174 resultados para private broadcast encryption
Resumo:
In this paper, we investigate the effect of mobility constraints on epidemic broad-cast mechanisms in DTNs (Delay-Tolerant Networks). Major factors affecting epidemic broadcast performances are its forwarding algorithm and node mobility. The impact of forwarding algorithm and node mobility on epidemic broadcast mechanisms has been actively studied in the literature, but those studies use generally unconstrained mobility models. The objective of this paper is therefore to quantitatively investigate the effect of mobility constraints on epidemic broadcast mechanisms. We evaluate the performances of P-BCAST (PUSH-based BroadCast), SA-BCAST (Self-Adaptive BroadCast), and HP-BCAST (History-based P-BCAST) with a random waypoint mobility model with mobility constraints.
Resumo:
In this paper, we investigate the effect of mobility constraints on epidemic broadcast mechanisms in DTNs (Delay-Tolerant Networks). Major factors affecting epidemic broadcast performances are its forwarding algorithm and node mobility. The impact of forwarding algorithm and node mobility on epidemic broadcast mechanisms has been actively studied in the literature, but those studies generally use unconstrained mobility models. The objective of this paper is therefore to quantitatively investigate the effect of mobility constraints on epidemic broadcast mechanisms. We evaluate the performances of three classes of epidemic broadcast mechanisms - P-BCAST (PUSH-based BroadCast), SA-BCAST (Self-Adaptive BroadCast), and HP-BCAST (History-based P-BCAST) - with a random waypoint mobility model with mobility constraints. Our finding includes that the existence of mobility constraints significantly improves the reach ability and dissemination speed of epidemic broadcast mechanisms while degrading their efficiency.
Resumo:
Background Pharmacists are considered medication experts but are underutilized and exist mainly at the periphery of the Malaysian primary health care team. Private general practitioners (GPs) in Malaysia are granted rights under the Poison Act 1952 to prescribe and dispense medications at their primary care clinics. As most consumers obtain their medications from their GPs, community pharmacists’ involvement in ensuring safe use of medicines is limited. The integration of a pharmacist into private GP clinics has the potential to contribute to quality use of medicines. This study aims to explore health care consumers’ views on the integration of pharmacists within private GP clinics in Malaysia. Methods A purposive sample of health care consumers in Selangor and Kuala Lumpur, Malaysia, were invited to participate in focus groups and semi-structured interviews. Sessions were audio recorded and transcribed verbatim and thematically analyzed using NVivo 10. Results A total of 24 health care consumers participated in two focus groups and six semi-structured interviews. Four major themes were identified: 1) pharmacists’ role viewed mainly as supplying medications, 2) readiness to accept pharmacists in private GP clinics, 3) willingness to pay for pharmacy services, and 4) concerns about GPs’ resistance to pharmacist integration. Consumers felt that a pharmacist integrated into a private GP clinic could offer potential benefits such as to provide trustworthy information on the use and potential side effects of medications and screening for medication misadventure. The potential increase in costs passed on to consumers and GPs’ reluctance were perceived as barriers to integration. Conclusion This study provides insights into consumers’ perspectives on the roles of pharmacists within private GP clinics in Malaysia. Consumers generally supported pharmacist integration into private primary health care clinics. However, for pharmacists to expand their capacity in providing integrated and collaborative primary care services to consumers, barriers to pharmacist integration need to be addressed.
Resumo:
Mike Budd and Max H. Kirsch, eds. Rethinking Disney: Private Control, Public Dimensions. Middletown, CT: Wesleyan University Press, 2005. ix + 341pp. $27.95
Resumo:
This research provides additional knowledge on the benefits and costs to society, in particular of road transport procured through Public-Private Partnership (PPP) arrangements. Currently, the public sector comparator (PSC) and cost-benefit analysis (CBA) used to evaluate and measure the benefits and costs of PPP are limited in their capacity to predict and forecast long-term events. PPP is attractive to governments due to the non-upfront payment, perceived value for money, and risk allocation and transfer to the private investor. However, public sector remains the guarantor, and under-writer of the private investor's loan from financial institutions and other voluntary risks which are unlimited to future compensatory claims. The new knowledge from this research is the introduction of a framework capable of evaluating, and measuring the associated PPP benefits, as well as the costs, effects, and impacts to society which are protracted and sporadic by nature.
Resumo:
An increasing number of studies analyze the relationship between natural disaster damage and income levels, but they do not consider the distinction between public and private disaster mitigation. This paper empirically distinguishes these two types of mitigation using Japanese prefectural panel data from 1975 to 2007. Our results show that public mitigation rather than private mitigation has contributed to mitigating the total damage resulting from natural disasters. Our estimation of cost-benefit ratios for each prefecture confirms that the mitigation efforts of urban prefectures are less effective than those of rural prefectures in focusing on both large and frequent/small disasters. Hence, urban prefectures need to reassess their public mitigation measures. Furthermore, to lessen the damage resulting from extreme catastrophes, policy makers are required to invest in improved mitigation infrastructures when faced with a high probability of disasters.
