WorldCat Identities

Henry, Ryan

Works: 18 works in 30 publications in 1 language and 660 library holdings
Roles: Author, Editor, Other
Classifications: JZ5588, 327
Publication Timeline
Most widely held works by Ryan Henry
The information revolution and international security( Book )

2 editions published in 1998 in English and held by 225 WorldCat member libraries worldwide

This companion volume to The Information Revolution and National Security (CSIS, 1996) brings together a diverse set of thinkers from the policy analysis, military, government, and academic communities to consider the implications of the information revolution for international security. The discussion includes military affairs, but also considers the global social, economic, and political changes occurring because of the information revolution and their potential effects on the international security environment - for example, the impact of global information networks on national economies and of new information technologies on diplomacy and governance. This provocative, informed exploration is written for policymakers, legislators, and others seeking an overview of key global security issues accompanying this technology revolution
Promoting international energy security by Stuart E Johnson( Book )

in English and held by 85 WorldCat member libraries worldwide

"The Gulf of Guinea is an important source of petroleum for the world market, with Nigeria being the dominant producer in this region. Nigeria's oil infrastructure has been subject to frequent attacks, causing production to be well below capacity. Moreover, investments in oil-producing infrastructure are lower than they would be in a secure environment. Oil production has been moving offshore in Nigeria. This trend is likely to continue, based on recent finds in Ghana's waters and off-shore exploratory activity in nearby nations. It is in the interests of the United States, as well as other oil importing nations, to encourage greater production and investment that would raise petroleum output in Nigeria and in the other Gulf of Guinea nations with crude oil reserves. While offshore fields have their own security issues, they are more visible from the air, yielding a potentially powerful role for aviation forces. This provides an opportunity for the U.S. Air Force to contribute to improved regional energy security through partnerships that would build local capabilities to secure offshore infrastructure. Nigeria is the most obvious partner and, despite challenges, has good reason to partner with the United States because the majority of the country's wealth lies in its hydrocarbon sector. But other alternatives are possible, such as working first with other nations in the region, such as Ghana, where governance is considerably better. The U.S. Air Force could then draw on lessons learned from such partnerships and best practices to partner with other countries in the region."--Provided by publisher
Portfolio assessment of the Department of State internet freedom program by Ryan Henry( Book )

2 editions published in 2014 in English and held by 78 WorldCat member libraries worldwide

The struggle between those promoting Internet freedom and those trying to control and monitor the Internet is a fast-paced game of cat and mouse, and the DRL Internet freedom program seeks to fund projects that promote preserving the open character of the Internet. Employing portfolio analysis techniques, the authors assessed DRL's Internet freedom portfolio for fiscal year 2012-2013. The assessment showed good alignment between the State Department's strategy and the cumulative effect of the 18 funded projects. Additionally, the portfolio was assessed to be well balanced with an unrealized potential for supporting emergent State Department needs in enlarging political space within authoritarian regimes. The assessment revealed that the investment in developing Internet freedom capacity and capabilities would likely have residual value beyond the portfolio's funded lifespan, with positive, but indirect, connections to civic freedom. Moreover, promoting Internet freedom appears to be a cost-imposing strategy that simultaneously aligns well with both U.S. values and interests, pressuring authoritarian rivals to either accept a free and open Internet or devote additional security resources to control or repress Internet activities. Finally, the authors determined that the value of such analysis is best realized over multiple stages of the portfolio's lifecycle. Among the authors' recommendations were for DRL to enhance the synergy within the portfolio and among its grantees and to maintain a relatively balanced Internet freedom strategy that includes projects working on access, anonymity, awareness, and advocacy
Defense Resource Planning Under Uncertainty : An Application of Robust Decision Making to Munitions Mix Planning by Robert J Lempert( Book )

1 edition published in 2016 in English and held by 52 WorldCat member libraries worldwide

