57 resultados para formal verification

em Deakin Research Online - Australia


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space. This has resulted in generating numerous data at a user's local storage. However, it is very expensive for users to store large data sets, and it also causes problems in data management. Therefore, it is of critical importance to outsource the data to cloud servers, which provides users an easy, cost-effective, and flexible way to manage data, whereas users lose control on their data once outsourcing their data to cloud servers, which poses challenges on integrity of outsourced data. Many schemes have been proposed to allow a third-party auditor to verify data integrity using the public keys of users. Most of these schemes bear a strong assumption: the auditors are honest and reliable, and thereby are vulnerability in the case that auditors are malicious. Moreover, in most of these schemes, an auditor needs to manage users certificates to choose the correct public keys for verification. In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that the SCLPV is efficient and practical. Compared with the only existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. In comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server of the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The market for insurance has become increasingly competitive in recent years. However, it has not always been so. At the end of the nineteenth century, it was characterized by a highly concentrated and tightly controlled oligopolistic market structure. As such, the history of the fire insurance industry provides an interesting case study in the development of collusive behaviour amongst firms. Up to 1897, pricing agreements among firms were generally short-lived, and were followed by periods of intense competition. After this point, an agreement was forged, which proved very resilient to market pressures and formed the basis of premium rate setting until the 1970s. This paper investigates the difference between this agreement and previous efforts to set premium rates, and points to some of the common features of the later compact, which explain its longevity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents the findings from an empirical study examining the relationship between total quality management (TQM) practices and quality performance in Australian organizations. A comparison is made between organizations that have adopted formal TQM programs and organizations without a formal program in place. It was recognized that the lack of a formal program did not necessarily mean TQM principles were not being practiced. The findings show that the firms adopting formal TQM programs implement several TQM practices at a higher level than those that do not have TQM programs. This difference, however, is not apparent in the case of quality performance. Furthermore, the findings show the strong links between TQM practices and quality performance, and there is no significant difference between organizations implementing formal TQM programs and those organizations simply adopting TQM practices. This suggests that it is the adoption of quality practices that matters rather than formal programs per se.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The assessment of children in their years before school and their first years of school has been, traditionally, informal. Further, assessment of children's mathematical skills at this level has been infrequent compared to social, emotional and physical assessments. However, there are contexts where reliable, valid, standardised data from assessment in mathematics are required. This paper outlines the development of two assessment tools for mathematics that were originally developed for such contexts. Item Response Theory (IRT) analyses enabled the construction of assessment forms that address the range of abilities of 4- to 8-year-old children, and provided the scales used for constructing formative and summative reports of achievement. A description of the development of the assessment tools and the IRT analysis that provides the reporting formats are presented together with some research uses of the tools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a fonnal ranking of the popularity of financial ratios in modeling corporate collapse. The analysis identified 48 financial ratios and ranked them according to their usefulness as portrayed in 53 studies that have utilized such ratios in modeling corporate collapse. The methodologies adopted in those studies are predominantly of the "multivariate" type. The 53 studies extend from 1966 to 2002, inclusive.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the influence of the level of interpersonal trust between superior and subordinate managers on the control behaviour of the former. On the basis of a questionnaire survey and interviews of senior managers from business organisations in Sri Lanka, and a survey of managers in Beijing-China the study explores the control behaviour of superior managers when their trust in a subordinate is high or low. Sri Lanka and China, societies in which the dependence on interpersonal trust is believed to be high, were chosen for the study to maximise the effect of interpersonal trust.

The findings of this study indicate that a superior’s high (low) trust in a subordinate is associated with a low (high) level of monitoring and a high (low) level of social interactions. The hypothesis that a superior’s high (low) level of trust is associated with a low (high) level of reliance on formal control was supported only in the Sri Lankan sample. These findings are at least indicative of control behaviour of superior managers in Sri Lanka and China and possibly of other countries in Asia. An understanding of the trust-sensitive control behaviour of managers in this region is particularly important for designing and implementing effective control systems for international organizations operating in the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kanban Control Systems (KCS) have become a widely accepted form of inventory and production control. The creation of realistic Discrete Events Simulation (DES) models of KCS require specification of both information and material flow. There are several commercially available simulation packages that are able to model these systems although the use of an application specific modelling language provides means for rapid model development. A new Kanban specific simulation language as well as a high-speed execution engine is verified in this paper through the simulation of a single stage single part type production line. A single stage single part KCS is modelled with exhaustive enumeration of the decision variables of container sizes and number of Kanbans. Several performance measures were used; 95% Confidence Interval (CI) of container Flow Time (FT), mean line throughput as well as the Coefficient of Variance (CV) of FT and Cycle Time were used to determine the robustness of the control system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In line with the current global trend of economic and social restructuring, it has become essential to address the issue of poverty and social protection for the poorer segment of the population who are not covered by formal social protection mechanisms. Micro finance institutions (MFIs) in developing countries have been working towards poverty alleviation and enhancing social protection for the last few decades. MFI’s provision of financial assistance to the poor has been instrumental in improving the overall quality of the impoverished. Based on an in-depth qualitative study conducted across three different types of NGOs (Non Governmental Organization) in the Philippines, this study found a relationship between micro finance programs and improved social protection. The study reveals that MFIs have the ability to make a positive impact on areas such as entrepreneurship, education, housing, job security and income generation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current study investigated the relationship between career-related mentoring, psychosocial mentoring, business success, and self-esteem in participants of a program that was designed to assist in the establishment of a new business. Seventy-seven protégés and their matched mentors were included in the study. A comparison of mentor and protégé perceptions revealed that mentors considered themselves to provide higher levels of psychosocial support than did the protégés. Protégé perceptions of business success were predicted by the frequency of mentor contact and the level of career-related support provided by their mentor.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study is concerned with the role of interpersonal trust in management control. On the basis of a questionnaire survey and interviews of senior managers from business organisations in sri lanka, the study explores the control behaviour of superior managers when they trust or distrust their subordinates. Sri lanka, a society in which the dependence on interpersonal trust is high, was chosen for the study to maximise the effect of interpersonal trust.

The findings of this study indicate that a superior's high trust in a subordinate is associated with a low level of monitoring, a high level of social interactions, and a low reliance on formal controls. In contrast, a superior's low level of trust in a subordinate is associated with a high level of monitoring, a low level of social interactions, and a high reliance on formal controls. Because the data emanate from experienced senior managers, these findings are at least indicative of control behaviour of superior managers in sri lanka and possibly of similar countries in asia. An understanding of the control behaviour of managers in this region is particularly important for designing and implementing effective controls systems for firms, subsidiaries, branches or joint-ventures operating in the region.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Students are a primary product of the management education system. To assess the impact of a basic course, the change in competencies of students over the duration of the course is examined. This study found that even a basic subject design had a significant and substantial impact on the competence development of the students. From the perspective of students-as-products, the baseline provided here allows for the testing of alternative designs of educational systems, whereby alternative designs have to prove a benefit above and beyond that of a basic teaching system.