391 resultados para privacy-preserving


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Unmanned aircraft, or drones, are a rapidly emerging sector of the aviation industry. There has been limited substantive research, however, into the public perception and acceptance of drones. This paper presents the results from two surveys of the Australian public designed to investigate (a) whether the public perceive drones to be riskier than existing manned aviation, (b) whether the terminology used to describe the technology influences public perception, and (c) what the broader concerns are that may influence public acceptance of the technology. We find that the Australian public currently hold a relatively neutral attitude towards drones. Respondents did not consider the technology to be overly unsafe, risky, beneficial, or threatening. Drones are largely viewed as being of comparable risk to that of existing manned aviation. Further, terminology had a minimal effect on the perception of the risks or acceptability of the technology. The neutral response is likely due to a lack of knowledge about the technology, which was also identified as the most prevalent public concern as opposed to the risks associated with its use. Privacy, military use and misuse (e.g., terrorism) were also significant public concerns. The results suggest that society is yet to form an opinion of drones. As public knowledge increases, the current position is likely to change. Industry communication and media coverage will likely influence the ultimate position adopted by the public, which can be difficult to change once established.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One main challenge in developing a system for visual surveillance event detection is the annotation of target events in the training data. By making use of the assumption that events with security interest are often rare compared to regular behaviours, this paper presents a novel approach by using Kullback-Leibler (KL) divergence for rare event detection in a weakly supervised learning setting, where only clip-level annotation is available. It will be shown that this approach outperforms state-of-the-art methods on a popular real-world dataset, while preserving real time performance.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates how Muslims living in Brisbane live within their current Australian homes and the liveability and adaptability of these homes from the perspective of home dwellers with respect to their Islamic faiths, cultural traditions and lifestyle. A qualitative case study approach was used to gather information about Muslims’ use of domestic spaces through their lived experiences, within an Australian context. Six participants were interviewed, including: a) three Muslim families residing in one suburb of Brisbane, and; b) three international Muslim students living in three different Brisbane suburbs. These cases indicate that apart from minor difficulties, case study participants were able to perform their daily activities within their current homes through various adaptations made to ensure their respective domestic domains provided their families with privacy and a sense of security and safety. Insight gained from these cases suggest the need for more research into the homes of Muslims homes within an Australian context and the development of culturally adaptable housing as a means of meeting the diverse needs of modern Australian multicultural society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K -bit key and N -bit block is called SIMON N/K . We present several linear characteristics for reduced-round SIMON32/64 that can be used for a key-recovery attack and extend them further to attack other variants of SIMON. Moreover, we provide results of key recovery analysis using several impossible differential characteristics starting from 14 out of 32 rounds for SIMON32/64 to 22 out of 72 rounds for SIMON128/256. In some cases the presented observations do not directly yield an attack, but provide a basis for further analysis for the specific SIMON variant. Finally, we exploit a connection between linear and differential characteristics for SIMON to construct linear characteristics for different variants of reduced-round SIMON. Our attacks extend to all variants of SIMON covering more rounds compared to any known results using linear cryptanalysis. We present a key recovery attack against SIMON128/256 which covers 35 out of 72 rounds with data complexity 2123 . We have implemented our attacks for small scale variants of SIMON and our experiments confirm the theoretical bias presented in this work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present some improved analytical results as part of the ongoing work on the analysis of Fugue-256 hash function, a second round candidate in the NIST’s SHA3 competition. First we improve Aumasson and Phans’ integral distinguisher on the 5.5 rounds of the final transformation of Fugue-256 to 16.5 rounds. Next we improve the designers’ meet-in-the-middle preimage attack on Fugue-256 from 2480 time and memory to 2416. Finally, we comment on possible methods to obtain free-start distinguishers and free-start collisions for Fugue-256.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although seeking help for mental ill-health is beneficial, the majority of persons afflicted do not access available help services. Young adults (16-24 years old) in particular have the highest prevalence of mental health problems and the lowest rate of help-seeking behaviour. Key barriers to help-seeking for young adults, including cost, privacy concerns, inconvenience, access to health professionals and interpersonal interaction, appear to derive from the face-to-face method of service delivery traditionally used to distribute mental health services. Social marketing employs the principle of value exchange, whereby consumers will choose a behaviour in exchange for receiving valued benefits and/or a reduction in key barriers, to achieve behavioural goals for social good. The appropriation of mobile digital technology to deliver self-help mental health services may reduce the current barriers to help seeking, however, extant literature offers no empirical support for this proposition. Our research addresses this gap by examining the perceptions of young adults regarding M-mental health services. Depth interviews were undertaken with 15 young adults (18-24 years old), who had self-reported mild-moderate stress, anxiety or depression. The data were thematically analysed with the assistance of Nvivo. The findings reveal M-mental health services reduce the barriers to accessing face-to-face help services to a large extent. However, they also present their own barriers to help-seeking that must be considered by social marketers, including negligible cost expectations and service efficacy concerns. Overall, this study highlights the potential of M-mental health services to encourage early intervention and help-seeking behaviour as part of a social marketing strategy to address mental illness in young adults.