Verification , Compliance , and Enforcement

نویسنده

  • Patricia Lewis
چکیده

The Adelphi Paper Abolishing Nuclear Weapons will play an important part in the whole nuclear disarmament initiative that was kicked off in 2007 by a combination of the Hoover Institution and Nuclear Threat Initiative's " Reykjavik Revisited " project; the Kissinger–Nunn–Perry–Shultz op-ed articles in the Wall Street Journal; Margaret Beckett's keynote address at have woven a strong fabric of possibility for the eventual elimination of nuclear weapons without glossing over the difficult problems that have yet to be solved. The key aspect of this paper is that it doesn't try to solve all of the problems. The paper instead addresses some of the most controversial issues pertaining to global nuclear disarmament and lays the foundation for building a stable structure for future global security. Not least of these issues are verification, compliance, and enforce-ment—the Golden or Bermuda Triangle of issues, depending on your perspective. This commentary will focus on them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Code Enforcement and Compliance Evaluation: Comparative Lessons Learned from the U.S. and China, and Opportunities for India

Building energy codes are one of the most cost-effective tools to achieve energy efficiency in buildings. The key to realizing their full benefits is strong enforcement and compliance. Studies have shown that robust enforcement and a high compliance rate are critical to improve the energy performance of buildings and unlock deeper energy savings. However, few countries have mechanisms for measu...

متن کامل

SeaFlows - a compliance checking framework for supporting the process lifecycle

Compliance-awareness is undoubtedly of utmost importance for companies nowadays. Even though an automated approach to compliance checking and enforcement has been advocated in recent literature as a means to tame the high costs for compliance-awareness, the potential of automated mechanisms for supporting business process compliance is not yet depleted. Business process compliance deals with th...

متن کامل

Verifying Compliance of Trusted Programs

In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe operations despite have the authority to perform unsafe operations; for example, initialization programs, administrative programs, root network daemons, etc. Currently, these programs are trusted without concrete justi...

متن کامل

Strategies and Design Principles for Compliance and Enforcement

Compliance and enforcement activities are essential to effective implementation of environmental legislation. Despite, or perhaps because of, the decades of experience government agencies have had in designing and deploying a wide range of compliance and enforcement techniques, there exists no unified theory of environmental compliance and enforcement. Instead, a variety of theories and program...

متن کامل

Enforcement and over-compliance

Economists generally view environmental enforcement as a tool to secure compliance with regulations. This paper demonstrates that credible enforcement significantly increases statutory over-compliance with regulations as well. We find that many plants with discharges typically below legally permitted levels reduce discharges further when regulators issue fines, even on other plants. Also, non-c...

متن کامل

Privacy Enforcement and Accountability with Semantics (peas2007) Iswc 2007 Sponsor Workshop Motivation and Goal beyond Secrecy: New Privacy Protection Strategies for the World Wide Web Semantic-driven Enforcement of Rights Delegation Policies via the Combination of Rules and Ontologies

We show that the semantic formal model for Open Digital Right Language (ODRL)-based rights delegation policies can be enforced and expressed as a combination of ontologies and rules, e.g., Semantic Web Rule Language (SWRL). Based on ODRL’s expressions and data dictionary, a rights delegation ontology is proposed in this study. Furthermore, we express the rights delegation policy as a set of ont...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010