381 resultados para secure protocal
Resumo:
Database watermarking has received significant research attention in the current decade. Although, almost all watermarking models have been either irreversible (the original relation cannot be restored from the watermarked relation) and/or non-blind (requiring original relation to detect the watermark in watermarked relation). This model has several disadvantages over reversible and blind watermarking (requiring only watermarked relation and secret key from which the watermark is detected and original relation is restored) including inability to identify rightful owner in case of successful secondary watermarking, inability to revert the relation to original data set (required in high precision industries) and requirement to store unmarked relation at a secure secondary storage. To overcome these problems, we propose a watermarking scheme that is reversible as well as blind. We utilize difference expansion on integers to achieve reversibility. The major advantages provided by our scheme are reversibility to high quality original data set, rightful owner identification, resistance against secondary watermarking attacks, and no need to store original database at a secure secondary storage.
Resumo:
Ever since Cox et. al published their paper, “A Secure, Robust Watermark for Multimedia” in 1996 [6], there has been tremendous progress in multimedia watermarking. The same pattern re-emerged with Agrawal and Kiernan publishing their work “Watermarking Relational Databases” in 2001 [1]. However, little attention has been given to primitive data collections with only a handful works of research known to the authors [11, 10]. This is primarily due to the absence of an attribute that differentiates marked items from unmarked item during insertion and detection process. This paper presents a distribution-independent, watermarking model that is secure against secondary-watermarking in addition to conventional attacks such as data addition, deletion and distortion. The low false positives and high capacity provide additional strength to the scheme. These claims are backed by experimental results provided in the paper.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS). A UDVS scheme can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature (not necessarily the signer) to designate the signature to any desired designated-verifier (using the verifier’s public key). Given the designated-signature, the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. We propose an efficient deterministic UDVS scheme constructed using any bilinear group-pair. Our UDVS scheme functions as a standard Boneh-Lynn-Shacham (BLS) signature when no verifier-designation is performed, and is therefore compatible with the key-generation, signing and verifying algorithms of the BLS scheme. We prove that our UDVS scheme is secure in the sense of our unforgeability and privacy notions for UDVS schemes, under the Bilinear Diffie-Hellman (BDH) assumption for the underlying group-pair, in the random-oracle model. We also demonstrate a general constructive equivalence between a class of unforgeable and unconditionally-private UDVS schemes having unique signatures (which includes the deterministic UDVS schemes) and a class of ID-Based Encryption (IBE) schemes which contains the Boneh-Franklin IBE scheme but not the Cocks IBE scheme.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
This project is led by scientists in conservation decision appraisal and brings together a group of experts working across the Lake Eyre Basin (LEB). The LEB covers a sixth of Australia, with an array of globally significant natural values that are threatened by invasive plants, among other things. Managers at various levels are investing in attempts to control, contain and eradicate these invasive plant species, under severe time and resources limitations. To date there has been no basin-wide assessment of which weed management strategies and locations provide the best investments for maximising outcomes for biodiversity per unit cost. Further, there has been no assessment of the extent of ecosystem intactness that may be lost without effective invasive plant species management strategies. Given that there are insufficient resources to manage all invasive plant species everywhere, this information has the potential to improve current investment decisions. Here, we provide a prioritisation of invasive plant management strategies in the LEB. Prioritisation was based on cost-effectiveness for biodiversity benefits. We identify the key invasive plant species to target to protect ecosystem intactness across the bioregions of the LEB, the level of investment required and the likely reduction in invasive species dominance gained per dollar spent on each strategy. Our focus is on strategies that are technically and socially feasible and reduce the likelihood that high impact invasive plant species will dominate native ecosystems, and therefore change their form and function. The outputs of this work are designed to help guide decision-making and further planning and investment in weed management for the Basin. Experts in weed management, policy-making, community engagement, biodiversity and natural values of the Basin, attended a workshop and agreed upon 12 strategies to manage invasive plants. The strategies focused primarily on 10 weeds which were considered to have a high potential for broad, significant impacts on natural ecosystems in the next 50 years and for which feasible management strategies could be defined. Each strategy consisted of one or more supporting actions, many of which were spatially linked to IBRA (Interim Biogeographical Regionalisation of Australia) bioregions. The first strategy was an over-arching recommendation for improved mapping, information sharing, education and extension efforts in order to facilitate the more specific weed management strategies. The 10 more specific weed management strategies targeted the control and/or eradication of the following high-impact exotic plants: mesquite, parkinsonia, rubber