55 resultados para Protocols of the wise men of Zion.
em Queensland University of Technology - ePrints Archive
Resumo:
Citizen science projects have demonstrated the advantages of people with limited relevant prior knowledge participating in research. However, there is a difference between engaging the general public in a scientific project and entering an established expert community to conduct research. This paper describes our ongoing acoustic biodiversity monitoring collaborations with the bird watching community. We report on findings gathered over six years from participation in bird walks, observing conservation efforts, and records of personal activities of experienced birders. We offer an empirical study into extending existing protocols through in-context collaborative design involving scientists and domain experts.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
Indigenous commentators have long critiqued the way in which government agencies and member of academic institutions carry out research in their social context. Recently, these commentators have turned their critical gaze upon activities of Research Ethics Boards(REBs). Informed by the reflections on research processes and by Indigenous Canadian and New Zealand research participants, as well as the extant literature, this paper critiques the processes employed by New Zealand REBs to assess Indigenous‐focused or Indigenous‐led research in the criminological realm.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
Purpose Samoan communities in Australia exhibit a disproportionate rate of kidney disease compared with other Australians. This article describes a research project that used a culturally sensitive framework, Fa’afaletui, to help reduce the barriers of language and culture and increase our understanding of the factors contributing to kidney disease, in one Samoan community in Australia. Design Semistructured group interviews were undertaken with Samoan community families and groups. The interviews were analyzed according to key concepts embedded in the Fa’afaletui framework. Findings Four factors associated with health risks in this Samoan community emerged—diet and exercise; issues related to the collective (incorporating the village, church, and family); tapu or cultural protocols; and the importance of language. Conclusions The findings suggest that future kidney health promotion initiatives within this Samoan community will be more effective if they are sensitive to Samoan cultural norms, language, and context.
Resumo:
A number of recent books on ethics (Hirst and Patching 2005, Tanner et al, 2005, Ward, 2006)have indicated that traditional understandings of journalism "objectivity" are in need of renovation if they are to sustain the claim as a guide to ethical action. Ward argues for the recasting of the notions of traditional objectivity to offer a "pragmatic objectivity" as an alternative and plausible underpinning to ethical journalism practice. He argues that a recast or "pragmatic objectivity" should respond to the changing rhetorical relationship between journalists and their audiences; and, in so doing, should take inspiration from attempts to be objective in other domains---professions such as law and public relations in seeking models. This paper seeks to take a step in that direction through illustrating how journalism interviews do "objectivity" through an adaptation of the principles of the "Fourth Estate" to political interviews. It turns such analysis to the ends of establishing the particular "pragmatic ethic" underpinning such practices and how journalism interviewing techniques has allowed for proactive journalists to strike a workable balance between pursuing the public interest and observing the restraining protocols of modern journalistic practice.
Resumo:
Background Cervical cancer and infection with human immunodeficiency virus (HIV) are both important public health problems in South Africa (SA). The aim of this study was to determine the prevalence of cervical squamous intraepithelial lesions (SILs), high-risk human papillomavirus (HR-HPV), HPV viral load and HPV genotypes in HIV positive women initiating anti-retroviral (ARV) therapy. Methods A cross-sectional survey was conducted at an anti-retroviral (ARV) treatment clinic in Cape Town, SA in 2007. Cervical specimens were taken for cytological analysis and HPV testing. The Digene Hybrid Capture 2 (HC2) test was used to detect HR-HPV. Relative light units (RLU) were used as a measure of HPV viral load. HPV types were determined using the Roche Linear Array HPV Genotyping test. Crude associations with abnormal cytology were tested and multiple logistic regression was used to determine independent risk factors for abnormal cytology. Results The median age of the 109 participants was 31 years, the median CD4 count was 125/mm3, 66.3% had an abnormal Pap smear, the HR-HPV prevalence was 78.9% (Digene), the median HPV viral load was 181.1 RLU (HC2 positive samples only) and 78.4% had multiple genotypes. Among women with abnormal smears the most prevalent HR-HPV types were HPV types 16, 58 and 51, all with a prevalence of 28.5%. On univariate analysis HR-HPV, multiple HPV types and HPV viral load were significantly associated with the presence of low and high-grade SILs (LSIL/HSIL). The multivariate logistic regression showed that HPV viral load was associated with an increased odds of LSIL/HSIL, odds ratio of 10.7 (95% CI 2.0 – 57.7) for those that were HC2 positive and had a viral load of ≤ 181.1 RLU (the median HPV viral load), and 33.8 (95% CI 6.4 – 178.9) for those that were HC2 positive with a HPV viral load > 181.1 RLU. Conclusion Women initiating ARVs have a high prevalence of abnormal Pap smears and HR-HPV. Our results underscore the need for locally relevant, rigorous screening protocols for the increasing numbers of women accessing ARV therapy so that the benefits of ARVs are not partially offset by an excess risk in cervical cancer.
