Orality in Medieval Irish Narrative: An Overview
78 pages
English

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris

Orality in Medieval Irish Narrative: An Overview

-

Découvre YouScribe en t'inscrivant gratuitement

Je m'inscris
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
78 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Description

  • mémoire - matière potentielle : the reciter
  • exposé
  • cours - matière potentielle : uninfl
  • expression écrite
Oral Tradition 1/2 (1986): 272-301 Orality in Medieval Irish Narrative: An Overview Joseph Falaky Nagy Celtic scholars do not doubt that there was an active oral narrative tradition functioning in pre-Christian and medieval Christian Irish society. Until recently, tradition-bearers with amazingly large story-repertoires could be found among Gaelic-speaking peasants and fi shermen in Ireland and Scotland. These creative oral artists, often neglected and no longer listened to in their own time, bore vivid testimony to a long-lived and rich Gaelic tradition of stories and narrative techniques—a tradition that is often referred to in the extant corpus of medieval Irish
  • tale airec menman uraird maic coisse
  • passages
  • generation to generation
  • generation upon generation
  • generation after generation
  • generation by generation
  • material
  • oral tradition
  • tale
  • literary tradition

Sujets

Informations

Publié par
Nombre de lectures 11
Langue English

Extrait

Privacy in
Communica-
tions and
Databases Privacy in Communications and Databases
George
Danezis (A Technology Tutorial)
Introduction
to Tra c
Analysis
George Danezis
Anonymous
Communica-
tions
K.U. Leuven, ESAT/COSIC,
Privacy in
Kasteelpark Arenberg 10,
Storage
B-3001 Leuven-Heverlee, Belgium.
Privacy in
George.Danezis@esat.kuleuven.be
Databases
Computers, Freedom and Privacy (CFP 2007).
Montreal, May 1st, 2007.
George Danezis Privacy in Communications and DatabasesOutline
Privacy in
Communica-
tions and
Databases
George
Danezis
Three (and a bit) part tutorial:
Introduction
Tra c Analysis: focus on unprotected systems.to Tra c
Analysis
Anonymous Communications: defences against tra c
Anonymous
Communica- analysis.
tions
Privacy in (Privacy in Storage)
Storage
Privacy in Databases: sharing data ‘safely’.
Privacy in
Databases
George Danezis Privacy in Communications and DatabasesWhat is Tra c Analysis?
Privacy in
Communica-
tions and De nition: Tra c Analysis
Databases
George Making use of (merely) the tra c data of aDanezis
communication to extract information.
Introduction
to Tra c As opposed to ‘interception’ or ‘cryptanalysis’.
Analysis
Anonymous
Communica-
tions What are tra c data?
Privacy in
Storage
Identities or call signs of communicating parties.
Privacy in
Databases Time, duration or length of transmissions.
Location of emitter or receiver.
No content { it may be encrypted.
George Danezis Privacy in Communications and DatabasesWhy care?
Privacy in
Communica- The controversy
tions and
Databases
George \Tra c analysis, not cryptanalysis, is the backbone of
Danezis
communications intelligence."
Introduction
Di e & Landau statement { ‘Privacy on the line’to Tra c
Analysis
(David Kahn: I simply disagree, content is king.)
Anonymous
Communica- Could this become true on the Internet? Is it already?tions
Privacy in
Storage
PrivacyPrivacy in
Databases
Tra c analysis, data mining, association mining: allow to
pierce or bypass the protection o ered by encryption or
other security technologies.
George Danezis Privacy in Communications and DatabasesMilitary Sigint and information warfare (I)
Privacy in
Communica-
tions and Military Importance
Databases
George
Danezis \These non-textual techniques can establish targets’
locations, order-of-battle and movement.
Introduction
to Tra c
Even when messages are not being deciphered, tra cAnalysis
Anonymous analysis of the target’s C3I system and its patterns of
Communica-
behavior provides indications of his intentions and statestions
Privacy in of mind"
Storage
UK Joint Intelligence Committee Chair, Herman
Privacy in
Databases
Key points: no need for cryptanalysis, hierachy of sources
according to availability / quality.
RF Direction Finding! Tra c analysis! cryptanalysis.
George Danezis Privacy in Communications and DatabasesMilitary Sigint and information warfare (II)
Privacy in
Communica- Information warfare
tions and
Databases
‘Just a bomb in the computer room? { No!’ { Di eGeorge
Danezis 3Modern C I relies on fast communications (small circle).
Introduction
to Tra c Attacks try to exploit the need to communicate fast and
Analysis
e ciently .
Anonymous
Communica- Tra c Analysis resistance is very expensive.
tions
Privacy in
Storage
3Other C I settingsPrivacy in
Databases
Diplomatic: line encryptors, not IP.
Civilian: Police communications, eet management, supply
chain.
George Danezis Privacy in Communications and DatabasesThe military world { Attack
Privacy in ExamplesCommunica-
tions and
Databases
WWI: Tapping the earth returns of telegraph lines.
George
Danezis
Naval and air operations: observing wireless
Introduction communications. Radio silence. Morse ‘hand’.
to Tra c
Analysis Reconstruction of network structure of the German Air
Anonymous Force radio in 1941 by the British.Communica-
tions
Identi cation of radio equipment (also possible for GSMs).
Privacy in
Storage
Privacy in
The value of tra c analysisDatabases
(Lower quality information)
Easier, cheaper to extract and process.
Often used to perform ‘target selection’.
George Danezis Privacy in Communications and Databases
Note the importance of jamming communications!The military world { Defence
Privacy in
Communica- Low probability of intercept and direction nding
tions and
Databases
Principle: make the adversary spend time or energyGeorge
Danezis
(power) to detect and jam.
Introduction Frequency hopping { modulate frequencies according toto Tra c
Analysis keys. Di cult to jam!
Anonymous
Communica- Spread spectrum { transform signal to high band low
tions
power. Di cult to detect (under the noise o or).
Privacy in
Storage Burst communications { meteor scatter.
Privacy in
Databases Most important: clear security policies, doctrine,
training, liveware. ..
Civilian uses: GSM (hopping), ADSL (SS)
Key Reference: Ross Anderson, Security Engineering.
George Danezis Privacy in Communications and DatabasesAnd then came (not just) the Internet
Privacy in
Communica- Di erent environment { (not so) di erent players.
tions and
Databases
George Not so hostile { commercial use, personal use,
Danezis
government, (critical infrastructure?), (military?)
Introduction
A confederation of networks, (jurisdictions and securityto Tra c
Analysis domains.)
Anonymous
Communica- Di erent transport technologies: cable, wireless, satelite,
tions
ATM, ethernet, .. .
Privacy in
Storage Common routing protocols { they expose tra c data.
Privacy in
Databases New technologies: wireless, overlay networks, convergence
with telephony { more opportunities for collecting tra c
data, RFID.
Threats rapidly escalate { attack scripts!
George Danezis Privacy in Communications and DatabasesInternet Security
We won the crypto wars!
Privacy in
Encryption is on!Communica-
tions and
Databases
Internet and NG Telephony: use security protocols.
George
Danezis
Tra c analysis only option (but also facilitated).
Introduction
to Tra c
Analysis
Case studies
Anonymous
Communica-
tions SSH: Password extraction and identi cation.
Privacy in
Storage SSL/TLS: I know what you are browsing (I).
Privacy in Cache Cookies: I know what you are browsing (II).Databases
Hardware Identi cation.
NAT Counting.
Detecting Stepping Stones.
George Danezis Privacy in Communications and Databases

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents