首页 > 最新文献

Journal of World-Systems Research最新文献

英文 中文
[Problem] Cerberus: Minimalistic Multi-shard Byzantine-resilient Transaction Processing [问题]Cerberus:极简的多分片拜占庭弹性事务处理
Q3 SOCIOLOGY Pub Date : 2023-02-01 DOI: 10.5070/sr33161314
Jelle Hellings, Daniel P. Hugues, Joshua Primero, Mohammad Sadoghi
To enable scalable resilient blockchain systems, several powerful general-purpose approaches toward sharding such systems have been demonstrated. Unfortunately, these approaches all come with substantial costs for ordering andexecution of multi-shard transactions.In this work, we ask whether one can achieve significantcost reductions for processing multi-shard transactions by limiting the type of workloads supported. To initiate the study of this problem, we propose CERBERUS, a family of minimalistic primitives for processing single-shard and multi-shard UTXO-like transactions. The first CERBERUS variant we propose is core-CERBERUS (CCERBERUS). CCERBERUS uses strict UTXO-based environmental requirements to enable powerful multi-shard transaction processing with an absolute minimum amount of coordination between shards. In the environment we designed CCERBERUS for, CCERBERUS will operate perfectly with respect to all transactions proposed and approved by well-behaved clients, but does not provide any other guarantees.To illustrate that CCERBERUS -like protocols can also be of use in environments with faulty clients, we also demonstrate two generalizations of CCERBERUS, optimistic-CERBERUS and resilient-CERBERUS, that make different tradeoffs in complexity and costs when dealing with faulty behavior and attacks. Finally, we compare these three protocols and show their potential scalability and performance benefits over state-of-the-art general-purpose systems. These results underline the importance of the study of specialized approaches toward sharding in resilient systems.
为了实现可扩展的弹性区块链系统,已经展示了几种强大的通用方法来对此类系统进行分片。不幸的是,这些方法在排序和执行多分片事务时都需要付出巨大的成本。在这项工作中,我们询问是否可以通过限制支持的工作负载类型来显著降低处理多分片事务的成本。为了开始对这个问题的研究,我们提出了CERBERUS,这是一个用于处理单分片和多分片utxo类事务的极简原语家族。我们提出的第一个CERBERUS变体是core-CERBERUS (CCERBERUS)。CCERBERUS使用严格的基于utxo的环境要求,以绝对最小的分片之间的协调来实现强大的多分片事务处理。在我们设计CCERBERUS的环境中,CCERBERUS将完美地运行所有由行为良好的客户提出和批准的交易,但不提供任何其他保证。为了说明类似CCERBERUS的协议也可以在客户端有故障的环境中使用,我们还展示了CCERBERUS的两种概括,乐观- cerberus和弹性- cerberus,它们在处理错误行为和攻击时在复杂性和成本方面做出了不同的权衡。最后,我们比较了这三种协议,并展示了它们相对于最先进的通用系统的潜在可伸缩性和性能优势。这些结果强调了研究弹性系统中分片的专门方法的重要性。
{"title":"[Problem] Cerberus: Minimalistic Multi-shard Byzantine-resilient Transaction Processing","authors":"Jelle Hellings, Daniel P. Hugues, Joshua Primero, Mohammad Sadoghi","doi":"10.5070/sr33161314","DOIUrl":"https://doi.org/10.5070/sr33161314","url":null,"abstract":"To enable scalable resilient blockchain systems, several powerful general-purpose approaches toward sharding such systems have been demonstrated. Unfortunately, these approaches all come with substantial costs for ordering andexecution of multi-shard transactions.In this work, we ask whether one can achieve significantcost reductions for processing multi-shard transactions by limiting the type of workloads supported. To initiate the study of this problem, we propose CERBERUS, a family of minimalistic primitives for processing single-shard and multi-shard UTXO-like transactions. The first CERBERUS variant we propose is core-CERBERUS (CCERBERUS). CCERBERUS uses strict UTXO-based environmental requirements to enable powerful multi-shard transaction processing with an absolute minimum amount of coordination between shards. In the environment we designed CCERBERUS for, CCERBERUS will operate perfectly with respect to all transactions proposed and approved by well-behaved clients, but does not provide any other guarantees.To illustrate that CCERBERUS -like protocols can also be of use in environments with faulty clients, we also demonstrate two generalizations of CCERBERUS, optimistic-CERBERUS and resilient-CERBERUS, that make different tradeoffs in complexity and costs when dealing with faulty behavior and attacks. Finally, we compare these three protocols and show their potential scalability and performance benefits over state-of-the-art general-purpose systems. These results underline the importance of the study of specialized approaches toward sharding in resilient systems.