97 resultados para compromise
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
There is a category of film about journalism in which journalism is not the star, but the supporting player, and journalists not the protagonists but the Greek chorus, commenting on and also changing the realities they report. In such films the news media are a structuring presence driving the plot, shaping the narrative, constructing what we might think of as a pseudo-reality. Like Daniel Boorstin’s notion of the pseudo-event (introduced in his still-relevant book The Image, 1962), this pseudo-reality is so-named because it would not exist were it not for the demands of the news media’s hunger for stories, and knowledge of the damage they can do with those stories, on the calculations and actions of the key actors. Pseudo-realities form as responses to what political actors think journalists and their organisations need and want, or as efforts to shape journalistic accounts in ways favourable to themselves. Films about politics often feature pseudorealities of this kind, in which the events and actions driving the plot have only a tenuous relationship with important things going on in the everyday world beyond the political arena. Everything we see is about image, perception, appearance.
Resumo:
In Uniline Australia Ltd ACN 010752057 v S Briggs Pty Ltd ACN 007415518 (No 2) [2009] FCA 920 Greenwood J considered a number of principles guiding the exercise of discretion in relation to costs, particularly when offers of compromise have been made under the formal process provided by the Federal Court Rules.
Resumo:
In Jones v Millward [2005]QCA76 the Queensland Court of Appeal held that an offer to settle under the UCPR will not attract a costs benefit unless it involves some element of compromise
Resumo:
Designing a school library is a complex, costly and demanding process with important educational and social implications for the whole school community. Drawing upon recent research, this paper presents contrasting snapshots of two school libraries to demonstrate the impacts of greater and lesser collaboration in the designing process. After a brief literature review, the paper outlines the research design (qualitative case study, involving collection and inductive thematic analysis of interview data and student drawings). The select findings highlight the varying experiences of each school’s teacher-librarian through the four designing phases of imagining, transitioning, experiencing and reimagining. Based on the study’s findings, the paper concludes that design outcomes are enhanced through collaboration between professional designers and key school stakeholders including teacher-librarians, teachers, principals and students. The findings and recommendations are of potential interest to teacher-librarians, school principals, education authorities, information professionals and library managers, to guide user-centred library planning and resourcing.
Resumo:
‘Conditions of Compromise and Failure (The Dickensian Aspect)' acts as a re-enactment of the common trope of television detective dramas. A result of the artist’s repeated immersions in the television program ‘The Wire’, the work forms a node-map of all the named characters featured on the show. While each coloured thread represents and connects together the Byzantine narrative between all of the characters, the sheer mass of connections obfuscates any clear reading at all.
Resumo:
Bid opening in e-auction is efficient when a homomorphic secret sharing function is employed to seal the bids and homomorphic secret reconstruction is employed to open the bids. However, this high efficiency is based on an assumption: the bids are valid (e.g., within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunately, validity verification of the bids is ignored in the auction schemes employing homomorphic secret sharing (called homomorphic auction in this paper). In this paper, an attack against the homomorphic auction in the absence of bid validity check is presented and a necessary bid validity check mechanism is proposed. Then a batch cryptographic technique is introduced and applied to improve the efficiency of bid validity check.
Resumo:
Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.
Resumo:
While spoken term detection (STD) systems based on word indices provide good accuracy, there are several practical applications where it is infeasible or too costly to employ an LVCSR engine. An STD system is presented, which is designed to incorporate a fast phonetic decoding front-end and be robust to decoding errors whilst still allowing for rapid search speeds. This goal is achieved through mono-phone open-loop decoding coupled with fast hierarchical phone lattice search. Results demonstrate that an STD system that is designed with the constraint of a fast and simple phonetic decoding front-end requires a compromise to be made between search speed and search accuracy.
