381 resultados para secure protocal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

As critical infrastructure such as transportation hubs continue to grow in complexity, greater importance is placed on monitoring these facilities to ensure their secure and efficient operation. In order to achieve these goals, technology continues to evolve in response to the needs of various infrastructure. To date, however, the focus of technology for surveillance has been primarily concerned with security, and little attention has been placed on assisting operations and monitoring performance in real-time. Consequently, solutions have emerged to provide real-time measurements of queues and crowding in spaces, but have been installed as system add-ons (rather than making better use of existing infrastructure), resulting in expensive infrastructure outlay for the owner/operator, and an overload of surveillance systems which in itself creates further complexity. Given many critical infrastructure already have camera networks installed, it is much more desirable to better utilise these networks to address operational monitoring as well as security needs. Recently, a growing number of approaches have been proposed to monitor operational aspects such as pedestrian throughput, crowd size and dwell times. In this paper, we explore how these techniques relate to and complement the more commonly seen security analytics, and demonstrate the value that can be added by operational analytics by demonstrating their performance on airport surveillance data. We explore how multiple analytics and systems can be combined to better leverage the large amount of data that is available, and we discuss the applicability and resulting benefits of the proposed framework for the ongoing operation of airports and airport networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Achieving knowledge-based urban development (KBUD) profoundly depends on not only encouraging the development of economic activities, but also strengthening the societal, environmental and governance bases of city-regions. In recent years, a number of global city-regions have been investigated from the angle of this multidimensional perspective, which has provided a new comprehension in the development processes of primate city-regions. However, there is a knowledge gap in understanding how KBUD works in the second-order city-region (SOCR) context. This warrants more attention as SOCRs potentially help secure balanced development and territorial cohesion. This paper aims to empirically investigate KBUD performances of SOCRs in order to generate new insights. An assessment framework is utilised in the Finnish context, where the findings provide a nationally benchmarked snapshot of the degree of achievements of SOCRs based on numerous KBUD performance areas. The results shed light on the unique Finnish urban and regional development process, and provide lessons for other SOCRs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag are very limited and this makes it difficult to solve its secure and private problems, especially for low-cost RFID tags. In order to ensure the security and privacy of low-cost RFID systems we propose a lightweight authentication protocol based on Hash function. This protocol can ensure forward security and prevent information leakage, location tracing, eavesdropping, replay attack and spoofing. This protocol completes the strong authentication of the reader to the tag by twice authenticating and it only transfers part information of the encrypted tag’s identifier for each session so it is difficult for an adversary to intercept the whole identifier of a tag. This protocol is simple and it takes less computing and storage resources, it is very suitable to some low-cost RFID systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The early years have been recognized as a “natural starting point” for education for sustainability. ECEfS is a newly emerging area and Australian educators, teacher educators, and researchers are leaders in this field. Indeed, there is a growing list of exemplary kindergartens, child care centres, preschools, and preps across the country engaged in EfS focusing on a range of topics that include, for example, water education, reducing energy use, recycling, growing gardens, and cleaning up parks and creeks. Some centres focus more on the social dimensions of sustainability – strengthening Indigenous communities, working with the elderly, supporting the unemployed, fostering gender equality in their communities, being more socially inclusive. There is mounting evidence that early lessons in sustainability help reshape adult sustainability actions in homes, schools and communities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This poster presents key features of how QUT’s integrated research data storage and management services work with researchers through their own individual or team research life cycle. By understanding the characteristics of research data, and the long-term need to store this data, QUT has provided resources and tools that support QUT’s goal of being a research intensive institute. Key to successful delivery and operation has been the focus upon researchers’ individual needs and the collaboration between providers, in particular, Information Technology Services, High Performance Computing and Research Support, and QUT Library. QUT’s Research Data Storage service provides all QUT researchers (staff and Higher Degree Research students (HDRs)) with a secure data repository throughout the research data lifecycle. Three distinct storage areas provide for raw research data to be acquired, project data to be worked on, and published data to be archived. Since the service was launched in late 2014, it has provided research project teams from all QUT faculties with acquisition, working or archival data space. Feedback indicates that the storage suits the unique needs of researchers and their data. As part of the workflow to establish storage space for researchers, Research Support Specialists and Research Data Librarians consult with researchers and HDRs to identify data storage requirements for projects and individual researchers, and to select and implement the most suitable data storage services and facilities. While research can be a journey into the unknown[1], a plan can help navigate through the uncertainty. Intertwined in the storage provision is QUT’s Research Data Management Planning tool. Launched in March 2015, it has already attracted 273 QUT staff and 352 HDR student registrations, and over 620 plans have been created (2/10/2015). Developed in collaboration with Office of Research Ethics and Integrity (OREI), uptake of the plan has exceeded expectations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cities are the most dramatic manifestations of human activities on the surface of the earth. These human-dominated organisms—i.e., cities—degrade natural habitats, simplify species composition, disrupt hydrological systems, and modify energy flow and nutrient cycling. Today, these consequential impacts of human activities, originated from population increase, rapid urbanization, high private motor vehicle dependency, deregulated industrialization and mass livestock production, are increasing exponentially and causing great deal of environmental, social, and economic challenges both at global and local scales. In such a situation, establishment of sustainable cities, through sustainable urban development practices, is seen as a potential panacea to combat these challenges responsibly, effectively, and efficiently. This paper offers a critical review of the key literature on the issues relating to planning, development and management of sustainable cities, introduces the contributions from the Special Issue, and speculates on the prospective research directions to place necessary mechanisms to secure a sustainable urban future for all.