251 resultados para Entity Authentication


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Significant differences between project partnering and project alliancing occur in the selection process, management structure of the organisations undertaking the project and nature of risk and reward incentives. This paper helps clarify the nature of project alliancing and how alliance member organisations were selected for this case study. A core issue that differentiates between the two approaches is that in partnering, partners may reap rewards at the expense of other partners. In alliancing each alliance member places their profit margin and reward structure ÁÁat riskÂÂ. Thus in alliancing, the entire alliance entity either benefits together or not all. This fundamentally changes the motivation and dynamics of the relationship between alliance members.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sustainable practices are more than ever on the radar screen of organizations, triggered by a growing demand of the wider population towards approaches and practices that can be considered "green" or "sustainable". Our specific intent with this call for action is to immerse deeper into the role of business processes, and specifically the contributions that the management of these processes can play in leveraging the transformative power of information systems (IS) in order to create environmentally sustainable organizations. Our key premise is that business and information technology (IT) managers need to engage in a process-focused discussion to enable a common, comprehensive understanding of process, and the process-centered opportunities for making these processes, and ultimately the organization as a process-centric entity, "green". Based on a business process lifecycle model, we propose possible avenues for future research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Management of change in construction organisations to capture internal knowledge and maximise innovation is central to construction process re-engineering. Recent international trends toward privatisation and outsourcing of many government functions has seen wholesale changes to the role of government departments. In Brisbane, Australia, the Port of Brisbane Corporation has responsibilities for development and maintenance of all port and harbour facilities in the Brisbane region. The PBC is an acknowledged leader in encouraging internal technical development. Yet 20 years ago, this organisation operated as a small division within a large and bureaucratic Queensland Government public service department. This paper reviews construction project procurement strategies for the port’s civil and structural facilities since a separate organisational entity with responsibilities for Port of Brisbane was formed in 1976. The Port of Brisbane Corporation serves as an initial case study setting for a larger research project studying innovative practices in the context of the trend towards corporatising and privatising public sector organisations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Bennett v Stewart McMurdo J considered the operation of a contract where the buyer was described as a superannuation fund. The Bennetts signed a standard REIQ contract as buyers of the Stewarts’ house and land. However, the reference schedule to the contract document contained these words next to the word ‘buyer’: ‘Bennett Superannuation Fund’ The Bennetts wished to enforce the contract. In response, the Stewarts (the sellers) raised two issues: • As the ‘Bennett Superannuation Fund’ was a trust and not a distinct legal entity capable of making a contract, the contract did not specify who was the buyer, so that the contract was void for uncertainty; and • The contract was unenforceable as there was no sufficient note or memorandum for the purposes of s 59 of the Property Law Act 1974 (Qld) as s 59 requires, amongst other things, an identification of the parties. McMurdo J did not accept either of these arguments and made an order for specific performance in favour of the Bennetts. Looking at each issue separately:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, a cryptographic countermeasure which provides a form of gradual authentication by requiring the client to solve some computationally difficult problems before access is granted. In particular, we describe a mechanism for integrating a hash-based puzzle into existing web services frameworks and analyze the effectiveness of the countermeasure using a variety of scenarios on a network testbed. Client puzzles are an effective defence against flooding attacks. They can also mitigate certain types of semantic-based attacks, although they may not be the optimal solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Business practices vary from one company to another and business practices often need to be changed due to changes of business environments. To satisfy different business practices, enterprise systems need to be customized. To keep up with ongoing business practice changes, enterprise systems need to be adapted. Because of rigidity and complexity, the customization and adaption of enterprise systems often takes excessive time with potential failures and budget shortfall. Moreover, enterprise systems often drag business behind because they cannot be rapidly adapted to support business practice changes. Extensive literature has addressed this issue by identifying success or failure factors, implementation approaches, and project management strategies. Those efforts were aimed at learning lessons from post implementation experiences to help future projects. This research looks into this issue from a different angle. It attempts to address this issue by delivering a systematic method for developing flexible enterprise systems which can be easily tailored for different business practices or rapidly adapted