"Today's defense resource planners face unprecedented uncertainty. The planning processes currently used to determine what forces and capabilities will be needed to address future threats to our national security and interests may be vulnerable to predictive failure. To manage these risks, a new approach to planning is needed to identify strategies that perform well over a wide range of threat and funding futures and thus are better able to manage surprise. This report describes how robust decision making (RDM) may help address this need. RDM, a quantitative decision support methodology for informing decisions under conditions of deep uncertainty and complexity, has been applied to many policy areas in the last decade. This document provides a proof of concept application of RDM to defense planning, focusing on the air-launched munitions mix challenge. The study embeds a fast-running "weapons on targets" allocation model within a "scenario generator" that explores many thousands of plausible, future twenty-year series of military campaigns. The RDM analysis uses these simulation models to stress-test alternative munitions mix strategies against many plausible futures. The analysis then identifies a robust munitions mix strategy, which interestingly depends not only on the desired portfolio of alternative weapons types but also on the rules used to replenish depleted weapons stocks after each campaign. The study also suggests how RDM might best be integrated into current Department of Defense planning processes and some of the challenges that might be involved"--Publisher's description
The information revolution and international security( Book )

6 editions published in 1998 in English and held by 18 WorldCat member libraries worldwide

Promoting international energy security : sea-lanes to asia by Ryan Henry( Book )

6 editions published in 2012 in English and held by 8 WorldCat member libraries worldwide

Despite their growing importance in transporting vital energy resources, Asia's sea-lanes are already under stress and vulnerable, not only to geopolitical concerns but also the threat of piracy. Although the U.S. Navy has traditionally guaranteed freedom of the seas in Asia, a growing mission set and shrinking force structure challenge this role. RAND explored two alternative approaches to sea-lane security: joint and multinational. A joint approach would involve not only the U.S. Navy but also the U.S. Air Force and other relevant elements of the U.S. government (such as the Coast Guard and Department of State). A multinational approach could enhance partner capacity and promote burden sharing; improve the effectiveness and efficiency of unilateral and bilateral efforts; and better accommodate the emergence of new powers in the region, improving regional stability through confidence building. While the direct benefits of greater Air Force engagement in improving energy sea-lane security would likely be marginal, the spillover benefits of joint operations with the Navy and multinational engagement could make greater Air Force involvement worthwhile
Nymbler : privacy-enhanced protection from abuses of anonymity by Ryan Henry( Book )

1 edition published in 2010 in English and held by 3 WorldCat member libraries worldwide

Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet--such as websites, IRC networks and mail servers--allow anonymous access while protecting themselves against abuse by misbehaving anonymous users? Recent research efforts have focused on using anonymous blacklisting systems (also known as anonymous revocation systems) to solve this problem. As opposed to revocable anonymity systems, which enable some trusted third party to deanonymize users, anonymous blacklisting systems provide a way for users to authenticate anonymously with a service provider, while enabling the service provider to revoke access from individual misbehaving anonymous users without revealing their identities. The literature contains several anonymous blacklisting systems, many of which are impractical for real-world deployment. In 2006, however, Tsang et al. proposed Nymble, which solves the anonymous blacklisting problem very efficiently using trusted third parties. Nymble has inspired a number of subsequent anonymous blacklisting systems. Some of these use fundamentally different approaches to accomplish what Nymble does without using third parties at all; so far, these proposals have all suffered from serious performance and scalability problems. Other systems build on the Nymble framework to reduce Nymble's trust assumptions while maintaining its highly efficient design. The primary contribution of this thesis is a new anonymous blacklisting system built on the Nymble framework--a nimbler version of Nymble--called Nymbler. We propose several enhancements to the Nymble framework that facilitate the construction of a scheme that minimizes trust in third parties. We then propose a new set of security and privacy properties that anonymous blacklisting systems should possess to protect: 1) users' privacy against malicious service providers and third parties (including other malicious users), and 2) service providers against abuse by malicious users
Efficient zero-knowledge proofs and applications by Ryan Henry( Book )

1 edition published in 2014 in English and held by 3 WorldCat member libraries worldwide