vine, bellyache bush, cacti, mother of millions, chinee apple, athel pine and prickly acacia, as well as a separate strategy for eradicating all invasive plants from one key threatened ecological community, the GAB (Great Artesian Basin dependant) mound springs. Experts estimated the expected biodiversity benefit of each strategy as the reduction in area that an invasive plant species is likely to dominate in over a 50-year period, where dominance was defined as more than 30% coverage at a site. Costs were estimated in present day terms over 50 years largely during follow up discussions post workshop. Cost-effectiveness was then calculated for each strategy in each bioregion by dividing the average expected benefit by the average annual costs. Overall, the total cost of managing 12 invasive plant strategies over the next 50 years was estimated at $1.7 billion. It was estimated that implementation of these strategies would result in a reduction of invasive plant dominance by 17 million ha (a potential 32% reduction), roughly 14% of the LEB. If only targeting Weeds of National Significance (WONS), the total cost was estimated to be $113 million over the next 50 years. Over the next 50 years, $2.3 million was estimated to eradicate all invasive plant species from the Great Artesian Basin Mound Springs threatened ecological community. Prevention and awareness programs were another key strategy targeted across the Basin and estimated at $17.5 million in total over 50 years. The cost of controlling, eradicating and containing buffel grass were the most expensive, over $1.5 billion over 50 years; this strategy was estimated to result in a reduction in buffel grass dominance of a million ha in areas where this species is identified as an environmental problem. Buffel grass has been deliberately planted across the Basin for pasture production and is by far the most widely distributed exotic species. Its management is contentious, having economic value to many graziers while posing serious threats to biodiversity and sites of high cultural and conservation interest. The strategy for containing and locally eradicating buffel grass was a challenge to cost based on expert knowledge, possibly because of the dual nature of this species as a valued pastoral grass and environmental weed. Based on our conversations with experts, it appears that control and eradication programs for this species, in conservation areas, are growing rapidly and that information on the most cost-effective strategies for this species will continue to develop over time. The top five most cost-effective strategies for the entire LEB were for the management of: 1) parkinsonia, 2) chinee apple, 3) mesquite, 4) rubber vine and 5) bellyache bush. Chinee apple and mother of millions are not WONS and have comparatively small populations within the semi-arid bioregions of Queensland. Experts felt that there was an opportunity to eradicate these species before they had the chance to develop into high-impact species within the LEB. Prickly acacia was estimated to have one of the highest benefits, but the costs of this strategy were high, therefore it was ranked 7th overall. The buffel grass strategy was ranked the lowest (10th) in terms of cost effectiveness. The top five most cost-effective strategies within and across the bioregions were the management of: 1) parkinsonia in the Channel Country, 2) parkinsonia in the Desert Uplands, 3) mesquite in the Mitchell Grass Downs, 4) parkinsonia in the Mitchell Grass Downs, and 5) mother of millions in the Desert Uplands. Although actions for several invasive plant species like parkinsonia and prickly acacia were concentrated in the Queensland part of the LEB, the actions involved investing in containment zones to prevent the spread of these species into other states. In the NT and SA bioregions of the LEB, the management of athel pine, parkinsonia and cacti were the main strategies. While outside the scientific research goals of study, this work highlighted a number of important incidental findings that led us to make the following recommendations for future research and implementation of weed management in the Basin: • Ongoing stakeholder engagement, extension and participation is required to ensure this prioritisation effort has a positive impact in affecting on-ground decision making and planning. • Short term funding for weed management was identified as a major reason for failure of current efforts, hence future funding needs to be secure and ongoing. • Improved mapping and information sharing is essential to implement effective weed management. • Due to uncertainties in the outcomes and impacts of management options, strategies should be implemented as part of an adaptive management program. The information provided in this report can be used to guide investment for controlling high-impact invasive plant species for the benefits of biodiversity conservation. We do not present a final prioritisation of invasive plant strategies for the LEB, and we have not addressed the cultural, socio-economic or spatial components necessary for an implementation plan. Cost-effectiveness depends on the objectives used; in our case we used the intactness of ecosystems as a surrogate for expected biodiversity benefits, measured by the extent that each invasive plant species is likely to dominate in a bioregion. When other relevant factors for implementation are considered the priorities may change and some actions may not be appropriate in some locations. We present the costs, ecological benefits and cost-effectiveness of preventing, containing, reducing and eradicating the dominance of high impact invasive plants through realistic management actions over the next 50 years. In doing so, we are able to estimate the size of the weed management problem in the LEB and provide expert-based estimates of the likely outcomes and benefits of implementing weed management strategies. The priorities resulting from this work provide a prospectus for guiding further investment in management and in improving information availability.
