245 resultados para Prove


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research is an autoethnographic investigation of consumption experiences, public and quasi-public spaces, and their relationship to community within an inner city neighbourhood. The research specifically focuses on the gentrifying inner city, where class-based processes of change can have implications for people’s abilities to remain within, or feel connected to place. However, the thesis draws on broader theories of the throwntogetherness of the contemporary city (e.g., Amin and Thrift, 2002; Massey 2005) to argue that the city is a space where place-based meanings cannot be seen to be fixed, and are instead better understood as events of place – based on ever shifting interrelations between the trajectories of people and things. This perspective argues the experience of belonging to community is not just born of a social encounter, but also draws on the physical and symbolic elements of the context in which it is situated. The thesis particularly explores the ways people construct identifications within this shifting urban environment. As such, consumption practices and spaces offer one important lens through which to explore the interplay of the physical, social and symbolic. Consumer research tells us that consumption practices can facilitate experiences in which identity-defining meaning can be generated and shared. Consumption spaces can also support different kinds of collective identification – as anchoring realms for specific cultural groups or exposure realms that enable individuals to share in the identification practices of others with limited risk (Aubert-Gamet & Cova, 1999). Furthermore, the consumption-based lifestyles that gentrifying inner city neighbourhoods both support and encourage can also mean that consumption practices may be a key reason that people are moving through public space. That is, consumption practices and spaces may provide a purpose for which – and spatial frame against which – our everyday interactions and connections with people and objects are undertaken within such neighbourhoods. The purpose of this investigation then was to delve into the subjectivities at the heart of identifying with places, using the lens of our consumption-based experiences within them. The enquiry describes individual and collective identifications and emotional connections, and explores how these arise within and through our experiences within public and quasi-public spaces. It then theorises these ‘imaginings’ as representative of an experience of community. To do so, it draws on theories of imagination and its relation to community. Theories of imagined community remind us that both the values and identities of community are held together by projections that create relational links out of objects and shared practices (e.g., Benedict Anderson, 2006; Urry, 2000). Drawing on broader theories of the processes of the imagination, this thesis suggests that an interplay between reflexivity and fantasy – which are products of the critical and the fascinated consciousness – plays a role in this imagining of community (e.g., Brann, 1991; Ricoeur, 1994). This thesis therefore seeks to explore how these processes of imagining are implicated within the construction of an experience of belonging to neighbourhood-based community through consumption practices and the public and quasi-public spaces that frame them. The key question of this thesis is how do an individual’s consumption practices work to construct an imagined presence of neighbourhood-based community? Given the focus on public and quasi-public spaces and our experiences within them, the research also asked how do experiences in the public and quasi-public spaces that frame these practices contribute to the construction of this imagined presence? This investigation of imagining community through consumption practices is based on my own experiences of moving to, and attempting to construct community connections within, an inner city neighbourhood in Melbourne, Australia. To do so, I adopted autoethnographic methodology. This is because autoethnography provides the methodological tools through which one can explore and make visible the subjectivities inherent within the lived experiences of interest to the thesis (Ellis, 2004). I describe imagining community through consumption as an extension of a placebased self. This self is manifest through personal identification in consumption spaces that operate as anchoring realms for specific cultural groups, as well as through a broader imagining of spaces, people, and practices as connected through experiences within realms of exposure. However, this is a process that oscillates through cycles of identification; these anchor one within place personally, but also disrupt those attachments. This instability can force one to question the orientation and motives of these imaginings, and reframe them according to different spaces and reference groups in ways that can also work to construct a more anonymous and, conversely, more achievable collective identification. All the while, the ‘I’ at the heart of this identification is in an ongoing process of negotiation, and similarly, the imagined community is never complete. That is, imagining community is a negotiation, with people and spaces – but mostly with the different identifications of the self. This thesis has been undertaken by publication, and thus the process of imagining community is explored and described through four papers. Of these, the first two focus on specific types of consumption spaces – a bar and a shopping centre – and consider the ways that anchoring and exposure within these spaces support the process of imagining community. The third paper examines the ways that the public and quasi-public spaces that make up the broader neighbourhood context are themselves throwntogether as a realm of exposure, and considers the ways this shapes my imaginings of this neighbourhood as community. The final paper develops a theory of imagined community, as a process of comparison and contrast with imagined others, to provide a summative conceptualisation of the first three papers. The first paper, chapter five, explores this process of comparison and contrast in relation to authenticity, which in itself is a subjective assessment of identity. This chapter was written as a direct response to the recent work of Zukin (2010), and draws on theories of authenticity as applied to personal and collective identification practices by consumer researchers Arnould and Price (2000). In this chapter, I describe how my assessments of the authenticity of my anchoring experiences within