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
We present a clustering-only approach to the problem of speaker diarization to eliminate the need for the commonly employed and computationally expensive Viterbi segmentation and realignment stage. We use multiple linear segmentations of a recording and carry out complete-linkage clustering within each segmentation scenario to obtain a set of clustering decisions for each case. We then collect all clustering decisions, across all cases, to compute a pairwise vote between the segments and conduct complete-linkage clustering to cluster them at a resolution equal to the minimum segment length used in the linear segmentations. We use our proposed cluster-voting approach to carry out speaker diarization and linking across the SAIVT-BNEWS corpus of Australian broadcast news data. We compare our technique to an equivalent baseline system with Viterbi realignment and show that our approach can outperform the baseline technique with respect to the diarization error rate (DER) and attribution error rate (AER).
Resumo:
This project analyses and evaluates the integrity assurance mechanisms used in four Authenticated Encryption schemes based on symmetric block ciphers. These schemes are all cross chaining block cipher modes that claim to provide both confidentiality and integrity assurance simultaneously, in one pass over the data. The investigations include assessing the validity of an existing forgery attack on certain schemes, applying the attack approach to other schemes and implementing the attacks to verify claimed probabilities of successful forgeries. For these schemes, the theoretical basis of the attack was developed, the attack algorithm implemented and computer simulations performed for experimental verification.
Resumo:
The study explores the relationship between open space design, factors impacting open space provision, and resident satisfaction with open space in multistorey apartment buildings in the context of the subtropical lifestyle and climate of Brisbane Australia. The purpose of the paper is to identify the specific physical and spatial design characteristics residents perceive to be important in open spaces associated with their private dwellings and with shared open spaces. Firsthand resident evaluations of everyday experiences of residing in inner urban high density environments are explored through a survey of 636 residents and interviews with 24 residents. Private balconies are highly valued, but residents’ satisfaction would be enhanced by spaciousness for diverse activities, privacy and climate responsive design. Communal spaces and facilities are used infrequently by many residents who prefer interactions with community outside of the building. This is related to preferences for a level of anonymity in a setting where privacy is difficult to achieve due to physical proximity of neighbours.
Resumo:
Dramatic growth in the Japanese economy in the postwar period – and its meltdown in the 1990s – has attracted sustained interest in the power dynamics underlying the management of Japan’s administrative state. For a long time, scholars and commentators have debated about who wields power in Japan. The question has been asked in different ways. In the 1970s and 1980s, the question was usually posed as: who orchestrated Japan’s economic miracle in the 1960s and 1970s? Today, the question is usually reframed to: who is accountable for the policy failures that plunged Japan into financial crisis and recession during the 1990s? Yet the core issue remains the same – who governs Japan? (Johnson 1995)...
Resumo:
Public-Private Partnerships (PPP) are established globally as an important mode of procurement and the features of PPP, not least of which the transfer of risk, appeal to governments and particularly in the current economic climate. There are many other advantages of PPP that are claimed as outweighing the costs of PPP and affording Value for Money (VfM) relative to traditionally financed projects or non-PPP. That said, it is the case that we lack comparative whole-life empirical studies of VfM in PPP and non-PPP. Whilst we await this kind of study, the pace and trajectory of PPP seem set to continue and so in the meantime, the virtues of seeking to improve PPP appear incontrovertible. The decision about which projects, or parts of projects, to offer to the market as a PPP and the decision concerning the allocation or sharing risks as part of engagement of the PPP consortium are among the most fundamental decisions that determine whether PPP deliver VfM. The focus in the paper is on latter decision concerning governments’ attitudes towards risk and more specifically, the effect of this decision on the nature of the emergent PPP consortium, or PPP model, including its economic behavior and outcomes. This paper presents an exploration into the extent to which the seemingly incompatible alternatives of risk allocation and risk sharing, represented by the orthodox/conventional PPP model and the heterodox/alliance PPP model respectively, can be reconciled along with suggestions for new research directions to inform this reconciliation. In so doing, an important step is taken towards charting a path by which governments can harness the relative strengths of both kinds of PPP model.
Resumo:
Public-private partnerships (PPPs) have generated a lot of interest from governments around the world for leveraging private sector involvement in developing and sustaining public infrastructure and services. Initially, PPPs were favoured by transport, energy, and other large infrastructure-intensive sectors. More recently, the concept has been expanded to include social sectors such as education.
Resumo:
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
Resumo:
This thesis explores perspectives on the accountability of Private Ancillary Funds (PAFs), a type of Australian endowed philanthropic foundation. Privately established for a public benefit purpose, with limited formal accountability requirements, there are differing and sometimes conflicting perspectives on the nature and scope of PAF accountability. Through in-depth interviews with managers and trustees of 10 PAFs, forms and relationships of PAF accountability are uncovered. Findings reveal accountability for PAFs does not necessarily include public disclosure or transparency. However, engagement with accountability for a PAF results in greater impact and satisfaction for those involved.