811 resultados para RSA public-key cryptography
Resumo:
Research on the impact of Information Systems (IS) reported in both academic literature and popular press has reported confounding results. Some studies have reported encouraging results of IS, while others have reported nil or detrimental results. The contradictory results of these research studies can be partially attributed to the weaknesses in survey instruments. In an attempt to increase the validity of conclusions of IS assessment studies, survey instrument design should follow a rigorous and scientific procedure. This paper illustrates key validity and reliability issues in measuring Information Systems performance, using examples from a study designed to assess Enterprise Resource Planning systems success. The article emphasizes on the importance of the survey method and the theoretical considerations of item derivation, scale development and item evaluation. Examples are provided from the ERP assessment study to supplement the readers understanding of the theoretical concepts of survey design.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
It's Not About The Money! Key Drivers of Satisfaction With Government Third-Party Complaint Handling
Resumo:
Networks are having a profound impact on the way society is organised at the local, national and international level. Networks are not ‘business as usual’. The defining feature of networks and a key indicator for their success is the strength and quality of the interactions between members. This relational power of networks provides the mechanism to bring together previously dispersed and even competitive entities into a collective venture. Such an operating context demands the ability to work in a more horizontal, relational manner. In addition a social infrastructure must be formed that will support and encourage efforts to become more collaborative. This paper seeks to understand how network members come to know about working in networks, how they work on their relationships and create new meanings about the nature of their linked work. In doing so, it proposes that learning, language and leadership, herein defined as the ‘3Ls’ represent critical mediating aspects for networks.
Resumo:
Purpose: The determination of the most appropriate procurement system for a capital works project is a challenging task for public sector clients considering the array of assessment criteria that are considered and the procurement methods that are available. This is particularly pertinent to the Western Australian public sector where they have had a propensity to use traditional lump sum as the default procurement solution despite knowing that the selection of an inappropriate procurement method may lead to cost and time overruns, claims, and disputes’ on projects. This paper presents a six step procurement method evaluation approach that requires public sector agencies to consider in detail an array of options so as to obtain value for money. Design/methodology/approach: A procurement evaluation approach is developed and is examined using a focus group of 12 participants comprising of a public sector client, project team and key stakeholders. The focus group was used to examine the developed approach in the context of a real-life capital works project. Findings: The procurement method evaluation approach was deemed to be pragmatic and enabled decision-makers to re-evaluate outcomes from previous steps in the process. All focus group participants stated the six step process enabled a recommendation that was grounded in reflection and detailed evaluation. Practical implications: The developed procurement approach has enabled the public sector client evaluate the way in which they view procurement method selection and examine how they obtain ‘value for money’. Originality/value: The six step procurement approach makes use of quantitative and qualitative techniques and is reliant on discourse and reflection in making a procurement method recommendation. Consequently, the approach enables public sector clients to account for the complexities often associated with procurement selection.
Resumo:
Is the environment more arduous for knowledge sharing in a public sector organisation? The organising principles, operations, internal environment and power relations of public sector organisations exhibit distinctive characteristics in a range of dimensions which differ from corporate sector organisations (Moynihan & Pandey, 2007). This paper discusses the findings of a study that explored the impact on knowledge sharing of environmental and relational issues in a public sector organisation. Individual knowledge sharing orientation and behaviour was found to be profoundly influenced by factors in the macro-level environment, locally constructed practices, and workers’ perceptions of their relations with the organisation and their colleagues. Key words: knowledge management, public sector, knowledge sharing
Resumo:
Over the last few decades, most large cities in the developing world have been experiencing rapid and imbalanced transport sector development resulting in severe congestion and poor levels of service. The most common response at a policy level under this circumstance has been to focus on private and public motorized transport modes, and especially on traffic control measures and mass transit systems. Despite their major role in the overall transport system in many developing cities in Asia & Latin America, relatively little attention is given to non-motorized transport (NMT) modes (walk, bicycle and cycle-rickshaw). In particular, this ideology is applicable to the paid category of non-motorized public transport (NMPT), notably three-wheeler cycle rickshaws that still have an important socio-economic, environmental and trip-making role in many developing cities. Despite, they are often seen as inefficient and backward; an impediment to progress; and inconsistent with modern urban image. Policy measures therefore, to restrict or eliminate non-motorized transport from urban arterials and other feeder networks have been implemented in cities as diverse as Dhaka, Delhi, Karachi, Bangkok, Jakarta, Manila, Surabaya and Beijing . This paper will primarily investigate the key contribution of NMPT in the sustainable transport system and urban fabric of developing cities, with Dhaka as case study. The paper will also highlight in detail the impediments towards NMPT development and provide introductory concept on possible role this mode is expected to play into the future of these cities
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
Public health educational pathways in Australia have traditionally been the province of Universities, with the Master of Public Health (MPH) recognised as the flagship professional entry program. Public health education also occurs within the fellowship training of the Faculty of Public Health Medicine, but within Australia this remains confined to medical graduates. In recent years, however, we have seen a proliferation of undergraduate degrees as well as an increasing public health presence in the Vocational Education and Training (VET) sector. ----- Following the 2007 Australian Federal election, the new Labour government brought with it a refreshing commitment to a more inclusive and strategic style of government. An important example of this was the 2020 visioning process that identified key issues of public health concern, including an acknowledgment that it was unacceptable to allocate less than 2% of the health budget towards disease prevention. This led to the recommendation for the establishment of a national preventive health agency (Australia: the healthiest country by 2020 National Preventative Health Strategy, Prepared by the Preventative Health Taskforce 2009). ----- The focus on disease prevention places a spotlight on the workforce that will be required to deliver the new investment in health prevention, and also on the role of public health education in developing and upskilling the workforce. It is therefore timely to reflect on trends, challenges and opportunities from a tertiary sector perspective. Is it more desirable to focus education efforts on selected lead issues such as the “obesity epidemic”, climate change, Indigenous health and so on, or on the underlying theory and skills that build a flexible workforce capable of responding to a range of health challenges? Or should we aspire to both? ----- This paper presents some of the key discussion points from 2008 – 2009 of the Public Health Educational Pathways workshops and working group of the Australian Network of Public Health Institutions. We highlight some of the competing tensions in public health tertiary education, their impact on public health training programs, and the educational pathways that are needed to grow, shape and prepare the public health workforce for future challenges.
