11 resultados para public integrity verification

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cyber-physical-social system (CPSS) allows individuals to share personal information collected from not only cyberspace but also physical space. This has resulted in generating numerous data at a user's local storage. However, it is very expensive for users to store large data sets, and it also causes problems in data management. Therefore, it is of critical importance to outsource the data to cloud servers, which provides users an easy, cost-effective, and flexible way to manage data, whereas users lose control on their data once outsourcing their data to cloud servers, which poses challenges on integrity of outsourced data. Many schemes have been proposed to allow a third-party auditor to verify data integrity using the public keys of users. Most of these schemes bear a strong assumption: the auditors are honest and reliable, and thereby are vulnerability in the case that auditors are malicious. Moreover, in most of these schemes, an auditor needs to manage users certificates to choose the correct public keys for verification. In this paper, we propose a secure certificateless public integrity verification scheme (SCLPV). The SCLPV is the first work that simultaneously supports certificateless public verification and resistance against malicious auditors to verify the integrity of outsourced data in CPSS. A formal security proof proves the correctness and security of our scheme. In addition, an elaborate performance analysis demonstrates that the SCLPV is efficient and practical. Compared with the only existing certificateless public verification scheme (CLPV), the SCLPV provides stronger security guarantees in terms of remedying the security vulnerability of the CLPV and resistance against malicious auditors. In comparison with the best of integrity verification scheme achieving resistance against malicious auditors, the communication cost between the auditor and the cloud server of the SCLPV is independent of the size of the processed data, meanwhile, the auditor in the SCLPV does not need to manage certificates.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Radical changes in the biosphere and human interaction with the environment are increasingly impacting on the health of populations across the world. Diseases are crossing the species barrier, and spreading rapidly through globalized transport systems. From new patterns of cancer to the threat of global pandemics, it is imperative that public health practitioners acknowledge the interdependence between the sustainability of the environment and the sustainability of the human species.* Why are issues of global and local sustainability of increasing importance to the public's health?* Why do issues of sustainability require new practices within the professions of public health?* How can future and current public health practitioners develop those new practices?Drawing on scientific evidence of global and local environmental changes, Sustainability and Health offers a thorough background and practical solutions to the overlapping issues in environment and health. It examines potential and existing responses to global and local environment and health issues, involving individuals, community, industry and government. The authors introduce a range of emerging conceptual frameworks and theoretical perspectives, link IT and epidemiology and explain how scoping can link program design, delivery, data collection and evaluation in projects from their very beginning. Public health practitioners need to be able to manage health issues that cut across environmental, economic and social systems and to develop the capacity for leadership in facilitating change. Incorporating learning activities, readings, international case studies and an open learning approach, this is a valuable resource for students of public and environmental health, as well as medical, environmental and health science professionals.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The potential for criminals and terrorism financiers to secure lucrativegovernment contracts poses a risk to Australia’s anti-money laundering,anti-corruption and counter-terrorism financing objectives. This articlecompares the customer due diligence measures that banks are required to implement to prevent money laundering and terrorism financing with the general supplier due diligence practices and processes of key Australian government departments and agencies. It identifies various weaknesses in current procurement practices relating to standard contracts and argues that these render Australian public procurement vulnerable to criminal abuse, threaten compliance with its sanctions regime and potentially undermine the crime combating objectives of its money laundering and terrorism financinglaws. The article recommends that the national interest calls for awhole-of-government approach to improve supplier due diligence in public procurement.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article takes a critical comparative approach to examining autonomous schooling in the United States and Australia. Amid the market imperatives currently driving education priorities, its focus is on how autonomy can be mobilized in ways that preserve the integrity of public education. Through reference to key debates and research about school autonomy in the United States and Australia, integrity is defined with reference to three values: (1) public ownership (i.e., governance that is responsive to the people it serves), (2) equity and access (i.e., adequate funding and inclusive student admission practices), and (3) public purpose (i.e., prioritizing the moral and social purposes of education; Darling-Hammond and Montgomery 2008). The analysis is mindful of the resonances and differences between the education systems in the United States and Australia and the fluidity and complexity of the notion of autonomous schooling. Against this backdrop, the article illustrates the significance of embedding these values within school autonomy policy in order to preserve the integrity of public education.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a recent study, Damian Cox, Marguerite La Caze and Michael P. Levine argue for a complex conception of integrity. But they leave two questions unanswered. The first is whether integrity is of greater importance to the agent's own sense of themselves or whether it is a virtue that is of social significance. The bulk of the literature on this virtue stresses its existential import. However, considerable weight should be given to its social significance. It should be linked to the essentially social reaction of shame, as opposed to the existential and personal reaction of guilt. The second question is whether the virtue of integrity has been analysed in such general terms that no specific meaning can be given to the virtue. Being a person of integrity might just collapse into being a virtuous person. This essay offers a distinctive account of integrity by asking what it is to act from the virtue in particular contexts that require public trust.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Systematic reviews of public health interventions are fraught with challenges. Complexity is inherent; this may be due to multi-component interventions, diverse study populations, multiple outcomes measured, mixed study designs utilized and the effect of context on intervention design, implementation and effectiveness. For policy makers and practitioners to use systematic reviews to implement effective public health programmes, systematic reviews must include this information, which seeks to answer the questions posed by decision makers, including recipients of programmes. This necessitates expanding the traditional evaluation of evidence to incorporate the assessment of theory, integrity of interventions, context and sustainability of the interventions and outcomes. Unfortunately however, the critical information required for judging both the quality of a public health intervention and whether or not an intervention is worthwhile or replicable is missing from most public health intervention studies. When the raw material is not available in primary studies the systematic review process becomes even more challenging. Systematic reviews, which highlight these critical gaps, may act to encourage better reporting in primary studies. This paper provides recommendations to reviewers on the issues to address within a public health systematic review and, indirectly, provides advice to researchers on the reporting requirements of primary studies for the production of high quality systematic reviews.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite the perennial nature of the problem of gratuities in considerations of police ethics, many prior analyses of this issue have rested on anecdotal, piecemeal or hypothetical considerations.. This paper draws on a unique sample of actual complaint cases involving gratuities, providing evidence of a range of public concerns about the problem. Gratuities are analysed and contextualised by reference to the concept of conflict of interest, which draws attention to the potential for the performance of public duty to be tainted in fact or appearance. In either case, public trust in the integrity of the police is damaged, giving rise to "political optics" as a key problem with gratuities.  The paper argues that an accountability ethos must be developed to promote active responsibility and a preparedness to prioritise the public interest in policing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to re-authenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cloud computing is establishing itself as the latest computing paradigm in recent years. As doing science in the cloud is becoming a reality, scientists are now able to access public cloud centers and employ high-performance computing resources to run scientific applications. However, due to the dynamic nature of the cloud environment, the usability of scientific cloud workflow systems can be significantly deteriorated if without effective service quality assurance strategies. Specifically, workflow temporal verification as the major approach for workflow temporal QoS (Quality of Service) assurance plays a critical role in the on-time completion of large-scale scientific workflows. Great efforts have been dedicated to the area of workflow temporal verification in recent years and it is high time that we should define the key research issues for scientific cloud workflows in order to keep our research on the right track. In this paper, we systematically investigate this problem and present four key research issues based on the introduction of a generic temporal verification framework. Meanwhile, state-of-the-art solutions for each research issue and open challenges are also presented. Finally, SwinDeW-V, an ongoing research project on temporal verification as part of our SwinDeW-C cloud workflow system, is also demonstrated.