when business practices change. First, this research examines the role of system models in the context of enterprise system development; and the relationship of system models with software programs in the contexts of computer aided software engineering (CASE), model driven architecture (MDA) and workflow management system (WfMS). Then, by applying the analogical reasoning method, this research initiates a concept of model driven enterprise systems. The novelty of model driven enterprise systems is that it extracts system models from software programs and makes system models able to stay independent of software programs. In the paradigm of model driven enterprise systems, system models act as instructors to guide and control the behavior of software programs. Software programs function by interpreting instructions in system models. This mechanism exposes the opportunity to tailor such a system by changing system models. To make this true, system models should be represented in a language which can be easily understood by human beings and can also be effectively interpreted by computers. In this research, various semantic representations are investigated to support model driven enterprise systems. The significance of this research is 1) the transplantation of the successful structure for flexibility in modern machines and WfMS to enterprise systems; and 2) the advancement of MDA by extending the role of system models from guiding system development to controlling system behaviors. This research contributes to the area relevant to enterprise systems from three perspectives: 1) a new paradigm of enterprise systems, in which enterprise systems consist of two essential elements: system models and software programs. These two elements are loosely coupled and can exist independently; 2) semantic representations, which can effectively represent business entities, entity relationships, business logic and information processing logic in a semantic manner. Semantic representations are the key enabling techniques of model driven enterprise systems; and 3) a brand new role of system models; traditionally the role of system models is to guide developers to write system source code. This research promotes the role of system models to control the behaviors of enterprise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes an effective method for signal-authentication and spoofing detection for civilian GNSS receivers using the GPS L1 C/A and the Galileo E1-B Safety of Life service. The paper discusses various spoofing attack profiles and how the proposed method is able to detect these attacks. This method is relatively low-cost and can be suitable for numerous mass-market applications. This paper is the subject of a pending patent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Design-Build (DB) project delivery systems have increasingly been adopted by many private and public sector organizations worldwide due to its many advantages. However, many Indonesian road infrastructure projects are still delivered using the traditional design-bid-build (DBB) project delivery system. This paper reviews the existing literature to explore factors that can influence the successful implementation of DB project delivery system in Indonesian road infrastructure projects. It founds the lack of clarification in existing legislations as well as the lack of experiences, knowledge and skill as the main obstacles in implementing DB systems in Indonesia. To overcome these obstacles, this paper proposes (1) A relook at existing legislation in term of providing more guidance on determining projects appropriate for the DB, procedures for implementing DB, and the structure of builder entity; (2) To develop the skills and knowledge of DB to all stakeholders through communications, knowledge sharing and training. The outcome of this review can serve as a guide to development a framework for the implementation of the design-build project delivery system in Indonesian road infrastructure projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Continuous user authentication with keystroke dynamics uses characters sequences as features. Since users can type characters in any order, it is imperative to find character sequences (n-graphs) that are representative of user typing behavior. The contemporary feature selection approaches do not guarantee selecting frequently-typed features which may cause less accurate statistical user-representation. Furthermore, the selected features do not inherently reflect user typing behavior. We propose four statistical based feature selection techniques that mitigate limitations of existing approaches. The first technique selects the most frequently occurring features. The other three consider different user typing behaviors by selecting: n-graphs that are typed quickly; n-graphs that are typed with consistent time; and n-graphs that have large time variance among users. We use Gunetti’s keystroke dataset and k-means clustering algorithm for our experiments. The results show that among the proposed techniques, the most-frequent feature selection technique can effectively find user representative features. We further substantiate our results by comparing the most-frequent feature selection technique with three existing approaches (popular Italian words, common n-graphs, and least frequent ngraphs). We find that it performs better than the existing approaches after selecting a certain number of most-frequent n-graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Motivation is a major driver of project performance. Despite team member ability to deliver successful project outcomes if they are not positively motivated to pursue joint project goals, then performance will be constrained. One approach to improving the motivation of project organizations is by offering a financial reward for the achievement of set performance