Resumo:
This presentation outlines key aspects of public policy in broad terms insofar as they relate to establishment, implementation and compliance with legal measurement standards. It refers in particular to traceability of a legal measurement unit from its source in a single international standard as a compliance issue. It comments on accreditation of legal measurement and liability concerned with errors in measurement.
Resumo:
Researching administrative history is problematical. A trail of authoritative documents is often hard to find; and useful summaries can be difficult to organise, especially if source material is in paper formats in geographically dispersed locations. In the absence of documents, the reasons for particular decisions and the rationale underpinning particular policies can be confounded as key personnel advance in their professions and retire. The rationale for past decisions may be lost for practical purposes; and if an organisation’s memory of events is diminished, its learning through experience is also diminished. Publishing this document tries to avoid unnecessary duplication of effort by other researchers that need to venture into how policies of charging for public sector information have been justified. The author compiled this work within a somewhat limited time period and the work does not pretend to be a complete or comprehensive analysis of the issues.----- A significant part of the role of government is to provide a framework of legally-enforceable rights and obligations that can support individuals and non-government organisations in their lawful activities. Accordingly, claims that governments should be more ‘business-like’ need careful scrutiny. A significant supply of goods and services occurs as non-market activity where neither benefits nor costs are quantified within conventional accounting systems or in terms of money. Where a government decides to provide information as a service; and information from land registries is archetypical, the transactions occur as a political decision made under a direct or a clearly delegated authority of a parliament with the requisite constitutional powers. This is not a market transaction and the language of the market confuses attempts to describe a number of aspects of how governments allocate resources.----- Cost recovery can be construed as an aspect of taxation that is a sole prerogative of a parliament. The issues are fundamental to political constitutions; but they become more complicated where states cede some taxing powers to a central government as part of a federal system. Nor should the absence of markets be construed necessarily as ‘market failure’ or even ‘government failure’. The absence is often attributable to particular technical, economic and political constraints that preclude the operation of markets. Arguably, greater care is needed in distinguishing between the polity and markets in raising revenues and allocating resources; and that needs to start by removing unhelpful references to ‘business’ in the context of government decision-making.
Resumo:
With growing concern over the use of the car in our urbanized society, there have emerged a number of lobby groups and professional bodies promoting a return to public transport, walking and cycling, with the urban village as the key driving land use, as a means of making our cities’ transportation systems more sustainable. This research has aimed at developing a framework applicable to the Australian setting that can facilitate increased passenger patronage of rail based urban transport systems from adjacent or associated land uses. The framework specifically tested the application of the Park & Ride and Transit Oriented Development (TOD) concepts and their applicability within the cultural, institutional, political and transit operational characteristics of Australian society. The researcher found that, although the application of the TOD concept had been limited to small pockets of town houses and mixed use developments around stations, the development industry and emerging groups within the community are posed to embrace the concept and bring with it increased rail patronage. The lack of a clear commitment to infrastructure and supporting land uses is a major barrier to the implementation of TODs. The research findings demonstrated significant scope for the size of a TOD to expand to a much greater radius of activity from the public transport interchange, than the commonly quoted 400 to 600 meters, thus incorporating many more residents and potential patrons. The provision of Park & Rides, and associated support facilities like Kiss & Rides, have followed worldwide trends of high patronage demands from the middle and outer car dependent suburbs of our cities. The data collection and analysis gathered by the researcher demonstrated that in many cases Park & Rides should form part of a TOD to ensure ease of access to rail stations by all modes and patron types. The question, however, remains how best to plan the incorporation of a Park & Ride within a TOD and still maintain those features that attract and promote TODs as a living entity.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.
Resumo:
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.