Resumo:
Children with Autism Spectrum Disorder experience difficulty in communication and in understanding the social world which can have negative consequences for their relationships, in managing emotions, and generally dealing with the challenges of everyday life. This thesis examines the effectiveness of the Active and Reflective components of the Get REAL program through the assessment of the detailed coding of video-recorded observations and longitudinal quantitative analysis. The aim of Get REAL is to increase the social, emotional, and cognitive learning of children with High Functioning Autism (HFA). Get REAL is a group program designed specifically for use in inclusive primary school settings. The Get REAL program was designed in response to the mixed success of generalisation of learning to new contexts of existing social skills programs. The theoretical foundation of Get REAL is based upon pedagogical theory and learning theory to facilitate transfer of learning, combined with experiential, individualised, evaluative and organisational approaches. This thesis is by publication and consists of four refereed journal papers; 1 accepted for publication and 3 that are under review. Paper 1 describes the development and theoretical basis of the Get REAL program and provides detail of the program structure and learning cycle. The focus of Paper 1 reflects the first question of interest in the thesis which is about the extent to which learning derived from participation in the program can be generalised to other contexts. Participants are 16 children with HFA ranging in age from 8-13 years. Results provided support for the generalisability of learning from Get REAL to home and school evidenced by parent and teacher data collected pre and post participation in Get REAL. Following establishment of the generalisation of learning from Get REAL, Papers 2 and 3 focus on the Active and Reflective components of the program in order to examine how individual and group learning takes place. Participants (N = 12) in the program are video-taped during the Active and Reflective Sessions. Using identical coding protocols of video data, improvements in prosocial behaviour and diminishing of inappropriate behaviours were apparent with the exception of perspective taking. Data also revealed that 2 of the participants had atypical trajectories. An in-depth case study analysis was then conducted with these 2 participants in Paper 4. Data included reports from health care and education professionals within the school and externally (e.g., paediatrician) and identified the multi-faceted nature of care needed for children with comorbid diagnoses and extremely challenging family circumstances as a complex task to effect change. Results of this research support the effectiveness of the Get REAL program in promoting pro social behaviours such as improvements in engaging with others and emotional regulation, and in diminishing unwanted behaviours such as conduct problems. Further, the gains made by the participating children were found to be generalisable beyond Get REAL to home and other school settings. The research contained in the thesis adds to current knowledge about how learning can take place for children with HFA. Results show that an experiential learning framework with a focus on social cognition, together with explicit teaching, scaffolded with video feedback, are key ingredients for the generalisation of social learning to broader contexts.
Resumo:
Since mass immigration recruitments of the post-war period, ‘othered’ immigrants to both the UK and Australia have faced ‘mainstream’ cultural expectations to assimilate, and various forms of state management of their integration. Perceived failure or refusal to integrate has historically been constructed as deviant, though in certain policy phases this tendency has been mitigated by cultural pluralism and official multiculturalism. At critical times, hegemonic racialisation of immigrant minorities has entailed their criminalisation, especially that of their young men. In the UK following the ‘Rushdie Affair’ of 1989, and in both Britain and Australia following these states’ involvement in the 1990-91 Gulf War, the ‘Muslim Other’ was increasingly targeted in cycles of racialised moral panic. This has intensified dramatically since the 9/11 terrorist attacks and the ensuing ‘War on Terror’. The young men of Muslim immigrant communities in both these nations have, over the subsequent period, been the subject of heightened popular and state Islamophobia in relation to: perceived ‘ethnic gangs’; alleged deviant, predatory masculinity including so-called ‘ethnic gang rape’; and paranoia about Islamist ‘radicalisation’ and its supposed bolstering of terrorism. In this context, the earlier, more genuinely social-democratic and egalitarian, aspects of state approaches to ‘integration’ have been supplanted, briefly glossed by a rhetoric of ‘social inclusion’, by reversion to increasingly oppressive assimilationist and socially controlling forms of integrationism. This article presents some preliminary findings from fieldwork in Greater Manchester over 2012, showing how mainly British-born Muslims of immigrant background have experienced these processes.
