114 resultados para Peronist Feminine Party
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
In an open railway access market, the provisions of railway infrastructures and train services are separated and independent. Negotiations between the track owner and train service providers are thus required for the allocation of the track capacity and the formulation of the services timetables, in which each party, i.e. a stakeholder, exhibits intelligence from the previous negotiation experience to obtain the favourable terms and conditions for the track access. In order to analyse the realistic interacting behaviour among the stakeholders in the open railway access market schedule negotiations, intelligent learning capability should be included in the behaviour modelling. This paper presents a reinforcement learning approach on modelling the intelligent negotiation behaviour. The effectiveness of incorporating learning capability in the stakeholder negotiation behaviour is then demonstrated through simulation.
Resumo:
With the recent regulatory reforms in a number of countries, railways resources are no longer managed by a single party but are distributed among different stakeholders. To facilitate the operation of train services, a train service provider (SP) has to negotiate with the infrastructure provider (IP) for a train schedule and the associated track access charge. This paper models the SP and IP as software agents and the negotiation as a prioritized fuzzy constraint satisfaction (PFCS) problem. Computer simulations have been conducted to demonstrate the effects on the train schedule when the SP has different optimization criteria. The results show that by assigning different priorities on the fuzzy constraints, agents can represent SPs with different operational objectives.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
Emotions play a central role in mediation as they help to define the scope and direction of a conflict. When a party to mediation expresses (and hence entrusts) their emotions to those present in a mediation, a mediator must do more than simply listen - they must attend to these emotions. Mediator empathy is an essential skill for communicating to a party that their feelings have been heard and understood, but it can lead mediators into trouble. Whilst there might exist a theoretical divide between the notions of empathy and sympathy, the very best characteristics of mediators (caring and compassionate nature) may see empathy and sympathy merge - resulting in challenges to mediator neutrality. This article first outlines the semantic difference between empathy and sympathy and the role that intrapsychic conflict can play in the convergence of these behavioural phenomena. It then defines emotional intelligence in the context of a mediation, suggesting that only the most emotionally intelligent mediators are able to emotionally connect with the parties, but maintain an impression of impartiality – the quality of remaining ‘attached yet detached’ to the process. It is argued that these emotionally intelligent mediators have the common qualities of strong self-awareness and emotional self-regulation.
Resumo:
Australia is leading the way in establishing a national system (the Palliative Care Outcomes Collaboration – PCOC) to measure the outcomes and quality of specialist palliative care services and to benchmark services across the country. This article reports on analysis of data collected routinely at point-of-care on 5939 patients treated by the first fifty one services that voluntarily joined PCOC. By March 2009, 111 services have agreed to join PCOC, representing more than 70% of services and more than 80% of specialist palliative care patients nationally. All states and territories are involved in this unique process that has involved extensive consultation and infrastructure and close collaboration between health services and researchers. The challenges of dealing with wide variation in outcomes and practice and the progress achieved to date are described. PCOC is aiming to improve understanding of the reasons for variations in clinical outcomes between specialist palliative care patients and differences in service outcomes as a critical step in an ongoing process to improve both service quality and patient outcomes. What is known about the topic? Governments internationally are grappling with how best to provide care for people with life limiting illnesses and how best to measure the outcomes and quality of that care. There is little international evidence on how to measure the quality and outcomes of palliative care on a routine basis. What does this paper add? The Palliative Care Outcomes Collaboration (PCOC) is the first effort internationally to measure the outcomes and quality of specialist palliative care services and to benchmark services on a national basis through an independent third party. What are the implications for practitioners? If outcomes and quality are to be measured on a consistent national basis, standard clinical assessment tools that are used as part of everyday clinical practice are necessary.
Resumo:
This paper undertakes an overview of two developments in online media that coincided with the 'year-long campaign' that was the 2007 Australian Federal election. It discusses the relatively successful use of the Internet and social media in the 'Kevin07' Australian Labor Party campaign, and contrasts this to the Liberal-National Party's faltering use of You Tube for policy announcements. It also notes the struggle for authority in interpreting polling data between the mainstream media and various online commentators, and the 'July 12 incident' at The Australian, where it engaged in strong denunciation of alleged biases and prejudices among bloggers and on political Web sites. It concludes with consideration of some wider implication for political communication and the politics-media relationship, and whether we are seeing trends towards dispersal and diversification characterising the 'third age' of political communication.
Resumo:
Last week I called the Australian federal campaign the Inception election. As we lurch toward voting day on August 21, reality has tried to kick in, but to little avail. The two leaders, Prime Minister Julia Gillard (Labor) and challenger Tony Abbott (Liberal), both of whom recently toppled their predecessors in party-room coups, are now frantically searching for their own identity. And that’s what the election itself is increasingly about. Even though both have substantial track records as ministers, they are untried as national leaders. The real conundrum of the campaign – for them, if not for voters – is: Who the heck are these people?