Resumo:
Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating systems executing on an Intel IA-32 architecture. The execution flow of attack payloads are analysed and a generic model of execution is examined. A novel classification scheme for executable attack payloads is presented which allows for characterisation of executable payloads and facilitates vulnerability and threat assessments, and intrusion detection capability assessments for intrusion detection systems. An intrusion detection capability assessment may be utilised to determine whether or not a deployed system is able to detect a specific attack and to identify requirements for intrusion detection functionality for the development of new detection methods. Two novel detection methods are presented capable of detecting new and previously unseen executable attack payloads. The detection methods are capable of identifying and enumerating the executable payload’s interactions with the operating system on the targeted host at the time of compromise. The detection methods are further validated using real world data including executable payload attacks.
Resumo:
Porous mesopore-bioglass (MBG) scaffolds have been proposed as a new class of bone regeneration materials due to their apatite-formation and drug-delivery properties; however, the material’s inherent brittleness and high degradation and surface instability are major disadvantages, which compromise its mechanical strength and cytocompatibility as a biological scaffold. Silk, on the other hand, is a native biomaterial and is well characterized with respect to biocompatibility and tensile strength. In this study we set out to investigate what effects blending silk with MBG had on the physiochemical, drug-delivery and biological properties of MBG scaffolds with a view to bone tissue engineering applications. Transmission electron microscopy (TEM), scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR) were the methods used to analyze the inner microstructure, pore size and morphology, and composition of MBG scaffolds, before and after addition of silk. The effect of silk modification on the mechanical property of MBG scaffolds was determined by testing the compressive strength of the scaffolds and also compressive strength after degradation over time. The drug-delivery potential was evaluated by the release of dexamethasone (DEX) from the scaffolds. Finally, the cytocompatibility of silk-modified scaffolds was investigated by the attachment, morphology, proliferation, differentiation and bone-relative gene expression of bone marrow stromal cells (BMSCs). The results showed that silk modification improved the uniformity and continuity of pore network of MBG scaffolds, and maintained high porosity (94%) and large-pore size (200–400 mm). There was a significant improvement in mechanical strength, mechanical stability, and control of burst release of DEX in silkmodified MBG scaffolds. Silk modification also appeared to provide a better environment for BMSC attachment, spreading, proliferation, and osteogenic differentiation on MBG scaffolds.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
Cultural issues have become an increasingly important consideration in healthcare. Such cultural issues, however, are underresearched in Australia, especially in palliative care. This study has sought to address this gap, exploring the social construction of cultural issues in palliative care by oncology nurses. A grounded theory approach was used. Semistructured interviews with 7 Australian oncology nurses provided the data for the study. The core category emerging from the study was that of accommodating cultural needs whereby to meet patients' specific cultural requirements, nurses actively found ways to accommodate the needs of patients and their families. This process often included compromise and negotiation whereby limits were set. In addition, the use of cross-cultural communication strategies emerged from the data as an important feature of cultural care. A series of subcategories were also identified as factors that could influence the process by which nurses would accommodate cultural needs.
Resumo:
Aligning the motivation of contractors and consultants to perform better than ‘business-as-usual’ (BAU) on a construction project is a complex undertaking and the costs of failure are high as misalignment can compromise project outcomes. Despite the potential benefits of effective alignment, there is still little information about optimally designing procurement approaches that promote motivation towards ‘above BAU’ goals. The paper contributes to this knowledge gap by examining the negative drivers of motivation in a major construction project that, despite a wide range of performance enhancing incentives, failed to exceed BAU performance. The paper provides a case study of an iconic infrastructure project undertaken in Australia between 2002 and 2004. It is shown that incentives provided to contractors and consultants to achieve above BAU performance can be compromised by a range of negative motivation drivers including: • inequitable contractual risk allocation; • late involvement of key stakeholders; • inconsistency between contract intentions and relationship intentions; • inadequate price negotiation; • inconsistency between the project performance goals and incentive goals; •unfair and inflexible incentive performance measurement processes. Future quantitative research is planned to determine the generalisability of these results.