60 resultados para Secure Multi-Party Computation


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Clean Energy Agreement of the MPCCC On 10 July 2011, details of the Multi-Party Climate Change Committee’s Clean Energy Agreement for implementing a carbon price were released. This included an agreed package of measures that the Committee considered would enable Australia to meet its emissions reduction targets in an environmentally and economically efficient way. A copy of the agreement can be found on the website of the Department of Climate Change and Energy Efficiency...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

On 24 February 2011 the Multi-Party Climate Change Committee released the broad architecture for a carbon pricing scheme, which is scheduled to commence on 1 July 2012. The proposed mechanism has been agreed by the members of the Multi-Party Climate Change Committee representing the Government and the Australian Greens. Independents Mr Windsor and Mr Oakeshott agreed to the release of the proposal to enable consideration of it, but have not commented on its contents.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Australian Accounting Research Foundation (AARF) recently issued Legislative Policy Discussion Paper No.4 which proposes a framework for financial reporting by Australian incorporated associations.This paper comments on both the merits and deficiencies of the proposal. In particular it notes that the proposal simply advocates that the application of differential reporting, accounting standards, and the conceptual framework be imposed on incorporated associations by amended statutes. It is noted that in light of long experience in the corporate sector, he espoused benefits of such a move may not eventuate. Further, concern is expressed that the proposal is a blank cheque one because of the inadequacy of existing relevant accounting standards and the proposal to introduce new relevant standards. Another major defect in the proposal is that it emanates from accountants who acknowledge in their conceptual framework, the need for external reports to report on performance through both financial and non-financial reporting methods. Despite that acknowledgment, the standard set of external reports prepared by accountants do not measure performance as defined in their own conceptual framework (SAC 2) and in their auditing pronouncements (AUP 33), and they have restricted their domain to financial reporting (SAC 2). Accordingly the proposal appears to be seriously deficient and it is suggested that it be rejected and a new proposal be prepared by a multi-party group free from vested interests.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a September 2010 media release the Prime Minister of Australia presented the terms of reference for the newly established Multi-Party Climate Change Committee. Although the Committee is charged with considering climate change mitigation measures in general, specifically the Committee must consider an appropriate mechanism for the establishment of a carbon price. The purpose of this article is to provide an overview of the mechanisms to be considered by the Climate Change Committee, including the use of emissions trading and carbon levies in other jurisdictions. This article argues that for any effective investigation of a carbon price for Australia to occur, a thorough knowledge of other jurisdictions’ methods for carbon pricing is essential.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two of the government’s six media reform bills passed in the House of Representatives with multi-party support on Tuesday 19 March. While most attention and debate has focused on the regulation of the news media and ownership, the changes approved on 19 March are both significant and far-reaching.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Australia, collaborative contracts, and in particular, project alliances, have been increasingly used to govern infrastructure projects. These contracts use formal and informal governance mechanisms to manage the delivery of infrastructure projects. Formal mechanisms such as financial risk sharing are specified in the contract, while informal mechanisms such as integrated teams are not. Given that the literature contains a multiplicity of often untestable definitions, this paper reports on a review of the literature to operationalize the concepts of formal and informal governance. This work is the first phase of a study that will examine the optimal balance of formal and informal governance structures. Desk-top review of leading journals in the areas of construction management and business management, as well as recent government documents and industry guidelines, was undertaken to to conceptualise and operationalize formal and informal governance mechanisms. The study primarily draws on transaction-cost economics (e.g. Williamson 1979; Williamson 1991), relational contract theory (Feinman 2000; Macneil 2000) and social psychology theory (e.g. Gulati 1995). Content analysis of the literature was undertaken to identify key governance mechanisms. Content analysis is a commonly used methodology in the social sciences area. It provides rich data through the systematic and objective review of literature (Krippendorff 2004). NVivo 9, a qualitative data analysis software package, was used to assist in this process. A previous study by the authors identified that formal governance mechanisms can be classified into seven measurable categories: (1) negotiated cost, (2) competitive cost, (3) commercial framework, (4) risk and reward sharing, (5) qualitative performance, (6) collaborative multi-party agreement, and (7) early contractor involvement. Similarly, informal governance mechanisms can be classified into four measureable categories: (1) leadership structure, (2) integrated team, (3) team workshops, and (4) joint management system. This paper explores and further defines the key operational characteristics of each mechanism category, highlighting its impact on value for money in alliance project delivery. The paper’s contribution is that it provides the basis for future research to compare the impact of a range of individual mechanisms within each category, as a means of improving the performance of construction