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In ecosystems driven by water availability, plant community dynamics depend on complex interactions between vegetation, hydrology, and human water resources use. Along ephemeral rivers—where water availability is erratic—vegetation and people are particularly vulnerable to changes in each other's water use. Sensible management requires that water supply be maintained for people, while preserving ecosystem health. Meeting such requirements is challenging because of the unpredictable water availability. We applied information gap decision theory to an ecohydrological system model of the Kuiseb River environment in Namibia. Our aim was to identify the robustness of ecosystem and water management strategies to uncertainties in future flood regimes along ephemeral rivers. We evaluated the trade-offs between alternative performance criteria and their robustness to uncertainty to account for both (i) human demands for water supply and (ii) reducing the risk of species extinction caused by water mining. Increasing uncertainty of flood regime parameters reduced the performance under both objectives. Remarkably, the ecological objective (species coexistence) was more sensitive to uncertainty than the water supply objective. However, within each objective, the relative performance of different management strategies was insensitive to uncertainty. The ‘best’ management strategy was one that is tuned to the competitive species interactions in the Kuiseb environment. It regulates the biomass of the strongest competitor and, thus, at the same time decreases transpiration, thereby increasing groundwater storage and reducing pressure on less dominant species. This robust mutually acceptable strategy enables species persistence without markedly reducing the water supply for humans. This study emphasises the utility of ecohydrological models for resource management of water-controlled ecosystems. Although trade-offs were identified between alternative performance criteria and their robustness to uncertain future flood regimes, management strategies were identified that help to secure an ecologically sustainable water supply.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The drying of grapes is a more complex process compared to the dehydration of other agricultural materials due to the necessity of a pretreatment operation prior to drying. Grape drying to produce raisins is a very slow process, due to the peculiar structure of grape peel, that is covered by a waxy layer.Its removal has benn so far carried out by using several chemical pre-treatments. However, they cause heterogeneity in the waxes removal and create microscopic cracks. In this paper an abrasive pretreatment for enhancing the drying rate and preserving the grape samples is proposed. Two cultivars of grape were investigated: Regina white grape and Red Globe red grape. The drying kinetics of untreated and treated samples were studied using a convective oven at 50 C. Fruit quality parameters such as sugar and organic acid contents, shrinkage, texture, peel damage (i.e. by SEM analysis) and rehydration capacity were studied to evaluate the effectiveness of abrasive pretreatment on raisins. Abrasive pretreatment contributed to reduce drying time and rehydration time. The treated and untreated dried grapes were significantly different (p<0.05) in sugar and in tartaric acid content. On the contrary, no significant differences (p<0.05) in malic and citric acids in texture peoperties between untreated and treated samples were observed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

XACML has become the defacto standard for enterprise- wide, policy-based access control. It is a structured, extensible language that can express and enforce complex access control policies. There have been several efforts to extend XACML to support specific authorisation models, such as the OASIS RBAC profile to support Role Based Access Control. A number of proposals for authorisation models that support business processes and workflow systems have also appeared in the literature. However, there is no published work describing an extension to allow XACML to be used as a policy language with these models. This paper analyses the specific requirements of a policy language to express and enforce business process authorisation policies. It then introduces BP-XACML, a new profile that extends the RBAC profile for XACML so it can support business process authorisation policies. In particular, BP-XACML supports the notion of tasks, and constraints at the level of a task instance, which are important requirements in enforcing business process authorisation policies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decision-making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled trials. Limitations of the outcomes from randomized controlled trials (RCT), such as “quantity” and “quality” of evidence generated, has lowered healthcare professionals’ confidence in using EBP. An alternate paradigm of Practice-Based Evidence has evolved with the key being evidence drawn from practice settings. Through the use of health information technology, electronic health records (EHR) capture relevant clinical practice “evidence”. A data-driven approach is proposed to capitalize on the benefits of EHR. The issues of data privacy, security and integrity are diminished by an information accountability concept. Data warehouse architecture completes the data-driven approach by integrating health data from multi-source systems, unique within the healthcare environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study examined the potential for apartment living to become more socially and environmentally acceptable in Australian society generally, and in subtropical cities particularly. Resolution of incongruities between residents' preferred attributes and other stakeholders' main interests has important implications for reshaping lifestyle expectations and design practice as society moves toward a post-carbon future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Kimberlite terminology remains problematic because both descriptive and genetic terms are mixed together in most existing terminology schemes. In addition, many terms used in existing kimberlite terminology schemes are not used in mainstream volcanology, even though kimberlite bodies are commonly the remains of kimberlite volcanic vents and edifices. We build on our own recently published approach to kimberlite facies terminology, involving a systematic progression from descriptive to genetic. The scheme can be used for both coherent kimberlite (i.e. kimberlite that was emplaced without undergoing any fragmentation processes and therefore preserving coherent igneous textures) and fragmental kimberlites. The approach involves documentation of components, textures and assessing the degree and effects of alteration on both components and original emplacement textures. This allows a purely descriptive composite component, textural and compositional petrological rock or deposit name to be constructed first, free of any biases about emplacement setting and processes. Then important facies features such as depositional structures, contact relationships and setting are assessed, leading to a composite descriptive and genetic name for the facies or rock unit that summarises key descriptive characteristics, emplacement processes and setting. Flow charts summarising the key steps in developing a progressive descriptive to genetic terminology are provided for both coherent and fragmental facies/deposits/rock units. These can be copied and used in the field, or in conjunction with field (e.g. drill core observations) and petrographic data. Because the approach depends heavily on field scale observations, characteristics and process interpretations, only the first descriptive part is appropriate where only petrographic observations are being made. Where field scale observations are available the progression from developing descriptive to interpretative terminology can be used, especially where some petrographic data also becomes available.