12 resultados para security analysis

em University of Queensland eSpace - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Grid computing is an emerging technology for providing the high performance computing capability and collaboration mechanism for solving the collaborated and complex problems while using the existing resources. In this paper, a grid computing based framework is proposed for the probabilistic based power system reliability and security analysis. The suggested name of this computing grid is Reliability and Security Grid (RSA-Grid). Then the architecture of this grid is presented. A prototype system has been built for further development of grid-based services for power systems reliability and security assessment based on probabilistic techniques, which require high performance computing and large amount of memory. Preliminary results based on prototype of this grid show that RSA-Grid can provide the comprehensive assessment results for real power systems efficiently and economically.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Two nuclear crises recently haunted the Korean peninsula, one in 1993/4, the other in 2002/3. In each case the events-were strikingly similar: North Korea made public its ambition to acquire nuclear weapons and withdrew from the Nonproliferation Treaty. Then the situation rapidly deteriorated until the peninsular was literally on the verge of war. The dangers of North Korea's actions, often interpreted as nuclear brinkmanship, are evident. and much discussed, but not so the underlying patterns that have shaped the conflict in the first place. This article sheds light on some of them. It examines the role of the United States in the crisis, arguing that Washington's inability to see North Korea as anything but a threatening 'rogue state' seriously hinders both an adequate understanding and possible resolution of the conflict. Particularly significant is the current policy of pre-emptive strikes against rogue states, for it reinforces half a century of American nuclear threats towards North Korea. The problematic role of these threats has been largely obscured, not least because the highly technical discourse of security analysis has managed to present the strategic situation on the peninsula in a manner that attributes responsibility for the crisis solely to North Korea's actions, even if the situation is in reality far more complex and interactive.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This article examines ways in which art can help broaden understandings of contemporary security challenges, especially in view of the limits of conventional forms of strategic and policy analysis. The article focuses especially on responses to 9/11 in literature, the visual arts, architecture, and music, and considers some epistemological questions about the status of art as a way of knowing political events, like those of 9/11, that escape state-based forms of security analysis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Young people from refugee backgrounds face enormous challenges in the settlement process within Australia. They must locate themselves within a new social, cultural, geographic and adult space, yet also try to find security within the spaces of their own families and ethnic communities. Traumas of the past can mix with painful experiences of the present. The stressors in the lives of these young people can be both complex and diverse. This paper explores the nature a/these stressors among young people from refugee backgrounds living in Australia. [t is based On in-depth interviews with 76 young people from refugee backgrounds now living in Brisbane, Adelaide and Perth. A qualitative analysis of the impact of these stressors as well as the coping strategies employed are discussed It is argued that trauma exists

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims: To determine if general practitioners' (GPs) experience of education on alcohol, support in their working environment for intervening with alcohol problems, and their attitudes have an impact on the number of patients they manage with alcohol problems. Methods: 1300 GPs from nine countries were surveyed with a postal questionnaire as part of a World Health Organization (WHO) collaborative study. Results: GPs who received more education on alcohol (OR = 1.5; 95% CI, 1.3-1.7), who perceived that they were working in a supportive environment (OR = 1.6; 95% CI, 1.4-1.9), who expressed higher role security in working with alcohol problems (OR = 2.0; 95% CI, 1.5-2.5) and who reported greater therapeutic commitment to working with alcohol problems (OR = 1.4: 95% CI, 1.1-1.7) were more likely to manage patients with alcohol-related harm. Conclusion: Both education and support in the working environment need to be provided to enhance the involvement of GPs in the management of alcohol problems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information security devices must preserve security properties even in the presence of faults. This in turn requires a rigorous evaluation of the system behaviours resulting from component failures, especially how such failures affect information flow. We introduce a compositional method of static analysis for fail-secure behaviour. Our method uses reachability matrices to identify potentially undesirable information flows based on the fault modes of the system's components.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Although computer technology is central to the operation of the modern welfare state, there has been little analysis of its role or of the factors shaping the way in which it is used. Using data generated by expert informants from 13 OECD countries, this paper provides an indicative comparison of the aims of computerization in national social security systems over a 15-year period from 1985 to 2000. The paper seeks to identify and explain patterns in the data and outlines and examines four hypotheses. Building on social constructivist accounts of technology, the first three hypotheses attribute variations in the aims of computerization to different welfare state regimes, forms of capitalism, and structures of public administration. The fourth hypothesis, which plays down the importance of social factors, assumes that computerization is adopted as a means of improving operational efficiency and generating expenditure savings. The findings suggest that, in all 13 countries, computerization was adopted in the expectation that it would lead to increased productivity and higher standards of performance, thus providing most support for the fourth hypothesis. However, variations between countries suggest that the sociopolitical values associated with different welfare state regimes have also had some effect in shaping the ways in which computer technology has been used in national social security systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.