816 resultados para public key cryptography


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose: As part of a comprehensive research study looking at implementing PPPs, interviews with experienced researchers were conducted to realize their views on private sector involvement in public works projects. Design / methodology / approach: Amongst these interviews, five were launched with academics from Hong Kong and Australia, and two were conducted with Legislative Councillors of the Hong Kong Special Administration Region (HKSAR) government. Findings: The interview findings show that both Hong Kong and Australian interviewees had previously conducted some kind of research in the field of PPP. The interviewees highlighted that “Different risk profiles” and “Private sector more innovative / efficient” were the main differences between projects that were procured by PPP and traditionally. Other differences include risk transfer. In a PPP arrangement the public sector passes on a substantial amount of the project risks to the private sector, whereas in a traditional case the public sector would take the largest responsibility in bearing these risks. Another common feature of the private sector is that they tend to be more efficient and innovative when compared to the public sector hence their expertise is often reflected in PPP projects. The interviewees agreed that the key performance indicators for PPP projects were unique depending on the individual project. The critical success factors mentioned by both groups of interviewees included “Transparent process”, “Project dependent” and “Market need”. Due to the fact that PPP projects tend to be large scaled costly projects, adequate transparency in the process is necessary in order to demonstrate that a fair selection and tendering process is conducted. A market need for the project is also important to ensure that the project will be financially secure and that the private sector can make a reasonable profit to cover their project expenditure. Originality / value: The findings from this study have enabled a comparative analysis between the views of researchers in two completely different jurisdictions. With the growing popularity to implement PPP projects, it is believed that the results presented in this paper would be of interest to the industry at large.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Public transport is one of the key promoters of sustainable urban transport. To encourage and increase public transport patronage it is important to investigate the route choice behaviours of urban public transit users. This chapter reviews the main developments of modelling urban public transit users’ route choice behaviours in a historical perspective, from the 1960s to the present time. The approaches re- viewed for this study include the early heuristic studies on finding the least-cost transit route and all-or- nothing transit assignment, the bus common lines problem, the disaggregate discrete choice models, the deterministic and stochastic user equilibrium transit assignment models, and the recent dynamic transit assignment models. This chapter also provides an outlook for the future directions of modelling transit users’ route choice behaviours. Through the comparison with the development of models for motorists’ route choice and traffic assignment problems, this chapter advocates that transit route choice research should draw inspiration from the research outcomes from the road area, and that the modelling practice of transit users’ route choice should further explore the behavioural complexities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

On the back of the growing capacity of networked digital information technologies to process and visualise large amounts of information in a timely, efficient and user-driven manner we have seen an increasing demand for better access to and re-use of public sector information (PSI). The story is not a new one. Share knowledge and together we can do great things; limit access and we reduce the potential for opportunity. The two volumes of this book seek to explain and analyse this global shift in the way we manage public sector information. In doing so they collect and present papers, reports and submissions on the topic by leading authors and institutions from across the world. These in turn provide people tasked with mapping out and implementing information policy with reference material and practical guidance. Volume 1 draws together papers on the topic by policymakers, academics and practitioners while Volume 2 presents a selection of the key reports and submissions that have been published over the last few years.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography specifically, whilst the second deals with how this form of cryptography may be applied to security related applications such as electronic cash for improving efficiency of the protocols. The objective of batch cryptography is to devise more efficient primitive cryptographic protocols. In general, these primitives make use of some property such as homomorphism to perform a computationally expensive operation on a collective input set. The idea is to amortise an expensive operation, such as modular exponentiation, over the input. Most of the research work in this field has concentrated on its employment as a batch verifier of digital signatures. It is shown that several new attacks may be launched against these published schemes as some weaknesses are exposed. Another common use of batch cryptography is the simultaneous generation of digital signatures. There is significantly less previous work on this area, and the present schemes have some limited use in practical applications. Several new batch signatures schemes are introduced that improve upon the existing techniques and some practical uses are illustrated. Electronic cash is a technology that demands complex