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135146446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Tool] Automatically Extracting Hardware Descriptions from PDF Technical Documentation [工具]自动从PDF技术文档中提取硬件描述
Q3 SOCIOLOGY Pub Date : 2023-02-01 DOI: 10.5070/sr33162446
Niklas Hauser, Jan Pennekamp
{"title":"[Tool] Automatically Extracting Hardware Descriptions from PDF Technical Documentation","authors":"Niklas Hauser, Jan Pennekamp","doi":"10.5070/sr33162446","DOIUrl":"https://doi.org/10.5070/sr33162446","url":null,"abstract":"","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135201593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Solution] Algorithmic Heap Layout Manipulation in the Linux Kernel [解决方案]Linux内核中的算法堆布局操作
IF 1.1 Q3 SOCIOLOGY Pub Date : 2023-02-01 DOI: 10.5070/sr33160040
Max Jens Ufer, Daniel Baier
To evaluate the severity of a security vulnerability a security researcher usually tries to prove its exploitability by writing an actual exploit. In the case of buffer overflows on the heap, a necessary part of this is manipulating the heap layout in a way that creates an exploitable state, usually by placing a vulnerable object adjacent to a target object. This requires manual effort and extensive knowledge of the target. With a target as complex as the Linux kernel, this problem becomes highly non-trivial. At the current time, there has been little research in terms of employing algorithmic solutions for this. In this work, we present Kernel-SIEVE, a framework for evaluating heap layout manipulation algorithms that target the SLAB/SLUB allocator in the Linux kernel. Inspired by previous work that targets user-space allocators [34–36] it provides an interface for triggering allocations/deallocations in the kernel and contains a feedback loop that returns the resulting distance of two target objects. With this, we create the (to our knowledge) first performance benchmarks for heap layout manipulation algorithms in the Linux kernel. We present and evaluate two algorithms: A pseudo-random search, whose performance serves as a baseline, and KEvoHeap, a genetic algorithm based on Heelan’s EvoHeap [34,36]. We show that KEvoHeap is successful at creating the desired heap layout in all test cases and also surpasses the user-space performance benchmarks of EvoHeap. Finally, we discuss the challenges of applying these kinds of algorithms in real-world scenarios and weigh different possible approaches to tackle the problems that arise. Our research results are publicly available on GitHub [18].
为了评估安全漏洞的严重性,安全研究人员通常试图通过编写实际的漏洞来证明其可利用性。在堆上缓冲区溢出的情况下,其中一个必要部分是以一种创建可利用状态的方式操纵堆布局,通常是通过将易受攻击的对象放置在目标对象附近。这需要手工工作和对目标的广泛了解。对于像Linux内核这样复杂的目标,这个问题变得非常重要。目前,在使用算法解决这一问题方面的研究很少。在这项工作中,我们提出了kernel - sieve,这是一个框架,用于评估针对Linux内核中的SLAB/SLUB分配器的堆布局操作算法。受先前针对用户空间分配器的工作的启发[34-36],它提供了一个在内核中触发分配/释放的接口,并包含一个返回两个目标对象的最终距离的反馈循环。据此,我们创建了(据我们所知)Linux内核中堆布局操作算法的第一个性能基准。我们提出并评估了两种算法:伪随机搜索,其性能作为基准;KEvoHeap,一种基于Heelan的EvoHeap的遗传算法[34,36]。我们表明,在所有测试用例中,KEvoHeap都成功地创建了所需的堆布局,并且还超过了EvoHeap的用户空间性能基准。最后,我们讨论了在现实场景中应用这些算法所面临的挑战,并权衡了解决这些问题的不同可能方法。我们的研究成果在GitHub上是公开的[18]。
