993 resultados para confidential information


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Basic information theory is used to analyse the amount of confidential information which may be leaked by programs written in a very simple imperative language. In particular, a detailed analysis is given of the possible leakage due to equality tests and if statements. The analysis is presented as a set of syntax-directed inference rules and can readily be automated.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The paper investigates which of Shannon’s measures (entropy, conditional entropy, mutual information) is the right one for the task of quantifying information flow in a programming language. We examine earlier relevant contributions from Denning, McLean and Gray and we propose and motivate a specific quantitative definition of information flow. We prove results relating equivalence relations, interference of program variables, independence of random variables and the flow of confidential information. Finally, we show how, in our setting, Shannon’s Perfect Secrecy theorem provides a sufficient condition to determine whether a program leaks confidential information.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

We consider a cloud data storage involving three entities, the cloud customer, the cloud business centre which provides services, and the cloud data storage centre. Data stored in the data storage centre comes from a variety of customers and some of these customers may compete with each other in the market place or may own data which comprises confidential information about their own clients. Cloud staff have access to data in the data storage centre which could be used to steal identities or to compromise cloud customers. In this paper, we provide an efficient method of data storage which prevents staff from accessing data which can be abused as described above. We also suggest a method of securing access to data which requires more than one staff member to access it at any given time. This ensures that, in case of a dispute, a staff member always has a witness to the fact that she accessed data.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"Know How" protection varies enormously from country to country and is a complex equation of legal, political, cultural and economic factors. A contrast between Japan and Australia serves to highlight some of these factors. For the purposes of this article, a working definition of "know how" is required. In Australia and other common law systems, no statutory definition of "know how" exists, "confidential information" proving the closest comparative term in Australia ('trade secret law' in the United States).

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Intellectual Property - group of rights used to protect literary, artistic and industrial property. Generally separated into the categories of: • Copyright • Trade marks • Designs • Patents But also extends to specific subject matter of plant variety rights and circuit layouts and general information that is confidential such as trade secrets and protection of goodwill and reputation through the action of passing off. New information, be it a new computer program or novel device, developed by an organisation is valuable to it. So too is the organisation name and reputation. While some protection is automatic, like copyright, other protection and rights must be obtained under various legislation. When dealing with employees and third parties, ownership of existing and new rights needs to be clearly established so that rights are not lost. Obligations in relation to the use of certain property and any confidential information must also be clearly established...

Relevância:

60.00% 60.00%

Publicador:

Resumo:

"LexisNexis Questions and Answers: Equity and Trusts provides students with a clear and systematic approach to successfully analysing and answering assessment questions on equity and trusts. Each chapter commences with a discussion of key principles and issues including a summary of relevant leading cases and legislation for effective revision. Examples of written questions with fact scenarios follow, each with a suggested answer plan, sample answer and comments on how the answer might be viewed by an examiner. Readers are provided with advice on common errors to avoid when answering questions and practical hints and tips on how to achieve higher marks. Features • Summary of key issues helps students revise key areas before attempting problem questions • Sample questions with model answers assist students with effective exam study preparation"--publisher website

