210 resultados para cryptographic protocol
Resumo:
Aim To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Background Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Design Pragmatic randomized controlled trial at one site with 260 participants. Methods This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Discussion Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce.
Resumo:
Background In 2002/03 the Queensland Government responded to high rates of alcohol-related harm in discrete Indigenous communities by implementing alcohol management plans (AMPs), designed to include supply and harm reduction and treatment measures. Tighter alcohol supply and carriage restrictions followed in 2008 following indications of reductions in violence and injury. Despite the plans being in place for over a decade, no comprehensive independent review has assessed to what level the designed aims were achieved and what effect the plans have had on Indigenous community residents and service providers. This study will describe the long-term impacts on important health, economic and social outcomes of Queensland’s AMPs. Methods/Design The project has two main studies, 1) outcome evaluation using de-identified epidemiological data on injury, violence and other health and social indicators for across Queensland, including de-identified databases compiled from relevant routinely-available administrative data sets, and 2) a process evaluation to map the nature, timing and content of intervention components targeting alcohol. Process evaluation will also be used to assess the fidelity with which the designed intervention components have been implemented, their uptake and community responses to them and their perceived impacts on alcohol supply and consumption, injury, violence and community health. Interviews and focus groups with Indigenous residents and service providers will be used. The study will be conducted in all 24 of Queensland’s Indigenous communities affected by alcohol management plans. Discussion This evaluation will report on the impacts of the original aims for AMPs, what impact they have had on Indigenous residents and service providers. A central outcome will be the establishment of relevant databases describing the parameters of the changes seen. This will permit comprehensive and rigorous surveillance systems to be put in place and provided to communities empowering them with the best credible evidence to judge future policy and program requirements for themselves. The project will inform impending alcohol policy and program adjustments in Queensland and other Australian jurisdictions. The project has been approved by the James Cook University Human Research Ethics Committee (approval number H4967 & H5241).
Resumo:
The 1967 Protocol Relating to the Status of Refugees has been described as an unnecessary addendum to the 1951 Convention Relating to the Status of Refugees. However, if the 1967 Protocol was superfluous, why did the United Nations High Commissioner for Refugees in the early 1960s insist on its development? This article seeks to establish that the 1967 Protocol was originally intended to encompass the broader concerns of African and Asian states concerning refugee populations in their region. However, the political influence upon the development of international refugee law radically altered the UNHCR's endeavour to make the 1951 Convention universally accessible.
Resumo:
Distributed Network Protocol Version 3 (DNP3) is the de-facto communication protocol for power grids. Standard-based interoperability among devices has made the protocol useful to other infrastructures such as water, sewage, oil and gas. DNP3 is designed to facilitate interaction between master stations and outstations. In this paper, we apply a formal modelling methodology called Coloured Petri Nets (CPN) to create an executable model representation of DNP3 protocol. The model facilitates the analysis of the protocol to ensure that the protocol will behave as expected. Also, we illustrate how to verify and validate the behaviour of the protocol, using the CPN model and the corresponding state space tool to determine if there are insecure states. With this approach, we were able to identify a Denial of Service (DoS) attack against the DNP3 protocol.
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions
Resumo:
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003. We propose the first protocol for key exchange among n ≥2k+1 parties which simultaneously achieves all of the following properties: 1. Key Privacy (including forward security) against active attacks by group outsiders, 2. Non-malleability — meaning in particular that no subset of up to k corrupted group insiders can ‘fix’ the agreed key to a desired value, and 3. Robustness against denial of service attacks by up to k corrupted group insiders. Our insider security properties above are achieved assuming the availability of a reliable broadcast channel.
Resumo:
The human right to water has recently been recognised by both the United Nations General Assembly and the Human Rights Council. As the mining industry interacts with water on multiple levels, it is important that these interactions respect the human right to water. Currently, a disconnect exists between mine site water management practices and the recognition of water from a human rights perspective. The Minerals Council of Australia (MCA) Water Accounting Framework (WAF) has previously been used to strengthen the connection between water management and human rights. This article extends this connection through the use of a Social Water Assessment Protocol (SWAP). The SWAP is scoping tool consisting of a set of questions classified into taxonomic themes under leading topics with suggested sources of data that enable mine sites to better understand the local water context in which they operate. Three of the themes contained in the SWAP – gender, Indigenous peoples and health – are discussed to demonstrate how the protocol may be useful in assisting mining companies to consider their impacts on the human right to water.
Resumo:
Review question/objective The objective of this review is to identify the effectiveness of surveillance systems and community-based interventions in identifying and responding to emerging and re-emerging zoonotic infections in Southeast Asia (SE Asia). More specifically the research questions are: 1. What is the effectiveness of community-based surveillance interventions designed to identify emerging zoonotic infectious diseases? 2. What is the effectiveness of non-pharmaceutical community-based interventions designed to prevent transmission of emerging zoonotic infectious diseases? 3. How do factors related to the emergence and management of emerging zoonotic infectious diseases impact the effectiveness of interventions designed to identify and respond to them?
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
• Premise of the study: Here we propose a staining protocol using TBO and Ruthenium red in order to reliably identify secondary compounds in the leaves of some species of Myrtaceae. • Methods and results: Leaves of 10 species representing 10 different genera of Myrtaceae were processed and stained using five different combinations of Ruthenium red and TBO. Optimal staining conditions were determined as 1 min of Ruthenium red (0.05% aqueous) and 45 sec of TBO (0.1% aqueous). Secondary compounds clearly identified under this treatment include mucilage in mesophyll, polyphenols in cuticle, lignin in fibers and xylem, tannins and carboxylated polysaccharides in epidermis and pectic substances in primary cell walls. • Conclusions: Potential applications of this protocol include systematic, phytochemical and ecological investigations in Myrtaceae. It might be applicable to other plant families rich in secondary compounds and could be used as preliminary screening method for extraction of these elements.
Resumo:
Background: Exercise and adequate self-management capacity may be important strategies in the management of venous leg ulcers. However, it remains unclear if exercise improves the healing rates of venous leg ulcers and if a self-management exercise program based on self-efficacy theory is well adhered to. Method/Design: This is a randomised controlled in adults with venous leg ulcers to determine the effectiveness of a self-efficacy based exercise intervention. Participants with venous leg ulcers are recruited from 3 clinical sites in Australia. After collection of baseline data, participants are randomised to either an intervention group or control group. The control group receive usual care, as recommended by evidence based guidelines. The intervention group receive an individualised program of calf muscle exercises and walking. The twelve week exercise program integrates multiple elements, including up to six telephone delivered behavioural coaching and goal setting sessions, supported by written materials, a pedometer and two follow-up booster calls if required. Participants are encouraged to seek social support among their friends, self-monitor their weekly steps and lower limb exercises. The control group are supported by a generic information sheet that the intervention group also receive encouraging lower limb exercises, a pedometer for self-management and phone calls at the same time points as the intervention group. The primary outcome is the healing rates of venous leg ulcers which are assessed at fortnightly clinic appointments. Secondary outcomes, assessed at baseline and 12 weeks: functional ability (range of ankle motion and Tinetti gait and balance score), quality of life and self-management scores. Discussion: This study seeks to address a significant gap in current wound management practice by providing evidence for the effectiveness of a home-based exercise program for adults with venous leg ulcers. Theory-driven, evidence-based strategies that can improve an individual’s exercise self-efficacy and self-management capacity could have a significant impact in improving the management of people with venous leg ulcers. Information gained from this study will provide much needed information on management of this chronic disease to promote health and independence in this population. Trial registration: Australian New Zealand Clinical Trials Registry ACTRN12612000475842 Trial status: Current follow up