293 resultados para distributed denial-of-service attack


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Amci Pty Ltd ACN 124 249 485 v Corcoal Management Pty Ltd [2013] QSC 50 Jackson J considered an application for an order under r117 of the Uniform Civil Procedure Rules 1999 (Qld) (UCPR) in relation to informal service of an originating process on a corporation registered in the Ajman Free Zone in the United Arab Emirates. The decision appears to be the first time a Queensland court has examined the scope of r117 of the UCPR, and relevant considerations influencing the exercise of the discretion under the rule, when the defendant is outside Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although advances in technology now enable people to communicate 'anytime, anyplace', it is not clear how citizens can be motivated to actually do so. This paper evaluates the impact of three principles of psychological empowerment, namely perceived self-efficacy, sense of community and causal importance, on public transport passengers' motivation to report issues and complaints while on the move. A week-long study with 65 participants revealed that self-efficacy and causal importance increased participation in short bursts and increased perceptions of service quality over longer periods. Finally, we discuss the implications of these findings for citizen participation projects and reflect on design opportunities for mobile technologies that motivate citizen participation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The underlying logic of enterprise policy is that there are impediments to change in economic systems that can be traced to the path-dependent behaviors of economic actors that prevent them from exploring new knowledge and new ways of doing things. Enterprise policy involves firm-level interventions delivered by distributed networks of business advisors coordinated by knowledge intermediaries. These metagovernance arrangements are able to disrupt the path-dependent behaviors of organizations. The logic and benefits of enterprise policy are explored through reference to public administration, strategic management and evolutionary theory, and three case studies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Innovations are usually attributed to ideas generated in the minds of individuals. As we reflect upon the evolving design of an online project to engage students in learning science through hybridized writing activities we propose a more distributed view of the process of innovative design. That is, our experience suggests ideas are generated in the activity of interacting with human and material resources that expand and constrain possibilities. This project is innovative in that it is a new educational response to the problem of disengagement of students in science, and has proven to be effective in changing classroom practice and improving students’ scientific literacy. In this chapter, we identify the antecedents and trace the evolution of the project. This account illuminates the innovative design process, presents a summary of the evidence for the effectiveness of the project, and identifies future directions for further development and research. Keywords: Science learning, hybridized writing, case study, innovative approach

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mechanisms of intervention and the contexts they are used in interact in complex ways. This helps explain why we can’t overgeneralize about what works in respect of models of service designed to prevent or respond to homelessness. This said there are some key messages from the totality of evidence that has been accumulated to date. First homelessness would be a lot easier to prevent for first or subsequent episodes if adequate and appropriate (developmentally/ culturally) housing was available. Second (and often dependent on the first) timely support of a particular character ‘works’ both in a preventive sense and in periods when people experience ongoing challenges which may render them vulnerable to further homelessness. This paper reflects on some of the critical features of how we can generate and use evidence, and how these complement each other in important ways.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tilting-pad hydrodynamic thrust bearings are used in hydroelectric power stations around the world, reliably supporting turbines weighing hundreds of tonnes, over decades of service. Newer designs incorporate hydrostatic recesses machined into the sector-shaped pads to enhance oil film thickness at low rotational speeds. External pressurisation practically eliminates wear and enhances service life and reliability. It follows that older generating plants, lacking such assistance, stand to benefit from being retrofitted with hydrostatic lubrication systems. The design process is not trivial however. The need to increase the groove size to permit spontaneous lifting of the turbine under hydrostatic pressure, conflicts with the need to preserve performance of the original plane pad design. A haphazardly designed recess can induce a significant rise in bearing temperature concomitant with reduced mechanical efficiency and risk of thermal damage. In this work, a numerical study of a sector-shaped pad is undertaken to demonstrate how recess size and shape can affect the performance of a typical bearing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to investigate the role of multiple actors in the value creation process for a preventative health service, and observe the subsequent impact on key service outcomes of satisfaction and customer behaviour intentions to use a preventative health service again in the future. Design/methodology/approach An online self-completion survey of Australian women (n=797) was conducted to test the proposed framework in the context of a free, government-provided breastscreening service. Data were analysed using Structural Equation Modelling (SEM). Findings The findings indicate that functional and emotional value are created from organisational and customer