{"title":"[Solution] Algorithmic Heap Layout Manipulation in the Linux Kernel","authors":"Max Jens Ufer, Daniel Baier","doi":"10.5070/sr33160040","DOIUrl":"https://doi.org/10.5070/sr33160040","url":null,"abstract":"To evaluate the severity of a security vulnerability a security researcher usually tries to prove its exploitability by writing an actual exploit. In the case of buffer overflows on the heap, a necessary part of this is manipulating the heap layout in a way that creates an exploitable state, usually by placing a vulnerable object adjacent to a target object. This requires manual effort and extensive knowledge of the target. With a target as complex as the Linux kernel, this problem becomes highly non-trivial. At the current time, there has been little research in terms of employing algorithmic solutions for this. In this work, we present Kernel-SIEVE, a framework for evaluating heap layout manipulation algorithms that target the SLAB/SLUB allocator in the Linux kernel. Inspired by previous work that targets user-space allocators [34–36] it provides an interface for triggering allocations/deallocations in the kernel and contains a feedback loop that returns the resulting distance of two target objects. With this, we create the (to our knowledge) first performance benchmarks for heap layout manipulation algorithms in the Linux kernel. We present and evaluate two algorithms: A pseudo-random search, whose performance serves as a baseline, and KEvoHeap, a genetic algorithm based on Heelan’s EvoHeap [34,36]. We show that KEvoHeap is successful at creating the desired heap layout in all test cases and also surpasses the user-space performance benchmarks of EvoHeap. Finally, we discuss the challenges of applying these kinds of algorithms in real-world scenarios and weigh different possible approaches to tackle the problems that arise. Our research results are publicly available on GitHub [18].","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"172 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74925438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[SoK] Evaluations in Industrial Intrusion Detection Research [j]工业入侵检测评价研究
Q3 SOCIOLOGY Pub Date : 2023-02-01 DOI: 10.5070/sr33162445
Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze
Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.
工业系统日益受到网络攻击的威胁,可能带来灾难性后果。为了对抗这种攻击,工业入侵检测系统努力及时发现即使是最复杂的入侵。由于其对社会的重要性,这一快速发展的领域吸引了来自不同背景的研究人员,仅在2021年就产生了130种新的检测方法。这种巨大的势头促进了对各种有希望的途径的探索,但同样也有可能使研究前景支离破碎,掩埋有希望的进展。因此,它需要可靠和可理解的评估来减轻这种风险,并催化努力实现具有现实适用性的可持续科学进步。因此,本文系统地分析了该领域的评估方法,以了解工业入侵检测的研究现状。我们对609份出版物的分析表明,这一研究领域的快速增长既有积极的影响,也有消极的影响。虽然我们观察到公共数据集的使用越来越多,但出版物平均只评估1.3个数据集,而且经常使用的基准指标是模糊的。与此同时,新开发的基准度量标准的采用进展甚微。最后,我们的系统分析使我们能够为所有参与者提供可操作的建议,从而推动整个研究领域向前发展。
{"title":"[SoK] Evaluations in Industrial Intrusion Detection Research","authors":"Olav Lamberts, Konrad Wolsing, Eric Wagner, Jan Pennekamp, Jan Bauer, Klaus Wehrle, Martin Henze","doi":"10.5070/sr33162445","DOIUrl":"https://doi.org/10.5070/sr33162445","url":null,"abstract":"Industrial systems are increasingly threatened by cyberattacks with potentially disastrous consequences. To counter such attacks, industrial intrusion detection systems strive to timely uncover even the most sophisticated breaches. Due to its criticality for society, this fast-growing field attracts researchers from diverse backgrounds, resulting in 130 new detection approaches in 2021 alone. This huge momentum facilitates the exploration of diverse promising paths but likewise risks fragmenting the research landscape and burying promising progress. Consequently, it needs sound and comprehensible evaluations to mitigate this risk and catalyze efforts into sustainable scientific progress with real-world applicability. In this paper, we therefore systematically analyze the evaluation methodologies of this field to understand the current state of industrial intrusion detection research. Our analysis of 609 publications shows that the rapid growth of this research field has positive and negative consequences. While we observe an increased use of public datasets, publications still only evaluate 1.3 datasets on average, and frequently used benchmarking metrics are ambiguous. At the same time, the adoption of newly developed benchmarking metrics sees little advancement. Finally, our systematic analysis enables us to provide actionable recommendations for all actors involved and thus bring the entire research field forward.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135201592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Solution] Byzantine Cluster-Sending in Expected Constant Cost and Constant Time [解决方案]拜占庭集群发送在预期恒定成本和恒定时间