standards above a minimum required level. However, little investigation has been undertaken into the features of successful incentive systems as a part of an overall delivery strategy. With input from organizational management literature, and drawing on the literature covering psychological and economic theories of motivation, this paper presents an integrated framework that can be used by project organizations to assess the impact of financial reward systems on motivation in construction projects. The integrated framework offers four motivation indicators which reflect key theoretical concepts across both psychological and economic disciplines. The indicators are: (1) Goal Commitment, (2) Distributive Justice, (3) Procedural Justice, and (4) Reciprocity. The paper also interprets the integrated framework against the results of a successful Australian social infrastructure project case study and identifies key learning’s for project organizations to consider when designing financial reward systems. Case study results suggest that motivation directed towards the achievement of incentive goals is influenced not only by the value placed on the financial reward for commercial benefit, but also driven by the strength of the project initiatives that encourage just and fair dealings, supporting the establishment of trust and positive reciprocal behavior across a project team. The strength of the project relationships was found to be influenced by how attractive the achievement of the goal is to the incentive recipient and how likely they were to push for the achievement of the goal. Interestingly, findings also suggested that contractor motivation is also influenced by the fairness of the performance measurement process and their perception of the trustworthiness and transparency of their client. These findings provide the basis for future research on the impact of financial reward systems on motivation in construction projects. It is anticipated that such research will shed new light on this complex topic and further define how reward systems should be designed to promote project team motivation. Due to the unique nature of construction projects with high levels of task complexity and interdependence, results are expected to vary in comparison to previous studies based on individuals or single-entity organizations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resilient organised crime groups survive and prosper despite law enforcement activity, criminal competition and market forces. Corrupt police networks, like any other crime network, must contain resiliency characteristics if they are to continue operation and avoid being closed down through detection and arrest of their members. This paper examines the resilience of a large corrupt police network, namely The Joke which operated in the Australian state of Queensland for a number of decades. The paper uses social network analysis tools to determine the resilient characteristics of the network. This paper also assumes that these characteristics will be different to those of mainstream organised crime groups because the police network operates within an established policing agency rather than as an independent entity hiding within the broader community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Discourses on ethical fashion are usually geared toward finding solutions—or right outcomes—to ethical problems, based on a teleological model of design and a positioning of the designer as an autonomous and isolated design authority. This practice-led project argues, however, that considerations of design ethics must take into account not only the outcome of a design, but also the ongoing, lived experience of designing as a making located in pre-existing social, historical and cultural conditions. Through an exploration of my own dressmaking practice and a reading of ethos as location, I argue for two things: one, for the designer as a located entity rather than an autonomous "author", and, two, against design-asplan and the original design object, and for the circular and conditioned character of design. Through a connection to ethos, understandings of design ethics shift from an end object focus to something situated, and invested in, everyday lived experience—and always in the making.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Design-Build (DB) system has been widely adopted overseas but it has not received the same popularity yet in the People’s Republic of China. The selection of design-build variant is regarded as one of the critical obstacles to the application of this alternative. This paper investigates categories of design-build variants in the construction market of China. The develop-and-construction, enhanced design-build, traditional-design-build and engineering procurement-construction (EPC) are the four current designbuild variants adopted by clients. Each of them is developed to meet a varying set of circumstances and has its own advantages and disadvantages. The develop-and-construction is mostly used in large, complex projects in housing industry and it will guarantee client’s great control over the project while still leave some design room for the contractor. The traditional-design-build and enhanced-design-build systems are mostly applied in projects that are comparatively simple, small-scale, and the DB contractors will have greater control of the projects. The EPC is the extension of pure design-build method and is widely adopted in the petrochemical, metallurgical and electronic fields because of the high-technique requirements and the necessity for one entity to control the design, construction, procurement and commissioning etc. Four corresponding design-build projects are also presented in this paper in order to better illustrate the operational process and provide the insight for understanding the design-build variants in Mainland China.