306 resultados para RSA public-key cryptography
Resumo:
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.
Resumo:
The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography specifically, whilst the second deals with how this form of cryptography may be applied to security related applications such as electronic cash for improving efficiency of the protocols. The objective of batch cryptography is to devise more efficient primitive cryptographic protocols. In general, these primitives make use of some property such as homomorphism to perform a computationally expensive operation on a collective input set. The idea is to amortise an expensive operation, such as modular exponentiation, over the input. Most of the research work in this field has concentrated on its employment as a batch verifier of digital signatures. It is shown that several new attacks may be launched against these published schemes as some weaknesses are exposed. Another common use of batch cryptography is the simultaneous generation of digital signatures. There is significantly less previous work on this area, and the present schemes have some limited use in practical applications. Several new batch signatures schemes are introduced that improve upon the existing techniques and some practical uses are illustrated. Electronic cash is a technology that demands complex protocols in order to furnish several security properties. These typically include anonymity, traceability of a double spender, and off-line payment features. Presently, the most efficient schemes make use of coin divisibility to withdraw one large financial amount that may be progressively spent with one or more merchants. Several new cash schemes are introduced here that make use of batch cryptography for improving the withdrawal, payment, and deposit of electronic coins. The devised schemes apply both to the batch signature and verification techniques introduced, demonstrating improved performance over the contemporary divisible based structures. The solutions also provide an alternative paradigm for the construction of electronic cash systems. Whilst electronic cash is used as the vehicle for demonstrating the relevance of batch cryptography to security related applications, the applicability of the techniques introduced extends well beyond this.
Resumo:
While previous positive and normative studies have focused on the role public relations should play in organisations and the need for management in all organisations to attend to public relations (Cutlip et al., 2006), there has been little discussion in the public relations literature on why or how managers choose to enact public relations strategies for their organisations. If the discipline of public relations is to cement itself as a management function, then researchers must gain a better understanding of managers themselves given that they are the ones who decide if and how public relations strategies should be employed in the organisation. This study has sought to explore evidence of a relationship between management characteristics and their impact on decisions managers make when choosing which public relations strategies to adopt in response to changes in the organisation’s operating environment. This exploratory research study has been conducted within a specific context of schools in Queensland, Australia. Queensland schools have been facing a number of changes within their operating environment due to changes in Federal funding models in Australia’s education system. This study used an exploratory, qualitative approach to understand the management characteristics demonstrated by managers in schools and how these have impacted on the selection of public relations strategies for responding to their changing and increasingly competitive environment. The unit of analysis for this research study was principals in State (government) schools and in non-government schools. Ten principals were interviewed from four different types of schools in Queensland – the more traditional, elite, private schools (GPS Schools); other Independent Schools; Catholic Schools; and State (or public) schools. These interviews were analysed for quantitative comparisons of the managers’ characteristics across the different schools (in terms of the number of principals in each age bracket, those holding postgraduate qualifications, years of experience etc.); and for qualitative data to provide a greater sense of their understanding of public relations. The 10 schools were selected within a geographic area from Brisbane’s inner city to its outer western suburbs to include an element of competition amongst those managers being interviewed. A detailed review of government, school and other public documents was also conducted to gain an insight into the environment in which principals made decisions about public relations strategy to respond to increasing competition. This study found support for the literature on the relationship between management characteristics and strategy. However, there was also variation in findings warranting further investigation of the literature on the relationship between management characteristics and strategy in a school setting. Key relationships found in this study were between: management characteristics themselves; age and the use of public relations strategies; and gender and the use of public relations strategies. There was also evidence of support for the literature linking the impact that the combination of managers’ age, education and experience had on the use of public relations strategies. While this study was exploratory in nature, it did reveal a number of areas that require further investigation to gain a deeper understanding of how and why managers choose public relations strategies as a response to changes in their operating environment. It also provided a different framework to gain a better understanding of managers’ understanding and support of public relations in schools, which, in conjunction with an analysis of their management characteristics, will hopefully allow public relations scholars and practitioners alike gain an understanding of how and why managers use public relations strategies.