projects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In Australia, collaborative contracts have been increasingly used to govern infrastructure projects. These contracts combine formal and informal mechanisms to manage project delivery. Formal mechanisms (e.g. financial risk sharing) are specified in the contract, while informal mechanisms (e.g. integrated team) are not. The paper reports on a literature review to operationalise the concepts of formal and informal governance, as the literature contains a multiplicity of, often un-testable, definitions. This work is the first phase of a study that will examine the optimal balance of formal and informal governance structures. Desk-top review of leading journals in the areas of construction management and business management, as well as recent government documents and industry guidelines, was undertaken to to conceptualise and operatinalise formal and informal governance mechanisms. The study primarily draws on transaction-cost economics (e.g. Williamson 1979; 1991), relational contract theory (Feinman 2000; Macneil 2000) and social psychology theory (e.g. Gulati 1995). Content analysis of the literature was undertaken to identify key governance mechanisms. Content analysis is a commonly used methodology in the social sciences area. It provides rich data through the systematic and objective review of literature (Krippendorff 2004). NVivo 9, a qualitative data analysis software package, was used to assist in this process. Formal governance mechanisms were found to be usefully broken down into four measurable categories: (1) target cost arrangement (2) financial risk and reward sharing regime (3) transparent financials and (4) collaborative multi-party agreement Informal governance mechanisms were found to be usefully broken down into three measurable categories: (1) leadership structure (2) integrated team (3) joint management system We expect these categories to effectively capture the key governance drivers of outcomes on infrastructure projects. These categories will be further refined and broken down into individual governance mechanisms for assessment through a large-scale Australian survey planned for late 2012. These individual mechanisms will feature in the questionnaire that QUT will deliver to AAA in October 2012.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We consider a new form of authenticated key exchange which we call multi-factor password-authenticated key exchange, where session establishment depends on successful authentication of multiple short secrets that are complementary in nature, such as a long-term password and a one-time response, allowing the client and server to be mutually assured of each other's identity without directly disclosing private information to the other party. Multi-factor authentication can provide an enhanced level of assurance in higher-security scenarios such as online banking, virtual private network access, and physical access because a multi-factor protocol is designed to remain secure even if all but one of the factors has been compromised. We introduce a security model for multi-factor password-authenticated key exchange protocols, propose an efficient and secure protocol called MFPAK, and provide a security argument to show that our protocol is secure in this model. Our security model is an extension of the Bellare-Pointcheval-Rogaway security model for password-authenticated key exchange and accommodates an arbitrary number of symmetric and asymmetric authentication factors.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper discusses practical issues related to the use of the division model for lens distortion in multi-view geometry computation. A data normalisation strategy is presented, which has been absent from previous discussions on the topic. The convergence properties of the Rectangular Quadric Eigenvalue Problem solution for computing division model distortion are examined. It is shown that the existing method can require more than 1000 iterations when dealing with severe distortion. A method is presented for accelerating convergence to less than 10 iterations for any amount of distortion. The new method is shown to produce equivalent or better results than the existing method with up to two orders of magnitude reduction in iterations. Through detailed simulation it is found that the number of data points used to compute geometry and lens distortion has a strong influence on convergence speed and solution accuracy. It is recommended that more than the minimal number of data points be used when computing geometry using a robust estimator such as RANSAC. Adding two to four extra samples improves the convergence rate and accuracy sufficiently to compensate for the increased number of samples required by the RANSAC process.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i  > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any tsecure for any t

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Dispersing a data object into a set of data shares is an elemental stage in distributed communication and storage systems. In comparison to data replication, data dispersal with redundancy saves space and bandwidth. Moreover, dispersing a data object to distinct communication links or storage sites limits adversarial access to whole data and tolerates loss of a part of data shares. Existing data dispersal schemes have been proposed mostly based on various mathematical transformations on the data which induce high computation overhead. This paper presents a novel data dispersal scheme where each part of a data object is replicated, without encoding, into a subset of data shares according to combinatorial design theory. Particularly, data parts are mapped to points and data shares are mapped to lines of a projective plane. Data parts are then distributed to data shares using the point and line incidence relations in the plane so that certain subsets of data shares collectively possess all data parts. The presented scheme incorporates combinatorial design theory with inseparability transformation to achieve secure data dispersal at reduced computation, communication and storage costs. Rigorous formal analysis and experimental study demonstrate significant cost-benefits of the presented scheme in comparison to existing methods.