IF 1.1 Q3 SOCIOLOGY Pub Date : 2023-02-01 DOI: 10.5070/sr33161345
Jelle Hellings, Mohammad Sadoghi
{"title":"[Solution] Byzantine Cluster-Sending in Expected Constant Cost and Constant Time","authors":"Jelle Hellings, Mohammad Sadoghi","doi":"10.5070/sr33161345","DOIUrl":"https://doi.org/10.5070/sr33161345","url":null,"abstract":"","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":"25 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79945727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maroon Movements Against Empire 黑人反帝国运动
IF 1.1 Q3 SOCIOLOGY Pub Date : 2022-08-25 DOI: 10.5195/jwsr.2022.1108
C. Eddins
Marronnage, or escape from slavery, was a longue-durée form of resistance to slavery in Haiti and was also, as Sylvia Wynter argues, a “dialectical response to the capitalist plantation system”—a system that aimed to deny humanity, sever social and cultural ties, and commodified people and their labor power. This article, as well as works by others such as Cedric Robinson (1983), Sylvia Wynter (n.d.), and Jean Casimir (2020), argues that marronnage was a fundamentally anti-capitalist mode of resistance, socio-political critique, and grassroots mobilizing. In the immediate moments when enslaved people fled plantations, they reclaimed possession of themselves and other tangible and intangible resources, such as their time, social relationships, forms of knowledge, and labor skills that enslavers stole from them. When maroons re-appropriated resources and mobilized themselves, they challenged and subverted colonial plantation structures, contributing to the downfall of both Spanish and French imperial slaveries in Haiti. During and after the Haitian Revolution of 1791–1804, Africa-born rebels and maroons were central to the mobilizing structures that successfully fought to abolish slavery and overturn colonialism—representing an astounding rupture to the prevailing Atlantic world-system that was dependent upon enslaved labor. Even after the post-independence Haitian government replicated aspects of the colonial administration, as Casimir (2020) points out, the formerly enslaved masses of Haiti organized themselves into communal social arrangements that prioritized subsistence labor and extended kin networks, and continued to rely on marronnage to protest exploitative economic practices. This article explores the trajectory of marronnage in Haiti as a continuous struggle, emphasizing the ways that it exposed the violence, exploitation, and oppression inherently embedded in the Atlantic world-system, and exposed the limits of the governing Haitian states.
Marronnage,即逃离奴隶制,是海地长期反抗奴隶制的一种形式,正如西尔维娅·温特所说,也是“对资本主义种植园制度的辩证回应”——这种制度旨在否认人性,切断社会和文化联系,并将人民及其劳动力商品化。本文以及塞德里克·罗宾逊(Cedric Robinson, 1983)、西尔维娅·温特(Sylvia Wynter,未出版日期)和让·卡西米尔(Jean Casimir, 2020)等人的著作认为,marronage从根本上来说是一种反资本主义的抵抗、社会政治批判和基层动员模式。在被奴役的人逃离种植园的瞬间,他们重新拥有了自己和其他有形和无形的资源,比如他们的时间、社会关系、知识形式和奴隶从他们那里偷走的劳动技能。当黑人重新占用资源并动员起来时,他们挑战和颠覆了殖民种植园结构,促成了西班牙和法国帝国在海地的奴隶制的垮台。在1791年至1804年的海地革命期间和之后,非洲出生的反叛者和逃亡者是成功废除奴隶制和推翻殖民主义的动员结构的核心,这代表了对依赖奴役劳工的主流大西洋世界体系的惊人突破。正如卡西米尔(Casimir, 2020)所指出的那样,即使在独立后的海地政府复制了殖民政府的各个方面,海地以前被奴役的群众也将自己组织成公共社会安排,优先考虑维持生计的劳动和扩大亲属网络,并继续依靠婚姻来抗议剥削性的经济实践。这篇文章探讨了海地婚姻作为一场持续斗争的轨迹,强调了它暴露了大西洋世界体系中固有的暴力、剥削和压迫的方式,并暴露了海地国家执政的局限性。
