Anotacija. Straipsnyje yra analizuojamos aplinkos apsaugos politikos ištakos ir jos raida įvairiais Lietuvos istoriniais laikotarpiais. Darbe yra aptariamos PirmosiosLietuvos Respublikos aplinkos apsaugos politikos užuomazgos, diskutuojami įvairūs požiūriai ar tai buvo politikos pradžia, ar tik klasikinė aplinkosauga. Taip pat yra vertinamas sovietinio valdymo laikotarpis, kai buvo priimtas Gamtos apsaugos įstatymas, kuris pradėjo teisiškai reglamentuoti aplinkosaugą ir nustatė pirmus svarbiausius aplinkos apsaugos valdymo principus. Remiantis aplinkosaugos specialistų nuomone yra aptariami pirmieji atkurtos Lietuvos Respublikos nepriklausomybės metai, kai teisiškai buvo nustatyti svarbiausi aplinkos apsaugos valdymo politikos principai. Vėlesniais metais aplinkos apsaugos politika buvo formuojama ne tik teisės aktų pagalba, bet patvirtinus Valstybinę aplinkos apsaugos strategiją bei Nacionalinę aplinkos apsaugos strategiją. Šios strategijos suformavo svarbiausius Lietuvos aplinkos apsaugos politikos principus. Straipsnyje taip pat yra aptariama aplinkos apsaugos politikos samprata, pateikiami skirtingi į ją požiūriai.Raktažodžiai: aplinkos apsaugos politika, aplinkos valdymas, aplinkos apsauga, valdymo efektyvumas.
In this paper the selection of the right Cloud in Intercloud of computing services for fulfilment of the user task is analyzed. The main problem approached is how to select the right Cloud in Intercloud for the user task when there are no available or relevant resources in the private and public Cloud. In this case the Cloud, which gives the calculation results to the user in the shortest time including waiting time in queue, should be selected. For selection of the right Cloud the QoGS method has been chosen. The principle schema of QoGS method application in Intercloud has been presented. However, QoGS method works properly if the right set of weighted coefficients (SoWC) is selected. Existing methods are not suitable for selection of weighted coefficients because they require sending a lot of test tasks to Intercloud. Therefore, a new algorithm for selection of the best SoWC is presented. Results of the experiment show that it allows minimizing the workload of Intercloud by test tasks significantly.
Abstract:The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the artifacts left by the BitTorrent client. We proposed a methodology to locate the artifacts that indicate the BitTorrent client activity performed. Additionally, we designed and implemented a tool that searches for the evidence left by the BitTorrent client application in a local computer running Windows. The tool looks for the four files holding the evidence. The files are as follows: *.torrent, dht.dat, resume.dat, and settings.dat. The tool decodes the files, extracts important information for the forensic investigator and converts it into XML format. The results are combined into a single result file.
The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried out in the plain text only. Therefore, we proposed the methodology that enables to capture the initiation step and to inform the forensics investigator, which then takes the reactive actions. The experiment was carried in two modes: 1) simulating of the use of the BitTorrent Sync application; 2) monitoring of real traffic on the Internet. During the monitoring, it is possible to calculate the public lookup SHA1 hash of the shared file. The comparison of the calculated hash with the list of publicly available hashes allows determination whether sharing of the file is legal or illegal. The presented methodology can be applied to any BitTorrent protocol.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.