40 resultados para privacy


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Boolean games, agents try to reach a goal formulated as a Boolean formula. These games are attractive because of their compact representations. However, few methods are available to compute the solutions and they are either limited or do not take privacy or communication concerns into account. In this paper we propose the use of an algorithm related to reinforcement learning to address this problem. Our method is decentralized in the sense that agents try to achieve their goals without knowledge of the other agents’ goals. We prove that this is a sound method to compute a Pareto optimal pure Nash equilibrium for an interesting class of Boolean games. Experimental results are used to investigate the performance of the algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The privacy of voice over IP (VoIP) systems is achieved by compressing and encrypting the sampled data. This paper investigates in detail the leakage of information from Skype, a widely used VoIP application. In this research, it has been demonstrated by using the dynamic time warping (DTW) algorithm, that sentences can be identified with an accuracy of 60%. The results can be further improved by choosing specific training data. An approach involving the Kalman filter is proposed to extract the kernel of all training signals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A novel wireless local area network (WLAN) security processor is described in this paper. It is designed to offload security encapsulation processing from the host microprocessor in an IEEE 802.11i compliant medium access control layer to a programmable hardware accelerator. The unique design, which comprises dedicated cryptographic instructions and hardware coprocessors, is capable of performing wired equivalent privacy, temporal key integrity protocol, counter mode with cipher block chaining message authentication code protocol, and wireless robust authentication protocol. Existing solutions to wireless security have been implemented on hardware devices and target specific WLAN protocols whereas the programmable security processor proposed in this paper provides support for all WLAN protocols and thus, can offer backwards compatibility as well as future upgrade ability as standards evolve. It provides this additional functionality while still achieving equivalent throughput rates to existing architectures. © 2006 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is by mapping an area that the geographer comes to understand the contours and formations of a place. The “place” in this case is the prison world. This article serves to map moments in prison demonstrating how “old” female bodies are performed under the prison gaze. In this article I will illustrate how older women subvert, negotiate, or invoke discourse as a means of reinscribing the normalizing discourses that serve to confine and define older women's experiences in prison. Female elders in prison become defined and confined by regimes of femininity and ageism. They have to endure symbolic and actual intrusions of physical privacy, which serve to remind them of what they were, where they are, and what they have become. This article will critically explore the complexity and contradictions of time use in prison and how they impact on embodied identities. By incorporating the voices of elders, I hope to draw out the contradictions and dilemmas which they experience, thereby illustrating the relationship between time, their involvement in doing time, and the performance of time in a total institution (see Goffman, 1961), and the relationship between temporality and existence. The stories of the women show how their identities are caught within the movement and motion of time and space, both in terms of the time of “the real” on the outside and within prison time. This is the in-between space of carceral time within which women live and which they negotiate. It is by being caught in this network of carceral time that they are constantly being “remade” as their body/performance of identities alters within it. While only a small percentage of the female prison population in the United Kingdom are in later life, one has to question why criminological and gerontological literature fail to address the needs of a growing significant minority.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Voice over IP (VoIP) has experienced a tremendous growth over the last few years and is now widely used among the population and for business purposes. The security of such VoIP systems is often assumed, creating a false sense of privacy. This paper investigates in detail the leakage of information from Skype, a widely used and protected VoIP application. Experiments have shown that isolated phonemes can be classified and given sentences identified. By using the dynamic time warping (DTW) algorithm, frequently used in speech processing, an accuracy of 60% can be reached. The results can be further improved by choosing specific training data and reach an accuracy of 83% under specific conditions. The initial results being speaker dependent, an approach involving the Kalman filter is proposed to extract the kernel of all training signals.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how it's doing it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ‘unitary household’ lives on in policymakers’ assumptions about couples sharing their finances. Yet financial autonomy is seen as a key issue in gender relations, particularly for women. This article draws on evidence from semi-structured individual interviews with men and women in thirty low-/moderate-income couples in Britain. The interviews explored whether financial autonomy had any meaning to these individuals; and, if so, to what extent this was gendered in the sense of there being differences in men's and women's understanding of it. We develop a framework for the investigation of financial autonomy, involving several dimensions: achieving economic independence, having privacy in one's financial affairs and exercising agency in relation to household and/or personal spending. We argue that financial autonomy is a relevant issue for low-/moderate-income couples, and that women are more conscious of tensions between financial togetherness and autonomy due to their greater responsibility for managing togetherness and lower likelihood of achieving financial independence. Policymakers should therefore not discount the aspirations of women in particular for financial autonomy, even in low-/moderate-income couples where there remain significant obstacles to achieving this. Yet plans for welfare reform that rely on means testing and ignore intra-household dynamics in relation to family finances threaten to exacerbate these obstacles and reinforce a unitary family model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Variation across research ethics boards (REBs) in conditions placed on access to medical records for research