{"title":"Maroon Movements Against Empire","authors":"C. Eddins","doi":"10.5195/jwsr.2022.1108","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1108","url":null,"abstract":"Marronnage, or escape from slavery, was a longue-durée form of resistance to slavery in Haiti and was also, as Sylvia Wynter argues, a “dialectical response to the capitalist plantation system”—a system that aimed to deny humanity, sever social and cultural ties, and commodified people and their labor power. This article, as well as works by others such as Cedric Robinson (1983), Sylvia Wynter (n.d.), and Jean Casimir (2020), argues that marronnage was a fundamentally anti-capitalist mode of resistance, socio-political critique, and grassroots mobilizing. In the immediate moments when enslaved people fled plantations, they reclaimed possession of themselves and other tangible and intangible resources, such as their time, social relationships, forms of knowledge, and labor skills that enslavers stole from them. When maroons re-appropriated resources and mobilized themselves, they challenged and subverted colonial plantation structures, contributing to the downfall of both Spanish and French imperial slaveries in Haiti. During and after the Haitian Revolution of 1791–1804, Africa-born rebels and maroons were central to the mobilizing structures that successfully fought to abolish slavery and overturn colonialism—representing an astounding rupture to the prevailing Atlantic world-system that was dependent upon enslaved labor. Even after the post-independence Haitian government replicated aspects of the colonial administration, as Casimir (2020) points out, the formerly enslaved masses of Haiti organized themselves into communal social arrangements that prioritized subsistence labor and extended kin networks, and continued to rely on marronnage to protest exploitative economic practices. This article explores the trajectory of marronnage in Haiti as a continuous struggle, emphasizing the ways that it exposed the violence, exploitation, and oppression inherently embedded in the Atlantic world-system, and exposed the limits of the governing Haitian states.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46652713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review Of: Oil Crisis in Iran 伊朗石油危机回顾
IF 1.1 Q3 SOCIOLOGY Pub Date : 2022-08-25 DOI: 10.5195/jwsr.2022.1144
V. Moghadam
{"title":"Review Of: Oil Crisis in Iran","authors":"V. Moghadam","doi":"10.5195/jwsr.2022.1144","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1144","url":null,"abstract":"","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42528718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theories of Antifascism in the Interwar Mediterranean Part I 地中海战争时期的反法西斯主义理论(上)
IF 1.1 Q3 SOCIOLOGY Pub Date : 2022-08-25 DOI: 10.5195/jwsr.2022.1105
Kristin Plys
The current proliferation of authoritarianism across both core and periphery is one political articulation of the current crisis of the capitalist world-system. Authoritarianism similarly proliferated in previous periods of crisis, in the 1970s and 80s in the peripheries, and in the 1930s and 40s in the core. In Part I of this essay, I detail how world-systems analysts have long been attuned to describing and analyzing chaotic moments in between systemic cycles of hegemony, but less attention has been given to the rise of authoritarianism in these chaotic phases. The multiple crises of hegemonic transition engenders an ideological contestation between Fascism and Communism revealing the limitations of Liberalism, the foundational ideology of the world-system. In such periods of hegemonic breakdown, anarchists developed autonomous strategies of resisting authoritarian rule at both the point of production (the worker-occupied and self-managed workplace) and at the point of leisure (the autonomous zone of the infoshop or café as resources and interventions in the joint struggle against capitalism and authoritarianism. These theories are important to recover for the contemporary fight against a resurgent authoritarianism across the world-system in the current conjuncture.