resources. These findings indicate that health service providers and customers are jointly responsible for the successful creation of value, leading to desirable outcomes for all stakeholders. Practical implications The results highlight to health professionals the aspects of service that can be managed in order to create value with target audiences. The findings also indicate the importance of the resources provided by users in the creation of value, signifying the importance of customer education and management. Originality/value This study provides a significant contribution to social marketing through the provision of an empirically validated model of value creation in a preventative health service. The model demonstrates how the creation and provision of value can lead to the achievement of desirable social behaviours - a key aim of social marketing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Stress corrosion cracking (SCC) is a well known form of environmental attack in low carat gold jewellery. It is desirable to have a quick, easy and cost effective way to detect SCC in alloys and prevent them from being used and later failing in their application. A facile chemical method to investigate SCC of 9 carat gold alloys is demonstrated. It involves a simple application of tensile stress to a wire sample in a corrosive environment such as 1–10 % FeCl3 which induces failure in less than 5 minutes. In this study three quaternary (Au, Ag, Cu and Zn) 9 carat gold alloy compositions were investigated for their resistance to SCC and the relationship between time to failure and processing conditions is studied. It is envisaged that the use of such a rapid and facile screening procedure at the production stage may readily identify alloy treatments that produce jewellery that will be susceptible to SCC in its lifetime.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

• Government reports consistently recognise the importance of Primary Health Care to an efficient health system. Barriers identified in Australia’s Primary Health Care include workforce pressures, increase rate of chronic disease, and equitable access to Primary Health Care services. • General Practitioners (GPs) are the key to the successful delivery of Primary Health Care especially in rural and remote regions such as the Wheatbelt region in Western Australia (WA). • The Wheatbelt region of WA is vast: some 72,500 residents spread across 150,000km2 in 43 Local Government Authorities catchments. Majority of the Wheatbelt residents live in small towns. There is a higher reported rates of chronic disease, more at risk of chronic diseases and less utilisation of Primary Health Care services in this region. • General practice patients in the Wheatbelt are among those most in need of Primary Health Care services. • Wheatbelt GP Network (the “Network”) was established in 1998. It is a key health service delivery stakeholder in the Wheatbelt. • The Network has responded to the health needs of the community by creating a mobile Allied Health Team that works closely with GPs and is adaptive to ensure priority needs are met. • The Medicare Local model introduced by the Australian Government in 2011 aimed to improve the delivery of Primary Health Care services by improved health planning and coordinating service delivery. • Little if any recognition has been given to the outstanding work that many Divisions of General Practice have done in improving the delivery of Primary Health Care services such as the Network. • The Network has continued to support GPs and general practices and created a complementary system that integrated general practice with the work of an Allied Health Team. Its program mix is extensive. • The Network has consistently delivered on-required contract outputs and has a fifteen (15) years history of operating successfully in a large geographical area comprising in the main smaller communities that cannot support the traditional health services model. • The complexity of supporting International Medical Graduates in the region requires special attention. • The introduction of the Medicare Local in the South West of WA and their intention to take over the delivery of health services, thus effectively shutting the Network will have catastrophic consequences and cannot be supported economically. • The Network proposes to create a new model, built on its past work that increases the delivery of Primary Health Care services through its current Allied Health Team. • The proposal uses the Wheatbelt GP Super Clinic currently under construction in Northam, part of the Network and funded by the Australian Government is a key to the proposed new model. • Wheatbelt GP Super Clinic is different from existing models of GP Super Clinics around Australia which focus predominately on co-location of services. Wheatbelt GP Super Clinic utilises a hub and spoke model of service outreach to small rural towns to ensure equitable Primary Health Care coverage and continuum of care in a financially responsible and viable manner. In particular, the Wheatbelt GP Super Clinic recognises the importance of Allied Health Professionals and will involve them in a collaborative model with rural general practice. • The proposed model advocated by the Network aims to substitute the South West WA Medicare Local direct service delivery proposed for the Wheatbelt. The Network’s proposed model is to expand on the current hub and spoke model of Primary Health Care delivery to otherwise small unviable Wheatbelt towns. A flexible and adaptive skill mix of Allied Health Professionals, Nurse Practitioners and GPs ensure equitable access to service. Expanded scope of practices are utilised to reduce duplication of service and concentration of services in major towns. This involves a partnership approach. • If the proposed model not funded, the Network and the Wheatbelt region will stand to lose 16 Allied Health Professionals and defeats the purpose of Australian Government current funding for the construction of the Wheatbelt GP Super Clinic. • The Network has considered how its model can best be funded. It proposes a re-allocation of funds made available to the South West WA Medicare Local. • This submission argues that the proposal for the South West WA Medicare Local to take over the service delivery of Primary Health Care services in the Wheatbelt makes no economic sense when an existing agency (the Network) has the infrastructure in place, is experienced in working in this geographical area that has special needs and is capable to expand its programs to meet demand.