78 resultados para Network security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Involvement of salivary glands with mucosa-associated lymphoid tissue (MALT) lymphoma is rare. This retrospective study was performed to assess the clinical profile, treatment outcome, and prognostic factors of MALT lymphoma of the salivary glands.Methods and Materials: Thirteen member centers of the Rare Cancer Network from 10 countries participated, providing data on 63 patients. The median age was 58 years; 47 patients were female and 16 were male. The parotid glands were involved in 49 cases, submandibular in 15, and minor glands in 3. Multiple glands were involved in 9 patients. Staging was as follows: IE in 34, IIE in 12, IIIE in 2, and IV in 15 patients.Results: Surgery (S) alone was performed in 9, radiotherapy (RI) alone in 8, and chemotherapy (CT) alone in 4 patients. Forty-one patients received combined modality treatment (S + RT in 23, S + CT in 8, RT + CT in 4, and all three modalities in 6 patients). No active treatment was given in one case. After initial treatment there was no tumor in 57 patients and residual tumor in 5. Tumor progression was observed in 23 (36.5%) (local in 1, other salivary glands in 10, lymph nodes in 11, and elsewhere in 6). Five patients died of disease progression and the other 5 of other causes. The 5-year disease-free survival, disease-specific survival, and overall survival were 54.4%, 93.2%, and 81.7%, respectively. Factors influencing disease-free survival were use of RI, stage, and residual tumor (p < 0.01). Factors influencing disease-specific survival were stage, recurrence, and residual tumor (p < 0.01).Conclusions: To our knowledge, this report represents the largest series of MALT lymphomas of the salivary glands published to date. This disease may involve all salivary glands either initially or subsequently in 30% of patients. Recurrences may occur in up to 35% of patients at 5 years; however, survival is not affected. Radiotherapy is the only treatment modality that improves disease-free survival. (C) 2012 Elsevier Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is no doubt about the necessity of protecting digital communication: Citizens are entrusting their most confidential and sensitive data to digital processing and communication, and so do governments, corporations, and armed forces. Digital communication networks are also an integral component of many critical infrastructures we are seriously depending on in our daily lives. Transportation services, financial services, energy grids, food production and distribution networks are only a few examples of such infrastructures. Protecting digital communication means protecting confidentiality and integrity by encrypting and authenticating its contents. But most digital communication is not secure today. Nevertheless, some of the most ardent problems could be solved with a more stringent use of current cryptographic technologies. Quite surprisingly, a new cryptographic primitive emerges from the ap-plication of quantum mechanics to information and communication theory: Quantum Key Distribution. QKD is difficult to understand, it is complex, technically challenging, and costly-yet it enables two parties to share a secret key for use in any subsequent cryptographic task, with an unprecedented long-term security. It is disputed, whether technically and economically fea-sible applications can be found. Our vision is, that despite technical difficulty and inherent limitations, Quantum Key Distribution has a great potential and fits well with other cryptographic primitives, enabling the development of highly secure new applications and services. In this thesis we take a structured approach to analyze the practical applicability of QKD and display several use cases of different complexity, for which it can be a technology of choice, either because of its unique forward security features, or because of its practicability.