93 resultados para REGULATORY INFRASTRUCTURE

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The regulatory environment in which the Australian life insurance industry operates has its antecedents in two major periods of legislative intervention. The first established the principle of ‘freedom with disclosure’ in the 1870s, which has since formed the basis of the regulatory approach. In the 1940s, the second refined the concept in the context of a general recognition of an interventionist approach to financial markets. It is suggested that regulation of the life insurance market in Australia came about not in response to problems associated with market failure but in reaction to external influences not directly related to conditions in the Australian life insurance industry. This was impacted not only on the timing of intervention but on the approach taken as well.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent trends in grid computing development is moving towards a service-oriented architecture. With the momentum gaining for the service-oriented grid computing systems, the issue of deploying support for integrated scheduling and fault-tolerant approaches becomes paramount importance. To this end, we propose a scalable framework that loosely couples the dynamic job scheduling approach with the hybrid replications approach to schedule jobs efficiently while at the same time providing fault-tolerance. The novelty of the proposed framework is that it uses passive replication approach under high system load and active replication approach under low system loads. The switch between these two replication methods is also done dynamically and transparently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays Distributed Denial of Service (DDoS) attacks have made one of the most serious threats to the information infrastructure. In this paper we firstly present a new filtering approach, Mark-Aided Distributed Filtering (MADF), which is to find the network anomalies by using a back-propagation neural network, deploy the defense system at distributed routers, identify and filtering the attack packets before they can reach the victim; and secondly propose an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. According to the experimental results, we find that MADF can detect and filter DDoS attack packets with high sensitivity and accuracy, thus provide high legitimate traffic throughput and low attack traffic throughput. Through the comparison between experiments and numerical results, we also demonstrate the validity of the analytical model that can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose an architecture of accounting and payment services for service-oriented grid computing systems. The proposed accounting and payment services provide the mechanisms for service providers to be paid for authorized use of their resources. It supports the recording of usage data, secure storage of that data, analysis of that data for purposes of billing and so forth. It allows a variety of payment methods, it is scalable, secure, convenient, and reduce the overall cost of payment processing while taking into account requirements of Grid computing systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article considers the efficacy of the two main legislative models in Australia which make racial vilification a crime. To this end, it considers whether the laws are compatible with the protection and promotion of freedom of speech; whether they sit comfortably within the existing criminal law frameworks; and whether the text of the offences is sufficiently clear and precise. It considers that the current models are fundamentally flawed and ought to be repealed, arguing, instead, for a particular kind of penalty enhancement statute.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Firms must often invest in large-scale capacity expansions in order to service their expectation of future demand. This is known as provisioning. This paper introduces and examines issues and contributions in optimal provisioning theory. It discusses some regulatory distortions and suggests how an awareness of optimal provisioning can improve regulatory outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure management of Australia's commercial critical infrastructure presents ongoing challenges to owners and the government. Currently a high-level iriformation sharing collaboration between the government and business manages complex security issues, but critical irifrastructure protection also lacks a scalable model exhibiting the overall structure of critical infrastructure at various levels, sectors and sub-sectors. This research builds on the work of Marasea and Warren (2003) to establish a representative model of Australia's critical irifrastructure; discusses the boundaries between critical infrastructures, and considers the existence andpotential irifluence ofcritical irifrastructure relationships.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security is now recognised as critical factor within the healthcare industry. With the gradual move from paper -based to electronic information there is an even greater need for protection. However, financial and operational constraints often exist which influence the practicality of developing a secure system. A new baseline security standard, the Health Information Security Management Implementation Guide, has been drafted which applies specifically to the unique information security requirements of the healthcare industry. The aim of this paper is to look at the effectiveness of the health information security standard and the development of information security within the Australian healthcare industry.