426 resultados para security architecture
Resumo:
With the rise in attacks and attempted attacks on marine‐based critical infrastructure, maritime security is an issue of increasing importance worldwide. However, there are three significant shortfalls in the efforts to overcome potential threats to maritime security: the need for greater understanding of whether current standards of best practice are truly successful in combating and reducing the risks of terrorism and other security issues, the absence of a collective maritime security best practice framework and the need for improved access to maritime security specific graduate and postgraduate (long) courses. This paper presents an overview of existing international, regional national standards of best practice and shows that literature concerning the measurement and/ or success of standards is virtually non‐existent. In addition, despite the importance of maritime workers to ensuring the safety of marine based critical infrastructure, a similar review of available Australian education courses shows a considerable lack of availability of maritime security‐specific courses other than short courses that cover only basic security matters. We argue that the absence of an Australian best practice framework informed by evaluation of current policy responses – particularly in the post 9/11 environment – leaves Australia vulnerable to maritime security threats. As this paper shows, the reality is that despite the security measures put in place post 9/11, there is still considerable work to be done to ensure Australia is equipped to overcome the threats posed to maritime security.
Resumo:
Barreto-Lynn-Scott (BLS) curves are a stand-out candidate for implementing high-security pairings. This paper shows that particular choices of the pairing-friendly search parameter give rise to four subfami- lies of BLS curves, all of which offer highly efficient and implementation- friendly pairing instantiations. Curves from these particular subfamilies are defined over prime fields that support very efficient towering options for the full extension field. The coefficients for a specific curve and its correct twist are automat-ically determined without any computational effort. The choice of an extremely sparse search parameter is immediately reflected by a highly efficient optimal ate Miller loop and final exponentiation. As a resource for implementors, we give a list with examples of implementation-friendly BLS curves through several high-security levels.
Resumo:
Power system dynamic analysis and security assessment are becoming more significant today due to increases in size and complexity from restructuring, emerging new uncertainties, integration of renewable energy sources, distributed generation, and micro grids. Precise modelling of all contributed elements/devices, understanding interactions in detail, and observing hidden dynamics using existing analysis tools/theorems are difficult, and even impossible. In this chapter, the power system is considered as a continuum and the propagated electomechanical waves initiated by faults and other random events are studied to provide a new scheme for stability investigation of a large dimensional system. For this purpose, the measured electrical indices (such as rotor angle and bus voltage) following a fault in different points among the network are used, and the behaviour of the propagated waves through the lines, nodes, and buses is analyzed. The impact of weak transmission links on a progressive electromechanical wave using energy function concept is addressed. It is also emphasized that determining severity of a disturbance/contingency accurately, without considering the related electromechanical waves, hidden dynamics, and their properties is not secure enough. Considering these phenomena takes heavy and time consuming calculation, which is not suitable for online stability assessment problems. However, using a continuum model for a power system reduces the burden of complex calculations
Resumo:
This paper explores violent urbanism in the recent science-fiction filem District 9 whhich depicts an alien immigration camp, filmed on location in Soweto in 2008 in the midst of a series of violent clashed between indigenous South Africans and the new wave of African immigrants. Violent Urbanism is the State of method of control of bodies and populations by those precise biological techniques that determine geopolitical sites for the control of cities. This film while presented as cinema verite speaks the real invasion of traditional, spatio-disciplinary regimes such as corporate-run detention centres, refugee camps, border control and enforced relocation by those imperceptible techniques which violate the body by reducing it to a biological datum, tool, or specimen to serve the security agenda of the twenty-first century nation-state. These techniques are chemical and biological warfare proliferation; genetic engineering; and surveillance systems, such as biometrics, whose purview is no longer limited to the specular but includes the molecular. District 9 evinces a compelling urban image of contemporary biopolitics that disturbs the received historiography of post-apartheid urbanism. Clearly Johannesburg is not the only place this could or is happening - the reach of biopolitics is worldwide. District 9 visualises with utter precision the corporate hijacking of the biological realm in contemporary cites, just as it asks the unsettling question, who exactly is the "audience" of Violent Urbanism?
Resumo:
The in vitro and in vivo degradation properties of poly(lactic-co-glycolic acid) (PLGA) scaffolds produced by two different technologies - thermally induced phase separation (TIPS), and solvent casting and particulate leaching (SCPL) were compared. Over 6 weeks, in vitro degradation produced changes in SCPL scaffold dimension, mass, internal architecture and mechanical properties. TIPS scaffolds produced far less changes in these parameters providing significant advantages over SCPL. In vivo results were based on a microsurgically created arteriovenous (AV) loop sandwiched between two TIPS scaffolds placed in a polycarbonate chamber under rat groin skin. Histologically, a predominant foreign body giant cell response and reduced vascularity was evident in tissue ingrowth between 2 and 8 weeks in TIPS scaffolds. Tissue death occurred at 8 weeks in the smallest pores. Morphometric comparison of TIPS and SCPL scaffolds indicated slightly better tissue ingrowth but greater loss of scaffold structure in SCPL scaffolds. Although advantageous in vitro, large surface area:volume ratios and varying pore sizes in PLGA TIPS scaffolds mean that effective in vivo (AV loop) utilization will only be achieved if the foreign body response can be significantly reduced so as to allow successful vascularisation, and hence sustained tissue growth, in pores less than 300 μm. © 2005 Elsevier Ltd. All rights reserved.
Resumo:
In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.
Resumo:
It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.
