349 resultados para Saïd, Edward


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tzeng et al. proposed a new threshold multi-proxy multi-signature scheme with threshold verification. In their scheme, a subset of original signers authenticates a designated proxy group to sign on behalf of the original group. A message m has to be signed by a subset of proxy signers who can represent the proxy group. Then, the proxy signature is sent to the verifier group. A subset of verifiers in the verifier group can also represent the group to authenticate the proxy signature. Subsequently, there are two improved schemes to eliminate the security leak of Tzeng et al.’s scheme. In this paper, we have pointed out the security leakage of the three schemes and further proposed a novel threshold multi-proxy multi-signature scheme with threshold verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This fascinating handbook defines how knowledge contributes to social and economic life, and vice versa. It considers the five areas critical to acquiring a comprehensive understanding of the knowledge economy: the nature of the knowledge economy; social, cooperative, cultural, creative, ethical and intellectual capital; knowledge and innovation systems; policy analysis for knowledge-based economies; and knowledge management. In presenting the outcomes of an important body of research, the handbook enables knowledge policy and management practitioners to be more systematically guided in their thinking and actions. The contributors cover a wide disciplinary spectrum in an accessible way, presenting concise, to-the-point discussions of critical concepts and practices that will enable practitioners to make effective research, managerial and policy decisions. They also highlight important new areas of concern to knowledge economies such as wisdom, ethics, language and creative economies that are largely overlooked.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we discuss our participation to the INEX 2008 Link-the-Wiki track. We utilized a sliding window based algorithm to extract the frequent terms and phrases. Using the extracted phrases and term as descriptive vectors, the anchors and relevant links (both incoming and outgoing) are recognized efficiently.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The production of knowledge has become central to economic life. Competitiveness in the 21st century market place is now characterized by the ability to translate scientific and technological knowledge into innovation. But does this render cultural and social knowledge unimportant? This unique book advocates a broader epistemological base for the term ‘knowledge’ and develops policy implications from this perspective. By examining long-term challenges, the volume argues that fresh policy thinking is needed not only in the obviously knowledge-intensive portfolios but across all areas of knowledge production and questions how the different dynamics of the knowledge era affect defence, employment, environment, indigenous and international relations, multiculturalism and urban policy.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is a video of the first of a seminar series which took place 10th February 2010. The presentations showcase how QUT researchers engage with new technology and techniques when conducting research. This sharing of eresearch experience resulted in great feedback from colleagues attending the presentations. Welcome – Prof Arun Sharma Presentations Prof Christian Langton, Prof Edward Chung, Assoc Prof Axel Bruns, Prof David Kavanagh, Prof Paul Roe, Martin Borchert, Dr Kirsty Kitto, Prof Robin Drogemuller, Prof Peter Corke, Assoc Prof Marcus Foth, Close – Prof Tom Cochrane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When communicating emotion in music, composers and performers encode their expressive intentions through the control of basic musical features such as: pitch, loudness, timbre, mode, and articulation. The extent to which emotion can be controlled through the systematic manipulation of these features has not been fully examined. In this paper we present CMERS, a Computational Music Emotion Rule System for the control of perceived musical emotion that modifies features at the levels of score and performance in real-time. CMERS performance was evaluated in two rounds of perceptual testing. In experiment I, 20 participants continuously rated the perceived emotion of 15 music samples generated by CMERS. Three music works, each with five emotional variations were used (normal, happy, sad, angry, and tender). The intended emotion by CMERS was correctly identified 78% of the time, with significant shifts in valence and arousal also recorded, regardless of the works’ original emotion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a survey of authorisation models and considers their ‘fitness-for-purpose’ in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerging business models based on the concept of a ‘virtual organisation’. The article argues that present authorisation models are inflexible and poorly scalable in such dynamic environments due to their assumption that the future needs of the system can be predicted, which in turn justifies the use of persistent