Resumo:
As various contributors to this volume suggest, the term soft power is multifaceted. In 2002 Joseph Nye, the political scientist who coined the term more than a decade previously, noted that the soft power of a country rests on three resources: a country’s culture, its political values, and its foreign policies (Nye 2002). However, several factors can be drawn together to explain China’s adoption of this concept. First, China’s economic influence has precipitated a groundswell of nationalism, which reached its apex at the Opening Ceremony of the 2008 Beijing Olympics. This global media event provided an international platform to demonstrate China’s new found self-confidence. Second, cultural diplomacy and foreign aid, particularly through Third World channels is seen by the Chinese Communist Party leadership as an appropriate way to extend Chinese influence globally (Kurlantzick 2007). Third, education in Chinese culture through globally dispersed Confucius Institutes is charged with improving international understanding of Chinese culture and values, and in the process renovating negative images of China. Fourth, the influence of Japanese and Korean popular culture on China’s youth cultures in recent years has caused acute discomfit to cultural nationalists. Many contend it is time to stem the tide. Fifth, the past few years have witnessed a series of lively debates about the importance of industries such as design, advertising, animation and fashion, resulting in the construction of hundreds of creative clusters, animation centres, film backlots, cultural precincts, design centres and artist lofts.
Resumo:
The use of parliamentary questions is the most popular and visible tool in the hands of the Opposition as a means to make government accountable. Their main purpose is to seek information or press for action. Contemporary parliamentary literature from the UK, Canada, and Australia, however, suggests that parliamentary questions have lost their effectiveness. The literature points out that Question Time in parliaments has become a battle ground between Ruling and Opposition parties in their fight to gain maximum political advantage. In this context, the effectiveness of parliamentary questions in the Indian state legislatures has not been investigated. The aim of this study, therefore, is to analyse the use, purpose and effectiveness of parliamentary questions in the State Legislative Assembly of Uttar Pradesh (India) to explore differences, if any, between Ruling and Opposition parties. In this study, 4023 parliamentary questions asked in the Uttar Pradesh State Legislative Assembly were analysed. The effectiveness of answers was also analysed qualitatively. The results show that half of the total members of the Assembly used this device, out of which 60% of the questions were asked by the Opposition party members. 31% of the questions from the Opposition were seeking information and 69% were pressing for action. The government provided the required information in 96% of the questions in the former category and took action in only 35% of the latter category. Furthermore, 60% of the questions raised by the Opposition were related to constituency matters and the remaining 40% were related to policy issues or public welfare. Comparing the data with the ruling party, the results indicate that the use,purpose and effectiveness of parliamentary questions were similar to that of the Opposition except some minor differences. Surprisingly, there was no evidence of any ‘Dorothy Dix’ questions. The study concludes parliamentary question is an effective device in the Indian state of Uttar Pradesh.
Resumo:
The intention of this work is to explain theoretically that democracy logically exists in China, despite the statements to the contrary by China’s ruling party. We will have to look at several recent developments in social and political theory to fully understand my point. The first involves recent findings in the historical analysis of democracy from thinkers like Keane (2009), Isakhan and Stockwell (2011). The second deals with cosmopolitan theory and 2nd modernity, or from the works of David Held (2003), Ulrich Beck and Edgar Grande (2010) respectively. Finally, the third is a recent work of mine titled “Democratic Theory and Theoretical Physics” (2010).
Resumo:
The recent successful pregnancy of Thomas Beatie, a transgender FTM, billed by the various media as ‘the pregnant man’, has stirred up considerably diverse public opinion and debate, some supportive and indicative of changing and progressive ideas around sex, gender and sexuality; others condemnatory in their claims that Beatie’s pregnancy is an affront to the laws of Nature and/or God. Desired or derided, the pregnant male body contests the terrain of reproductive embodiment and the orthodoxy of Western systems of gender categorization. This chapter analyses a selection of media and internet responses to the case of the pregnant man, arguing that most disturbing of all it seems, is the body in-between (Kristeva 1982, p.4), the one that visibly defies socially obdurate gender oppositions of male and female, feminine and masculine in its insistence on being, to borrow from Homi Bhabha, a ‘third space of enunciation.’ Banana Yoshimoto’s novella Kitchen, also contests gender boundaries in its characterisation of Eriko, a transgendered male to female, a father, then a mother. In this narrative the in-between, the ambiguous, is not reviled but rather celebrated as a ‘horizon of possibility’ (Halperin, qtd in Jagose 1996 http://www.australianhumanitiesreview.org/archive/Issue-Dec- 1996/jagose.html).
Resumo:
Much of the research on the delivery of advice by professionals such as physicians, health workers and counsellors, both on the telephone and in face to face interaction more generally, has focused on the theme of client resistance and the consequent need for professionals to adopt particular formats to assist in the uptake of the advice. In this paper we consider one setting, Kid’s Helpline, the national Australian counselling service for children and young people, where there is an institutional mandate not to give explicit advice in accordance with the values of self-direction and empowerment. The paper examines one practice, the use of script proposals by counsellors, which appears to offer a way of providing support which is consistent with these values. Script proposals entail the counsellors packaging their advice as something that the caller might say – at some future time – to a third party such as a friend, teacher, parent, or partner, and involve the counsellor adopting the speaking position of the caller in what appears as a rehearsal of a forthcoming strip of interaction. Although the core feature of a script proposal is the counsellor’s use of direct reported speech they appear to be delivered, not so much as exact words to be followed, but as the type of conversation that the client needs to have with the 3rd party. Script proposals, in short, provide models of what to say as well as alluding to how these could be emulated by the client. In their design script proposals invariably incorporate one or more of the most common rhetorical formats for maximising the persuasive force of an utterance such as a three part list or a contrastive pair. Script proposals, moreover, stand in a complex relation to the prior talk and one of their functions appears to be to summarise, respecify or expand upon the client’s own ideas or suggestions for problem solving that have emerged in these preceding sequences.