630 resultados para Key control

em Queensland University of Technology - ePrints Archive


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The complex systems approach offers an opportunity to replace the extant pre-dominant mechanistic view on sport-related phenomena. The emphasis on the environment-system relationship, the applications of complexity principles, and the use of nonlinear dynamics mathematical tools propose a deep change in sport science. Coordination dynamics, ecological dynamics, and network approaches have been successfully applied to the study of different sport-related behaviors, from movement patterns that emerge at different scales constrained by specific sport contexts to game dynamics. Sport benefit from the use of such approaches in the understanding of technical, tactical, or physical conditioning aspects which change their meaning and dilute their frontiers. The creation of new learning and training strategies for teams and individual athletes is a main practical consequence. Some challenges for the future are investigating the influence of key control parameters in the nonlinear behavior of athlete-environment systems and the possible relatedness of the dynamics and constraints acting at different spatio-temporal scales in team sports. Modelling sport-related phenomena can make useful contributions to a better understanding of complex systems and vice-versa.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The launch of the Centre of Research Excellence in Reducing Healthcare Associated Infection (CRE-RHAI) took place in Sydney on Friday 12 October 2012. The mission of the CRE-RHAI is to generate new knowledge about strategies to reduce healthcare associated infections and to provide data on the cost-effectiveness of infection control programs. As well as launching the CRE-RHAI, an important part of this event was a stakeholder Consultation Workshop, which brought together several experts in the Australian infection control community. The aims of this workshop were to establish the research and clinical priorities in Australian infection control, assess the importance of various multi-resistant organisms, and to gather information about decision making in infection control. We present here a summary and discussion of the responses we received.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

AIMS: To examine changes in illicit drug consumption between peak holiday season (23 December-3 January) in Australia and a control period two months later in a coastal urban area, an inland semi-rural area and an island populated predominantly by vacationers during holidays. DESIGN: Analysis of representative daily composite wastewater samples collected from the inlet of the major wastewater treatment plant in each area. SETTING: Three wastewater treatment plants. PARTICIPANTS: Wastewater treatment plants serviced approximately 350, 000 persons in the urban area, 120,000 in the semi-rural area and 1100-2400 on the island. MEASUREMENTS: Drug residues were analysed using liquid chromatography coupled to a tandem mass spectrometer. Per capita drug consumption was estimated. Changes in drug use were quantified using Hedges' g. FINDINGS: During the holidays, cannabis consumption in the semi-rural area declined (g = -2.8) as did methamphetamine (-0.8), whereas cocaine (+1.5) and ecstasy (+1.6) use increased. In the urban area, consumption of all drugs increased during holidays (cannabis +1.6, cocaine +1.2, ecstasy +0.8 and methamphetamine +0.3). In the vacation area, methamphetamine (+0.7), ecstasy (+0.7) and cocaine (+1.1) use increased, but cannabis (-0.5) use decreased during holiday periods. CONCLUSIONS: While the peak holiday season in Australia is perceived as a period of increased drug use, this is not uniform across all drugs and areas. Substantial declines in drug use in the semi-rural area contrasted with substantial increases in urban and vacation areas. Per capita drug consumption in the vacation area was equivalent to that in the urban area, implying that these locations merit particular attention for drug use monitoring and harm minimisation measures.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Introduction and Aims: Holiday periods are potentially a time for increased substance use as social events and private parties are more common. Data on community illicit drug consumption during holiday periods are limited. Besides existing methods for determining drug use, such as population surveys, one emerging method is to measure illicit drugs and/or their metabolites in wastewater samples. This study examined the change in consumption of cannabis, methamphetamine, cocaine and 3,4- methylenedioxymethamphetamine in three different types of areas (an inland semi-rural area, a coastal urban area and a vacation island) with respect to holiday times. Design and Methods: Samples were collected at the inlet of the major wastewater treatment plant in each area during a key annual holiday (i.e. the summer holiday including Christmas and New Year) and control period. Illicit drug residues in the daily composited samples were measured by liquid chromatography coupled with tandem mass spectrometry. Results: Drug use varied substantially among the three areas within each monitoring period as well as between the holiday and control period within each area. Use consistently increased and peaked over New Year particularly for cocaine and 3,4-methylenedioxymethamphetamine whereas cannabis and methamphetamine were relatively less subjected to holiday times in all the areas. Discussion and Conclusions: Wastewater sampling and analysis provides higher spatio-temporal resolution than national surveys and supplements drug epidemiology studies originating primary in metropolitan locations. Such data is essential for policy makers to plan potential intervention strategies associated with these illicit substances in regional areas and other settings besides urban areas in the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper traces the history of store (retailer-controlled) and national (manufacture controlled)brands; identifies the key historical characteristics of the past 200 years of marketing history;describes the four main time periods of U.S. retail marketing (1800 - 2000); and comments on the most likely developments within the current phases of brand marketing. Will the future focus on technology and new forms of communications? The Internet exemplifies an unconventional retailing environment, with etailer numbers growing rapidly. The central proposition of this paper is that a "cycle of control" - a pattern of marketing developments within the history of retailing and national marketing communications - Can indicate the success of marketing strategies in the future.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The lack of satisfactory consensus for characterizing the system intelligence and structured analytical decision models has inhibited the developers and practitioners to understand and configure optimum intelligent building systems in a fully informed manner. So far, little research has been conducted in this aspect. This research is designed to identify the key intelligent indicators, and develop analytical models for computing the system intelligence score of smart building system in the intelligent building. The integrated building management system (IBMS) was used as an illustrative example to present a framework. The models presented in this study applied the system intelligence theory, and the conceptual analytical framework. A total of 16 key intelligent indicators were first identified from a general survey. Then, two multi-criteria decision making (MCDM) approaches, the analytic hierarchy process (AHP) and analytic network process (ANP), were employed to develop the system intelligence analytical models. Top intelligence indicators of IBMS include: self-diagnostic of operation deviations; adaptive limiting control algorithm; and, year-round time schedule performance. The developed conceptual framework was then transformed to the practical model. The effectiveness of the practical model was evaluated by means of expert validation. The main contribution of this research is to promote understanding of the intelligent indicators, and to set the foundation for a systemic framework that provide developers and building stakeholders a consolidated inclusive tool for the system intelligence evaluation of the proposed components design configurations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper proposes a new approach for delay-dependent robust H-infinity stability analysis and control synthesis of uncertain systems with time-varying delay. The key features of the approach include the introduction of a new Lyapunov–Krasovskii functional, the construction of an augmented matrix with uncorrelated terms, and the employment of a tighter bounding technique. As a result, significant performance improvement is achieved in system analysis and synthesis without using either free weighting matrices or model transformation. Examples are given to demonstrate the effectiveness of the proposed approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Primary prevention of childhood overweight is an international priority. In Australia 20-25% of 2-8 year olds are already overweight. These children are at substantially increased the risk of becoming overweight adults, with attendant increased risk of morbidity and mortality. Early feeding practices determine infant exposure to food (type, amount, frequency) and include responses (eg coercion) to infant feeding behaviour (eg. food refusal). There is correlational evidence linking parenting style and early feeding practices to child eating behaviour and weight status. A focus on early feeding is consistent with the national focus on early childhood as the foundation for life-long health and well being. The NOURISH trial aims to implement and evaluate a community-based intervention to promote early feeding practices that will foster healthy food preferences and intake and preserve the innate capacity to self-regulate food intake in young children. Methods/Design This randomised controlled trial (RCT) aims to recruit 820 first-time mothers and their healthy term infants. A consecutive sample of eligible mothers will be approached postnatally at major maternity hospitals in Brisbane and Adelaide. Initial consent will be for re-contact for full enrolment when the infants are 4-7 months old. Individual mother- infant dyads will be randomised to usual care or the intervention. The intervention will provide anticipatory guidance via two modules of six fortnightly parent education and peer support group sessions, each followed by six months of regular maintenance contact. The modules will commence when the infants are aged 4-7 and 13-16 months to coincide with establishment of solid feeding, and autonomy and independence, respectively. Outcome measures will be assessed at baseline, with follow up at nine and 18 months. These will include infant intake (type and amount of foods), food preferences, feeding behaviour and growth and self-reported maternal feeding practices and parenting practices and efficacy. Covariates will include sociodemographics, infant feeding mode and temperament, maternal weight status and weight concern and child care exposure. Discussion Despite the strong rationale to focus on parents’ early feeding practices as a key determinant of child food preferences, intake and self-regulatory capacity, prospective longitudinal and intervention studies are rare. This trial will be amongst to provide Level II evidence regarding the impact of an intervention (commencing prior to age 12 months) on children’s eating patterns and behaviours. Trial Registration: ACTRN12608000056392

