102 resultados para interview protocols


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jacques Ranciere's work on aesthetics has received a great deal of attention recently. Given his work has enormous range – taking in art and literature, political theory, historiography, pedagogy and worker's history – Andrew McNamara and Toni Ross (UNSW) seek to explore his wider project in this interview, while showing how it leads to his alternative insights into aesthetics. Rancière sets aside the core suppositions linking the medium to aesthetic judgment, which has informed many definitions of modernism. Rancière is emphatic in freeing aesthetic judgment from issues of medium-specificity. He argues that the idea of autonomy associated with medium-specificity – or 'truth to the medium' – was 'a very late one' in modernism, and that post-medium trends were already evident in early modernism. While not stressing a simple continuity between early modernism and contemporary art, Ranciere nonetheless emphasizes the ethical and political ramifications of maintaining an a-disciplinary stance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This edited interview with Hung Huang, CEO of China Interactive Media Group (CIMG), was conducted by Lucy Montgomery in Beijing on 12 August 2005. It was done as part of the ARC Discovery research project, Internationalising Creative Industries: China, the WTO and the Knowledge Economy, led by John Hartley. That project is investigating the development of creative industries in China by focusing on a number of creative services including fashion magazines. Huang’s group publishes five fashion magazines in China, including i-Look, Youth International (Qingnian Yizu), which is the Chinese edition of Seventeen (originally founded by TV-Guide mogul Walter Annenberg), and the Beijing and Shanghai versions of London’s Time Out. It also produces TV programs under the same media brands. The company is based in the stylish Bauhaus-designed former factory 798-Space in the district of Dashanzi, Beijing (see www.798space.com). Huang went to school in Greenwich Village and graduated from Vassar College in New York. She is the daughter of Zhang Hanzhi, who was Mao Zedong’s personal English teacher, and stepdaughter of Qiao Guanhua, Foreign Minister of China during the 1970s at the time of the Nixon visit. Her book My Abnormal Life sold 200,000 copies in China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dr. Young-Ki Paik directs the Yonsei Proteome Research Center in Seoul, Korea and was elected as the President of the Human Proteome Organization (HUPO) in 2009. In the December 2009 issue of the Current Pharmacogenomics and Personalized Medicine (CPPM), Dr. Paik explains the new field of pharmacoproteomics and the approaching wave of “proteomics diagnostics” in relation to personalized medicine, HUPO’s role in advancing proteomics technology applications, the HUPO Proteomics Standards Initiative, and the future impact of proteomics on medicine, science, and society. Additionally, he comments that (1) there is a need for launching a Gene-Centric Human Proteome Project (GCHPP) through which all representative proteins encoded by the genes can be identified and quantified in a specific cell and tissue and, (2) that the innovation frameworks within the diagnostics industry hitherto borrowed from the genetics age may require reevaluation in the case of proteomics, in order to facilitate the uptake of pharmacoproteomics innovations. He stresses the importance of biological/clinical plausibility driving the evolution of biotechnologies such as proteomics,instead of an isolated singular focus on the technology per se. Dr. Paik earned his Ph.D. in biochemistry from the University of Missouri-Columbia and carried out postdoctoral work at the Gladstone Foundation Laboratories of Cardiovascular Disease, University of California at San Francisco. In 2005, his research team at Yonsei University first identified and characterized the chemical structure of C. elegans dauer pheromone (daumone) which controls the aging process of this nematode. He is interviewed by a multidisciplinary team specializing in knowledge translation, technology regulation, health systems governance, and innovation analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Assessment plays an integral role in teaching and learning in Higher Education and teachers have a strong interest in debates and commentaries on assessment as and for learning. In a one-year graduate entry teacher preparation program, the temptation is to emphasize assessment in an attempt to ensure students “cover” everything as part of a robust preparation for the profession. The risk is that, for students, assessment drives curriculum, and time spent in the completion of assignments is no guarantee of either effective learning or authentic preparation for teaching. Interviews as assessment provide an opportunity for a learning experience as well as an authentic task, since students will shortly be interviewing for employment in a “real world” situation. This paper reports on a project experimenting with interview panels as authentic assessment with pre-service early childhood teachers. At the end of their first semester of study, students enrolled in the Graduate Diploma of Education program at the Queensland University of Technology in Australia were required to participate in a panel interview where they were graded by a panel made up of three faculty staff and one undergraduate student enrolled in the four-year Bachelor of Education program. Students and panel members completed a questionnaire on their experience after the interview. Results indicated that both students and staff valued the experience and felt it was authentic. Results are discussed in terms of how the assessment interview and portfolio presentation supports graduating students in their preparation for employment interviews, and how this authentic assessment task has benefits for both students and teaching staff.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Privacy enhancing protocols (PEPs) are a family of protocols that allow secure exchange and management of sensitive user information. They are important in preserving users’ privacy in today’s open environment. Proof of the correctness of PEPs is necessary before they can be deployed. However, the traditional provable security approach, though well established for verifying cryptographic primitives, is not applicable to PEPs. We apply the formal method of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various security properties of PIEMCP using state space analysis techniques. This investigation provides us with preliminary insights for modeling and verification of PEPs in general, demonstrating the benefit of applying the CPN-based formal approach to proving the correctness of PEPs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An interview on literacy at McGill University, 2003.