295 resultados para Secure protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To investigate the effects of educational interventions on the behaviour and clinical practice of health professionals, and subsequent patient outcomes related to prevention of foot ulceration in people with diabetes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of intensive glycaemic control compared to conventional control on the outcome of foot ulcers in patients with type 1 and type 2 diabetes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Despite advancements in our understanding of the importance of stress reduction in achieving good health, we still only have limited insight into the impact of stress on cellular function. Recent studies have suggested that exposure to prolonged psychological stress may alter an individual's physiological responses, and contribute to morbidity and mortality. This paper presents an overview of the study protocol we are using to examine the impact of life stressors on lifestyle factors, health-related quality of life and novel and established biomarkers of stress in midlife and older Australian women.The primary aim of this study is to explore the links between chronic psychological stress on both subjective and objective health markers in midlife and older Australian women. The study examines the extent to which exposure frightening, upsetting or stressful events such as natural disasters, illness or death of a relative, miscarriage and relationship conflict is correlated with a variety of objective and subjective health markers.Methods/design: This study is embedded within the longitudinal Healthy Aging of Women's study which has collected data from midlife and older Australian women at 5 yearly intervals since 2001, and uses the Allostastic model of women's health by Groer and colleagues in 2010. The current study expands the focus of the HOW study and will assess the impact of life stressors on quality of life and clinical biomarkers in midlife and older Australian women to explain the impact of chronic psychological stress in women. DISCUSSION: The proposed study hypothesizes that women are at increased risk of exposure to multiple or repeated stressors, some being unique to women, and the frequency and chronicity of stressors increases women's risk of adverse health outcomes. This study aims to further our understanding of the relationships between stressful life experiences, perceived quality of life, stress biomarkers, chronic illness, and health status in women.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stream ciphers are symmetric key cryptosystems that are used commonly to provide confidentiality for a wide range of applications; such as mobile phone, pay TV and Internet data transmissions. This research examines the features and properties of the initialisation processes of existing stream ciphers to identify flaws and weaknesses, then presents recommendations to improve the security of future cipher designs. This research investigates well-known stream ciphers: A5/1, Sfinks and the Common Scrambling Algorithm Stream Cipher (CSA-SC). This research focused on the security of the initialisation process. The recommendations given are based on both the results in the literature and the work in this thesis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives To describe the intervention protocol for the first multilevel ecological intervention for physical activity in retirement communities that addresses individual, interpersonal and community influences on behavior change. Design A cluster randomized controlled trial design was employed with two study arms: a physical activity intervention and an attention control successful aging condition. Setting Sixteen continuing care retirement communities in San Diego County. Participants Three hundred twenty older adults, aged 65 years and older, are being recruited to participate in the trial. In addition, peer leaders are being recruited to lead some study activities, especially to sustain the intervention after study activities ceased. Intervention Participants in the physical activity trial receive individual, interpersonal and community intervention components. The individual level components include pedometers, goal setting and individual phone counseling. The interpersonal level components include group education sessions and peer-led activities. The community level components include resource audits and enumeration, tailored walking maps, and community improvement projects. The successful aging group receives individual and group attention about successful aging topics. Measurements The main outcome is light to moderate physical activity, measured objectively by accelerometry. Other objective outcomes included physical functioning, blood pressure, physical fitness, and cognitive functioning. Self report measures include depressive symptoms and health related quality of life. Results The intervention is being delivered successfully in the communities and compliance rates are high. Conclusion Ecological Models call for interventions that address multiple levels of the model. Previous studies have not included components at each level and retirement communities provide a model environment to demonstrate how to implement such an intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: The intense pain and anxiety triggered by burns and their associated wound care procedures are well established in the literature. Non-pharmacological intervention is a critical component of total pain management protocols and is used as an adjunct to pharmacological analgesia. An example is virtual reality, which has been used effectively to dampen pain intensity and unpleasantness. Possible links or causal relationships between pain/anxiety/stress and burn wound healing have previously not been investigated. The purpose of this study is to investigate these relationships, specifically by determining if a newly developed multi-modal procedural preparation and distraction device (Ditto) used during