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Despite the realisation of the potential implications from biosimilars is relatively recent, much has already been written about raising the awareness of differences between biosimilars and originating/ reference listed (innovator) pharmaceuticals. The European Medicines Agency has led the global charge in regulating biosimilars. Regardless of sufficient similarities across international regulations, differences do exist across jurisdictions. The consideration of regulating biosimilars demands a congruent approach across all stages: pre-registration (Australian copyright protection, patent, international obligations), registration (confidential information, international regulators, safety and efficacy), post-registration (Pharmaceutical Benefit Scheme, prescriber and dispenser awareness). Our National Medicines Policy could provide the necessary congruent framework and function for national and international regulation of biosimilars. The Policy concedes that pharmaceuticals will be affected by financial policies and trade considerations, international treaty obligations, industrial policies, education policies and the need for public-private partnerships.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Australia currently has a small generic and biosimilar industry despite having a good track record in biomedical research and a sound reputation in producing high quality but small volume biological pharmaceuticals. In recent times, Australia has made incremental changes to its regulation of biosimilars – in patent registration, in the use of commercial confidential information, and in remuneration. These improvements, together with Australia’s geographical proximity and strong trade relationship with the Asian biocluster have positioned Australia to take advantage of potential public cost savings from the increased use of biosimilars.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Taking an interdisciplinary approach unmatched by any other book on this topic, this thoughtful Handbook considers the international struggle to provide for proper and just protection of Indigenous intellectual property (IP). In light of the United Nations Declaration on the Rights of Indigenous Peoples 2007, expert contributors assess the legal and policy controversies over Indigenous knowledge in the fields of international law, copyright law, trademark law, patent law, trade secrets law, and cultural heritage. The overarching discussion examines national developments in Indigenous IP in the United States, Canada, South Africa, the European Union, Australia, New Zealand, and Indonesia. The Handbook provides a comprehensive overview of the historical origins of conflict over Indigenous knowledge, and examines new challenges to Indigenous IP from emerging developments in information technology, biotechnology, and climate change. Practitioners and scholars in the field of IP will learn a great deal from this Handbook about the issues and challenges that surround just protection of a variety of forms of IP for Indigenous communities. Preface The Legacy of David Unaipon Matthew Rimmer Introduction: Mapping Indigenous Intellectual Property Matthew Rimmer PART I INTERNATIONAL LAW 1. The United Nations Declaration on the Rights of Indigenous Peoples: A Human Rights Framework for Indigenous Intellectual Property Mauro Barelli 2. The WTO, The TRIPS Agreement and Traditional Knowledge Tania Voon 3. The World Intellectual Property Organization and Traditional Knowledge Sara Bannerman 4. The World Indigenous Network: Rio+20, Intellectual Property, Indigenous Knowledge, and Sustainable Development Matthew Rimmer PART II COPYRIGHT LAW AND RELATED RIGHTS 5. Government Man, Government Painting? David Malangi and the 1966 One-Dollar Note Stephen Gray 6. What Wandjuk Wanted Martin Hardie 7. Avatar Dreaming: Indigenous Cultural Protocols and Making Films Using Indigenous Content Terri Janke 8. The Australian Resale Royalty for Visual Artists: Indigenous Art and Social Justice Robert Dearn and Matthew Rimmer PART III TRADE MARK LAW AND RELATED RIGHTS 9. Indigenous Cultural Expression and Registered Designs Maree Sainsbury 10. The Indian Arts and Crafts Act: The Limits of Trademark Analogies Rebecca Tushnet 11. Protection of Traditional Cultural Expressions within the New Zealand Intellectual Property Framework: A Case Study of the Ka Mate Haka Sarah Rosanowski 12 Geographical Indications and Indigenous Intellectual Property William van Caenegem PART IV PATENT LAW AND RELATED RIGHTS 13. Pressuring ‘Suspect Orthodoxy’: Traditional Knowledge and the Patent System Chidi Oguamanam, 14. The Nagoya Protocol: Unfinished Business Remains Unfinished Achmad Gusman Siswandi 15. Legislating on Biopiracy in Europe: Too Little, too Late? Angela Daly 16. Intellectual Property, Indigenous Knowledge, and Climate Change Matthew Rimmer PART V PRIVACY LAW AND IDENTITY RIGHTS 17. Confidential Information and Anthropology: Indigenous Knowledge and the Digital Economy Sarah Holcombe 18. Indigenous Cultural Heritage in Australia: The Control of Living Heritages Judith Bannister 19. Dignity, Trust and Identity: Private Spheres and Indigenous Intellectual Property Bruce Baer Arnold 20. Racial Discrimination Laws as a Means of Protecting Collective Reputation and Identity David Rolph PART VI INDIGENOUS INTELLECTUAL PROPERTY: REGIONAL PERSPECTIVES 21. Diluted Control: A Critical Analysis of the WAI262 Report on Maori Traditional Knowledge and Culture Fleur Adcock 22. Traditional Knowledge Governance Challenges in Canada Jeremy de Beer and Daniel Dylan 23. Intellectual Property protection of Traditional Knowledge and Access to Knowledge in South Africa Caroline Ncube 24. Traditional Knowledge Sovereignty: The Fundamental Role of Customary Law in Protection of Traditional Knowledge Brendan Tobin Index