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Trivium is a bit-based stream cipher in the final portfolio of the eSTREAM project. In this paper, we apply the algebraic attack approach of Berbain et al. to Trivium-like ciphers and perform new analyses on them. We demonstrate a new algebraic attack on Bivium-A. This attack requires less time and memory than previous techniques to recover Bivium-A's initial state. Though our attacks on Bivium-B, Trivium and Trivium-N are worse than exhaustive keysearch, the systems of equations which are constructed are smaller and less complex compared to previous algebraic analyses. We also answer an open question posed by Berbain et al. on the feasibility of applying their technique on Trivium-like ciphers. Factors which can affect the complexity of our attack on Trivium-like ciphers are discussed in detail. Analysis of Bivium-B and Trivium-N are omitted from this manuscript. The full paper is available on the IACR ePrint Archive.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘SUGAR: Service users and carers group advising on research’ is an exciting initiative established to develop collaborative working in mental health nursing research between mental health service users, carers, researchers and practitioners at City University London, UK. This paper will describe the background to SUGAR and how and why it was established; how the group operates; some of the achievements to date including researcher reflections; and case studies of how this collaboration influences our research. Written reflective narratives of service user and carer experiences of SUGAR were analysed using constant comparative methods by the members. Common themes are presented with illustrative quotes. The article highlights the benefits and possible limitations identified so far by members of SUGAR; outlines future plans and considers the findings in relation to literature on involvement and empowerment. This paper has been written by staff and members of SUGAR and is the first venture into collaborative writing of the group and reflects the shared ethos of collaborative working.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There has been growing recognition of the contribution that Sessional Academics make to student learning in higher education; with recent studies concluding that around half Australian university teaching is now performed by casual staff [Red Report 2008; May, 2013]. However, sector-wide research and institutional audits continue to raise concerns about academic development and quality assurance, as well as the recognition and retention of Sessional Academics. In response, universities offer academic development programs. However, while such centrally offered programs are undoubtedly useful, they are necessarily generic and cannot address the local contexts of faculties or provide ‘on the ground’ support. This paper presents a new, distributed model of academic support and development for Sessional academics at Queensland University of Technology. Entitled the Sessional Academic Success program, it employs the principles of distributed leadership. Experienced Sessional academics are trained and supported to assume roles as Sessional Academic Success Advisors within their schools. Complementing our central programs, they design bespoke, locally situated, peer-to-peer academic development for new Sessional teachers; provide ‘just in time’, safe and reliable advice; and build supportive communities of teaching practice in their local contexts. This distributed model re-envisages the forms and places of academic development and support. It helps ensure that new Sessional Academics are embraced by faculty life. And, recognizing that experienced Sessional Academics have much to contribute to the advancement of learning and teaching, it builds their capacity through leadership opportunities. As the designer/facilitator of the program and a Sessional Academic Success Advisor, the authors take a dialogic approach and together describe the design, implementation and outcomes of the program.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective To describe the changing prevalence of healthcare- and community-associated MRSA. Methods Susceptibility phenotypes of MRSA were observed from 2000 to 2012 using routine susceptibility data. Phenotypic definitions of major clones were validated by genotyping isolates from a nested period prevalence survey in 2011. Results The predominant healthcare-associated (AUS-2/3 like) MRSA phenotype decreased from 42 to 14 isolates per million occasions of service in outpatients (P < 0.0001) and from 650 to 75 isolates per million accrued patient days in inpatients (P 0.0005), while the respective rates of the healthcare-related EMRSA-15 like phenotype increased from 1 to 19 in outpatients (P < 0.0001) and from 11 to 83 in inpatients (P < 0.0001) and those of the community-associated MRSA phenotype increased from 17 to 296 in outpatients (P < 0.0001) and from 71 to 486 in inpatients (P < 0.0001). When compared with single nucleotide polymorphism genotyping the AUS-2/3 like phenotype had a sensitivity and positive predictive value (PPV) for CC239 of 1 and 0.791 respectively, while the EMRSA-15 like phenotype had a sensitivity and PPV for CC22 of 0.903 and 0.774. PVL-positive CA-MRSA, predominantly ST93 and CC30, accounted for 60.8% of MRSA, while PVL-negative CA-MRSA, mainly CC5 and CC1, accounted for 21.4%. Conclusions The initially dominant healthcare-associated MRSA clone has been progressively replaced, mainly by four community-associated lineages.