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Problem-based learning (PBL) is a pedagogical methodology that presents the learner with a problem to be solved to stimulate and situate learning. This paper presents key characteristics of a problem-based learning environment that determines its suitability as a data source for workrelated research studies. To date, little has been written about the availability and validity of PBL environments as a data source and its suitability for work-related research. We describe problembased learning and use a research project case study to illustrate the challenges associated with industry work samples. We then describe the PBL course used in our research case study and use this example to illustrate the key attributes of problem-based learning environments and show how the chosen PBL environment met the work-related research requirements of the research case study. We propose that the more realistic the PBL work context and work group composition, the better the PBL environment as a data source for a work-related research. The work context is more realistic when relevant and complex project-based problems are tackled in industry-like work conditions over longer time frames. Work group composition is more realistic when participants with industry-level education and experience enact specialized roles in different disciplines within a professional community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Alzaid et al. proposed a forward & backward secure key management scheme in wireless sensor networks for Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems. The scheme, however, is still vulnerable to an attack called the sandwich attack that can be launched when the adversary captures two sensor nodes at times t1 and t2, and then reveals all the group keys used between times t1 and t2. In this paper, a fix to the scheme is proposed in order to limit the vulnerable time duration to an arbitrarily chosen time span while keeping the forward and backward secrecy of the scheme untouched. Then, the performance analysis for our proposal, Alzaid et al.’s scheme, and Nilsson et al.’s scheme is given.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The GuRoo is a 1.2 m tall, 23 degree of freedom humanoid constructed at the University of Queensland for research into humanoid robotics. The key challenge being addressed by the GuRoo project is the development of appropriate learning strategies for control and coordination of the robot's many joints. The development of learning strategies is seen as a way to side-step the inherent intricacy of modeling a multi-DOF biped robot. This paper outlines the approach taken to generate an appropriate control scheme for the joints of the GuRoo. The paper demonstrates the determination of local feedback control parameters using a genetic algorithm. The feedback loop is then augmented by a predictive modulator that learns a form of feed-forward control to overcome the irregular loads experienced at each joint during the gait cycle. The predictive modulator is based on the CMAC architecture. Results from tests on the GuRoo platform show that both systems provide improvements in stability and tracking of joint control.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.