Resumo:
Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
The "vernacular" housing tradition of southeast Queensland is easily identifiable. Its history is more complex. This study seeks to challenge two popular conceptions of the "Queenslander" history by showing that they actually provide contradictory explanations. The aim is to produce a more complex account of local architecture and its historical explanation so that both its past and its present practices can be better understood as a distinctly subtropical idiom. This discussion shows that such practices may respond to common concerns but that are also ever-changing.
Resumo:
This thesis investigates the radically uncertain formal, business, and industrial environment of current entertainment creators. It researches how a novel communication technology, the Internet, leads to novel entertainment forms, how these lead to novel kinds of businesses that lead to novel industries; and in what way established entertainment forms, businesses, and industries are part of that process. This last aspect is addressed by focusing on one exemplary es-tablished form: movies. Using a transdisciplinary approach and a combination of historical analysis, industry interviews, and an innovative mode of ‘immersive’ textual analysis, a coherent and comprehensive conceptual framework for the creation of and re-search into a specific emerging entertainment form is proposed. That form, products based on it, and the conceptual framework describing it are all re-ferred to as Entertainment Architecture (‘entarch,’ for short). The thesis charac-terises this novel form as Internet-native transmedia entertainment, meaning it fully utilises the unique communicative characteristics of the Internet, and is spread across media. The thesis isolates four constitutive elements within Entertainment Architec-ture: story, play, ‘dance,’ and ‘glue.’ That is, entarch tells a story; offers playful interaction; invites social interaction between producer and consumer, and amongst consumers (‘dance’); and all components of it can be spread across many media, but are so well interconnected and mutually dependent that they are perceived as one product instead of many (‘glue’). This sets entarch apart from current media franchises like Star Wars or Halo, which are perceived as many products spread across many media. Entarch thus embraces the commu-nicative behaviour of Internet-native consumers instead of forcing them to de-sist from it, it harnesses the strengths of various media while avoiding some of their weaknesses, and it can sustain viable businesses. The entarch framework is an innovative contribution to scholarship that al-lows researchers to investigate this emerging entertainment form in a structured way. The thesis demonstrates this by using it to survey business models appro-priate to the entarch environment. The framework can also be used by enter-tainment creators — exemplified in the thesis by moviemakers — to delimit the room for manoeuvre available to them in a changing environment.
Resumo:
Enterprise architecture management (EAM) has become an intensively discussed approach to manage enterprise transformations. While many organizations employ EAM, a notable insecurity about the value of EAM remains. In this paper, we propose a model to measure the realization of benefits from EAM. We identify EAM success factors and EAM benefits through a comprehensive literature review and eleven explorative expert interviews. Based on our findings, we integrate the EAM success factors and benefits with the established DeLone & McLean IS success model resulting in a model that explains the realization of EAM benefits. This model aids organizations as a benchmark and framework for identifying and assessing the setup of their EAM initiatives and whether and how EAM benefits are materialized. We see our model also as a first step to gain insights in and start a discussion on the theory of EAM benefit realization.
Resumo:
Enterprise architecture (EA) management has become an intensively discussed approach to manage enterprise transformations. Despite the popularity and potential of EA, both researchers and practitioners lament a lack of knowledge about the realization of benefits from EA. To determine the benefits from EA, we explore the various dimensions of EA benefit realization and report on the development of a validated and robust measurement instrument. In this paper, we test the reliability and construct validity of the EA benefit realization model (EABRM), which we have designed based on the DeLone & McLean IS success model and findings from exploratory interviews. A confirmatory factor analysis confirms the existence of an impact of five distinct and individually important dimensions on the benefits derived from EA: EA artefact quality, EA infrastructure quality, EA service quality, EA culture, and EA use. The analysis presented in this paper shows that the EA benefit realization model is an instrument that demonstrates strong reliability and validity.
Resumo:
Critical-sized bone defect regeneration is a remaining clinical concern. Numerous scaffold-based strategies are currently being investigated to enable in vivo bone defect healing. However, a deeper understanding of how a scaffold influences the tissue formation process and how this compares to endogenous bone formation or to regular fracture healing is missing. It is hypothesized that the porous scaffold architecture can serve as a guiding substrate to enable the formation of a structured fibrous network as a prerequirement for later bone formation. An ovine, tibial, 30-mm critical-sized defect is used as a model system to better understand the effect of the scaffold architecture on cell organization, fibrous tissue, and mineralized tissue formation mechanisms in vivo. Tissue regeneration patterns within two geometrically distinct macroscopic regions of a specific scaffold design, the scaffold wall and the endosteal cavity, are compared with tissue formation in an empty defect (negative control) and with cortical bone (positive control). Histology, backscattered electron imaging, scanning small-angle X-ray scattering, and nanoindentation are used to assess the morphology of fibrous and mineralized tissue, to measure the average mineral particle thickness and the degree of alignment, and to map the local elastic indentation modulus. The scaffold proves to function as a guiding substrate to the tissue formation process. It enables the arrangement of a structured fibrous tissue across the entire defect, which acts as a secondary supporting network for cells. Mineralization can then initiate along the fibrous network, resulting in bone ingrowth into a critical-sized defect, although not in complete bridging of the defect. The fibrous network morphology, which in turn is guided by the scaffold architecture, influences the microstructure of the newly formed bone. These results allow a deeper understanding of the mode of mineral tissue formation and the way this is influenced by the scaffold architecture. Copyright © 2012 American Society for Bone and Mineral Research.