acute burn wound care procedures will reduce the pain and anxiety of a child and increase the rate of re-epithelialization. METHODS/DESIGN: Children (4 to 12 years) with acute burn injuries presenting for their first dressing change will be randomly assigned to either the (1) Control group (standard distraction) or (2) Ditto intervention group (receiving Ditto, procedural preparation and Ditto distraction). It is intended that a minimum of 29 participants will be recruited for each treatment group. Repeated measures of pain intensity, anxiety, stress and healing will be taken at every dressing change until complete wound re-epithelialization. Further data collection will aid in determining patient satisfaction and cost effectiveness of the Ditto intervention, as well as its effect on speed of wound re-epithelialization. DISCUSSION: Results of this study will provide data on whether the disease process can be altered by reducing stress, pain and anxiety in the context of acute burn wounds. TRIAL REGISTRATION: ACTRN12611000913976.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: In the paediatric population, pain and distress associated with burn injuries during wound care procedures remain a constant challenge. Although silver dressings are the gold standard for burn care in Australasia, very few high-level trials have been conducted that compare silver dressings to determine which will provide the best level of care clinically. Therefore, for paediatric patients in particular, identifying silver dressings that are associated with lower levels of pain and rapid wound re-epithelialisation is imperative. This study will determine whether there is a difference in time to re-epithelialisation and pain and distress experienced during wound care procedures among Acticoat, Acticoat combined with Mepitel and Mepilex Ag dressings for acute, paediatric partial thickness burns. METHODS/DESIGN: Children aged 0 to 15 years with an acute partial thickness (superficial partial to deep partial thickness inclusive) burn injury and a burn total body surface area of

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Globally, alcohol-related injuries cause millions of deaths and huge economic loss each year . The incidence of facial (jawbone) fractures in the Northern Territory of Australia is second only to Greenland, due to a strong involvement of alcohol in its aetiology, and high levels of alcohol consumption. The highest incidences of alcohol-related trauma in the Territory are observed amongst patients in the Maxillofacial Surgery Unit of the Royal Darwin Hospital. Accordingly, this project aims to introduce screening and brief interventions into this unit, with the aims of changing health service provider practice, improving access to care, and improving patient outcomes. Methods Establishment of Project Governance: The project governance team includes a project manager, project leader, an Indigenous Reference Group (IRG) and an Expert Reference Group (ERG). Development of a best practice pathway: PACT project researchers collaborate with clinical staff to develop a best practice pathway suited to the setting of the surgical unit. The pathway provides clear guidelines for screening, assessment, intervention and referral. Implementation: The developed pathway is introduced to the unit through staff training workshops and associate resources and adapted in response to staff feedback. Evaluation: File audits, post workshop questionnaires and semi-structured interviews are administered. Discussion This project allows direct transfer of research findings into clinical practice and can inform future hospital-based injury prevention strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to prove the security of AKE protocols even when the adversary learns certain secret values. In this work, we address more granular leakage: partial leakage of long-term secrets of protocol principals, even after the session key is established. We introduce a generic key exchange security model, which can be instantiated allowing bounded or continuous leakage, even when the adversary learns certain ephemeral secrets or session keys. Our model is the strongest known partial-leakage-based security model for key exchange protocols. We propose a generic construction of a two-pass leakage-resilient key exchange protocol that is secure in the proposed model, by introducing a new concept: the leakage-resilient NAXOS trick. We identify a special property for public-key cryptosystems: pair generation indistinguishability, and show how to obtain the leakage-resilient NAXOS trick from a pair generation indistinguishable leakage-resilient public-key cryptosystem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a framework for adaptive security from hard random lattices in the standard model. Our approach borrows from the recent Agrawal-Boneh-Boyen families of lattices, which can admit reliable and punctured trapdoors, respectively used in reality and in simulation. We extend this idea to make the simulation trapdoors cancel not for a specific forgery but on a non-negligible subset of the possible challenges. Conceptually, we build a compactly representable, large family of input-dependent “mixture” lattices, set up with trapdoors that “vanish” for a secret subset which we hope the forger will target. Technically, we tweak the lattice structure to achieve “naturally nice” distributions for arbitrary choices of subset size. The framework is very general. Here we obtain fully secure signatures, and also IBE, that are compact, simple, and elegant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in “cross-site user impersonation” to each other. It enables a person to authenticate (with) arbitrarily many independent servers, over adversarial channels, using a memorable and reusable single short password. Beside the usual PAKE security guarantees, our framework goes to lengths to secure the password against brute-force cracking from privileged server information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.