-to-Peer Distributed Hash-Tables -- Distributed Power Control with Multiple Agents in a Distributed Base Station Scheme Using Macrodiversity -- Redundancy Maintenance and Garbage Collection Strategies in Peer-to-Peer Storage Systems -- Model Checking Coalition Nash Equilibria in MAD Distributed Systems -- OpenMP Support for NBTI-Induced Aging Tolerance in MPSoCs -- A Self-stabilizing Algorithm for Graph Searching in Trees -- A Metastability-Free Multi-synchronous Communication Scheme for SoCs -- From Local Impact Functions to Global Adaptation of Service Compositions -- A Wireless Security Framework without Shared Secrets -- Read-Write-Codes: An Erasure Resilient Encoding System for Flexible Reading and Writing in Storage Networks -- Distributed Sleep Scheduling in Wireless Sensor Networks via Fractional Domatic Partitioning -- Network-Friendly Gossiping -- Black Hole Search with Tokens in Interconnected Networks -- Oracle-Based Flocking of Mobile Robots in Crash-Recovery Model -- Speculation for Parallelizing Runtime Checks -- Optimistic Fair Exchange Using Trusted Devices -- Application Data Consistency Checking for Anomaly Based Intrusion Detection -- Self Adaptive High Interaction Honeypots Driven by Game Theory -- Cooperative Autonomic Management in Dynamic Distributed Systems -- Brief Announcements -- Brief Announcement: Consistent Fixed Points and Negative Gain -- Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems -- Safer Than Safe: On the Initial State of Self-stabilizing Systems -- Brief Announcement: Unique Permutation Hashing -- Randomization Adaptive Self-stabilization -- Brief Announcement: On the Time Complexity of Distributed Topological Self-stabilization -- Brief Announcement: An OS Architecture for Device Self-protection -- Brief Announcement: Towards Secure Cloud Computing -- Brief Announcement: Robust Self-stabilizing Construction of Bounded Size Weight-Based Clusters -- Brief Announcement: A Stabilizing Algorithm for Finding Two Disjoint Paths in Arbitrary Networks -- Relocation Analysis of Stabilizing MAC -- Brief Announcement: A Simple and Quiescent Omega Algorithm in the Crash-Recovery Model -- Brief Announcement: How to Overcome the Limits of Bounds -- Brief Announcement: The Design and Evaluation of a Distributed Reliable File System.This book constitutes the refereed proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2009, held in Lyon, France, in November 2009. The 49 revised full papers and 14 brief announcements presented together with three invited talks were carefully reviewed and selected from 126 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The special topics were alternative systems and models, autonomic computational science, cloud computing, embedded systems, fault-tolerance in distributed systems / dependability, formal methods in distributed systems, grid computing, mobility and dynamic networks, multicore computing, peer-to-peer systems, self-organizing systems, sensor networks, stabilization, and system safety and security.Theoretical Computer Science and General Issues,2512-2029 ;5873Computer networksUser interfaces (Computer systems)Human-computer interactionComputers, Special purposeComputer scienceAlgorithmsData protectionComputer Communication NetworksUser Interfaces and Human Computer InteractionSpecial Purpose and Application-Based SystemsTheory of ComputationAlgorithmsData and Information SecurityComputer networks.User interfaces (Computer systems).Human-computer interaction.Computers, Special purpose.Computer science.Algorithms.Data protection.Computer Communication Networks.User Interfaces and Human Computer Interaction.Special Purpose and Application-Based Systems.Theory of Computation.Algorithms.Data and Information Security.004n/a004sdnbDAT 250fstubDAT 461fstubSS 4800rvkGuerraoui Rachidedthttp://id.loc.gov/vocabulary/relators/edtPetit Franckedthttp://id.loc.gov/vocabulary/relators/edtSSS 2009BOOK996466279703316Stabilization, Safety, and Security of Distributed Systems772094UNISA01115nam0 22002891i 450 UON0027425820231205103808.5320060310d1942 |0itac50 bafreFR|||| |||||ˆLa ‰crique du françaispar Daphné Du Mauriertraduit de l'anglais par Berthe VullieminGeneveJeheber ; ParisJ'ai Lu1942446 p.17 cm.001UON002741832001 J'ai Lutexte integral210 ParisJ'ai Lu.FRParisUONL002984CHGenèveUONL003003843NARRATIVA FRANCESE21DU MAURIERDaphnéUONV159031193242J'ai LuUONV252797650JeheberUONV271472650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00274258SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI Francese 24 J'AI DU-MAU SI SFR1387 7 Crique du français1243426UNIOR