one specific consumption space, a neighbourhood bar, are evaluated in comparison to my observations of and affective reactions to the social practices of another group of residents in a different consumption space, the local shopping centre. Chapter five also provides an overview of the key sites and experiences that are considered in more detail in the following two chapters. In chapter six, I again draw on my experiences within the bar introduced in chapter five, this time to explore the process of developing a regular identity within a specific consumption space. Addressing the popular theory of the cafe or bar as third place (Oldenburg, 1999), this paper considers the purpose of developing anchored relationships with people within specific consumption spaces, and explores the different ways this may be achieved in an urban context where the mobilities and lifestyle practices of residents complicate the idea of a consumption space as an anchoring or third place. In doing so, this chapter also considers the manner in which this type of regular identification may be seen to be the beginning of the process of imagining community. In chapter seven, I consider the ways the broader public spaces of the neighbourhood work cumulatively to expose different aspects of its identity by following my everyday movements through the neighbourhood’s shopping centre and main street. Drawing on the theories of Urry (2000), Massey (2005), and Amin (2007, 2008), this chapter describes how these spaces operate as exposure realms, enabling the expression of different senses of the neighbourhood’s spaces, times, cultures, and identities through their physical, social, and symbolic elements. Yet they also enable them to be united: through habitual pathways, group practices of appropriation of space, and memory traces that construct connections between objects and experiences. This chapter describes this as a process of exposure to these different elements. Our imagination begins to expand the scope of the frames onto which it projects an imagined presence; it searches for patterns within the physical, social, and symbolic environment and draws connections between people and practices across spaces. As the final paper, chapter eight, deduces, it is in making these connections that one constructs the objects and shared practices of imagined community. This chapter describes this as an imagining of neighbourhood as a place-based extension of the self, and then explores the ways in which I drew on physical, social, and symbolic elements in an attempt to construct a fit between the neighbourhood’s offerings and my desires for place-based identity definition. This was as a cumulative but fragmented process, in which positive and negative experiences of interaction and identification with people and things were searched for their potential to operate as the objects and shared practices of imagined community. This chapter describes these connections as constructed through interplay between reflexivity and fantasy, as the imagination seeks balance between desires for experiences of belonging, and the complexities of constructing them within the throwntogether context of the contemporary city. The conclusion of the thesis describes the process of imagining community as a reflexive fantasy, that is, as a product of both the critical and fascinated consciousness (Ricoeur, 1994). It suggests that the fascinated consciousness imbues experiences with hope and desire, which the reflexive imagining can turn to disappointment and shame as it critically reflects on the reality of those fascinated projections. At the same time, the reflexive imagination also searches the practices of others for affirmation of those projections, effectively seeking to prove the reality of the fantasy of the imagined community.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Specifically, we build an efficient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learning-with-errors intractability in the standard model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attention Deficit Hyperactivity Disorder (ADHD) has achieved celebrity status in many Western countries, yet despite considerable effort to prove its existence as a “real” disorder, ADHD still suffers from a crisis of legitimacy. Nonetheless, diagnosis and prescription of medication has grown at a phenomenal rate since the late 1980s, particularly in Western culture. Numerous accounts exist explaining how the ADHD diagnosis functions as a convenient administrative loophole, providing schools with a medical explanation for school failure, medication to sedate the “problem” into submission, or the means to eject children from mainstream classrooms. This book provides a more holistic interpretation of how to respond to children who might otherwise be diagnosed with and medicated for “ADHD”—a diagnosis which, whether scientifically valid or not, is unhelpful within the confine of the school. Training teachers to recognise and identify “ADHD symptoms” or to understand the functions of restricted pharmaceuticals will only serve to increase the number of children diagnosed and the sale of psychoactive medications. Research has shown that such activities will not help those children learn, nor will it empower their classroom teachers to take responsibility for teaching such children well. This book seeks to provide school practitioners with knowledge that is useful within the educational context to improve the educational experiences and outcomes for children who might otherwise receive a diagnosis of ADHD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The higher education sector in Australia is under increasing pressure to prove quality and efficacy of education provision, including graduate outcomes. One of the central tasks of higher education has become to prepare nascent professionals as far as possible for initial employment and future working lives beyond this (Boden & Nedeva, 2010). Tertiary educators in the creative arts face significant and distinctive challenges in demonstrating graduate employability, and creative graduates consistently have the poorest outcomes of any subject grouping. In part, this is because the national graduate destinations survey (Graduate Careers Council of Australia, 2012) does not cater to the distinctive ‘portfolio’ nature of creative careers, or take account of the fact that creative careers can take concerted effort over several years to establish (e.g., McCowan & Wyganowska, 2010). However, it is worth asking whether we as tertiary arts educators are doing enough to prepare creative arts students for the world of work, particularly given that the majority