protocols in order to furnish several security properties. These typically include anonymity, traceability of a double spender, and off-line payment features. Presently, the most efficient schemes make use of coin divisibility to withdraw one large financial amount that may be progressively spent with one or more merchants. Several new cash schemes are introduced here that make use of batch cryptography for improving the withdrawal, payment, and deposit of electronic coins. The devised schemes apply both to the batch signature and verification techniques introduced, demonstrating improved performance over the contemporary divisible based structures. The solutions also provide an alternative paradigm for the construction of electronic cash systems. Whilst electronic cash is used as the vehicle for demonstrating the relevance of batch cryptography to security related applications, the applicability of the techniques introduced extends well beyond this.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

While previous positive and normative studies have focused on the role public relations should play in organisations and the need for management in all organisations to attend to public relations (Cutlip et al., 2006), there has been little discussion in the public relations literature on why or how managers choose to enact public relations strategies for their organisations. If the discipline of public relations is to cement itself as a management function, then researchers must gain a better understanding of managers themselves given that they are the ones who decide if and how public relations strategies should be employed in the organisation. This study has sought to explore evidence of a relationship between management characteristics and their impact on decisions managers make when choosing which public relations strategies to adopt in response to changes in the organisation’s operating environment. This exploratory research study has been conducted within a specific context of schools in Queensland, Australia. Queensland schools have been facing a number of changes within their operating environment due to changes in Federal funding models in Australia’s education system. This study used an exploratory, qualitative approach to understand the management characteristics demonstrated by managers in schools and how these have impacted on the selection of public relations strategies for responding to their changing and increasingly competitive environment. The unit of analysis for this research study was principals in State (government) schools and in non-government schools. Ten principals were interviewed from four different types of schools in Queensland – the more traditional, elite, private schools (GPS Schools); other Independent Schools; Catholic Schools; and State (or public) schools. These interviews were analysed for quantitative comparisons of the managers’ characteristics across the different schools (in terms of the number of principals in each age bracket, those holding postgraduate qualifications, years of experience etc.); and for qualitative data to provide a greater sense of their understanding of public relations. The 10 schools were selected within a geographic area from Brisbane’s inner city to its outer western suburbs to include an element of competition amongst those managers being interviewed. A detailed review of government, school and other public documents was also conducted to gain an insight into the environment in which principals made decisions about public relations strategy to respond to increasing competition. This study found support for the literature on the relationship between management characteristics and strategy. However, there was also variation in findings warranting further investigation of the literature on the relationship between management characteristics and strategy in a school setting. Key relationships found in this study were between: management characteristics themselves; age and the use of public relations strategies; and gender and the use of public relations strategies. There was also evidence of support for the literature linking the impact that the combination of managers’ age, education and experience had on the use of public relations strategies. While this study was exploratory in nature, it did reveal a number of areas that require further investigation to gain a deeper understanding of how and why managers choose public relations strategies as a response to changes in their operating environment. It also provided a different framework to gain a better understanding of managers’ understanding and support of public relations in schools, which, in conjunction with an analysis of their management characteristics, will hopefully allow public relations scholars and practitioners alike gain an understanding of how and why managers use public relations strategies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article reports on a research program that has developed new methodologies for mapping the Australian blogosphere and tracking how information is disseminated across it. The authors improve on conventional web crawling methodologies in a number of significant ways: First, the authors track blogging activity as it occurs, by scraping new blog posts when such posts are announced through Really Simple Syndication (RSS) feeds. Second, the authors use custom-made tools that distinguish between the different types of content and thus allow us to analyze only the salient discursive content provided by bloggers. Finally, the authors are able to examine these better quality data using both link network mapping and textual analysis tools, to produce both cumulative longer term maps of interlinkages and themes, and specific shorter term snapshots of current activity that indicate current clusters of heavy interlinkage and highlight their key themes. In this article, the authors discuss findings from a yearlong observation of the Australian political blogosphere, suggesting that Australian political bloggers consistently address current affairs, but interpret them differently from mainstream news outlets. The article also discusses the next stage of the project, which extends this approach to an examination of other social networks used by Australians, including Twitter, YouTube, and Flickr. This adaptation of our methodology moves away from narrow models of political communication, and toward an investigation of everyday and popular communication, providing a more inclusive and detailed picture of the Australian networked public sphere.