Zero-knowledge proofs provide a means for a prover to convince a verifier that some claim is true and nothing more. The ability to prove statements while conveying zero information beyond their veracity has profound implications for cryptography and, especially, for its applicability to privacy-enhancing technologies. Unfortunately, the most common zero-knowledge techniques in the literature suffer from poor scalability, which limits their usefulness in many otherwise promising applications. This dissertation addresses the problem of designing communication- and computation-efficient protocols for zero-knowledge proofs and arguments of propositions that comprise many "simple" predicates. In particular, we propose a new formal model in which to analyze batch zero-knowledge protocols and perform the first systematic study of systems for batch zero-knowledge proofs and arguments of knowledge. In the course of this study, we suggest a general construction for batch zero-knowledge proof systems and use it to realize several new protocols suitable for proving knowledge of and relationships among large batches of discrete logarithm (DL) representations in prime-order groups. Our new protocols improve on existing protocols in several ways; for example, among the new protocols is one with lower asymptotic computation cost than any other such system in the literature. We also tackle the problem of constructing batch proofs of partial knowledge, proposing new protocols to prove knowledge of a DL that is equal to at least k-out-of-n other DLs, at most k-out-of-n other DLs, or exactly k-out-of-n other DLs. These constructions are particularly interesting as they prove some propositions that appear difficult to prove using existing techniques, even when efficiency is not a primary consideration. We illustrate the applicability of our new techniques by using them to construct efficient protocols for anonymous blacklisting and reputation systems
Thrasher magazine presents: how to build skateboard ramps( Book )

1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide

Whether you're building a new ramp, adding on to an existing ramp, or replacing an old ramp, everything you need to know is in here. Packed with 76 pages of color photographs and detailed illustrations that make ramp construction safe and easy
Transforming the U. S. Global Defense Posture by Ryan Henry( )

1 edition published in 2006 in English and held by 1 WorldCat member library worldwide

Scrapbook by Viterbo University( )

1 edition published in 2004 in English and held by 1 WorldCat member library worldwide

Sea-Lanes to Asia( Book )

1 edition published in 2012 in English and held by 1 WorldCat member library worldwide

Assessing "Byte City" : an insightful or misleading vision? by Ryan Henry( )

1 edition published in 1997 in English and held by 1 WorldCat member library worldwide

The military we need : the defense requirements of the Bush doctrine by Thomas Donnelly( )

1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide

Choices for America in a turbulent world by James Dobbins( )

1 edition published in 2015 in English and held by 0 WorldCat member libraries worldwide

"This book is the first of a series in which RAND will explore the elements of a national strategy for the conduct of U.S. foreign policy in a fast-changing world. Here, we lay out the major choices facing the next American administration both globally and in three critical regions. The initial chapters lay out alternatives for managing the world economy and the national defense, countering international terrorism, handling conflict in the cyber domain, and dealing with climate change. Subsequent chapters examine in more detail the choices to be faced in Europe, the Middle East, and East Asia. The final section proposes broad strategic guidelines that can inform and guide these choices"--Provided by publisher
Promoting International Energy Security. Volume 3, Sea-Lanes to Asia by Ryan Henry( )

1 edition published in 2012 in English and held by 0 WorldCat member libraries worldwide

Defense Transformation and the 2005 Quadrennial Defense Review( )

1 edition published in 2005 in English and held by 0 WorldCat member libraries worldwide

At the end of the Cold War, America entered a new and unfamiliar global security environment. As the Department of Defense began to alter strategies and plans, it quickly became apparent that changes might have to be made across the defense establishment. This led in 1993 to the Bottom-Up Review, and, starting in 1997, to the Quadrennial Defense Review (QDR) process. As the Department of Defense enters its third QDR this year, it is important to understand how central the QDR has become to the work of the department and how different this QDR is, compared to its predecessors. With a yearly budget in excess of $400 billion, the Department of Defense is perhaps the largest single bureaucracy in the world. Sheer size, as well as vested interests and old ways of thinking, tend to give large bureaucracies an inertial resistance to change. One of the tasks in the department this year is to ensure that the QDR can instead be an engine of continued transformation. The need to transform the U.S. military has elevated the role of the QDR from a tool of periodic refinement to a fulcrum of transition to a post-9/11 world. This article will explore what the QDR has become, how it is being processed, and what the Defense Department hopes it will achieve
Promoting international energy security( )

in English and held by 0 WorldCat member libraries worldwide

moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.52 (from 0.03 for Thrasher m ... to 1.00 for Promoting ...)

The information revolution and international securityThe information revolution and international security
English (30)

The information revolution and international securityThrasher magazine presents: how to build skateboard rampsThe military we need : the defense requirements of the Bush doctrine