authorisation policies. The article outlines the motivation and requirement for a new flexible authorisation model that addresses the needs of information sharing. It proposes that a flexible and scalable authorisation model must allow an explicit specification of the objectives of the system and access decisions must be made based on a late trade-off analysis between these explicit objectives. A research agenda for the proposed Objective-based Access Control concept is presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter looks at issues of non-stationarity in determining when a transient has occurred and when it is possible to fit a linear model to a non-linear response. The first issue is associated with the detection of loss of damping of power system modes. When some control device such as an SVC fails, the operator needs to know whether the damping of key power system oscillation modes has deteriorated significantly. This question is posed here as an alarm detection problem rather than an identification problem to get a fast detection of a change. The second issue concerns when a significant disturbance has occurred and the operator is seeking to characterize the system oscillation. The disturbance initially is large giving a nonlinear response; this then decays and can then be smaller than the noise level ofnormal customer load changes. The difficulty is one of determining when a linear response can be reliably identified between the non-linear phase and the large noise phase of thesignal. The solution proposed in this chapter uses “Time-Frequency” analysis tools to assistthe extraction of the linear model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: This paper is a report of a study to explore the phenomenon of resilience in the lives of adult patients of mental health services who have experienced mental illness. ---------- Background: Mental illness is a major health concern worldwide, and the majority experiencing it will continue to battle with relapses throughout their lives. However, in many instances people go on to overcome their illness to lead productive and socially engaged lives. Contemporary mental health nursing practice primarily focuses on symptom reduction, and working with resilience has not generally been a consideration. ---------- Method: A descriptive phenomenological study was carried out in 2006. One participant was recruited through advertisements in community newspapers and newsletters and the others using the snowballing method. Information was gathered through in-depth individual interviews which were tape-recorded and subsequently transcribed. Colaizzi's original seven-step approach was used for data analysis, with the inclusion of two additional steps. ---------- Findings: The following themes were identified: Universality, Acceptance, Naming and knowing, Faith, Hope, Being the fool and Striking a balance, Having meaning and meaningful relationships, and 'Just doing it'. The conceptualization identified as encapsulating the themes was 'Viewing life from the ridge with eyes wide open', which involved knowing the risks and dangers ahead and making a decision for life amid ever-present hardships. ---------- Conclusion: Knowledge about resilience should be included in the theoretical and practical education of nursing students and experienced nurses. Early intervention, based on resilience factors identified through screening processes, is needed for people with mental illness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Mood and anxiety disorders pose significant health burdens on the community. Kava and St John’s wort (SJW) are the most commonly used herbal medicines in the treatment of anxiety and depressive disorders, respectively. Objectives: To conduct a comprehensive review of kava and SJW, to review any evidence of efficacy, mode of action, pharmacokinetics, safety and use in Major Depressive Disorder (MDD), Bipolar Disorder (BP), Seasonal Affective Disorder (SAD), Generalized Anxiety Disorder (GAD), Social Phobia (SP), Panic Disorder (PD), Obsessive-Compulsive Disorder (OCD), and Post Traumatic Stress Disorder (PTSD). Methods: A systematic review was conducted using the electronic databases MEDLINE, CINAHL, and The Cochrane Library during late 2008. The search criteria involved mood and anxiety disorder search terms in combination with kava, Piper methysticum, kavalactones, St John’s wort, Hypericum perforatum, hypericin and hyperforin. Additional search criteria for safety, pharmacodynamics , and pharmacokinetics was employed. A subsequent forward search was conducted of the papers using Web of Science cited reference search. Results: Current evidence supports the use of SJW in treating mild-moderate depression, and for kava in treatment of generalized anxiety. In respect to the other disorders, only weak preliminary evidence exists for use of SJW in SAD. Currently there is no published human trial on use of kava in affective disorders, or in OCD, PTSD, PD or SP. These disorders constitute potential applications that warrant exploration. Conclusions: Current evidence for herbal medicines in the treatment of depression and anxiety only supports the use of Hypericum perforatum for depression, and Piper methysticum for generalized anxiety.