191 resultados para Equity groups
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
Australia has been populated for more than 40,000 years with Indigenous Australians joined by European settlers only 230 years ago. The first settlers consisted of convicts from more than 28 countries and members of the British army who arrived in 1788 to establish a British penal colony. Mass migration in the nineteenth century with one and a half million immigrants from Europe, principally from the United Kingdom and Ireland (Haines and Shlomowitz, 1992), established the continent as an Anglo society in the Pacific. In the twentieth century immigrants came from many European countries and in the latter decades from many parts of Asia and the Middle East (Collins, 1991, pp.10-13). In the 21st century Australia has an ethnically and culturally diverse population. The original Indigenous population of Australia accounts for approximately 460,000 or 2.5 per cent of the total population (ABS, 2006a). Estimates are that around 4.5m. persons in the population (close to 20 per cent), were born outside Australia with the majority of these arriving from Europe, principally the United Kingdom, and New Zealand (ABS, 2006b). Like many other countries, Australia has a legacy of discrimination and inequality in employment. Propelled by racist ideologies and the male breadwinner ideology, Indigenous Australians, and non-European immigrants, and women were barred from certain jobs and paid less for their work than any white male counterpart. These conditions were legally sanctioned through the industrial relations system and other laws in the nineteenth and first half of the twentieth century. Since the 1960s a dramatic change has occurred in social policy and national legislation and Australia today has an extensive array of laws which forbid employment discrimination on race, ethnicity, gender and many other characteristics, and other approaches which promote proactive organizational plans and actions to achieve equity in employment. This chapter outlines these developments.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.
Resumo:
It is clear that where a disease affects men and women differently, research on potential therapies or cures should include both men and women and should examine whether the therapy is effective and safe for both sexes. In this paper we consider whether there is an appropriate role for law in regulating to ensure an examination of these sex- and gender-specific aspects in health research. We consider the relative advantages and disadvantages of pursuing a regulatory approach to achieving gender equity in the field of women's health by exploring first, the meaning of gender equity, and second, the regulatory mechanisms that might be best suited to promoting the goal of gender equity. Within our examination of different regulatory forms and mechanisms, we also interrogate the shift from gender-neutral provisions relating to sex in favor of generalized notions of fairness that remove any specific consideration of sex.
Resumo:
The Australian Taxation Office (AT)) attempted to challenge both the private equity fund reliance on double tax agreements and the assertion that profits were capital in nature in its dispute with private equity group TPG. Failure to resolve the dispute resulted in the ATO issuing two taxation determinations: TD 2010/20 which states that the general anti-avoidance provisions can apply to arrangements designed to alter the intended effect of Australia's international tax agreements net; and TD 2010/21 which states that the profits on the sale of shares in a company group acquired in a leveraged buyout is assessable income. The purpose of this article is to determine the effectiveness of the administrative rulings regime as a regulatory strategy. This article, by using the TPG-Myer scenario and subsequent tax determinations as a case study, collects qualitative data which is then analysed (and triangulated) using tonal and thematic analysis. Contemporaneous commentary of private equity stakeholders, tax professionals, and media observations are analysed and evaluated within a framework of responsive regulation and utilising the current ATO compliance model. Contrary to the stated purpose of the ATO rulings regime to alleviate complexities in Australian taxation law and provide certainty to taxpayers, and despite the de facto law status afforded these rulings, this study found that the majority of private equity stakeholders and their advisors perceived that greater uncertainty was created by the two determinations. Thus, this study found that in the context of private equity fund investors, a responsive regulation measure in the form of taxation determinations was not effective.
Resumo:
We report on the use of the hydrogen bond acceptor properties of some phosphorus-containing functional groups for the assembly of a series of [2]rotaxanes. Phosphinamides, and the homologous thio– and selenophosphinamides, act as hydrogen bond acceptors that, in conjunction with an appropriately positioned amide group on the thread, direct the assembly of amide-based macrocycles around the axle to form rotaxanes in up to 60% yields. Employing solely phosphorus-based functional groups as the hydrogen bond accepting groups on the thread, a bis(phosphinamide) template and a phosphine oxide-phosphinamide template afforded the corresponding rotaxanes in 18 and 15 % yields, respectively. X-Ray crystallography of the rotaxanes shows the presence of up to four intercomponent hydrogen bonds between the amide groups of the macrocycle and various hydrogen bond accepting groups on the thread, including rare examples of amide-to-phosphonamide, -thiophosphinamide and -selenophosphinamide groups. With a phosphine oxide-phosphinamide thread, the solid state structure of the rotaxane is remarkable, featuring no direct intercomponent hydrogen bonds but rather a hydrogen bond network involving water molecules that bridge the H-bonding groups of the macrocycle and thread through bifurcated hydrogen bonds. The incorporation of phosphorus-based functional groups into rotaxanes may prove useful for the development of molecular shuttles in which the macrocycle can be used to hinder or expose binding ligating sites for metal-based catalysts.