of them will be self-employed to some degree (Bureau of Labour Statistics, 2011, Throsby & Zednik, 2010), and will be challenged to build their own careers without recourse to the support of HR departments or intra-firm promotion schemes. It has been demonstrated empirically that career management and creative enterprise skills are among the most important graduate capabilities in determining early creative career success (Bridgstock, 2011), although these skills do not appear in the Learning and Teaching Academic Standards for the Creative and Performing Arts (2010). This paper explores the nature and development of enterprise capabilities for creative arts students (as distinct from students of the business school), examines best practice in the field internationally, and proposes a theoretically-driven creative arts-specific enterprise curriculum model which commences in first year, for demonstrable impact on student enterprise behaviours (such as grant seeking, professional networking and intention to start an enterprise) and employability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To investigate the role of the dopamine receptor genes, DRD1, DRD3, and DRD5 in the pathogenesis of migraine. BACKGROUND: Migraine is a chronic debilitating disorder affecting approximately 12% of the white population. The disease shows strong familial aggregation and presumably has a genetic basis, but at present, the type and number of genes involved is unclear. The study of candidate genes can prove useful in the identification of genes involved in complex diseases such as migraine, especially if the contribution of the gene to phenotypic expression is minor. Genes coding for proteins involved in dopamine metabolism have been implicated in a number of neurologic conditions and may play a contributory role in migraine. Hence, genes that code for enzymes and receptors modulating dopaminergic activity are good candidates for investigation of the molecular genetic basis of migraine. METHODS: We tested 275 migraineurs and 275 age- and sex-matched individuals free of migraine. Genotypic results were determined by restriction endonuclease digestion of polymerase chain reaction products to detect DRD1 and DRD3 alleles and by Genescan analysis after polymerase chain reaction using fluorescently labelled oligonucleotide primers for the DRD5 marker. RESULTS: Results of chi-square statistical analyses indicated that the allele distribution for migraine cases compared to controls was not significantly different for any of the three tested gene markers (chi2 = 0.1, P =.74 for DRD1; chi2 = 1.8, P =.18 for DRD3; and chi2 = 20.3, P =.08 for DRD5). CONCLUSIONS: These findings offer no evidence for allelic association between the tested dopamine receptor gene polymorphisms and the more prevalent forms of migraine and, therefore, do not support a role for these genes in the pathogenesis of the disorder.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

1. Essential hypertension occurs in people with an underlying genetic predisposition who subject themselves to adverse environmental influences. The number of genes involved is unknown, as is the extent to which each contributes to final blood pressure and the severity of the disease. 2. In the past, studies of potential candidate genes have been performed by association (case-control) analysis of unrelated individuals or linkage (pedigree or sibpair) analysis of families. These studies have resulted in several positive findings but, as one may expect, also an enormous number of negative results. 3. In order to uncover the major genetic loci for essential hypertension, it is proposed that scanning the genome systematically in 100- 200 affected sibships should prove successful. 4. This involves genotyping sets of hypertensive sibships to determine their complement of several hundred microsatellite polymorphisms. Those that are highly informative, by having a high heterozygosity, are most suitable. Also, the markers need to be spaced sufficiently evenly across the genome so as to ensure adequate coverage. 5. Tests are performed to determine increased segregation of alleles of each marker with hypertension. The analytical tools involve specialized statistical programs that can detect such differences. Non- parametric multipoint analysis is an appropriate approach. 6. In this way, loci for essential hypertension are beginning to emerge.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines a number of issues in sustainable energy generation and distribution, and explores avenues that are available for integration of our society’s energy supplies. In particular, the paper presents a way in which transport vehicle energy supplies could be integrated with distributed generation schemes to achieve synergistic and beneficial outcomes. The worldwide energy system contains fundamental problems that result directly from the use of unsustainable fuels and a lack of energy system integration. There is a need to adopt an integrated, sustainable energy system for our society. The adoption of distributed generation could result in beneficial restructuring of the energy trade, and a change in the role of energy providers. Inherent benefits in distributed generation schemes would directly combat barriers to installation of renewable generation facilities, which might prove distributed renewable energy sources to be more feasible. The presence of fuel cells, batteries, power electronic inverters and intelligent controls in vehicles of the future provides many opportunities for the integration of vehicle energy supplies into a distributed generation scheme. In such a system, vehicles could play a major role in power generation and storage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mainstream discourse on the revolving around food security is often portrayed by macro level indicators on nutrition, consumption and food production. While these indicators may prove significant in addressing food security in the national and regional levels, it falls short in addressing it among the indigenous peoples’ (IP) communities in the Philippines. Reflecting through the experiences in agricultural production, indigenous knowledge and socio-political institutions are relevant factors that must be seriously considered when food security among IPs are concerned. It is argued that disregarding micro level interactions over macro development policies will not address the issue of food security among marginalized sectors. The paper presents policy recommendations in taking cultural systems seriously in addressing food security among indigenous peoples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.