818 resultados para high security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Direct instruction, an approach that is becoming familiar to Queensland schools that have high Aboriginal and Torres Strait Islander populations, has been gaining substantial political and popular support in the United States of America [USA], England and Australia. Recent examples include the No Child Left Behind policy in the USA, the British National Numeracy Strategy and in Australia, Effective Third Wave Intervention Strategies. Direct instruction, stems directly from the model created in the 1960s under a Project Follow Through grant. It has been defined as a comprehensive system of education involving all aspects of instruction. Now in its third decade of influencing curriculum, instruction and research, direct instruction is also into its third decade of controversy because of its focus on explicit and highly directed instruction for learning. Characteristics of direct instruction are critiqued and discussed to identify implications for teaching and learning for Indigenous students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Variable Speed Limits (VSL) is a control tool of Intelligent Transportation Systems (ITS) which can enhance traffic safety and which has the potential to contribute to traffic efficiency. This study presents the results of a calibration and operational analysis of a candidate VSL algorithm for high flow conditions on an urban motorway of Queensland, Australia. The analysis was done using a framework consisting of a microscopic simulation model combined with runtime API and a proposed efficiency index. The operational analysis includes impacts on speed-flow curve, travel time, speed deviation, fuel consumption and emission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The results of pressure-tuning Raman spectroscopic, X-ray powder diffraction and solid-state 13C-NMR studies of selected dicarboxylate anions intercalated in a Mg-Al layered double hydroxide (talcite) lattice are reported. The pressure dependences of the vibrational modes are linear for pressures up to 4.6 GPa indicating that no phase transitions occur. The interlayer spacings show that the oxalate, malonate and succinate dianions are oriented perpendicular to the layers, but the glutarate and adipate are tilted. The solid-state 13C-NMR spectra of these materials show full chemical shift anisotropy and, therefore, the anions are not mobile at room temperature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a novel method and instrument for in vivo imaging and measurement of the human corneal dynamics during an air puff. The instrument is based on high-speed swept source optical coherence tomography (ssOCT) combined with a custom adapted air puff chamber from a non-contact tonometer, which uses an air stream to deform the cornea in a non-invasive manner. During the short period of time that the deformation takes place, the ssOCT acquires multiple A-scans in time (M-scan) at the center of the air puff, allowing observation of the dynamics of the anterior and posterior corneal surfaces as well as the anterior lens surface. The dynamics of the measurement are driven by the biomechanical properties of the human eye as well as its intraocular pressure. Thus, the analysis of the M-scan may provide useful information about the biomechanical behavior of the anterior segment during the applanation caused by the air puff. An initial set of controlled clinical experiments are shown to comprehend the performance of the instrument and its potential applicability to further understand the eye biomechanics and intraocular pressure measurements. Limitations and possibilities of the new apparatus are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dry eye syndrome is one of the most commonly reported eye health conditions. Dynamic-area highspeed videokeratoscopy (DA-HSV) represents a promising alternative to the most invasive clinical methods for the assessment of the tear film surface quality (TFSQ), particularly as Placido-disk videokeratoscopy is both relatively inexpensive and widely used for corneal topography assessment. Hence, improving this technique to diagnose dry eye is of clinical significance and the aim of this work. First, a novel ray-tracing model is proposed that simulates the formation of a Placido image. This model shows the relationship between tear film topography changes and the obtained Placido image and serves as a benchmark for the assessment of indicators of the ring’s regularity. Further, a novel block-feature TFSQ indicator is proposed for detecting dry eye from a series of DA-HSV measurements. The results of the new indicator evaluated on data from a retrospective clinical study, which contains 22 normal and 12 dry eyes, have shown a substantial improvement of the proposed technique to discriminate dry eye from normal tear film subjects. The best discrimination was obtained under suppressed blinking conditions. In conclusion,this work highlights the potential of the DA-HSV as a clinical tool to diagnose dry eye syndrome.