Resumo:
Aging is associated with increased circulating pro-inflammatory and lower anti-inflammatory cytokines. Exercise training, in addition to improving muscle function, reduces these circulating pro-inflammatory cytokines. Yet, few studies have evaluated changes in the expression of cytokines within skeletal muscle after exercise training. The aim of the current study was to examine the expression of cytokines both at rest and following a bout of isokinetic exercise performed before and after 12 weeks of resistance exercise training in young (n = 8, 20.3 ± 0.8 yr) and elderly men (n = 8, 66.9 ± 1.6 yr). Protein expression of various cytokines was determined in muscle homogenates. The expression of MCP-1, IL-8 and IL-6 (which are traditionally classified as ‘pro-inflammatory’) increased substantially after acute exercise. By contrast, the expression of the anti-inflammatory cytokines IL-4, IL-10 and IL-13 increased only slightly (or not at all) after acute exercise. These responses were not significantly different between young and elderly men, either before or after 12 weeks of exercise training. However, compared with the young men, the expression of pro-inflammatory cytokines 2 h post exercise tended to be greater in the elderly men prior to training. Training attenuated this difference. These data suggest that the inflammatory response to unaccustomed exercise increases with age. Furthermore, regular exercise training may help to normalize this inflammatory response, which could have important implications for muscle regeneration and adaptation in the elderly.
Resumo:
The recent floods in south-east Queensland have focused policy, academic and community attention on the challenges associated with severe weather events (SWE), specifically pre-disaster preparation, disaster-response and post-disaster community resilience. Financially, the cost of SWE was $9 billion in the 2011 Australian Federal Budget (Swan 2011); psychologically and emotionally, the impact on individual mental health and community wellbeing is also significant but more difficult to quantify. However, recent estimates suggest that as many as one in five will subsequently experience major emotional distress (Bonanno et al. 2010). With climate change predicted to increase the frequency and intensity of a wide range of SWE in Australia (Garnaut 2011; The Climate Institute 2011), there is an urgent and critical need to ensure that the unique psychological and social needs of more vulnerable community members - such as older residents - are better understood and integrated into disaster preparedness and response policy, planning and protocols. Navigating the complex dynamics of SWE can be particularly challenging for older adults and their disaster experience is frequently magnified by a wide array of cumulative and interactive stressors, which intertwine to make them uniquely vulnerable to significant short and long-term adverse effects. This current article provides a brief introduction to the current literature in this area and highlights a gap in the research relating to communication tools during and after severe weather events.
Resumo:
Multi-touch interfaces across a wide range of hardware platforms are becoming pervasive. This is due to the adoption of smart phones and tablets in both the consumer and corporate market place. This paper proposes a human-machine interface to interact with unmanned aerial systems based on the philosophy of multi-touch hardware-independent high-level interaction with multiple systems simultaneously. Our approach incorporates emerging development methods for multi-touch interfaces on mobile platforms. A framework is defined for supporting multiple protocols. An open source solution is presented that demonstrates: architecture supporting different communications hardware; an extensible approach for supporting multiple protocols; and the ability to monitor and interact with multiple UAVs from multiple clients simultaneously. Validation tests were conducted to assess the performance, scalability and impact on packet latency under different client configurations.
Resumo:
Introduction and Aim: Sexual assaults commonly involve alcohol use by the perpetrator, victim, or both. Beliefs about alcohol’s effects may impact on people’s perceptions of and responses to men and women who have had such experiences while intoxicated from alcohol. This study aimed to develop an alcohol expectancy scale that captures young adults’ beliefs about alcohol’s role in sexual aggression and victimisation. Design and Methods: Based on pilot focus groups, an initial pool of 135 alcohol expectancy items was developed, checked for readability and face validity, and administered via a cross-sectional survey to 201 male and female university students (18-25 years). Items were specified in terms of three target drinkers: self, men, and women. In addition, a social desirability measure was included. Results: Principal Axis Factoring revealed a 4-factor solution for the targets men and women and a 5-factor solution for the target self with 72 items retained. Factors related to sexual coercion, sexual vulnerability, confidence, self-centredness, and negative cognitive and behavioural effects. Social desirability issues were evident for the target self, but not for the targets men and women. Discussion and Conclusions: Young adults link alcohol’s effects with sexual vulnerabilities via perceived risky cognitions and behaviours. Due to social desirability, these expectancies may be difficult to explicate for the self but may be accessible instead via other-oriented assessment. The Sexual Coercion and Vulnerability Alcohol Expectancy Scale has potential as a tool to elucidate the established tendency for observers to excuse intoxicated sexual perpetrators while blaming intoxicated victims.
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Resumo:
The first User-Focused Service Engineering, Consumption and Aggregation workshop (USECA) in 2011 was held in conjunction with the WISE 2011 conference in Sydney, Australia. Web services and related technology are a widely accepted standard architectural paradigm for application development. The idea of reusing existing software components to build new applications has been well documented and supported for the world of enterprise computing and professional developers. However, this powerful idea has not been transferred to end-users who have limited or no computing knowledge. The current methodologies, models, languages and tools developed for Web service composition are suited to IT professionals and people with years of training in computing technologies. It is still hard to imagine any of these technologies being used by business professionals, as opposed to computing professionals. © 2013 Springer-Verlag.