Resumo:
This study examined the formation and operation of women's microfinance self-help groups in southern India and investigated whether or not the poorest of the poor women were accepted as members of those groups. The study found that caste was used as a selection criterion. Many eligible women excluded themselves from joining the self-help group due to their own lack of education, age, poor health, poverty and lack of trust in the system. The research revealed that self-help groups enhanced women's income and education, improved village infrastructure, and reduced household conflict. Factors that might prevent inclusion of the poorest of the poor in future microfinance programs were identified.
Resumo:
Current national reforms in Australian higher education have prioritised efforts to reduce educational disadvantage within a vernacular expression of neoliberal education policy. Student-equity policy in universities is enmeshed in a set of competitive student recruitment relations. This raises practice-based tensions as universities strive to meet specific institutional targets for low-socio-economic status (SES) and Indigenous student participation, whilst broadening participation more generally within the sector. This paper seeks empirically to trace the activation and appropriation of federal policy through two sites of higher education policy practices: a state government-sponsored equity practitioner body and two differently positioned universities, Dawson and McIllwraith, as they engage with low-SES schools. Working together Dorothy Smith’s insights into the textually mediated activation of local practices, Levinson and colleagues’ concept of the local appropriation of authorised policy, and Bourdieu’s notion of the contested field, we demonstrate that the generation of state level and institutionally specific policies for student-equity practices not only articulates to federal policy, but also appropriates the ruling relations of mandated policy. Further, the scope of these creative local appropriations is organised within a hierarchical academic field through which particular institutional imperatives, as well as the needs of low-SES students, are negotiated. The analysis demonstrates the vernacularisation of policy in the national rearticulation of global discourses, in appropriation at the level of the state body and in the practices of equity workers.
Resumo:
We consider the following problem: a user stores encrypted documents on an untrusted server, and wishes to retrieve all documents containing some keywords without any loss of data confidentiality. Conjunctive keyword searches on encrypted data have been studied by numerous researchers over the past few years, and all existing schemes use keyword fields as compulsory information. This however is impractical for many applications. In this paper, we propose a scheme of keyword field-free conjunctive keyword searches on encrypted data, which affirmatively answers an open problem asked by Golle et al. at ACNS 2004. Furthermore, the proposed scheme is extended to the dynamic group setting. Security analysis of our constructions is given in the paper.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
Interest in the participation of Indigenous peoples in higher education has, in recent times, gained momentum with an increasing number of advocates challenging the global history of culturally inept policies and practices imposed within the western higher education system. To address the challenges being presented by Indigenous communities and other groups (often relegated under the banner of disadvantaged or equity) Western Universities are promoting a shift toward inclusive policies and practices. Frustrated with the offerings of the Western Higher Education system, a global movement of Indigenous academics, Elders and knowledge holders are developing strategies to meet the educational needs of their own communities, in order to find a way forward. The mobilization of Elders and Indigenous academics has resulted in the development of a global higher education network which is proving to be a significant force in changing the position of Indigenous participation in higher education. The World Indigenous Network Higher Education Consortium (WINHEC) has presented a significant challenge to those barriers within the western higher education system that has historically demonstrated an inability to develop culturally inclusive practices within their institutions. This paper examines the development of a world Indigenous higher education movement and its contribution to the history of the “university” within the context of western higher education institutions. Outlined in this examination will be a synopsis of the development of the “University of Excellence” and the creation of an international Indigenous space within higher education.
Resumo:
A matched case-control study of mortality to children under age five was conducted to consider associations with parents' socio-economic status and social support in the Farafenni Demographic Surveillance Site (DSS). Cases and controls were selected from Farafenni DSS, matched on date of birth, and parents were interviewed about personal resources and social networks. Parents with the lowest personal socio-economic status and social support were identified. Multivariate multinomial regression was used to consider whether the children of these parents were at increased risk of either infant or 1-4 mortality, in separate models using either parents' characteristics. There was no benefit found for higher SES or better social support with respect to child mortality. Children of fathers who had the poorest social support had lower 1-4 mortality risk (OR=0.52, p=0.037). Given that socio-economic status was not associated with child mortality, it seems unlikely that the explanation for the link between father's social support and mortality is linked to resource availability. Explanations for the risk effect of father's social ties may lie in decision-making around health maintenance and health care for children.
Resumo:
Curriculum scholars and teachers working for social justice and equity have been caught up in acrimonious and polarizing debates over content, ideology and disciplinary knowledge. At the forefront in cutting through these debates and addressing the practical questions involved, this book is distinctive in looking to the technical form of the curriculum rather than its content for solutions. The editors and contributors, all leading international scholars, advance a unified, principled approach to the design of syllabus documents that aims for high quality/high equity educational outcomes and enhances teacher professionalism.