Resumo:
Like the UK, Australia has a number of school nursing models and programmes. The School Based Youth Health Nurse Program (SBYHNP) is a new and unique model of school nursing in Queensland, Australia. The SBYHNP represents a philosophical and structural shift from traditional school nursing programmes. The purpose of this qualitative case study is to explore the reasons School Based Youth Health Nurses (SBYHN) leave school nursing. Sixteen in-depth interviews were conducted with participants who practiced as SBYHN and left the SBYHNP. This case study reveals six themes: The politics’: Navigating the organisational divide, 'Unconditional positive regard’: Surviving without team cohesion, 'Absolutely exhausted’: Maintaining physical and emotional strength, ‘Definitely geographical’: Managing the tyranny of time and distance, ‘If things fell into place’: Thinking about what could have been, and ‘A stepping stone’: Moving on to the next nursing position. This case study suggests nurses considering school nursing as a specialty should seek opportunity to understand this complex role, ensure realistic expectations and ndertake relevant qualifications. This approach may secure the investment made by nurses and schools and create demand for a highly sort after position.
Resumo:
Inspired by similar reforms introduced in New Zealand, Canada and the United States, the Commonwealth, with the co-operation of the States, seeks in the Personal Property Securities Bill 2008 (the Bill) to introduce a central repository of recorded information reflecting particular security interests in personal property in Australia. Specifically, the interest recorded is an interest in personal property provided for by a transaction that in substance secures the payment or the performance of an obligation. In addition to providing a notification of the use of the personal property as collateral to secure the payment of monies or the performance of an obligation, the Bill proposes to introduce a regime of prioritising interests in the same collateral. Central to this prioritisation are the concepts of a ‘perfected security interests’and ‘unperfected security interests’. Relevantly, a perfected security interest in collateral has priority over an unperfected security interest in the same collateral. The proposed mechanisms rely on the fundamental integer of personal property, which is defined as any property other than land. Recognising that property may take a tangible as well as an intangible form, the Bill reflects an appreciation of the fact that some property may have a tangible form which may act as collateral, and simultaneously the same property may involve other property, intangible property in the form of intellectual property rights, which in their own right may be the subject of a‘security agreement’. An example set out in the Commentary on the Consultation Draft of the Bill (the Commentary), indicates the practical implications involving certain property which have multiple profiles for the purposes of the Bill. This submission is concerned with the presumptions made in relation to the interphase between tangible property and intangible property arising from the same personal property, as set out in s 30 of the Bill.
Resumo:
Rapid urbanization in developing countries is putting stress on current infrastructure, which is resulting in the rapid consumption of natural resources to cope with the increasing demand of the population. Saudi Arabia is one of the developing countries facing rapid urbanization where its infrastructure is facing a huge demand by the increasing urbanization levels of its major cities. Developing sustainable housing in Saudi Arabia is a must for the preservation of resources for future generations of the region and of the world. In the coming years, several resources (such as fossil fuels and natural water) will be facing shortage if not managed properly. Providing electricity for housing in Saudi Arabia is one of the biggest challenges facing the country, where it is estimated that by 2050 energy demand in the Kingdom will be approximately 120 GW, and to meet this growing demand, 8 million barrels of oil per day will be required. However, implementation of Sustainable Housing in Saudi is still problematic to reach the desired goals of various key Saudi stakeholders. This paper analyses three case studies that have adopted sustainable construction methods and compares them to traditional non-sustainable houses. The outcome suggests that there is a viable chance for development of sustainable housing in the region if supported by the government with less red tape to deal with. This paper recommends that the Saudi governments should mandate new laws to reduce the overall consumption of energy and water to reduce the overall consumption of natural resources to secure the future generation’s demand of natural resources.