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper introduces Sapporo World Window, a screen-based application that is currently under development for the new underway passage at the centre of Sapporo City. There are ten large public screens installed in the space, displaying user-generated videos about various aspects of the city and a real-time map that visualises users’ interaction with the city. The application aims to engage the general public by functioning as a unique ‘point of connection’ for socio-cultural and technological interactions, making the space a lively social place where people can have meaningful experiences of interacting with people and places of Sapporo through mobile phones (keitai) and the public screens in the space. This paper first outlines the contextual background and key concept for the application’s design. Then the paper discusses the user interaction processes, technical specifications, and interface design, followed by the conclusions and outlook.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In cloud computing resource allocation and scheduling of multiple composite web services is an important challenge. This is especially so in a hybrid cloud where there may be some free resources available from private clouds but some fee-paying resources from public clouds. Meeting this challenge involves two classical computational problems. One is assigning resources to each of the tasks in the composite web service. The other is scheduling the allocated resources when each resource may be used by more than one task and may be needed at different points of time. In addition, we must consider Quality-of-Service issues, such as execution time and running costs. Existing approaches to resource allocation and scheduling in public clouds and grid computing are not applicable to this new problem. This paper presents a random-key genetic algorithm that solves new resource allocation and scheduling problem. Experimental results demonstrate the effectiveness and scalability of the algorithm.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Triggered by the continuing global financial crisis, most public administration systems internationally are reviewing their ability to meet public expectations in more challenging strategic environments, while satisfying the pressure from their political masters to drive down the costs of public administration. Consequently public sector organizations are under constant pressure to reform to meet not only the global economic challenges, but the need for more responsive government (Brown et al 2003). Doyle et al (2000) propose that organizational change is seldom well managed, but that the public sector faces greater difficulty in implementing corporate change than the private sector because of its unique environment, e.g. the need to deliver bureaucratically impartial outcomes. The scale of the changes required, and the constraints imposed by the context within which these changes need to occur, have intensified the need for capable public sector leadership and management. The types of capability required now extend beyond those typically required in public organizations through the efficiency drive of new public management. Acquiring these capabilities remains a key issue for public organizations. One challenge for public management, then, is leadership and management quality, including the need to recruit externally to refresh, re-energize and change the sector and its individual organizations as well as develop advanced skills among existing senior executives.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper describes the background and methodology developed and employed in undertaking research developing a Knowledge Management Strategy for a key construction focused government agency. This paper reviews this methodology and examines a likely Knowledge Management Strategy. Two central objectives structure this Case Study: 1. Identify categories of important information generated by the Building Division, Queensland Department of Public Works in its service delivery to internal and external stake-holders, and 2. Formulate an appropriate and targeted Knowledge Management Strategy to meet the needs of the Queensland Building Capital Works program. The structure of this paper includes: *Description of the Queensland construction industry setting *Review the relevant literature *Design an appropriate research methodology *Analyse results *Formulate conclusions, contributions and implications of the targeted strategy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The proliferation of media services enabled by digital technologies poses a serious challenge to public service broadcasting rationales based on media scarcity. Looking to the past and future, we articulate an important role that the Australian Broadcasting Corporation (ABC) might play in the digital age. We argue that historically the ABC has acted beyond its institutional broadcasting remit to facilitate cultural development and, drawing on the example of Pool (an online community of creative practitioners established and maintained by the ABC), point to a key role it might play in fostering network innovation in what are now conceptualised as the creative industries.