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This submission responds to the document Intellectual Property Arrangements Issues Paper (Issues Paper) released by the Productivity Commission in October 2015 for public consultation and input by 30 November 2015. The API is grateful for the extension of time granted by the Commission to complete and lodge this submission. The overall need for an inquiry into intellectual property is supported by API. In particular it is noted with approval that the Commission states in its Issues Paper that it is to consider the appropriate balance between “incentives for innovation and investments, and the interests of both individuals and businesses in assessing products”.1 However, API is of the view that intellectual property in the area of real property presents a number of issues which are not fully canvassed in the abovementioned Issues Paper. Intellectual property embedded in valuation and other property-related reports of API members involves the acquisition of information which may possibly be confidential. Yet, when engaged in banks and financial institutions the intellectual property in such valuations and/ or reports is commonly required to be passed to the client bank or financial institution. In the Issues Paper it is proposed that there are seven different forms of intellectual property rights.2 It is the view of API that an eight form exists, namely private agreements. The Issues Paper, however, regards private agreements between firms as alternatives to intellectual property rights. The API considers that “secrecy or confidentiality arrangements”3 as identified in the Issues Paper form a much larger part of the manner in which intellectual property is maintained in Australia for the purposes of trade secrecy or more often, financial confidentiality...

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter addresses the areas more commonly found in everyday practice (NB circuit layouts and plant breeder's rights are not covered). Importantly, IP law has become very specialised, and as such one for which practitioners will need expertise or access to relevant experts in order to properly provide advice. The following therefore is an overview only of relevant issues.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider a network in which several service providers offer wireless access to their respective subscribed customers through potentially multihop routes. If providers cooperate by jointly deploying and pooling their resources, such as spectrum and infrastructure (e.g., base stations) and agree to serve each others' customers, their aggregate payoffs, and individual shares, may substantially increase through opportunistic utilization of resources. The potential of such cooperation can, however, be realized only if each provider intelligently determines with whom it would cooperate, when it would cooperate, and how it would deploy and share its resources during such cooperation. Also, developing a rational basis for sharing the aggregate payoffs is imperative for the stability of the coalitions. We model such cooperation using the theory of transferable payoff coalitional games. We show that the optimum cooperation strategy, which involves the acquisition, deployment, and allocation of the channels and base stations (to customers), can be computed as the solution of a concave or an integer optimization. We next show that the grand coalition is stable in many different settings, i.e., if all providers cooperate, there is always an operating point that maximizes the providers' aggregate payoff, while offering each a share that removes any incentive to split from the coalition. The optimal cooperation strategy and the stabilizing payoff shares can be obtained in polynomial time by respectively solving the primals and the duals of the above optimizations, using distributed computations and limited exchange of confidential information among the providers. Numerical evaluations reveal that cooperation substantially enhances individual providers' payoffs under the optimal cooperation strategy and several different payoff sharing rules.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper identifies and analyses the means of accessing and collecting foreign-based evidence in transnational antitrust cases. It makes an original contribution to the existing scholarship by critically addressing the available mechanisms of judicial cooperation, the possibility of reliance on domestic discovery in transnational context, as well as the existing instruments allowing for cooperation between antitrust agencies. It identifies the shortcomings of the current regulatory framework and points out to the existing good practices in those jurisdictions which provide their antitrust agencies with more leeway in sharing confidential information with foreign counterparts.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

While transnational antitrust enforcement is becoming only more common, the access to foreign-based evidence remains a considerable practical challenge. This article appraises considerations and concerns surrounding confidentiality, and looks into ways of their possible accommodation. It further identifies and critically evaluates the existing mechanisms allowing for inter-agency confidential information/ evidence sharing in competition law enforcement. The article outlines the shortcomings of the current framework and points to novel unilateral approaches. In the latter regard the focus is devoted to Australia, where the competition agency is empowered to share confidential information with foreign counterparts, also without any underlying bilateral agreement and on a non-reciprocal basis. This solution shows that a pragmatic and workable approach to inter-agency evidence sharing can be achieved.