Resumo:
This article reports on a research program that has developed new methodologies for mapping the Australian blogosphere and tracking how information is disseminated across it. The authors improve on conventional web crawling methodologies in a number of significant ways: First, the authors track blogging activity as it occurs, by scraping new blog posts when such posts are announced through Really Simple Syndication (RSS) feeds. Second, the authors use custom-made tools that distinguish between the different types of content and thus allow us to analyze only the salient discursive content provided by bloggers. Finally, the authors are able to examine these better quality data using both link network mapping and textual analysis tools, to produce both cumulative longer term maps of interlinkages and themes, and specific shorter term snapshots of current activity that indicate current clusters of heavy interlinkage and highlight their key themes. In this article, the authors discuss findings from a yearlong observation of the Australian political blogosphere, suggesting that Australian political bloggers consistently address current affairs, but interpret them differently from mainstream news outlets. The article also discusses the next stage of the project, which extends this approach to an examination of other social networks used by Australians, including Twitter, YouTube, and Flickr. This adaptation of our methodology moves away from narrow models of political communication, and toward an investigation of everyday and popular communication, providing a more inclusive and detailed picture of the Australian networked public sphere.
Resumo:
This paper introduces Sapporo World Window, a screen-based application that is currently under development for the new underway passage at the centre of Sapporo City. There are ten large public screens installed in the space, displaying user-generated videos about various aspects of the city and a real-time map that visualises users’ interaction with the city. The application aims to engage the general public by functioning as a unique ‘point of connection’ for socio-cultural and technological interactions, making the space a lively social place where people can have meaningful experiences of interacting with people and places of Sapporo through mobile phones (keitai) and the public screens in the space. This paper first outlines the contextual background and key concept for the application’s design. Then the paper discusses the user interaction processes, technical specifications, and interface design, followed by the conclusions and outlook.
Resumo:
In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.
Resumo:
Triggered by the continuing global financial crisis, most public administration systems internationally are reviewing their ability to meet public expectations in more challenging strategic environments, while satisfying the pressure from their political masters to drive down the costs of public administration. Consequently public sector organizations are under constant pressure to reform to meet not only the global economic challenges, but the need for more responsive government (Brown et al 2003). Doyle et al (2000) propose that organizational change is seldom well managed, but that the public sector faces greater difficulty in implementing corporate change than the private sector because of its unique environment, e.g. the need to deliver bureaucratically impartial outcomes. The scale of the changes required, and the constraints imposed by the context within which these changes need to occur, have intensified the need for capable public sector leadership and management. The types of capability required now extend beyond those typically required in public organizations through the efficiency drive of new public management. Acquiring these capabilities remains a key issue for public organizations. One challenge for public management, then, is leadership and management quality, including the need to recruit externally to refresh, re-energize and change the sector and its individual organizations as well as develop advanced skills among existing senior executives.
Resumo:
This paper describes the background and methodology developed and employed in undertaking research developing a Knowledge Management Strategy for a key construction focused government agency. This paper reviews this methodology and examines a likely Knowledge Management Strategy. Two central objectives structure this Case Study: 1. Identify categories of important information generated by the Building Division, Queensland Department of Public Works in its service delivery to internal and external stake-holders, and 2. Formulate an appropriate and targeted Knowledge Management Strategy to meet the needs of the Queensland Building Capital Works program. The structure of this paper includes: *Description of the Queensland construction industry setting *Review the relevant literature *Design an appropriate research methodology *Analyse results *Formulate conclusions, contributions and implications of the targeted strategy.
Resumo:
The proliferation of media services enabled by digital technologies poses a serious challenge to public service broadcasting rationales based on media scarcity. Looking to the past and future, we articulate an important role that the Australian Broadcasting Corporation (ABC) might play in the digital age. We argue that historically the ABC has acted beyond its institutional broadcasting remit to facilitate cultural development and, drawing on the example of Pool (an online community of creative practitioners established and maintained by the ABC), point to a key role it might play in fostering network innovation in what are now conceptualised as the creative industries.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
Objective: Given the increasing popularity of motorcycle riding and heightened risk of injury or death associated with being a rider, this study explored rider behaviour as a determinant of rider safety and, in particular, key beliefs and motivations which influence such behaviour. To enhance the effectiveness of future education and training interventions, it is important to understand riders’ own views about what influences how they ride. Specifically, this study sought to identify key determinants of riders’ behaviour in relation to the social context of riding including social and identity-related influences relating to the group (group norms and group identity) as well as the self (moral/personal norm and self-identity). ----- ----- Method: Qualitative research was undertaken via group discussions with motorcycle riders (n = 41). Results: The findings revealed that those in the group with which one rides represent an important source of social influence. Also, the motorcyclist (group) identity was associated with a range of beliefs, expectations, and behaviours considered to be normative. Exploration of the construct of personal norm revealed that riders were most cognizant of the “wrong things to do” when riding; among those issues raised was the importance of protective clothing (albeit for the protection of others and, in particular, pillion passengers). Finally, self-identity as a motorcyclist appeared to be important to a rider’s self-concept and was likely to influence their on-road behaviour. ----- ----- Conclusion: Overall, the insight provided by the current study may facilitate the development of interventions including rider training as well as public education and mass media messages. The findings suggest that these interventions should incorporate factors associated with the social nature of riding in order to best align it with some of the key beliefs and motivations underpinning riders’ on-road behaviours.