Resumo:
We have previously suggested that three proof requirements are essential for a sustainable land registration system. These were proof of identity, proof of ownership and authority to deal. Our attention in this article is drawn to the security framework that surrounds these requirements. We will ask whether the introduction of the Property Exchange of Australia (PEXA), and its underpinning regulatory regime will meet the concerns that we have in relation to them. In drawing out some problems with PEXA, we then offer an innovative idea, sourced from the transfer of equities that could serve to generate discussion on how we can ensure the Torrens system of land registration is sustainable for another 160 years. We also canvass some more incremental suggestions that evolve out of what we currently do, as well as outlining some comparative externally sourced ideas as to how the transfer and ownership of land can be made safer for all citizens. Such a goal is imperative when land transfer and secure property ownership is a critical component of the economic infrastructure of a modern society.
Resumo:
"Information Thru Play: In 2010, responding to the success of The Threshold, Juxt Interactive again asked No Mimes Media, to partner in creating a transmedia experience to entertain and inform Cisco's Global Sales Force. The Hunt put employees at the center of a thriller where characters sent and responded to their emails, left phone messages, communicated through Facebook and Twitter, even asked them to retrieve items from a dead drop and to send them photographs and information. And while helping fictional characters Isabel and Keith escape an ancient secret organization, the sales force also learned about new Cisco technologies coming to market. Cisco had new demands for the 2010 experience. A geographically and culturally dispersed sales force raises challenges when it comes to introducing dozens of new products and technologies each year. Cisco wanted The Hunt to have global reach, to educate, to build collaboration, and to be fun. This demanded new ways of storytelling and new ways of thinking. The Hunt was quick and intense, unfolding in real time in just two weeks. Many experienced players were poised to participate and expectations were high. Many of the mechanics of the previous year's experience were repeated, and the audience ripped through the opening, discovering video clips and websites in minutes. The surprise was discovering Facebook and Twitter accounts, where characters responded to player postings and comments in real time. The Hunt involved audience members from countries around the world, including China, India, Netherlands, Germany, Norway, Pakistan, Japan, the United Kingdom, and the United States. It highlighted new Cisco technologies like Pulse and Mediator, painlessly engaging the audience in what those technologies do and how they work. Players collaborated across silos, creating networks of cross-disciplinary experts. The Hunt pushed the boundaries of storytelling, with events unfolding on Twitter and Facebook, and in the real world where the audience had to use social engineering to find and secure a package with vital information. With thousands of players highly engaged around the world, The Hunt once again proved that transmedia experiences can effectively be used to not only meet the goals of a brand, but entertain their audience as well."
Resumo:
Christy Dena was commissioned by the Australia Council for the Arts to organise and curate a special conference and workshop event on transmedia. Her brief was to secure all the relevant funding bodies to support it financially (the first time they ever all funded the same event). Christy brought in transmedia professionals from around the world, and targeted directors, writers, designers, and producers, from film, TV, theatre, gaming, music, literature and digital sectors. She curated the audience as well as the speakers. It was a huge success, and follow-up meetups with the IGDA were also organised.
Resumo:
Objectives: Examine the association between food insecurity (FI) and physical activity (PA) in the U.S. population. Methods: Accelerometry (PAM) and self-report PA (PAQ) data from NHANES 2003-2006 were used. Those aged less than six years or were older than 65 years, pregnant, with physical limitations, or with family income above 350% of the poverty line were excluded. FI was measured by the USDA Household Food Security Survey Module. Crude and adjusted odd ratios were calculated from logistic regression to identify the association between FI and adherence to the PA recommendation. Crude and adjusted coefficients were calculated from linear regression to identify the association between FI and both sedentary and activity minutes. Results: In children, FI was not associated with adherence to PA recommendation measured via PAM or PAQ (p>0.05) but was significantly associated with sedentary minutes (adjusted coefficient=10.74, one-sided p<0.05). Food-insecure children did less moderate-to-vigorous PA than did food-secure children (adjusted coefficient = -5.31, p = 0.032). In adults, FI was significantly associated with PA (adjusted OR=0.722 for PAM and OR=0.839 for PAQ, one-sided p<0.05) but not associated with sedentary minutes (p>0.05) Conclusions: FI children were more sedentary and FI adults were less likely to adhere to the PA recommendation than those without FI.