当前威权主义在核心和外围的扩散是当前资本主义世界体系危机的一个政治表述。威权主义在前几次危机时期、20世纪70年代和80年代的外围以及30年代和40年代的核心也同样激增。在本文的第一部分中,我详细介绍了世界系统分析师长期以来如何习惯于描述和分析霸权系统周期之间的混乱时刻,但很少关注威权主义在这些混乱阶段的兴起。霸权主义转型的多重危机引发了法西斯主义与共产主义的意识形态之争,揭示了世界体系的基础意识形态自由主义的局限性。在这样的霸权崩溃时期,无政府主义者制定了在生产点(工人占据和自我管理的工作场所)和休闲点抵制独裁统治的自主策略(信息商店或咖啡馆的自治区作为反对资本主义和威权主义的联合斗争的资源和干预措施。这些理论对于在当前形势下恢复当代世界体系中反对死灰复燃的威权主义很重要。)。
{"title":"Theories of Antifascism in the Interwar Mediterranean Part I","authors":"Kristin Plys","doi":"10.5195/jwsr.2022.1105","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1105","url":null,"abstract":"The current proliferation of authoritarianism across both core and periphery is one political articulation of the current crisis of the capitalist world-system. Authoritarianism similarly proliferated in previous periods of crisis, in the 1970s and 80s in the peripheries, and in the 1930s and 40s in the core. In Part I of this essay, I detail how world-systems analysts have long been attuned to describing and analyzing chaotic moments in between systemic cycles of hegemony, but less attention has been given to the rise of authoritarianism in these chaotic phases. The multiple crises of hegemonic transition engenders an ideological contestation between Fascism and Communism revealing the limitations of Liberalism, the foundational ideology of the world-system. In such periods of hegemonic breakdown, anarchists developed autonomous strategies of resisting authoritarian rule at both the point of production (the worker-occupied and self-managed workplace) and at the point of leisure (the autonomous zone of the infoshop or café as resources and interventions in the joint struggle against capitalism and authoritarianism. These theories are important to recover for the contemporary fight against a resurgent authoritarianism across the world-system in the current conjuncture.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44636794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ins and Outs of Autonomy 自治的来龙去脉
IF 1.1 Q3 SOCIOLOGY Pub Date : 2022-08-25 DOI: 10.5195/jwsr.2022.1096
Ryan A. Knight
Drawing from processes of autonomous community organization in Mexico, this paper will interrogate and rethink the borders and boundaries of autonomy. Rather than articulating autonomy as some fully separated space with clearly delineated borders, this paper will show how struggles for autonomy in Mexico are constantly navigating their insides and outsides, organizing and inhabiting the border or boundary space. With this, we can begin to re-conceptualize autonomy without state-like borders as something in constant movement. In the same way, we can begin to take seriously the complexities and intricacies of autonomous struggles as they play out in practice.
本文将从墨西哥自治社区组织的过程中,对自治的边界和界限进行审问和反思。本文将展示墨西哥争取自治的斗争是如何不断地在内部和外部进行,组织和居住在边界或边界空间中的,而不是将自治表述为一个具有明确边界的完全分离的空间。有了这一点,我们可以开始将没有国家般边界的自治重新概念化为不断运动的东西。同样,我们可以开始认真对待自主斗争在实践中的复杂性和复杂性。
{"title":"Ins and Outs of Autonomy","authors":"Ryan A. Knight","doi":"10.5195/jwsr.2022.1096","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1096","url":null,"abstract":"Drawing from processes of autonomous community organization in Mexico, this paper will interrogate and rethink the borders and boundaries of autonomy. Rather than articulating autonomy as some fully separated space with clearly delineated borders, this paper will show how struggles for autonomy in Mexico are constantly navigating their insides and outsides, organizing and inhabiting the border or boundary space. With this, we can begin to re-conceptualize autonomy without state-like borders as something in constant movement. In the same way, we can begin to take seriously the complexities and intricacies of autonomous struggles as they play out in practice.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44408448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue 特刊简介
IF 1.1 Q3 SOCIOLOGY Pub Date : 2022-08-25 DOI: 10.5195/jwsr.2022.1142
Spencer Louis Potiker
Editor's introduction to the special issue on non-state movements and spaces.
编者对非国家运动和空间特刊的介绍。
{"title":"Introduction to the Special Issue","authors":"Spencer Louis Potiker","doi":"10.5195/jwsr.2022.1142","DOIUrl":"https://doi.org/10.5195/jwsr.2022.1142","url":null,"abstract":"Editor's introduction to the special issue on non-state movements and spaces.","PeriodicalId":36882,"journal":{"name":"Journal of World-Systems Research","volume":" ","pages":""},"PeriodicalIF":1.1,"publicationDate":"2022-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42949887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of World-Systems Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1