Resumo:
In 2008, a three-year pilot ‘pay for performance’ (P4P) program, known as ‘Clinical Practice Improvement Payment’ (CPIP) was introduced into Queensland Health (QHealth). QHealth is a large public health sector provider of acute, community, and public health services in Queensland, Australia. The organisation has recently embarked on a significant reform agenda including a review of existing funding arrangements (Duckett et al., 2008). Partly in response to this reform agenda, a casemix funding model has been implemented to reconnect health care funding with outcomes. CPIP was conceptualised as a performance-based scheme that rewarded quality with financial incentives. This is the first time such a scheme has been implemented into the public health sector in Australia with a focus on rewarding quality, and it is unique in that it has a large state-wide focus and includes 15 Districts. CPIP initially targeted five acute and community clinical areas including Mental Health, Discharge Medication, Emergency Department, Chronic Obstructive Pulmonary Disease, and Stroke. The CPIP scheme was designed around key concepts including the identification of clinical indicators that met the set criteria of: high disease burden, a well defined single diagnostic group or intervention, significant variations in clinical outcomes and/or practices, a good evidence, and clinician control and support (Ward, Daniels, Walker & Duckett, 2007). This evaluative research targeted Phase One of implementation of the CPIP scheme from January 2008 to March 2009. A formative evaluation utilising a mixed methodology and complementarity analysis was undertaken. The research involved three research questions and aimed to determine the knowledge, understanding, and attitudes of clinicians; identify improvements to the design, administration, and monitoring of CPIP; and determine the financial and economic costs of the scheme. Three key studies were undertaken to ascertain responses to the key research questions. Firstly, a survey of clinicians was undertaken to examine levels of knowledge and understanding and their attitudes to the scheme. Secondly, the study sought to apply Statistical Process Control (SPC) to the process indicators to assess if this enhanced the scheme and a third study examined a simple economic cost analysis. The CPIP Survey of clinicians elicited 192 clinician respondents. Over 70% of these respondents were supportive of the continuation of the CPIP scheme. This finding was also supported by the results of a quantitative altitude survey that identified positive attitudes in 6 of the 7 domains-including impact, awareness and understanding and clinical relevance, all being scored positive across the combined respondent group. SPC as a trending tool may play an important role in the early identification of indicator weakness for the CPIP scheme. This evaluative research study supports a previously identified need in the literature for a phased introduction of Pay for Performance (P4P) type programs. It further highlights the value of undertaking a formal risk assessment of clinician, management, and systemic levels of literacy and competency with measurement and monitoring of quality prior to a phased implementation. This phasing can then be guided by a P4P Design Variable Matrix which provides a selection of program design options such as indicator target and payment mechanisms. It became evident that a clear process is required to standardise how clinical indicators evolve over time and direct movement towards more rigorous ‘pay for performance’ targets and the development of an optimal funding model. Use of this matrix will enable the scheme to mature and build the literacy and competency of clinicians and the organisation as implementation progresses. Furthermore, the research identified that CPIP created a spotlight on clinical indicators and incentive payments of over five million from a potential ten million was secured across the five clinical areas in the first 15 months of the scheme. This indicates that quality was rewarded in the new QHealth funding model, and despite issues being identified with the payment mechanism, funding was distributed. The economic model used identified a relative low cost of reporting (under $8,000) as opposed to funds secured of over $300,000 for mental health as an example. Movement to a full cost effectiveness study of CPIP is supported. Overall the introduction of the CPIP scheme into QHealth has been a positive and effective strategy for engaging clinicians in quality and has been the catalyst for the identification and monitoring of valuable clinical process indicators. This research has highlighted that clinicians are supportive of the scheme in general; however, there are some significant risks that include the functioning of the CPIP payment mechanism. Given clinician support for the use of a pay–for-performance methodology in QHealth, the CPIP scheme has the potential to be a powerful addition to a multi-faceted suite of quality improvement initiatives within QHealth.