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie--Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent decades, the meaning and value of formal state citizenship has shifted dramatically. In the same period, scholarship on citizenship has drawn attention to the proliferation of alternative forms of sub-, supra- and transnational citizenship, at times obscuring the ongoing importance of formal state citizenship. For refugees, however, formal state citizenship remains a critical and widely shared goal. Drawing on interviews with 51 young people from refugee backgrounds in Melbourne, Australia, this article explores the intersecting themes of mobility and security that were identified by participants as the most important benefits of acquiring formal state citizenship in the country of resettlement. In contrast to the insecurity of forced migration, formal state citizenship provides a privileged mobility that enables refugee-background youth to maintain and create transnational identities and attachments and to be protected while doing so, while also granting a secure status within the nation state and insurance against further displacement in an uncertain future. In offering these forms of mobility and security, formal state citizenship contributes to a sense of ontological security among refugee-background youth, providing an important foundation for building national and transnational futures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This practice-led research project harnesses the plasmatic nature of animation (Eisenstein 1989) to embody the in-between state of being of the Peel Island Lazaret on the island of Teerk Roo Ra in Moreton Bay, Queensland. In this project the genius loci of this place is expressed through the development of a series of creative works that employs the unique transformative quality of animation to push and pull at the boundary lines between what can be apprehended as the ‘real’ and the ‘imaginary’. Drawing on the physical approach of Czech surrealist animator Jan Švankmajer and cultural theories from Australian writer Ross Gibson, this study re-members and re-imagines the site of the Lazaret as a liminal, uncanny place. This study investigates how conceptions of place are overlaid by aspects of history, memory and the imagination and these discoveries contribute to the currently limited academic discourse around place and place-making in animation practice in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose The purpose of this paper is to highlight the importance of enterprise educators working collectively to develop a unique scholarship of teaching. The authors argue that the time is right for educators in this domain to secure the future of enterprise education. Acknowledging the debate between "entrepreneurship education" and "enterprise education," the authors set out to develop a unification model through which educators can act collectively to demonstrate the leadership required to secure the autonomy of the domain. Design/methodology/approach The authors bring several pertinent ideas (pedagogical content knowledge, heutagogy and academagogy) to the attention of academics/researchers involved in the design, development and delivery of enterprise education. The innovative approach to combine these ideas with prevailing thinking in this domain has facilitated a model for collective action. Findings It is at the level of the shared philosophical positions that the authors can best cooperate to shape the future direction of enterprise education. The authors argue against dwelling upon how the authors differ in terms of context and process issues. Such matters can only fragment the theory and practice of enterprise education. The authors need to develop greater appreciation of shared philosophical positions and leverage this understanding into a unique scholarship of teaching, specific to enterprise education. Practical implications – As enterprise education becomes more global, it is also likely to become more attractive to business schools that long for a new positioning tool in the increasingly overcrowded markets that they compete in. Originality/value This paper encourages enterprise educators to reflect upon the knowledge they hold of their own practice, and that of other enterprise educators.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Malnutrition and unintentional weight loss are major clinical issues in people with dementia living in residential aged care facilities (RACFs) and are associated with serious adverse outcomes. However, evidence regarding effective interventions is limited and strategies to improve the nutritional status of this population are required. This presentation describes the implementation and results of a pilot randomised controlled trial of a multi-component intervention for improving the nutritional status of RACF residents with dementia. Method Fifteen residents with moderate-severe dementia living in a secure long-term RACF participated in a five week pilot study. Participants were randomly allocated to either an Intervention (n=8) or Control group (n=7). The intervention comprised four elements delivered in a separate dining room at lunch and dinner: the systematic reinforcement of residents’ eating behaviors using a specific communication protocol; family-style dining; high ambiance table presentation; and routine Dietary-Nutrition Champion supervision. Control group participants ate their meals according to the facility’s standard practice. Baseline and follow-up assessments of nutritional status, food consumption, and body mass index were obtained by qualified nutritionists. Additional assessments included measures of cognitive functioning, mealtime agitation, depression, wandering status and multiple measures of intervention fidelity. Results No participant was malnourished at study commencement and participants in both groups gained weight from follow-up to baseline which was not significantly different between groups (t=0.43; p=0.67). A high degree of treatment fidelity was evident throughout the intervention. Qualitative data from staff indicate the intervention was perceived to be beneficial for residents. Conclusions This multi-component nutritional intervention was well received and was feasible in the RACF setting. Participants’ sound nutritional status at baseline likely accounts for the lack of an intervention effect. Further research using this protocol in malnourished residents is recommended. For success, a collaborative approach between researchers and facility staff, particularly dietary staff, is essential.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.