purposes raises concerns around negative impacts on research quality and on human subject protection, including privacy. Aim: To study variation in REB consent requirements for retrospective chart review and who may have access to the medical record for data abstraction. Methods: Thirty 90-min face-to-face interviews were conducted with REB chairs and administrators affiliated with faculties of medicine in Canadian universities, using structured questions around a case study with open-ended responses. Interviews were recorded, transcribed and coded manually. Results: Fourteen sites (47%) required individual patient consent for the study to proceed as proposed. Three (10%) indicated that their response would depend on how potentially identifying variables would be managed. Eleven sites (38%) did not require consent. Two (7%) suggested a notification and opt-out process. Most stated that consent would be required if identifiable information was being abstracted from the record. Among those not requiring consent, there was substantial variation in recognising that the abstracted information could potentially indirectly re-identify individuals. Concern over access to medical records by an outside individual was also associated with requirement for consent. Eighteen sites (60%) required full committee review. Sixteen (53%) allowed an external research assistant to abstract information from the health record. Conclusions: Large variation was found across sites in the requirement for consent for research involving access to medical records. REBs need training in best practices for protecting privacy and confidentiality in health research. A forum for REB chairs to confidentially share concerns and decisions about specific studies could also reduce variation in decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Political and spatial contestation in divided cities contributes to strategies of self-defense that utilize physical and spatial settings to enable the constitution of social boundaries, borders and territories.
Urban parks that are designed to ease division through an open transitional landscape can instead facilitate further segregation through their spatial order and facility layout. This paper investigates the role of the spatial design and material landscape of integrated parks in Belfast interface areas as instruments of engagement or division. It does so by analyzing the spatial organization of the parks’ facilities and the resultant ‘social voids.’ Space, time and distance were found to be effective tools for the negotiation of privacy, the manifestation of power, and the interplay of dominance and self-confidence. In the context of a divided city, strong community-culture tends to reproduce new boundaries and territories within the shared landscape. Through user interviews and spatial analysis, this paper outlines the design principles that influence spatial behavior in the urban parks of contested urban landscapes. It argues that despite granting equal access to shared public facilities, social voids and physical gaps can instill practices of division that deepen territorial barriers, both psychologically and spatially.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research reports on a survey of 228 blind and partially sighted persons in 15 health authorities across Scotland. The survey reports data on patient experience of receiving health information in accessible reading formats. Data indicated that about 90% of blind and partially sighted persons did not receive communications from various NHS health departments in a format that they could read by themselves. The implications for patient privacy, confidentiality and wider impact on life and health care are highlighted. The implications for professional ethical medical practice and for public policy are also discussed. Recommendations for improved practice are made.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cloud computing technology has rapidly evolved over the last decade, offering an alternative way to store and work with large amounts of data. However data security remains an important issue particularly when using a public cloud service provider. The recent area of homomorphic cryptography allows computation on encrypted data, which would allow users to ensure data privacy on the cloud and increase the potential market for cloud computing. A significant amount of research on homomorphic cryptography appeared in the literature over the last few years; yet the performance of existing implementations of encryption schemes remains unsuitable for real time applications. One way this limitation is being addressed is through the use of graphics processing units (GPUs) and field programmable gate arrays (FPGAs) for implementations of homomorphic encryption schemes. This review presents the current state of the art in this promising new area of research and highlights the interesting remaining open problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Asthma is now one of the most common long-term conditions in the UK. It is therefore important to develop a comprehensive appreciation of the healthcare and societal costs in order to inform decisions on care provision and planning. We plan to build on our earlier estimates of national prevalence and costs from asthma by filling the data gaps previously identified in relation to healthcare and broadening the field of enquiry to include societal costs. This work will provide the first UK-wide estimates of the costs of asthma. In the context of asthma for the UK and its member countries (ie, England, Northern Ireland, Scotland and Wales), we seek to: (1) produce a detailed overview of estimates of incidence, prevalence and healthcare utilisation; (2) estimate health and societal costs; (3) identify any remaining information gaps and explore the feasibility of filling these and (4) provide insights into future research that has the potential to inform changes in policy leading to the provision of more cost-effective care.

Methods and analysis Secondary analyses of data from national health surveys, primary care, prescribing, emergency care, hospital, mortality and administrative data sources will be undertaken to estimate prevalence, healthcare utilisation and outcomes from asthma. Data linkages and economic modelling will be undertaken in an attempt to populate data gaps and estimate costs. Separate prevalence and cost estimates will be calculated for each of the UK-member countries and these will then be aggregated to generate UK-wide estimates.

Ethics and dissemination Approvals have been obtained from the NHS Scotland Information Services Division's Privacy Advisory Committee, the Secure Anonymised Information Linkage Collaboration Review System, the NHS South-East Scotland Research Ethics Service and The University of Edinburgh's Centre for Population Health Sciences Research Ethics Committee. We will produce a report for Asthma-UK, submit papers to peer-reviewed journals and construct an interactive map.