The Security Dimension of GMES: Network of Excellence GMOSS: A European Think Tank for EO Technologies in Support of Security Issues
MetadataShow full item record
The European research landscape has evolved in the 7th framework programme (FWP) to reflect new challenges to human security both at the European and global levels. Today, European security research is designed to address societal demands in the face of these new security challenges, and to enhance the competitiveness of European security industry. The Global Monitoring and Environment and Security (GMES) initiative has particularly evolved in the 7th FWP to reflect the increasing importance space technology can play in developing solutions to address the requirements of several European Union (EU) policies with a global dimension such as border monitoring and crisis management. Research though is still an essential element in the European security research programme. GMOSS is a network of excellence that has developed into a European think-tank focusing on research on earth observation (EO) technologies for security. The greatest achievement of GMOSS has been to bring together fragmented civil security research from around Europe, to build the foundation for a security research community focusing on EO technologies for civil security applications.
Showing items related by title, author, creator and subject.
Representative Litigation in Italian Capital Markets: Italian Derivative Suits and (if ever) Securities Class Actions Giudici, P (De Gruyter, 2009)In this article I investigate representative litigation in the Italian company law and financial law context. In Section I, I will analyze derivative actions, which were introduced in 1998 and which can be considered up ...
Pinna A (2015)Extant literature on the pricing of pledgeable securities focuses on models of risk sharing. I derive the equilibrium price function in rational expectations when investors have heterogeneous information. That allows me ...
Silaghi, M; Friedrich, G; Yokoo, M; Zanker, M (AAAI, 2006)The algorithms we propose here are simple but our contribution consists in identifying the simple guidelines required for a high level of privacy. Achieving the highest level of privacy for secrets used in a distributed ...